CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-28197

Medium Severity
Zitadel
SVRS
38/100

CVSSv3
7.5/10

EPSS
0.00092/1

CVE-2024-28197 is a security vulnerability affecting Zitadel, an open-source identity management system. This vulnerability allows an attacker to potentially gain unauthorized access to a victim's account by exploiting a weakness in how Zitadel handles user agent cookies across subdomains. With a CVSS score of 7.5, it signifies a high-severity issue requiring attention; however, the SOCRadar Vulnerability Risk Score (SVRS) of 38 suggests a lower real-world risk compared to its potential severity. The attack requires specific conditions, including the victim logging in through a malicious link hosted on a compromised subdomain. While the vulnerability has been patched in versions 2.46.0, 2.45.1, and 2.44.3, immediate action might not be as critical unless your Zitadel instance is directly exposed to subdomain vulnerabilities or untrusted subdomains. The vulnerability is categorized as CWE-269, indicating improper privilege management, and there is an indication it might be In The Wild.

In The Wild
CVSS:3.1
AV:A
AC:H
PR:N
UI:R
S:C
C:H
I:H
A:N
2024-03-11

2025-01-07
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-28197 affects Zitadel, an open-source identity management system. It involves a vulnerability in the handling of cookies, allowing attackers to gain access to user accounts under specific conditions. The SVRS score of 38 indicates a moderate risk, highlighting the need for attention and timely mitigation.

Key Insights

  • Exploitation Requires Specific Conditions: The vulnerability requires a combination of factors, including a malicious link hosted on a subdomain and an initial vulnerability on that subdomain.
  • Limited Impact on Existing Sessions: The attack only succeeds if the victim logs in through the malicious link and does not have an existing cookie.
  • Self-Hosted Environments Affected: The vulnerability primarily affects self-hosted Zitadel instances that cannot upgrade to patched versions.

Mitigation Strategies

  • Upgrade to Patched Versions: Update Zitadel to versions 2.46.0, 2.45.1, or 2.44.3 to resolve the vulnerability.
  • Prevent Cookie Setting on Subdomains: For self-hosted environments, prevent the setting of the __Secure-zitadel-useragent cookie on subdomains using a web application firewall (WAF).
  • Monitor for Suspicious Activity: Regularly monitor logs and security alerts for any suspicious activity or attempts to exploit the vulnerability.
  • Educate Users: Inform users about the vulnerability and advise them to be cautious of suspicious links, especially from subdomains.

Additional Information

  • Threat Actors/APT Groups: No specific threat actors or APT groups have been identified as actively exploiting this vulnerability.
  • Exploit Status: Active exploits have not been published.
  • CISA Warnings: The Cybersecurity and Infrastructure Security Agency (CISA) has not issued a warning for this vulnerability.
  • In the Wild: The vulnerability is not known to be actively exploited by hackers.

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-28197 | Zitadel up to 2.44.2/2.45.0 Cookie privileges management (GHSA-mq4x-r2w3-j7mr)
vuldb.com2025-01-07
CVE-2024-28197 | Zitadel up to 2.44.2/2.45.0 Cookie privileges management (GHSA-mq4x-r2w3-j7mr) | A vulnerability was found in Zitadel up to 2.44.2/2.45.0. It has been classified as critical. This affects an unknown part of the component Cookie Handler. The manipulation leads to improper privilege management. This vulnerability is uniquely identified as CVE-2024-28197. The attack can only be done within
vuldb.com
rss
forum
news

Social Media

No tweets found for this CVE

Affected Software

Configuration 1
TypeVendorProduct
AppZitadelzitadel

References

ReferenceLink
[email protected]https://github.com/zitadel/zitadel/security/advisories/GHSA-mq4x-r2w3-j7mr
AF854A3A-2127-422B-91AE-364DA2661108https://github.com/zitadel/zitadel/security/advisories/GHSA-mq4x-r2w3-j7mr
[email protected]https://github.com/zitadel/zitadel/security/advisories/GHSA-mq4x-r2w3-j7mr

CWE Details

CWE IDCWE NameDescription
CWE-269Improper Privilege ManagementThe software does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
CWE-384Session FixationAuthenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence