CVE-2024-51162

8.8 HIGH

📋 TL;DR

A privilege escalation vulnerability in Audimex EE allows any authenticated user to dump the entire database, exposing password hashes, audit data, and other sensitive information. This affects all users of Audimex EE version 15.1.20 and earlier. Attackers can leverage exposed credentials to gain administrative access.

💻 Affected Systems

Products:
  • Audimex EE
Versions: 15.1.20 and earlier
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with default configurations are vulnerable. Requires any authenticated user account.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full database compromise leading to credential theft, data exfiltration, and complete system takeover through privilege escalation to administrative roles.

🟠

Likely Case

Unauthorized access to sensitive audit data and password hashes that can be cracked or used in credential stuffing attacks against other systems.

🟢

If Mitigated

Limited exposure if strong network segmentation and access controls prevent database access from unauthorized systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires authenticated access but any user privilege level is sufficient. Public GitHub repositories contain proof-of-concept code.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://en.web-audimex.com/ee-auditmanagement

Restart Required: No

Instructions:

1. Contact Audimex vendor for patch availability. 2. If patch exists, download from vendor portal. 3. Apply patch following vendor instructions. 4. Verify database access controls are properly configured.

🔧 Temporary Workarounds

Restrict Database Access

all

Implement network segmentation and firewall rules to limit database connections to authorized application servers only.

Implement Strong Authentication

all

Enforce multi-factor authentication and strong password policies to reduce impact of credential exposure.

🧯 If You Can't Patch

  • Isolate Audimex systems from internet and restrict internal network access
  • Implement database encryption and monitor for unusual database access patterns

🔍 How to Verify

Check if Vulnerable:

Check Audimex EE version in application interface or configuration files. If version is 15.1.20 or earlier, system is vulnerable.

Check Version:

Check application interface or consult vendor documentation for version checking method.

Verify Fix Applied:

Verify version is updated beyond 15.1.20 and test that authenticated non-admin users cannot access database dump functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual database export operations
  • Large data transfers from database
  • Multiple failed authentication attempts followed by successful access

Network Indicators:

  • Unexpected database connection patterns
  • Large outbound data transfers from database server

SIEM Query:

source="audimex" AND (event="database_export" OR event="data_dump")

🔗 References

📤 Share & Export