CVE-2025-24456
Published: 21 January 2025
Summary
CVE-2025-24456 is a medium-severity Authentication Bypass Using an Alternate Path or Channel (CWE-288) vulnerability in Jetbrains Hub. Its CVSS base score is 6.7 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 0.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and AC-2 (Account Management).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the software flaw in JetBrains Hub's improper LDAP authentication mapping by identifying, reporting, and applying vendor patches such as version 2024.3.55417.
Enforces the principle of least privilege to limit the initial low-privilege access (PR:L) that attackers can leverage for escalation via flawed LDAP mapping.
Manages and reviews account provisioning and privileges associated with LDAP authentication mappings to prevent or correct improper privilege assignments.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The CVE describes a privilege escalation vulnerability via improper LDAP authentication mapping and bypass (CWE-288/306), directly enabling the Exploitation for Privilege Escalation technique.
NVD Description
In JetBrains Hub before 2024.3.55417 privilege escalation was possible via LDAP authentication mapping
Deeper analysisAI
CVE-2025-24456 is a privilege escalation vulnerability in JetBrains Hub versions prior to 2024.3.55417, stemming from improper LDAP authentication mapping. Published on 2025-01-21, it has a CVSS v3.1 base score of 6.7 (AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L) and is associated with CWE-288 (Authentication Bypass Using an Alternate Path or Channel) and CWE-306 (Missing Authentication for Critical Function).
An attacker with low privileges (PR:L) can exploit this over the network (AV:N), though it requires high attack complexity (AC:H) and user interaction (UI:R). Successful exploitation enables privilege escalation, resulting in high impacts on confidentiality and integrity (C:H/I:H) with low impact on availability (A:L), all within unchanged scope (S:U).
JetBrains addressed the issue in version 2024.3.55417, as detailed in their issues-fixed advisory at https://www.jetbrains.com/privacy-security/issues-fixed/. Security practitioners should upgrade to this version or later to mitigate the vulnerability.
Details
- CWE(s)