CVE-2024-2921

9.8 CRITICAL

📋 TL;DR

This vulnerability allows authenticated users with PAM access in Devolutions Server to bypass permission controls and view unauthorized PAM entries. It affects all Devolutions Server deployments running version 2024.1.10.0 or earlier. Attackers can exploit this to access sensitive credentials and secrets they shouldn't have permission to view.

💻 Affected Systems

Products:
  • Devolutions Server
Versions: 2024.1.10.0 and earlier
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with PAM functionality enabled are affected. The vulnerability exists in the core permission validation logic.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all PAM-stored credentials, allowing lateral movement, privilege escalation, and data exfiltration across the entire environment.

🟠

Likely Case

Unauthorized access to sensitive credentials and secrets, potentially leading to account compromise and limited lateral movement within the PAM system.

🟢

If Mitigated

Limited exposure if strict network segmentation and minimal user permissions are already implemented, though some credential exposure may still occur.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the PAM system but is straightforward once authenticated. No special tools or advanced techniques are needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.1.11.0 or later

Vendor Advisory: https://devolutions.net/security/advisories/DEVO-2024-0005

Restart Required: Yes

Instructions:

1. Download Devolutions Server 2024.1.11.0 or later from the official Devolutions website
2. Backup your current configuration and database
3. Run the installer to upgrade your existing installation
4. Restart the Devolutions Server service
5. Verify the upgrade completed successfully

🔧 Temporary Workarounds

Temporary PAM Access Restriction

all

Temporarily disable or restrict PAM access for all non-essential users while waiting for patch deployment

# Use Devolutions Server management console to modify user permissions
# Remove PAM access from users who don't absolutely need it

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the Devolutions Server from other critical systems
  • Enable detailed audit logging for all PAM access attempts and monitor for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check the Devolutions Server version in the administration console or via the web interface. If version is 2024.1.10.0 or earlier, the system is vulnerable.

Check Version:

# In Devolutions Server web interface, navigate to Administration > About

Verify Fix Applied:

After patching, verify the version shows 2024.1.11.0 or later in the administration console. Test PAM permissions with a test user to ensure proper access controls are enforced.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed permission checks followed by successful PAM entry access
  • Users accessing PAM entries outside their normal permission scope
  • Unusual patterns of PAM entry access from authenticated users

Network Indicators:

  • Increased traffic to PAM endpoints from authenticated users
  • Unusual patterns of credential retrieval

SIEM Query:

source="devolutions-server" AND (event_type="pam_access" OR event_type="permission_violation") AND result="success" AND user_permissions NOT CONTAINS accessed_resource

🔗 References

📤 Share & Export