CVE-2024-39340

8.8 HIGH

📋 TL;DR

This vulnerability allows attackers to bypass two-factor authentication (2FA) in Securepoint UTM by exploiting improper handling of OTP keys. Attackers can gain unauthorized access to administrative interfaces and user portals without providing the second authentication factor. Organizations using affected Securepoint UTM versions with OTP enabled are vulnerable.

💻 Affected Systems

Products:
  • Securepoint UTM
  • Securepoint Reseller Preview
Versions: UTM 11.5 through 12.6.4, Reseller Preview 12.7.0
Operating Systems: Securepoint UTM OS
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when OTP (two-factor authentication) is enabled. Systems without OTP enabled are not affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the UTM device, allowing attackers to reconfigure firewall rules, intercept network traffic, disable security controls, and gain persistent access to the protected network.

🟠

Likely Case

Unauthorized access to administrative interfaces leading to configuration changes, privilege escalation, and potential lateral movement within the network.

🟢

If Mitigated

Limited impact if strong network segmentation, additional authentication layers, and monitoring are in place to detect unauthorized access attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires knowledge of valid username/password credentials but bypasses the OTP requirement. No public exploit code has been disclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: UTM 12.6.5 and 12.7.1

Vendor Advisory: https://wiki.securepoint.de/Advisory/CVE-2024-39340

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download and install UTM 12.6.5 or 12.7.1 from Securepoint portal. 3. Apply the update through the web interface or CLI. 4. Reboot the system. 5. Verify the update was successful.

🔧 Temporary Workarounds

Disable OTP Authentication

all

Temporarily disable OTP/two-factor authentication until patching can be completed

Restrict Access to Management Interfaces

all

Limit access to administration and user portals to trusted IP addresses only

🧯 If You Can't Patch

  • Implement network segmentation to isolate UTM management interfaces from untrusted networks
  • Enable detailed logging and monitoring for authentication attempts and configuration changes

🔍 How to Verify

Check if Vulnerable:

Check UTM version in web interface under System > Status or via CLI command 'show version'. If version is between 11.5-12.6.4 or exactly 12.7.0, and OTP is enabled, the system is vulnerable.

Check Version:

show version

Verify Fix Applied:

Verify version is 12.6.5 or higher (or 12.7.1 for Reseller Preview) and test OTP authentication functionality.

📡 Detection & Monitoring

Log Indicators:

  • Successful authentication without OTP verification when OTP is enabled
  • Multiple failed OTP attempts followed by successful login
  • Authentication from unusual IP addresses

Network Indicators:

  • Unauthorized access to /admin or /userportal endpoints
  • Traffic patterns indicating configuration changes

SIEM Query:

source="securepoint_utm" (event_type="authentication" AND otp_status="bypassed") OR (event_type="configuration_change" AND user!="authorized_admin")

🔗 References

📤 Share & Export