CVE-2024-3317

6.5 MEDIUM

📋 TL;DR

This vulnerability allows authenticated users in SailPoint's Identity Security Cloud to access job processing metadata from other tenants, potentially revealing sensitive operational information. Organizations using affected versions of SailPoint ISC are impacted.

💻 Affected Systems

Products:
  • SailPoint Identity Security Cloud
Versions: Specific versions not disclosed in available references
Operating Systems: Cloud-based service
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the message server API component of Identity Security Cloud

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could map organizational structure, identify high-value targets, and gather intelligence for further attacks by analyzing job processing patterns across tenants.

🟠

Likely Case

Unauthorized access to operational metadata that could reveal tenant activity patterns, queue depths, and message processing information.

🟢

If Mitigated

Minimal impact with proper access controls and tenant isolation in place, limiting exposure to authorized users only.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access but minimal technical skill to exploit

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in available references

Vendor Advisory: https://www.sailpoint.com/security-advisories/

Restart Required: No

Instructions:

1. Review SailPoint security advisory 2. Apply recommended patches/updates 3. Verify tenant isolation controls

🔧 Temporary Workarounds

Enhanced Access Monitoring

all

Implement strict monitoring of API access patterns and tenant boundary crossings

🧯 If You Can't Patch

  • Implement strict API access controls and tenant isolation policies
  • Monitor for unusual cross-tenant API requests and job metadata access patterns

🔍 How to Verify

Check if Vulnerable:

Check SailPoint advisory for specific version information and test API access controls

Check Version:

Check SailPoint ISC administration console for current version

Verify Fix Applied:

Verify that authenticated users cannot access job metadata from other tenants via message server API

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized cross-tenant API requests
  • Unusual job metadata access patterns

Network Indicators:

  • API requests attempting to access other tenant resources

SIEM Query:

source="sailpoint_isc" AND (api_path="/api/message-server" OR event_type="cross_tenant_access")

🔗 References

📤 Share & Export