10 CVE-2024-11639

 

An authentication bypass in the admin web console of Ivanti CSA before 5.0.3 allows a remote unauthenticated attacker to gain administrative access
https://nvd.nist.gov/vuln/detail/CVE-2024-11639

Categories

CWE-288 : Authentication Bypass Using an Alternate Path or Channel
The product requires authentication, but the product has an alternate path or channel that does not require authentication. Funnel all access through a single choke point to simplify how users can access a resource. For every access, perform a check to determine if the user has permissions to access the resource. Router allows remote attackers to read system logs without authentication by directly connecting to the login screen and typing certain control characters. Attackers with physical access to the machine may bypass the password prompt by pressing the ESC (Escape) key. OS allows local attackers to bypass the password protection of idled sessions via the programmer's switch or CMD-PWR keyboard sequence, which brings up a debugger that the attacker can use to disable the lock. Direct request of installation file allows attacker to create administrator accounts. Attackers may gain additional privileges by directly requesting the web management URL. Bypass authentication via direct request to named pipe. User can avoid lockouts by using an API instead of the GUI to conduct brute force password guessing.

References


 

CPE

cpe start end


REMEDIATION




EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
No known exploits


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
127 Directory Indexing
Medium
665 Exploitation of Thunderbolt Protection Flaws
Very High


MITRE


Techniques

id description
T1083 File and Directory Discovery
T1211 Exploitation for Defensive Evasion
T1542.002 Pre-OS Boot:Component Firmware
T1556 Modify Authentication Process
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

Mitigations

id description
T1211 Update software regularly by employing patch management for internal enterprise endpoints and servers.
T1542.002 Perform regular firmware updates to mitigate risks of exploitation and/or abuse.
T1556 Ensure that proper policies are implemented to dictate the the secure enrollment and deactivation of authentication mechanisms, such as MFA, for user accounts.
© 2022 The MITRE Corporation. Esta obra se reproduce y distribuye con el permiso de The MITRE Corporation.