CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-39327

Critical Severity
SVRS
87/100

CVSSv3
9.9/10

EPSS
0.00049/1

CVE-2024-39327 is a critical access control vulnerability in Atos Eviden IDRA. This flaw, present in versions prior to 2.6.1, can lead to unauthorized CA signing, posing a significant security risk. With a SOCRadar Vulnerability Risk Score (SVRS) of 87, this vulnerability is considered critical and requires immediate attention. The high SVRS indicates that CVE-2024-39327 is actively being exploited In The Wild and associated with known threat actors. Successful exploitation of this vulnerability could allow attackers to illegitimately obtain CA signing capabilities, leading to severe consequences such as the compromise of trust relationships and the deployment of malicious software. Given the potential for widespread damage and the active exploitation, organizations using affected versions of Atos Eviden IDRA must upgrade to version 2.6.1 or later immediately to mitigate this severe threat.

In The Wild
CVSS:3.1
AC:L
AV:N
A:H
C:H
I:H
PR:L
S:C
UI:N
2025-03-17

2025-02-18
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-39327 is an Incorrect Access Control vulnerability found in Atos Eviden IDRA versions prior to 2.6.1. This flaw could allow an attacker to illegitimately obtain Certificate Authority (CA) signing capabilities. With an SVRS of 87, this is classified as a critical vulnerability requiring immediate attention. The high SVRS indicates the exploitation of this vulnerability is likely, possibly due to factors beyond the CVSS score, such as ease of exploitation, potential for widespread impact, and discussions or proof-of-concept code availability observed within SOCRadar's threat intelligence feeds.

Key Insights

  • Critical CA Signing Exposure: The vulnerability allows unauthorized access to CA signing, a highly sensitive function. Successful exploitation could allow an attacker to create fraudulent certificates, enabling man-in-the-middle attacks, impersonation of legitimate websites, and unauthorized access to sensitive systems.
  • High Likelihood of Exploitation: Given the SVRS of 87, SOCRadar has identified significant signals pointing to the active or imminent exploitation of this vulnerability, potentially including mentions on social media, dark web discussions, or code repositories. The provided data also shows that the vulnerability is actively exploited by hackers.
  • Vendor Fix Available: Atos Eviden has released version 2.6.1 to address this vulnerability. This indicates a known and confirmed flaw, emphasizing the need for immediate patching.
  • Potential for Widespread Impact: Since IDRA is likely a widely used system within Atos Eviden's client base, a successful exploit could impact multiple organizations, potentially leading to significant disruption and data breaches.

Mitigation Strategies

  • Immediate Patching: Upgrade Atos Eviden IDRA to version 2.6.1 or later to remediate the Incorrect Access Control vulnerability. Prioritize this patch due to the critical SVRS and the potential for widespread impact.
  • Certificate Authority Review: Audit all certificates issued by the affected IDRA instance before and after the patch. Revoke any unauthorized or suspicious certificates to prevent their misuse.
  • Access Control Hardening: Review and strengthen access control policies for the IDRA system and related infrastructure. Enforce the principle of least privilege and implement multi-factor authentication to limit unauthorized access.
  • Continuous Monitoring: Implement continuous monitoring and threat detection mechanisms to identify and respond to any attempts to exploit this vulnerability. Monitor system logs, network traffic, and security alerts for suspicious activity.

Additional Information

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-39327 | Atos Eviden IDRA up to 2.6.0 CA Signing access control
vuldb.com2025-02-18
CVE-2024-39327 | Atos Eviden IDRA up to 2.6.0 CA Signing access control | A vulnerability classified as critical was found in Atos Eviden IDRA up to 2.6.0. This vulnerability affects unknown code of the component CA Signing. The manipulation leads to improper access controls. This vulnerability was named CVE-2024-39327. The attack can be initiated remotely. There is no exploit available. It is
vuldb.com
rss
forum
news

Social Media

CVE-2024-39327 (CVSS 9.9): Critical IDPKI Flaw Could Allow Illegitimate Certificate Issuance https://t.co/DwckSBp3K2
0
3
0
CVE-2024-39327 Incorrect Access Control vulnerability in Atos Eviden IDRA before 2.6.1 could allow the possibility to obtain CA signing in an illegitimate way. https://t.co/dcBtlrbnp0
0
0
0
[CVE-2024-39327: CRITICAL] Incorrect Access Control vulnerability in Atos Eviden IDRA before 2.6.1 could allow the possibility to obtain CA signing in an illegitimate way.#cybersecurity,#vulnerability https://t.co/kvX7ZJP2OK https://t.co/BN4uVJUHj8
0
0
0

Affected Software

No affected software found for this CVE

References

No references found for this CVE

CWE Details

No CWE details found for this CVE

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence