CVE-2024-42197
📋 TL;DR
HCL Workload Scheduler stores user credentials in plain text files that can be read by local users on the system. This vulnerability allows unauthorized access to sensitive authentication data, affecting all users of vulnerable versions who have local access to the system.
💻 Affected Systems
- HCL Workload Scheduler
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Local attackers gain administrative credentials, leading to complete system compromise, data theft, and lateral movement across connected systems.
Likely Case
Local users or attackers with basic access can read stored credentials, potentially gaining elevated privileges or accessing other systems using stolen credentials.
If Mitigated
With proper access controls and monitoring, impact is limited to credential exposure without successful privilege escalation or lateral movement.
🎯 Exploit Status
Exploitation requires local file system access to read plain text credential files.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 9.4 Fix Pack 6 and 9.5 Fix Pack 4
Vendor Advisory: https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0127448
Restart Required: Yes
Instructions:
1. Download the appropriate fix pack from HCL Support. 2. Apply the fix pack following HCL documentation. 3. Restart the HCL Workload Scheduler services. 4. Verify credentials are no longer stored in plain text.
🔧 Temporary Workarounds
Restrict File Permissions
linuxSet strict file permissions on credential storage files to prevent unauthorized reading.
chmod 600 /path/to/credential/files/*
chown root:root /path/to/credential/files/*
Implement Access Controls
allUse operating system access controls to restrict which users can access the application directories.
🧯 If You Can't Patch
- Implement strict file system permissions and access controls on all credential storage locations.
- Monitor file access attempts to credential files and implement alerting for unauthorized access.
🔍 How to Verify
Check if Vulnerable:
Check if credential files exist in plain text format in the application directories and verify file permissions.
Check Version:
Check the HCL Workload Scheduler version using the application's administrative interface or version command.
Verify Fix Applied:
After patching, verify that credentials are no longer stored in plain text files and that file permissions are properly restricted.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized file access attempts to credential storage locations
- Failed authentication attempts using potentially stolen credentials
Network Indicators:
- Unusual authentication patterns from the affected system
- Lateral movement attempts using credentials from the vulnerable system
SIEM Query:
source="*" AND (file_access="*credential*" OR auth_failed="*" FROM host="workload-scheduler*")