CVE-2024-12196

6.5 MEDIUM

📋 TL;DR

This vulnerability allows authenticated users in Devolutions Server to view password history entries without proper authorization. Attackers with valid credentials can access sensitive password history data they shouldn't have permission to see. This affects all Devolutions Server deployments running version 2024.3.7.0 or earlier.

💻 Affected Systems

Products:
  • Devolutions Server
Versions: 2024.3.7.0 and earlier
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with password history feature enabled are affected. Requires authenticated user access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could systematically extract historical passwords for all entries, potentially compromising credentials across the entire environment and enabling lateral movement.

🟠

Likely Case

Malicious insiders or compromised accounts could access password history for specific entries they target, potentially recovering previously used credentials.

🟢

If Mitigated

With proper access controls and monitoring, unauthorized access attempts would be detected and logged, limiting exposure to targeted entries.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid user credentials but no special technical skills - just API or UI access to view password history.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.3.8.0 or later

Vendor Advisory: https://devolutions.net/security/advisories/DEVO-2024-0017

Restart Required: Yes

Instructions:

1. Backup your Devolutions Server configuration and database. 2. Download and install Devolutions Server 2024.3.8.0 or later from the official website. 3. Run the installer and follow upgrade prompts. 4. Restart the Devolutions Server service. 5. Verify the update completed successfully.

🔧 Temporary Workarounds

Disable Password History Feature

all

Temporarily disable password history functionality to prevent unauthorized access to historical passwords.

Navigate to Administration > Security Settings > Password History and disable the feature

Restrict User Permissions

all

Review and tighten user permissions, ensuring only necessary users have access to sensitive entries.

Review user permissions in Administration > Users and adjust access controls

🧯 If You Can't Patch

  • Implement strict access controls and monitor all password history access attempts
  • Enable detailed logging and set up alerts for unauthorized access patterns

🔍 How to Verify

Check if Vulnerable:

Check Devolutions Server version in Administration > About. If version is 2024.3.7.0 or earlier, the system is vulnerable.

Check Version:

Check version in Administration > About section of Devolutions Server web interface

Verify Fix Applied:

After patching, verify version is 2024.3.8.0 or later in Administration > About. Test that users without view password permission cannot access password history.

📡 Detection & Monitoring

Log Indicators:

  • Failed authorization attempts for password history access
  • Successful password history queries from users without proper permissions
  • Unusual patterns of password history access

Network Indicators:

  • API calls to password history endpoints from unauthorized users
  • Increased traffic to password-related endpoints

SIEM Query:

source="devolutions-server" AND (event_type="password_history_access" OR api_endpoint="/api/password/history") AND user_permission!="view_password"

🔗 References

📤 Share & Export