← Back to CVEs
CVE-2020-24030
CRITICAL9.8
Description
ForLogic Qualiex v1 and v3 has weak token expiration. This allows remote unauthenticated privilege escalation and access to sensitive data via token reuse. NOTE: as of 2025-10-14, the Supplier's perspective is that this is "not exploitable in the current implementation. Tokens are properly expired, invalidated, and bound to session context. Attempts to alter the token payload to extend its validity do not affect server-side validation."
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published9/2/2020
Last Modified10/14/2025
Sourcenvd
Honeypot Sightings0
Affected Products
forlogic:qualiex
Weaknesses (CWE)
CWE-672
References
https://github.com/underprotection/CVE-2020-24030(cve@mitre.org)
https://qualiex.com(cve@mitre.org)
https://github.com/underprotection/CVE-2020-24030(af854a3a-2127-422b-91ae-364da2661108)
https://qualiex.com(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.