CVE-2024-8395

Public Exploit
FlyCASS Cockpit Access Security System (CASS) SQL Injection

Description

FlyCASS CASS and KCM systems did not correctly filter SQL queries, which made them vulnerable to attack by outside attackers with no authentication.

Remediation

Solution:

  • According to the researchers, the security gap in the FlyCASS online portal has been closed.

Category

9.3
CVSS
Severity: Critical
CVSS 4.0 •
CVSS 3.1 •
EPSS 0.30%
Third-Party Advisory ian.sh
Affected: FlyCASS Cockpit Access Security System (CASS)
Affected: FlyCASS Known Crewmember (KCM)
Published at:
Updated at:

References

Link Tags
https://ian.sh/tsa third party advisory exploit

Frequently Asked Questions

What is the severity of CVE-2024-8395?
CVE-2024-8395 has been scored as a critical severity vulnerability.
How to fix CVE-2024-8395?
To fix CVE-2024-8395: According to the researchers, the security gap in the FlyCASS online portal has been closed.
Is CVE-2024-8395 being actively exploited in the wild?
It is possible that CVE-2024-8395 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2024-8395?
CVE-2024-8395 affects FlyCASS Cockpit Access Security System (CASS), FlyCASS Known Crewmember (KCM).
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.