CVE-2024-10971

4.3 MEDIUM

📋 TL;DR

This vulnerability allows authenticated users in Devolutions DVLS to bypass intended access controls and view password history data they shouldn't have permission to access. It affects all users with any level of authentication in DVLS versions 2024.3.6 and earlier. The flaw exists in the password history feature's permission validation.

💻 Affected Systems

Products:
  • Devolutions Virtual Lab Server (DVLS)
Versions: 2024.3.6 and earlier
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with password history feature enabled are vulnerable. Requires authenticated user access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated malicious insider could access sensitive password history data across the entire DVLS deployment, potentially compromising credentials for critical systems stored in the password manager.

🟠

Likely Case

Authenticated users can view password history entries they shouldn't have permission to see, leading to unauthorized access to credential information for systems they're not authorized to access.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to potential credential exposure for systems where the user already has some level of access.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access. The vulnerability is in permission validation logic, making it relatively straightforward to exploit once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.3.7 or later

Vendor Advisory: https://devolutions.net/security/advisories/DEVO-2024-0015/

Restart Required: Yes

Instructions:

1. Download DVLS version 2024.3.7 or later from Devolutions website. 2. Backup current DVLS configuration and database. 3. Run the installer to upgrade to the patched version. 4. Restart DVLS services.

🔧 Temporary Workarounds

Disable Password History Feature

all

Temporarily disable the password history feature to prevent exploitation while planning upgrade.

Navigate to DVLS Admin Panel > Security Settings > Password History > Disable

Restrict User Access

all

Implement strict access controls and review all authenticated user permissions.

Review and adjust user permissions in DVLS Admin Panel > User Management

🧯 If You Can't Patch

  • Implement network segmentation to isolate DVLS from critical systems
  • Enable detailed audit logging for all password history access attempts

🔍 How to Verify

Check if Vulnerable:

Check DVLS version in Admin Panel > About. If version is 2024.3.6 or earlier, system is vulnerable.

Check Version:

In DVLS web interface, navigate to Admin Panel > About section

Verify Fix Applied:

After upgrade, verify version is 2024.3.7 or later in Admin Panel > About. Test that authenticated users cannot access password history beyond their permissions.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to password history API endpoints
  • Multiple failed permission checks followed by successful password history access

Network Indicators:

  • HTTP requests to /api/passwordhistory endpoints from unauthorized user contexts

SIEM Query:

source="dvls" AND (uri_path="/api/passwordhistory" OR event_description="password history access") AND user_permission_level="low"

🔗 References

📤 Share & Export