CVE-2024-51768

| EUVD-2024-54781 HIGH
2025-07-14 [email protected]
8.0
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 16, 2026 - 09:43 vuln.today
EUVD ID Assigned
Mar 16, 2026 - 09:43 euvd
EUVD-2024-54781
CVE Published
Jul 14, 2025 - 11:15 nvd
HIGH 8.0

Description

An hsqldb-related remote code execution vulnerability exists in HPE AutoPass License Server (APLS) prior to 9.17.

Analysis

CVE-2024-51768 is a remote code execution vulnerability in HPE AutoPass License Server (APLS) versions prior to 9.17, stemming from unsafe deserialization in the embedded HSQLDB database library. An authenticated attacker with local network access can execute arbitrary code with the privileges of the APLS service, potentially leading to complete system compromise. The vulnerability has a CVSS score of 8.0 and represents a significant risk to organizations using affected APLS versions, particularly given the authentication requirement is modest (PR:L) and the attack complexity is low.

Technical Context

The vulnerability resides in HPE AutoPass License Server's use of HSQLDB (HyperSQL Database), a Java-based embedded relational database engine. The root cause is classified as CWE-94 (Improper Control of Generation of Code - 'Code Injection'), which in this context specifically involves unsafe deserialization of untrusted data within HSQLDB's communication or serialization mechanisms. HSQLDB allows remote procedure calls and object serialization for inter-process communication; when input validation is insufficient, attackers can craft malicious serialized objects that execute arbitrary code upon deserialization. The affected CPE likely encompasses cpe:2.7.a:hpe:autopass_license_server:*:*:*:*:*:*:*:* with versions <9.17. APLS uses HSQLDB for its license database backend, making this library-level vulnerability directly exploitable through APLS interfaces.

Affected Products

HPE AutoPass License Server (APLS) versions prior to 9.17. Specific affected versions likely include 9.16 and earlier releases. The vulnerability affects any deployment where APLS is installed and exposed to authenticated users or local network access. Affected CPE: cpe:2.7.a:hpe:autopass_license_server:*:*:*:*:*:*:*:* where version < 9.17. Organizations should verify installed APLS version via the administrative console or package manager (dpkg/rpm on Linux, Windows Registry on Windows). Related components: HSQLDB library bundled within APLS installation directory (typically $APLS_HOME/lib/hsqldb.jar). No evidence of CVE cross-listing for specific HSQLDB versions in the description, but HSQLDB versions supporting unsafe deserialization are vulnerable.

Remediation

Immediate Actions: (1) UPGRADE to HPE AutoPass License Server 9.17 or later immediately. HPE has released patched versions that address the HSQLDB deserialization vulnerability. (2) If immediate upgrade is not feasible, implement these workarounds: (a) Restrict network access to APLS administrative interfaces using firewall rules—limit to trusted administrative networks only (whitelist source IPs); (b) Disable or restrict APLS REST API/remote access features if not required; (c) Apply network segmentation to isolate APLS servers from general user networks; (d) Monitor APLS logs for suspicious serialization activity or unusual object instantiation patterns. (3) Verify patch installation by confirming APLS version >= 9.17 via CLI or UI. (4) Consult HPE Security Advisory (references section) for detailed patch notes, rollback procedures, and verification steps. (5) After patching, review APLS access controls and authentication mechanisms to ensure principle of least privilege is enforced.

Priority Score

40
Low Medium High Critical
KEV: 0
EPSS: +0.4
CVSS: +40
POC: 0

Share

CVE-2024-51768 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy