Critical Authentication Bypass Vulnerability in Safeguard for Privileged Passwords (CVE-2024-45488)

A critical vulnerability, CVE-2024-45488, has been discovered in One Identity’s Safeguard for Privileged Passwords (SPP), an enterprise-level solution designed to protect and manage privileged credentials. This vulnerability, commonly referred to as “Skeleton Cookie,” allows attackers to bypass authentication and potentially gain full administrative access to the virtual appliance, posing significant security risks.

Understanding the Software: Safeguard for Privileged Passwords (SPP)

Safeguard for Privileged Passwords (SPP) is a product developed by One Identity, widely used by organizations to manage privileged access and automate the process of handling highly sensitive credentials. The platform is designed to:

  • Automate the granting of privileged credentials through role-based access management.
  • Control access to sensitive systems and information.
  • Secure credentials with encryption and policies to prevent unauthorized access.

SPP is commonly used by large enterprises, government agencies, and organizations that need to manage numerous privileged accounts, such as IT administrators, system architects, and database managers. These organizations often rely on SPP to ensure that access to sensitive data is only granted to authorized personnel and that all activity is securely logged and monitored.

CVE-2024-45488: The Skeleton Cookie Flaw

CVE-2024-45488 arises from a hard-coded cryptographic key found in SPP virtual appliance images. This vulnerability allows attackers to forge session cookies, which can then be used to bypass authentication mechanisms. Once an attacker gains access by using this vulnerability, they can establish an authenticated administrative session. From there, they have the same control as legitimate administrators, enabling them to:

  • Reconfigure appliance settings, potentially weakening the security controls in place.
  • Modify policies to allow the extraction of stored passwords in managed accounts or personal vaults.
  • If the appliance uses the default backup encryption setting (which utilizes a hardcoded RSA key), attackers could also download and decrypt backups, accessing sensitive historical data.

The AmberWolf research team, consisting of David Cash and Richard Warren, was responsible for discovering this vulnerability. They provided a detailed breakdown of their findings and even demonstrated how to exploit the flaw through a video demo. Their investigation showed how this hard-coded key, present in certain virtual appliance setups, could be easily leveraged to gain unauthorized access.

Who is Vulnerable?

While the vulnerability is serious, it only affects SPP virtual appliances that run on platforms like VMware and Hyper-V. Deployments on physical appliances or those hosted in Azure, AWS, Oracle Cloud Infrastructure (OCI), or other officially supported cloud platforms are not vulnerable.

This means that organizations using virtualized environments for their SPP installations are at risk. Given the widespread use of virtualization in modern IT infrastructures, many companies are likely affected. Virtualized environments are particularly common in enterprises aiming for flexibility, scalability, and cost savings.

Patch and Mitigation

One Identity has responded to the vulnerability by confirming that the issue is resolved in newer versions of the SPP software. Users are advised to upgrade to the following fixed versions:

  • Safeguard for Privileged Passwords 7.0.5.1 LTS
  • Safeguard for Privileged Passwords 7.4.2
  • Safeguard for Privileged Passwords 7.5.2

It is critical that organizations using vulnerable versions of SPP immediately update to one of these patched releases to mitigate the risk of exploitation. For those unsure whether their systems are vulnerable, AmberWolf has released a script that allows users to check whether their instance is susceptible to exploitation of CVE-2024-45488.

Why This Matters: The Importance of Securing Privileged Access

Security experts continually emphasize the importance of securing privileged access within an organization. Privileged accounts, such as system administrators or database managers, have the highest level of access within an organization, and compromising these accounts can lead to catastrophic consequences. A Ponemon Institute study reported that privileged access misuse was involved in 74% of data breaches.

Saryu Nayyar, CEO of Gurucul, highlights the growing risks associated with mismanaged privileged access, noting, “Once attackers gain access to a privileged account, they effectively control the organization. Protecting and monitoring privileged access should be the top priority for any security-conscious enterprise.”

In the case of CVE-2024-45488, an attacker could access or manipulate sensitive credentials stored in managed accounts. This could allow them to move laterally within the organization’s network, gaining unauthorized access to additional systems or sensitive data, making this vulnerability extremely dangerous if not addressed.

CVE-2024-45488 represents a critical vulnerability in One Identity’s Safeguard for Privileged Passwords, and organizations using virtualized deployments of SPP must take immediate action to secure their environments. With the ability to bypass authentication and gain administrative access, the Skeleton Cookie flaw could enable attackers to compromise entire infrastructures if exploited.

Organizations should patch their systems immediately, using the updated versions provided by One Identity, and implement best practices for securing privileged accounts.

Learn More About CommandLink:
Contact Page

ADDITIONAL

RESOURCES:

Library with dropdown

Schedule a Demo:

Schedule a Demo
22722 29th Drive SE Suite 100 Bothell, WA 98021
Single source platform to design, deploy and manage internet access, SD-WAN, SASE, security, cloud phone systems, & collaboration services in one unified SaaS platform.
Copyright CommandLink. All rights reserved.
apartmentcloudcloud-synccloud-checklocklicenseuserusersspell-checklaptop-phonechart-barsselectthumbs-upchevron-downmovelayers