ForLogic Qualiex v1 and v3 has weak token expiration. This allows remote unauthenticated privilege escalation and access to sensitive data via token reuse. NOTE: as of 2025-10-14, the Supplier's perspective is that this is "not exploitable in the current implementation. Tokens are properly expired, invalidated, and bound to session context. Attempts to alter the token payload to extend its validity do not affect server-side validation."
References
| Link | Resource |
|---|---|
| https://github.com/underprotection/CVE-2020-24030 | Third Party Advisory |
| https://qualiex.com | Product Vendor Advisory |
| https://github.com/underprotection/CVE-2020-24030 | Third Party Advisory |
| https://qualiex.com | Product Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
14 Oct 2025, 13:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) ForLogic Qualiex v1 and v3 has weak token expiration. This allows remote unauthenticated privilege escalation and access to sensitive data via token reuse. NOTE: as of 2025-10-14, the Supplier's perspective is that this is "not exploitable in the current implementation. Tokens are properly expired, invalidated, and bound to session context. Attempts to alter the token payload to extend its validity do not affect server-side validation." |
Information
Published : 2020-09-02 17:15
Updated : 2025-10-14 13:15
NVD link : CVE-2020-24030
Mitre link : CVE-2020-24030
CVE.ORG link : CVE-2020-24030
JSON object : View
Products Affected
forlogic
- qualiex
CWE
CWE-672
Operation on a Resource after Expiration or Release
