CVE-2020-24030

9.8 CRITICAL
Published: September 02, 2020 Modified: October 14, 2025

Description

ForLogic Qualiex v1 and v3 has weak token expiration. This allows remote unauthenticated privilege escalation and access to sensitive data via token reuse. NOTE: as of 2025-10-14, the Supplier's perspective is that this is "not exploitable in the current implementation. Tokens are properly expired, invalidated, and bound to session context. Attempts to alter the token payload to extend its validity do not affect server-side validation."

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://github.com/underprotection/CVE-2020-24030
Source: cve@mitre.org
Third Party Advisory
https://qualiex.com
Source: cve@mitre.org
Product Vendor Advisory
https://github.com/underprotection/CVE-2020-24030
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://qualiex.com
Source: af854a3a-2127-422b-91ae-364da2661108
Product Vendor Advisory

4 reference(s) from NVD

Quick Stats

CVSS v3 Score
9.8 / 10.0
EPSS (Exploit Probability)
1.4%
80th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

forlogic