CVE-2024-33891

8.8 HIGH

📋 TL;DR

This vulnerability allows attackers to bypass authentication in Delinea Secret Server via the SOAP API, potentially gaining administrative access. It affects Secret Server versions before 11.7.000001 due to a hardcoded key and improper user ID handling. Organizations using vulnerable versions of this privileged access management solution are at risk.

💻 Affected Systems

Products:
  • Delinea Secret Server
Versions: All versions before 11.7.000001
Operating Systems: Windows, Linux (if applicable for deployment)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments of Secret Server before the patched version, regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all secrets stored in Secret Server, allowing attackers to access administrative credentials, SSH keys, database passwords, and other sensitive data across the entire infrastructure.

🟠

Likely Case

Unauthorized access to sensitive secrets leading to lateral movement, privilege escalation, and potential data exfiltration from systems protected by Secret Server.

🟢

If Mitigated

Limited impact if network segmentation restricts access to Secret Server and strong monitoring detects anomalous authentication attempts.

🌐 Internet-Facing: HIGH - If Secret Server is exposed to the internet, attackers can directly exploit this vulnerability without any authentication.
🏢 Internal Only: HIGH - Even internally, any user with network access to the Secret Server instance can potentially exploit this vulnerability.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Detailed technical analysis and exploitation details are publicly available in the referenced Medium article, making exploitation straightforward for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.7.000001

Vendor Advisory: https://trust.delinea.com/?tcuUid=17aaf4ef-ada9-46d5-bf97-abd3b07daae3

Restart Required: Yes

Instructions:

1. Backup your Secret Server database and configuration. 2. Download version 11.7.000001 from Delinea's official portal. 3. Run the upgrade installer following Delinea's upgrade documentation. 4. Verify the upgrade completed successfully and test functionality.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to the Secret Server SOAP API endpoint to only trusted IP addresses or networks.

Use firewall rules to block access to /SecretServer/webservices/SSWebService.asmx from untrusted networks

Disable SOAP API if Unused

all

Temporarily disable the vulnerable SOAP API endpoint if it's not required for your operations.

IIS/Apache configuration to block or remove the SSWebService.asmx endpoint

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Secret Server from untrusted networks
  • Enable detailed logging and monitoring for all authentication attempts to the SOAP API

🔍 How to Verify

Check if Vulnerable:

Check the Secret Server version in the web interface under Help > About, or examine the installed version in the Windows Programs list.

Check Version:

On Windows: Check installed programs list or registry at HKEY_LOCAL_MACHINE\SOFTWARE\Delinea\Secret Server\Version

Verify Fix Applied:

Verify the version shows 11.7.000001 or higher after patching, and test that the SOAP API now properly validates authentication tokens.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication patterns to SSWebService.asmx
  • Multiple failed authentication attempts followed by successful admin access
  • SOAP requests with suspicious user ID parameters

Network Indicators:

  • Unusual traffic patterns to /SecretServer/webservices/SSWebService.asmx
  • SOAP requests containing hardcoded authentication bypass parameters

SIEM Query:

source="SecretServer" AND (uri_path="/webservices/SSWebService.asmx" AND (user_id="2" OR auth_token="hardcoded_value"))

🔗 References

📤 Share & Export