CVE-2023-24468

9.8 CRITICAL

📋 TL;DR

CVE-2023-24468 is a broken access control vulnerability in NetIQ Advanced Authentication that allows attackers to bypass authentication mechanisms. This affects versions prior to 6.4.1.1 and 6.3.7.2, potentially enabling unauthorized access to protected systems and data.

💻 Affected Systems

Products:
  • NetIQ Advanced Authentication
Versions: All versions prior to 6.4.1.1 and 6.3.7.2
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to bypass all authentication controls, access sensitive data, and potentially gain administrative privileges across connected systems.

🟠

Likely Case

Unauthorized access to protected resources, credential theft, and privilege escalation within the authentication system.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, but authentication bypass remains possible.

🌐 Internet-Facing: HIGH - Authentication systems exposed to the internet are directly vulnerable to exploitation attempts.
🏢 Internal Only: HIGH - Even internally deployed systems are vulnerable to insider threats or compromised internal accounts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CVSS 9.8 indicates critical severity with low attack complexity and no authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.4.1.1 or 6.3.7.2

Vendor Advisory: https://www.netiq.com/documentation/advanced-authentication-64/advanced-authentication-releasenotes-6411/data/advanced-authentication-releasenotes-6411.html

Restart Required: Yes

Instructions:

1. Download the appropriate patch version (6.4.1.1 or 6.3.7.2) from the NetIQ support portal. 2. Backup current configuration and data. 3. Apply the patch following vendor documentation. 4. Restart the Advanced Authentication services. 5. Verify successful update and functionality.

🔧 Temporary Workarounds

Network Isolation

all

Restrict network access to Advanced Authentication systems to only trusted sources

Enhanced Monitoring

all

Implement strict monitoring for authentication bypass attempts and unusual access patterns

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit access to Advanced Authentication systems
  • Deploy additional authentication layers and implement compensating controls like multi-factor authentication

🔍 How to Verify

Check if Vulnerable:

Check the Advanced Authentication version in the administration console or configuration files. If version is below 6.4.1.1 (for 6.4.x) or below 6.3.7.2 (for 6.3.x), the system is vulnerable.

Check Version:

Check the administration console or refer to the product documentation for version verification commands specific to your deployment.

Verify Fix Applied:

Verify the version shows 6.4.1.1 or higher (for 6.4.x) or 6.3.7.2 or higher (for 6.3.x) in the administration console.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful access
  • Authentication bypass patterns in access logs
  • Unusual authentication source IPs or user agents

Network Indicators:

  • Direct access attempts to authentication endpoints from untrusted sources
  • Unusual authentication traffic patterns

SIEM Query:

source="advanced_auth" AND (event_type="auth_bypass" OR (auth_result="success" AND previous_auth_result="fail"))

🔗 References

📤 Share & Export