CVE-2024-33867
📋 TL;DR
Linqi versions before 1.4.0.1 on Windows contain a hardcoded password salt, which weakens password security by making password hashes predictable. This affects all Windows users of Linqi software versions below 1.4.0.1. Attackers could potentially crack passwords more easily if they obtain password hashes.
💻 Affected Systems
- Linqi
📦 What is this software?
Linqi by Linqi
⚠️ Risk & Real-World Impact
Worst Case
Attackers could precompute rainbow tables using the known salt and crack user passwords from stolen password hashes, leading to account compromise and potential lateral movement.
Likely Case
If password hashes are exposed through another vulnerability, attackers could more efficiently crack passwords using the predictable salt, compromising individual user accounts.
If Mitigated
With strong password policies and proper access controls limiting hash exposure, the impact is reduced to theoretical risk with minimal practical exploitation.
🎯 Exploit Status
Exploitation requires access to password hashes through another vulnerability or system access; cannot be exploited directly without hash access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.4.0.1
Vendor Advisory: https://linqi.help/Updates/en#/SecurityUpdates
Restart Required: Yes
Instructions:
1. Download Linqi version 1.4.0.1 from official sources. 2. Run the installer to upgrade. 3. Restart the Linqi service or system. 4. Verify the version is 1.4.0.1 or higher.
🔧 Temporary Workarounds
Enforce password rotation
allRequire all users to change passwords after patching to generate new hashes with proper salts.
Restrict access to password storage
allImplement strict access controls to prevent unauthorized access to password hashes.
🧯 If You Can't Patch
- Migrate to Linux/macOS version of Linqi if possible, as they are not affected.
- Implement network segmentation to isolate vulnerable systems and monitor for unauthorized access attempts.
🔍 How to Verify
Check if Vulnerable:
Check Linqi version in application settings or via 'linqi --version' command; if version is below 1.4.0.1 on Windows, it is vulnerable.
Check Version:
linqi --version
Verify Fix Applied:
Confirm version is 1.4.0.1 or higher and check that password hashing uses unique salts (may require code review or vendor confirmation).
📡 Detection & Monitoring
Log Indicators:
- Unusual access patterns to password databases or authentication logs
- Failed login attempts followed by successful logins from unexpected locations
Network Indicators:
- Suspicious outbound connections from Linqi servers to unknown IPs
- Unusual authentication traffic patterns
SIEM Query:
source="linqi_logs" AND (event_type="authentication" OR event_type="password_change") | stats count by user, src_ip