CVE-2024-56404
Published: 24 January 2025
Summary
CVE-2024-56404 is a critical-severity Authentication Bypass by Assumed-Immutable Data (CWE-302) vulnerability in Oneidentity (inferred from references). Its CVSS base score is 9.9 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked in the top 46.4% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
AC-3 enforces approved access authorizations, directly preventing IDOR exploitation by ensuring manipulated object references are denied for unauthorized users.
SI-2 identifies and remediates flaws like this IDOR vulnerability through timely patching, such as upgrading to One Identity Identity Manager 9.3.
AC-6 applies least privilege to restrict the potential impact of privilege escalation achieved via IDOR exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
IDOR vulnerability directly enables remote privilege escalation from low-privileged authenticated access, matching Exploitation for Privilege Escalation.
NVD Description
In One Identity Identity Manager 9.x before 9.3, an insecure direct object reference (IDOR) vulnerability allows privilege escalation. Only On-Premise installations are affected.
Deeper analysisAI
CVE-2024-56404 is an insecure direct object reference (IDOR) vulnerability, mapped to CWE-302, in One Identity Identity Manager 9.x versions before 9.3. Only on-premise installations are affected. The issue enables privilege escalation and carries a CVSS v3.1 base score of 9.9 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H), marking it as critical due to its network accessibility, low complexity, low privilege requirements, lack of user interaction, and high impacts across confidentiality, integrity, availability, and scope.
An authenticated attacker with low privileges can exploit this IDOR flaw remotely to escalate privileges. Exploitation requires no user interaction and can lead to full compromise of the targeted system, granting high-level access and potentially disrupting or extracting sensitive identity management data.
Vendor advisories recommend upgrading to One Identity Identity Manager 9.3, where the vulnerability is addressed, as outlined in the product notification at https://support.oneidentity.com/product-notification/noti-00001678 and the 9.3 release notes at https://support.oneidentity.com/technical-documents/identity-manager/9.3/release-notes/. Further details are available on the One Identity community forum at https://www.oneidentity.com/community/identity-manager/.
Details
- CWE(s)