CVE-2024-39327

9.9 CRITICAL

📋 TL;DR

This vulnerability in Atos Eviden IDRA (Identity and Access Management solution) allows attackers to bypass access controls and illegitimately obtain Certificate Authority (CA) signing capabilities. This affects all IDRA installations before version 2.6.1. Attackers could potentially sign malicious certificates or escalate privileges within the identity management system.

💻 Affected Systems

Products:
  • Atos Eviden IDRA (Identity and Access Management)
Versions: All versions before 2.6.1
Operating Systems: Linux-based systems (typically RHEL/CentOS)
Default Config Vulnerable: ⚠️ Yes
Notes: This affects the IDPKI component within IDRA. The vulnerability is present in default configurations.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the PKI infrastructure, allowing attackers to sign fraudulent certificates for any domain or service, enabling man-in-the-middle attacks, impersonation of legitimate services, and bypassing of all certificate-based authentication.

🟠

Likely Case

Privilege escalation within the IDRA system, unauthorized certificate issuance, and potential compromise of dependent systems that trust certificates signed by the vulnerable CA.

🟢

If Mitigated

Limited impact if proper network segmentation, certificate pinning, and monitoring are in place, though the core vulnerability still exists.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires some knowledge of the IDRA system and access to the management interface, but detailed technical information is not publicly available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.6.1

Vendor Advisory: https://support.bull.com/ols/product/security/psirt/security-bulletins/potential-privilege-escalation-in-idpki-psirt-1335-tlp-clear-version-2-10-cve-2024-39327-cve-2024-39328-cve-2024-51505/view

Restart Required: Yes

Instructions:

1. Download IDRA version 2.6.1 from official Atos Eviden sources. 2. Backup current configuration and data. 3. Stop all IDRA services. 4. Apply the update following vendor documentation. 5. Restart services and verify functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to IDRA management interfaces to only authorized administrative networks

Enhanced Monitoring

all

Implement strict monitoring of certificate issuance and CA signing activities

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the IDRA management interface
  • Enable detailed logging and alerting for all certificate signing and CA operations

🔍 How to Verify

Check if Vulnerable:

Check the IDRA version via the web interface or configuration files. If version is below 2.6.1, the system is vulnerable.

Check Version:

Check the IDRA web interface or configuration files for version information (specific command depends on installation method)

Verify Fix Applied:

After patching, verify the version shows 2.6.1 or higher and test certificate signing operations with proper authorization checks.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized certificate signing requests
  • Unexpected CA operations from non-admin accounts
  • Failed authentication attempts followed by successful CA operations

Network Indicators:

  • Unusual traffic patterns to IDRA management ports
  • Certificate requests from unexpected sources

SIEM Query:

source="idra" AND (event="certificate_sign" OR event="ca_operation") AND user!="admin"

🔗 References

📤 Share & Export