CVE-2024-34399

9.8 CRITICAL

📋 TL;DR

CVE-2024-34399 is a critical authentication bypass vulnerability in BMC Remedy Mid Tier 7.6.04 that allows unauthenticated remote attackers to access any user account without credentials. This affects organizations running the unsupported 7.6.04 version of BMC Remedy Mid Tier. The vulnerability is particularly dangerous because it requires no authentication and has a CVSS score of 9.8.

💻 Affected Systems

Products:
  • BMC Remedy Mid Tier
Versions: 7.6.04 only
Operating Systems: All supported platforms for BMC Remedy Mid Tier 7.6.04
Default Config Vulnerable: ⚠️ Yes
Notes: This vulnerability ONLY affects version 7.6.04, which is no longer supported by the vendor. Other versions are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all user accounts, unauthorized access to sensitive data, privilege escalation to administrative functions, and potential lateral movement within the network.

🟠

Likely Case

Unauthorized access to user accounts leading to data theft, manipulation of service desk tickets, and potential business process disruption.

🟢

If Mitigated

Limited impact if system is isolated behind strict network controls, but authentication bypass still presents significant risk.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation makes internet-facing instances extremely vulnerable to immediate compromise.
🏢 Internal Only: HIGH - Even internally, unauthenticated access allows any internal attacker or compromised system to bypass authentication controls.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability description indicates unauthenticated remote access, suggesting trivial exploitation. No public PoC has been identified, but the nature of the vulnerability makes weaponization likely.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: N/A

Vendor Advisory: https://www.gruppotim.it/it/footer/red-team.html

Restart Required: No

Instructions:

No official patch is available as this version is unsupported. The only secure option is to upgrade to a supported version of BMC Remedy Mid Tier.

🔧 Temporary Workarounds

Network Isolation

all

Restrict network access to BMC Remedy Mid Tier instances to only trusted IP addresses and networks

Use firewall rules to restrict access: iptables -A INPUT -p tcp --dport [BMC_PORT] -s [TRUSTED_NETWORK] -j ACCEPT
iptables -A INPUT -p tcp --dport [BMC_PORT] -j DROP

Web Application Firewall

all

Implement WAF rules to detect and block authentication bypass attempts

Configure WAF to monitor for unusual authentication patterns and block suspicious requests

🧯 If You Can't Patch

  • Immediately isolate affected systems from internet access and restrict internal network access
  • Implement additional authentication layers such as VPN or reverse proxy with strong authentication

🔍 How to Verify

Check if Vulnerable:

Check the BMC Remedy Mid Tier version. If it's exactly 7.6.04, the system is vulnerable. Attempt to access user accounts without credentials to confirm vulnerability.

Check Version:

Check the BMC Remedy Mid Tier administration console or configuration files for version information specific to 7.6.04

Verify Fix Applied:

Since no patch exists, verify workarounds by testing that unauthenticated access is blocked and only authorized users can access accounts.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts followed by successful access without credentials
  • User logins from unexpected IP addresses or locations
  • Administrative actions performed by non-admin users

Network Indicators:

  • Unusual authentication request patterns to BMC Remedy endpoints
  • Traffic to BMC Remedy from unauthorized IP addresses

SIEM Query:

source="BMC_Remedy_Logs" AND (event_type="authentication" AND result="success" AND auth_method="none") OR (user="*" AND source_ip NOT IN [allowed_ips])

🔗 References

📤 Share & Export