CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-29868

Medium Severity
SVRS
34/100

CVSSv3
NA/10

EPSS
0.52878/1

CVE-2024-29868: Apache StreamPipes vulnerability. A cryptographically weak pseudo-random number generator (PRNG) is used in user self-registration and password recovery, allowing attackers to guess recovery tokens. The account takeover risk is high for affected users. CVE-2024-29868 impacts Apache StreamPipes versions 0.69.0 through 0.93.0. The use of a weak PRNG significantly reduces the entropy of the generated tokens. While the SOCRadar Vulnerability Risk Score (SVRS) is 34, the presence of active exploits elevates the risk significantly. This flaw allows malicious actors to compromise accounts relatively easily. Upgrade to version 0.95.0 to mitigate the security risk. Failure to patch could lead to unauthorized access and data breaches.

In The Wild
Exploit Avaliable
2024-06-24

2024-06-24
Eye Icon
SOCRadar
AI Insight

Description:

CVE-2024-29868 is a vulnerability in Apache StreamPipes that allows an attacker to guess the recovery token and take over a user's account. This vulnerability affects Apache StreamPipes versions 0.69.0 through 0.93.0.

Key Insights:

  • SVRS Score: 34 (Moderate)
  • Exploit Status: Active exploits have been published.
  • CISA Warning: The Cybersecurity and Infrastructure Security Agency (CISA) has warned of the vulnerability, calling for immediate and necessary measures.
  • In The Wild: The vulnerability is actively exploited by hackers.

Mitigation Strategies:

  • Upgrade to Apache StreamPipes version 0.95.0 or later.
  • Implement strong password policies and enforce multi-factor authentication.
  • Monitor for suspicious activity and investigate any unauthorized access attempts.
  • Regularly review and update security configurations.

Additional Information:

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

TitleSoftware LinkDate
DEVisions/CVE-2024-29868https://github.com/DEVisions/CVE-2024-298682024-06-24
Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-29868: Apache StreamPipes, Apache StreamPipes: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Recovery Token Generation
2024-06-22
CVE-2024-29868: Apache StreamPipes, Apache StreamPipes: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Recovery Token Generation | Posted by Dominik Riemer on Jun 22Severity: important Affected versions: - Apache StreamPipes 0.69.0 through 0.93.0 - Apache StreamPipes 0.69.0 through 0.93.0 Description: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Apache StreamPipes user self-registration and password recovery mechanism.<br
seclists.org
rss
forum
news
CVE-2024-29868 | Apache StreamPipes up to 0.93.0 Self-Registration/Password Recovery entropy
vuldb.com2024-06-22
CVE-2024-29868 | Apache StreamPipes up to 0.93.0 Self-Registration/Password Recovery entropy | A vulnerability, which was classified as problematic, was found in Apache StreamPipes up to 0.93.0. This affects an unknown part of the component Self-Registration/Password Recovery. The manipulation leads to insufficient entropy in prng. This vulnerability is uniquely identified as CVE-2024-29868. The attack can only be initiated within
vuldb.com
rss
forum
news

Social Media

CVE-2024-29868 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Apache StreamPipes user self-registration and password recovery mechanism. This a… https://t.co/PIS1WyUSwY
0
1
1

Affected Software

No affected software found for this CVE

References

ReferenceLink
[email protected]https://lists.apache.org/thread/g7t7zctvq2fysrw1x17flnc12592nhx7

CWE Details

CWE IDCWE NameDescription
CWE-338Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)The product uses a Pseudo-Random Number Generator (PRNG) in a security context, but the PRNG's algorithm is not cryptographically strong.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence