{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T11:02:19.955","vulnerabilities":[{"cve":{"id":"CVE-2020-24030","sourceIdentifier":"cve@mitre.org","published":"2020-09-02T17:15:12.203","lastModified":"2025-10-14T13:15:32.880","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ForLogic Qualiex v1 and v3 has weak token expiration. This allows remote unauthenticated privilege escalation and access to sensitive data via token reuse. NOTE: as of 2025-10-14, the Supplier's perspective is that this is \"not exploitable in the current implementation. Tokens are properly expired, invalidated, and bound to session context. Attempts to alter the token payload to extend its validity do not affect server-side validation.\""},{"lang":"es","value":"ForLogic Qualiex versiones v1 y v3, presentan un expiración débil de token.&#xa0;Esto permite una escalada de privilegios no autenticada remota y el acceso a datos confidenciales por medio de la reutilización de tokens"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-672"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:forlogic:qualiex:1.0:*:*:*:*:*:*:*","matchCriteriaId":"CD490EC3-8EAC-468C-AD3D-CD11087C7711"},{"vulnerable":true,"criteria":"cpe:2.3:a:forlogic:qualiex:3.0:*:*:*:*:*:*:*","matchCriteriaId":"604B39BE-EAF2-4578-B4CA-133593A05E34"}]}]}],"references":[{"url":"https://github.com/underprotection/CVE-2020-24030","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"https://qualiex.com","source":"cve@mitre.org","tags":["Product","Vendor Advisory"]},{"url":"https://github.com/underprotection/CVE-2020-24030","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://qualiex.com","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product","Vendor Advisory"]}]}}]}