CVE-2024-5249
CVE-2024-5249 exposes Akana API Platform users to SAML token replay attacks, allowing unauthorized access. Prior to version 2024.1.0, the platform fails to adequately prevent the reuse of SAML tokens. This vulnerability, classified as CWE-294 (Improper Check of Certificate Validity), carries a CVSS score of 7.5. While SOCRadar's Vulnerability Risk Score (SVRS) is 42, indicating a moderate risk, the fact it is tagged as "In The Wild" means active exploitation is possible. Successful exploitation allows attackers to impersonate legitimate users, potentially leading to data breaches and unauthorized actions within the Akana API Platform. Users should upgrade to version 2024.1.0 or later immediately to mitigate this security risk. Even though the SVRS isn't critical, its real-world exploitability makes patching urgent.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.