Home

Description

TopQuadrant TopBraid EDG stores external credentials insecurely. An authenticated attacker with file system access can read edg-setup.properites and obtain the secret to decrypt external passwords stored in edg-vault.properties. An authenticated attacker could gain file system access using a separate vulnerability such as CVE-2024-45745. At least version 7.1.3 is affected. Version 7.3 adds HashiCorp Vault integration that does not store external passwords locally. Version 8.3.0 warns when using plain text secrets.

PUBLISHED Reserved 2024-09-05 | Published 2024-09-27 | Updated 2025-10-02 | Assigner cisa-cg




LOW: 3.0CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N

Problem types

CWE-257 Storing Passwords in a Recoverable Format

CWE-312 Cleartext Storage of Sensitive Information

Product status

Default status
unknown

7.1.3
affected

References

raw.githubusercontent.com/...IT/white/2024/va-24-254-02.json (url)

www.topquadrant.com/...ence/PasswordManagementAdminPage.html (url)

www.topquadrant.com/...entication/hashicorp_integration.html (url)

www.topquadrant.com/release-note/7-3/ (url)

www.topquadrant.com/...ent/uploads/2025/02/changes-8.3.0.txt (url)

cve.org (CVE-2024-45744)

nvd.nist.gov (CVE-2024-45744)