CVE-2024-23674

9.6 CRITICAL

📋 TL;DR

This vulnerability allows man-in-the-middle attackers to bypass authentication in Germany's Online-Ausweis-Funktion eID scheme, enabling identity theft for accessing government, medical, and financial services. Attackers can also extract personal data from identity cards. Users are affected when tricked into installing malicious eID kernel software.

💻 Affected Systems

Products:
  • German National Identity card Online-Ausweis-Funktion eID scheme
Versions: Through 2024-02-15
Operating Systems: All platforms running vulnerable eID software
Default Config Vulnerable: ⚠️ Yes
Notes: Requires victim to install malicious eID kernel software; basic card readers with insecure PIN entry are particularly vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete identity theft allowing unauthorized access to sensitive government systems, medical records, and financial accounts, plus extraction of all personal data from identity cards.

🟠

Likely Case

Targeted attacks against individuals for identity fraud, unauthorized access to online services, and personal data theft.

🟢

If Mitigated

Limited impact with proper client-side security controls and user awareness about software installation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires man-in-the-middle position and victim interaction (installing malicious software). Detailed technical analysis and proof-of-concept available in public research.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 2024-02-15

Vendor Advisory: https://www.ausweisapp.bund.de/

Restart Required: Yes

Instructions:

1. Update to latest version of AusweisApp2 from official sources. 2. Ensure all eID-related software is from verified official sources. 3. Follow BSI recommendations for secure operational environment.

🔧 Temporary Workarounds

Use secure card readers

all

Use card readers with secure PIN entry mechanisms instead of basic readers

Disable eid:// deeplinking

all

Configure systems to block or require confirmation for eid:// protocol handlers

🧯 If You Can't Patch

  • Implement strict network segmentation and monitoring for eID-related traffic
  • Enforce user training about only installing software from official sources and recognizing phishing attempts

🔍 How to Verify

Check if Vulnerable:

Check if using eID software versions dated before 2024-02-15 or if system has been modified with unofficial eID kernel

Check Version:

Check application version in AusweisApp2 settings or system documentation

Verify Fix Applied:

Verify AusweisApp2 version is latest from official source and check for security updates applied after 2024-02-15

📡 Detection & Monitoring

Log Indicators:

  • Unexpected eID authentication attempts
  • Multiple failed authentication attempts followed by successful login
  • Unusual eid:// protocol handler activations

Network Indicators:

  • Man-in-the-middle patterns in eID authentication traffic
  • Unusual network connections during eID sessions

SIEM Query:

source="eid_auth" AND (status="success" AFTER status="failure" WITHIN 5s) OR protocol="eid" AND src_ip!=expected_ip

🔗 References

📤 Share & Export