TopQuadrant TopBraid EDG stores external credentials insecurely. An authenticated attacker with file system access can read edg-setup.properites and obtain the secret to decrypt external passwords stored in edg-vault.properties. An authenticated attacker could gain file system access using a separate vulnerability such as CVE-2024-45745. At least version 7.1.3 is affected. Version 7.3 adds HashiCorp Vault integration that does not store external passwords locally. Version 8.3.0 warns when using plain text secrets.
References
| Link | Resource |
|---|---|
| https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/IT/white/2024/va-24-254-02.json | Third Party Advisory |
| https://www.topquadrant.com/doc/latest/administrator_guide/edg_installation_and_authentication/hashicorp_integration.html | Technical Description |
| https://www.topquadrant.com/doc/latest/reference/PasswordManagementAdminPage.html | Technical Description |
| https://www.topquadrant.com/release-note/7-3/ | Release Notes |
| https://www.topquadrant.com/wp-content/uploads/2025/02/changes-8.3.0.txt | Release Notes |
Configurations
History
No history.
Information
Published : 2024-09-27 16:15
Updated : 2025-10-02 15:15
NVD link : CVE-2024-45744
Mitre link : CVE-2024-45744
CVE.ORG link : CVE-2024-45744
JSON object : View
Products Affected
topquadrant
- topbraid_edg
