CVE-2024-42197

5.5 MEDIUM

📋 TL;DR

HCL Workload Scheduler stores user credentials in plain text files that can be read by local users on the system. This vulnerability allows unauthorized access to sensitive authentication data, affecting all users of vulnerable versions who have local access to the system.

💻 Affected Systems

Products:
  • HCL Workload Scheduler
Versions: All versions prior to 9.4 FP6 and 9.5 FP4
Operating Systems: All supported operating systems
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all installations where credentials are stored by the application.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attackers gain administrative credentials, leading to complete system compromise, data theft, and lateral movement across connected systems.

🟠

Likely Case

Local users or attackers with basic access can read stored credentials, potentially gaining elevated privileges or accessing other systems using stolen credentials.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to credential exposure without successful privilege escalation or lateral movement.

🌐 Internet-Facing: LOW - This is a local vulnerability requiring access to the system files.
🏢 Internal Only: HIGH - Internal users with local access can exploit this to gain unauthorized privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local file system access to read plain text credential files.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.4 Fix Pack 6 and 9.5 Fix Pack 4

Vendor Advisory: https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0127448

Restart Required: Yes

Instructions:

1. Download the appropriate fix pack from HCL Support. 2. Apply the fix pack following HCL documentation. 3. Restart the HCL Workload Scheduler services. 4. Verify credentials are no longer stored in plain text.

🔧 Temporary Workarounds

Restrict File Permissions

linux

Set strict file permissions on credential storage files to prevent unauthorized reading.

chmod 600 /path/to/credential/files/*
chown root:root /path/to/credential/files/*

Implement Access Controls

all

Use operating system access controls to restrict which users can access the application directories.

🧯 If You Can't Patch

  • Implement strict file system permissions and access controls on all credential storage locations.
  • Monitor file access attempts to credential files and implement alerting for unauthorized access.

🔍 How to Verify

Check if Vulnerable:

Check if credential files exist in plain text format in the application directories and verify file permissions.

Check Version:

Check the HCL Workload Scheduler version using the application's administrative interface or version command.

Verify Fix Applied:

After patching, verify that credentials are no longer stored in plain text files and that file permissions are properly restricted.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized file access attempts to credential storage locations
  • Failed authentication attempts using potentially stolen credentials

Network Indicators:

  • Unusual authentication patterns from the affected system
  • Lateral movement attempts using credentials from the vulnerable system

SIEM Query:

source="*" AND (file_access="*credential*" OR auth_failed="*" FROM host="workload-scheduler*")

🔗 References

📤 Share & Export