SARA / Free Tools / CVE / CVE-2024-3700

CVE-2024-3700 — Use of hard-coded password to the patients' database allows an attacker to retri

Use of hard-coded password to the patients' database allows an attacker to retrieve sensitive data stored in the database. The password is the same among all Simple Care software installations.

CVSS
9.3 CRITICAL
EPSS
11.00% (top 70.20%)
CWE
CWE-259
Published
2024-06-10T11:19:54.619Z
Last modified
2025-10-03T09:03:38.081Z
CVSS vector
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:H/SA:H/AU:Y/R:U/V:C/RE:M/U:R

01What is this vulnerability?

Use of hard-coded password to the patients' database allows an attacker to retrieve sensitive data stored in the database. The password is the same among all Simple Care software installations.

02Affected products

VendorProductVersions
Estomed Sp. z o.o.Simple Careall versions

03Active exploitation status

Not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. EPSS is the best forward-looking signal — see the EPSS row above.

04Recommended remediation

05Technical details

For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.

06Detection signatures

Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:

Open in Sigma generator →

07Related CVEs

CVE-2024-1228
Cited in vendor advisory

08Timeline

09References

Want this in your SOAR or SIEM?
SARA's API returns EPSS, CVSS, KEV, and an analyst-grade summary in one call.
Read the API reference →