CVE-2024-37348

4.5 MEDIUM

📋 TL;DR

This is a stored cross-site scripting (XSS) vulnerability in Absolute Secure Access management UI that allows authenticated system administrators to inject malicious scripts. When exploited, it can interfere with other administrators' management sessions by executing arbitrary JavaScript in their browsers. Only systems running Absolute Secure Access versions before 13.06 with administrator accounts are affected.

💻 Affected Systems

Products:
  • Absolute Secure Access
Versions: All versions prior to 13.06
Operating Systems: All supported platforms for Absolute Secure Access
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with administrator accounts. The vulnerability is in the management UI component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

A malicious administrator could inject persistent scripts that hijack other administrators' sessions, potentially leading to privilege escalation, configuration changes, or data manipulation across the management platform.

🟠

Likely Case

An administrator with malicious intent could disrupt other administrators' workflows by injecting annoying scripts or misleading content into the management interface, causing operational confusion.

🟢

If Mitigated

With proper access controls and administrator vetting, the impact is minimal since it requires authenticated administrator privileges to exploit.

🌐 Internet-Facing: LOW - The vulnerability requires administrator authentication and affects the management UI, which typically should not be internet-facing.
🏢 Internal Only: MEDIUM - While it requires administrator privileges, insider threats or compromised administrator accounts could exploit this to disrupt management operations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated administrator access. The vulnerability involves injecting scripts into management objects that persist and execute when other administrators view/edit those objects.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 13.06

Vendor Advisory: https://www.absolute.com/platform/security-information/vulnerability-archive/secure-access-1306/cve-2024-37348/

Restart Required: Yes

Instructions:

1. Download Absolute Secure Access version 13.06 from Absolute support portal. 2. Backup current configuration. 3. Apply the update following Absolute's upgrade documentation. 4. Restart the Secure Access service. 5. Verify the update completed successfully.

🔧 Temporary Workarounds

Restrict Administrator Access

all

Limit the number of administrator accounts and implement strict access controls to reduce attack surface.

Implement Content Security Policy

all

Add Content-Security-Policy headers to restrict script execution in the management UI.

🧯 If You Can't Patch

  • Implement strict administrator account monitoring and review all administrator activities regularly.
  • Segment management network access and ensure only trusted administrators can access the management UI.

🔍 How to Verify

Check if Vulnerable:

Check the Absolute Secure Access version in the management UI under System > About. If version is below 13.06, the system is vulnerable.

Check Version:

Check via management UI: System > About, or via CLI if available: 'absolute-secure-access --version'

Verify Fix Applied:

After updating, verify the version shows 13.06 or higher in the management UI. Test that administrator users cannot inject scripts into management objects.

📡 Detection & Monitoring

Log Indicators:

  • Unusual administrator activity patterns
  • Multiple failed login attempts on administrator accounts
  • Unexpected configuration changes to management objects

Network Indicators:

  • Unusual traffic patterns to management UI endpoints
  • Suspicious script-like content in HTTP requests to management endpoints

SIEM Query:

source="absolute_secure_access" AND (event_type="admin_login" OR event_type="config_change") AND user="administrator" AND result="success" | stats count by user, src_ip

🔗 References

📤 Share & Export