A critical vulnerability (CVE-2024-1403) affecting Progress Software OpenEdge Authentication Gateway and AdminServer impacts versions 11.7.18 and earlier, 12.2.13 and earlier, and 12.8.0. The vulnerability allows unauthorized access due to manipulation of username and password combinations during the authentication process. Review this Cybersecurity Threat Advisory to minimize the potential impact on your systems.
What is the threat?
The vulnerability arises from the software’s inability to validate certain username and password combinations. This weakness allows an attacker to bypass authentication checks and gain unauthorized access to protected systems.
The following OpenEdge versions are susceptible to CVE-2024-1403:
- OpenEdge versions 11.7.18 and earlier
- OpenEdge versions 12.2.13 and earlier
- OpenEdge version 12.8.0
Why is it noteworthy?
The exploit targets a function called “connect()” within the AdminServer service responsible for handling remote connection attempts. By manipulating specific username and password combinations, the exploit bypasses authentication and grants unauthorized access.
What is the exposure or risk?
CVE-2024-1403 carries a maximum severity rating of 10.0 on the CVSS scoring system, indicating a critical vulnerability. An attacker can exploit this vulnerability to:
- Gain unauthorized access: By bypassing authentication, attackers can access sensitive systems, data, and applications.
- Escalate privileges: Once inside the system, attackers can leverage this initial foothold to escalate privileges and gain control over critical resources.
- Deploy malicious payloads: Gaining access allows attackers to deploy malware, ransomware, or other malicious payloads to disrupt operations and steal data.
What are the recommendations?
Barracuda MSP recommends the following actions to limit the impact of CVE-2024-1403:
- Apply security patches. Update OpenEdge to the following versions:
- OpenEdge LTS Update 11.7.19
- OpenEdge LTS Update 12.2.14
- OpenEdge LTS Update 12.8.1
- Disable any unnecessary OpenEdge services like the AdminServer to minimize the attack surface.
- Implement network segmentation strategies to isolate critical systems and limit the potential impact of a successful attack.
- Monitor systems for suspicious activity and unauthorized access attempts.
References
For more in-depth information about the recommendations, please visit the following link:
If you have any questions regarding this Cybersecurity Threat Advisory, please contact Barracuda XDR’s Security Operations Center.