CVE-2024-25652

7.6 HIGH

📋 TL;DR

This vulnerability in Delinea PAM Secret Server allows users with 'Administer Reports' permission or those in UNLIMITED ADMIN MODE to gain unauthorized access to remote sessions created by legitimate users through the Custom Legacy Report functionality. This affects organizations using Delinea PAM Secret Server 11.4 where users have these specific permissions.

💻 Affected Systems

Products:
  • Delinea PAM Secret Server
Versions: 11.4
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires users to have 'Administer Reports' permission or be in UNLIMITED ADMIN MODE with access to Report functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with appropriate permissions could hijack active remote sessions, potentially gaining access to sensitive systems and data that legitimate users are connected to through the PAM solution.

🟠

Likely Case

Privileged users with report access could inadvertently or intentionally view and access remote sessions they shouldn't have access to, violating the principle of least privilege.

🟢

If Mitigated

With proper permission controls and monitoring, the impact is limited to authorized users who might abuse their privileges, which can be detected through audit logs.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with specific permissions. The vulnerability is in the report functionality itself.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in version released February 10, 2024

Vendor Advisory: https://docs.delinea.com/online-help/secret-server/release-notes/ssc-rn-2024-02-10.htm

Restart Required: Yes

Instructions:

1. Backup your Secret Server configuration and database. 2. Download the latest patch from Delinea support portal. 3. Apply the patch following Delinea's upgrade documentation. 4. Restart the Secret Server services. 5. Verify the fix by checking the version and testing report functionality.

🔧 Temporary Workarounds

Restrict Report Permissions

all

Temporarily remove 'Administer Reports' permission from users who don't absolutely need it and disable UNLIMITED ADMIN MODE where possible.

Disable Custom Legacy Reports

all

If not required, disable the Custom Legacy Report functionality entirely until patched.

🧯 If You Can't Patch

  • Implement strict access controls and review all users with 'Administer Reports' permission
  • Enable detailed audit logging for all report access and session activities

🔍 How to Verify

Check if Vulnerable:

Check if you're running Secret Server 11.4 and review user permissions for 'Administer Reports' and UNLIMITED ADMIN MODE access.

Check Version:

Check the Secret Server web interface under Administration > System Information or review the release notes in the application.

Verify Fix Applied:

Verify the version is updated to the February 10, 2024 release or later, and test that users with report permissions cannot access unauthorized remote sessions.

📡 Detection & Monitoring

Log Indicators:

  • Unusual report generation patterns
  • Users accessing reports they don't typically use
  • Multiple failed attempts to access report functionality

Network Indicators:

  • Increased traffic to report endpoints from unauthorized users

SIEM Query:

source="secret_server" AND (event_type="report_access" OR event_type="session_access") AND user_permission="Administer Reports"

🔗 References

📤 Share & Export