CVE-2024-27455

9.1 CRITICAL

📋 TL;DR

The Bentley ALIM Web application exposes user session tokens during file download operations when specific configurations are present. This allows attackers to hijack authenticated sessions and gain unauthorized access. Organizations using vulnerable versions of Assetwise ALIM Web or Information Integrity Server are affected.

💻 Affected Systems

Products:
  • Assetwise ALIM Web
  • Assetwise Information Integrity Server
Versions: Versions before Assetwise ALIM Web 23.00.04.04 and Assetwise Information Integrity Server 23.00.02.03
Operating Systems: Windows Server (typical deployment)
Default Config Vulnerable: ✅ No
Notes: Requires specific configuration settings that cause token exposure during file downloads.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers steal session tokens, gain full administrative access to ALIM systems, manipulate critical infrastructure data, and potentially pivot to other enterprise systems.

🟠

Likely Case

Attackers capture session tokens to access sensitive asset information, modify configuration data, or exfiltrate proprietary engineering documents.

🟢

If Mitigated

With proper network segmentation and monitoring, impact is limited to unauthorized access within the ALIM application boundary.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires network access to intercept or capture exposed tokens during legitimate user file download operations.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Assetwise ALIM Web 23.00.04.04 and Assetwise Information Integrity Server 23.00.02.03

Vendor Advisory: https://www.bentley.com/advisories/be-2024-0001/

Restart Required: Yes

Instructions:

1. Download patches from Bentley Software Downloads portal. 2. Backup current installation. 3. Apply patches following Bentley's upgrade documentation. 4. Restart application services. 5. Verify functionality.

🔧 Temporary Workarounds

Disable file downloads

all

Temporarily disable file download functionality in ALIM Web to prevent token exposure.

Configure via ALIM Web administration interface

Network segmentation

all

Restrict access to ALIM Web to trusted internal networks only.

Configure firewall rules to limit ALIM Web access

🧯 If You Can't Patch

  • Implement strict network access controls to limit ALIM Web exposure
  • Deploy web application firewall with session protection rules

🔍 How to Verify

Check if Vulnerable:

Check ALIM Web and Information Integrity Server version numbers against vulnerable versions.

Check Version:

Check version in ALIM Web administration interface or application logs

Verify Fix Applied:

Confirm installation of Assetwise ALIM Web 23.00.04.04 or later and Assetwise Information Integrity Server 23.00.02.03 or later.

📡 Detection & Monitoring

Log Indicators:

  • Multiple session creations from same IP
  • Unauthorized access attempts to sensitive endpoints

Network Indicators:

  • Unexpected outbound connections from ALIM servers
  • Session token values in URL parameters or headers

SIEM Query:

source="alim-web" AND (event="file_download" OR event="session_hijack")

🔗 References

📤 Share & Export