CVE-2024-39334

6.5 MEDIUM

📋 TL;DR

MENDELSON AS4 client software before version 2024 B376 has a deserialization vulnerability where malicious XML data from a trading partner can trigger arbitrary file writes on the victim's computer when transaction details are viewed. This affects all users running vulnerable client versions. The server component is not vulnerable.

💻 Affected Systems

Products:
  • MENDELSON AS4 Client
Versions: All versions before 2024 B376
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only the client software is affected. Server installations are not vulnerable. Requires user interaction to view malicious transaction details.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could write malicious files to the victim's system, potentially leading to remote code execution, data theft, or system compromise.

🟠

Likely Case

An attacker with access to the trading partner network could deliver malicious XML payloads that write files to client systems, potentially deploying malware or stealing credentials.

🟢

If Mitigated

With proper network segmentation and client hardening, impact is limited to isolated client systems without critical data.

🌐 Internet-Facing: LOW - The vulnerability requires client interaction with specific XML data, not directly internet-exposed services.
🏢 Internal Only: MEDIUM - Requires malicious trading partner or compromised internal user to deliver payload, but can affect multiple client systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires the victim to open transaction details containing malicious XML. Attacker needs ability to send XML data as a trading partner.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024 B376 or later

Vendor Advisory: https://mendelson-e-c.com/node/27845

Restart Required: Yes

Instructions:

1. Download latest version from vendor website. 2. Backup configuration. 3. Install update. 4. Restart AS4 client services.

🔧 Temporary Workarounds

Restrict Trading Partner Access

all

Limit which trading partners can send XML data to only trusted entities

Client Application Control

windows

Implement application whitelisting to prevent unauthorized file writes

🧯 If You Can't Patch

  • Implement strict network segmentation between trading partner networks and client systems
  • Configure client systems with minimal user privileges and restrict write permissions to sensitive directories

🔍 How to Verify

Check if Vulnerable:

Check AS4 client version in Help > About menu. If version is earlier than 2024 B376, system is vulnerable.

Check Version:

Not applicable - check via GUI Help > About menu

Verify Fix Applied:

Confirm version shows 2024 B376 or later in Help > About menu. Test with known safe XML transactions.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file write operations from AS4 client process
  • Large or malformed XML transactions from trading partners

Network Indicators:

  • Unusual XML payloads in AS4 protocol traffic
  • Suspicious trading partner connections

SIEM Query:

process_name:"as4client.exe" AND file_write_operation:* AND NOT file_path:"C:\\Program Files\\MENDELSON\\*"

🔗 References

📤 Share & Export