CVE-2024-6426

8.1 HIGH

📋 TL;DR

This vulnerability in MESbook 20221021.03 allows a local attacker with user privileges to access unauthorized resources by manipulating API values. It affects users of the MESbook software who have local access to the system. The exposure could lead to unauthorized information disclosure.

💻 Affected Systems

Products:
  • MESbook
Versions: 20221021.03
Operating Systems: Not specified, likely multiple
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local access with user privileges. The vulnerability is in the API parameter handling.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could access sensitive data, configuration files, or system resources beyond their intended permissions, potentially leading to data theft or privilege escalation.

🟠

Likely Case

Local users accessing data they shouldn't have permission to view, such as other users' information or system configuration details.

🟢

If Mitigated

With proper access controls and monitoring, the impact is limited to unauthorized data viewing within the local environment.

🌐 Internet-Facing: LOW - This requires local access with user privileges, not remote exploitation.
🏢 Internal Only: HIGH - Local attackers with user privileges can exploit this vulnerability to access unauthorized resources.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access and user privileges. The attacker manipulates API values to access different resources.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in references, check vendor for latest version

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-mesbook

Restart Required: Yes

Instructions:

1. Contact MESbook vendor for patched version. 2. Backup current configuration. 3. Apply vendor-provided patch or upgrade to fixed version. 4. Restart the application/service. 5. Verify the fix is applied.

🔧 Temporary Workarounds

Restrict Local Access

all

Limit local user access to systems running MESbook to only authorized personnel

API Input Validation

all

Implement additional input validation for API parameters if source code access is available

🧯 If You Can't Patch

  • Implement strict access controls to limit which users can access the MESbook system
  • Monitor API access logs for unusual parameter values or access patterns

🔍 How to Verify

Check if Vulnerable:

Check if running MESbook version 20221021.03. Review API access logs for parameter manipulation attempts.

Check Version:

Check application settings or configuration files for version information (specific command depends on installation)

Verify Fix Applied:

Verify the installed version is newer than 20221021.03. Test API parameter manipulation to confirm access controls are working.

📡 Detection & Monitoring

Log Indicators:

  • Unusual API parameter values
  • Access to resources outside normal user patterns
  • Failed authorization attempts with manipulated parameters

Network Indicators:

  • Local API calls with unexpected parameter values

SIEM Query:

source="mesbook" AND (parameter_value CONTAINS suspicious_pattern OR resource_access OUTSIDE normal_pattern)

🔗 References

📤 Share & Export