CVE Vulnerabilities

CVE-2024-1621

Improper Verification of Source of a Communication Channel

Published: Sep 02, 2024 | Modified: Sep 17, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

The registration process of uniFLOW Online (NT-ware product) apps, prior to and including version 2024.1.0, can be compromised when email login is enabled on the tenant. Those tenants utilising email login in combination with Microsoft Safe Links or similar are impacted. This vulnerability may allow the attacker to register themselves against a genuine user in the system and allow malicious users with similar access and capabilities via the app to the existing genuine user.

Weakness

The product establishes a communication channel to handle an incoming request that has been initiated by an actor, but it does not properly verify that the request is coming from the expected origin.

Affected Software

Name Vendor Start Version End Version
Uniflow_online Nt-ware * 2024.1.0 (including)
Uniflow_online Nt-ware - (including) - (including)
Uniflow_online_print_&_scan Nt-ware - (including) - (including)
Uniflow_smartclient Nt-ware - (including) - (including)

Potential Mitigations

  • Use a mechanism that can validate the identity of the source, such as a certificate, and validate the integrity of data to ensure that it cannot be modified in transit using an Adversary-in-the-Middle (AITM) attack.
  • When designing functionality of actions in the URL scheme, consider whether the action should be accessible to all mobile applications, or if an allowlist of applications to interface with is appropriate.

References