Created on 2025-02-18 21:49 and updated on 2025-02-18 21:49.

Description

A security assessment of IDPKI implementation revealed a weakness potentially allowing an operator to exceed its privileges.

In the course of a pentest security assessment of IDPKI, some security measures protecting internal communications were found potentially compromised for an internal user with high privileges.

None of these vulnerabilities put Certificate Authority (CA) private key at risk.

Eviden analyzed the root cause of the weakness. It revealed two separate vulnerabilities. During validation of the fix, an additional vulnerability of similar nature was identified, leveraging some race condition to alter an internal automata state and achieve a system privilege escalation:

  • CVE-2024-39327: The vulnerability could allow the possibility to obtain CA signing in an illegitimate way.
  • CVE-2024-39328: Highly trusted role (Config Admin) could exceed their configuration privileges in a multi-partition environment and access some confidential data. Data integrity and availability is not at risk.
  • CVE-2024-51505: Highly trusted role (Config Admin) could leverage a race condition to escalate privileges.

  • CVE-2024-39327 correction has been validated and published.

  • CVE-2024-39328 correction has been validated and published. This vulnerability has no impact in mono-partition nor in SaaS environments.
  • CVE-2024-51505 risk is increased if the last fixes are not applied, as a lower privileged role is required. A fix is available and published.

Vulnerabilities included in this bundle

Meta

[
   {
      ref: [
         "https://support.bull.com/ols/product/security/psirt/security-bulletins/potential-privilege-escalation-in-idpki-psirt-1335-tlp-clear-version-2-10-cve-2024-39327-cve-2024-39328-cve-2024-51505/",
      ],
   },
]

Author

Cédric Bonhomme

Combined sightings

Author Vulnerability Source Type Date
cedricCVE-2024-51505https://support.bull.com/ols/product/security/psirt/security-bulletins/potential-privilege-escalation-in-idpki-psirt-1335-tlp-clear-version-2-10-cve-2024-39327-cve-2024-39328-cve-2024-51505/seen1 month ago
automationCVE-2024-51505https://mastodon.social/users/CyberSignaler/statuses/114026383745737897seen1 month ago
automationCVE-2024-51505https://bsky.app/profile/cve-notifications.bsky.social/post/3lihuleaguz2gseen1 month ago
automationCVE-2024-39327https://bsky.app/profile/dinosn.bsky.social/post/3lio5652hs22mseen1 month ago
automationCVE-2024-39327https://bsky.app/profile/vulnalerts.bsky.social/post/3lijpzyjtyd2tseen1 month ago
automationCVE-2024-39327https://bsky.app/profile/vulnalerts.bsky.social/post/3liihtlzcbq2aseen1 month ago
cedricCVE-2024-39327https://support.bull.com/ols/product/security/psirt/security-bulletins/potential-privilege-escalation-in-idpki-psirt-1335-tlp-clear-version-2-10-cve-2024-39327-cve-2024-39328-cve-2024-51505/seen1 month ago
automationCVE-2024-39327https://mastodon.social/users/CyberSignaler/statuses/114026383696752900seen1 month ago
automationCVE-2024-39327https://bsky.app/profile/cve-notifications.bsky.social/post/3lihra2slcs23seen1 month ago
cedricCVE-2024-39328https://support.bull.com/ols/product/security/psirt/security-bulletins/potential-privilege-escalation-in-idpki-psirt-1335-tlp-clear-version-2-10-cve-2024-39327-cve-2024-39328-cve-2024-51505/seen1 month ago
automationCVE-2024-39328https://bsky.app/profile/cve-notifications.bsky.social/post/3lihukyouae2yseen1 month ago