CVE-2024-42006

7.5 HIGH

📋 TL;DR

Keyfactor AWS Orchestrator through version 2.0 contains an information disclosure vulnerability that allows unauthorized access to sensitive data. This affects organizations using Keyfactor AWS Orchestrator for certificate lifecycle management. Attackers could potentially access configuration data, credentials, or other sensitive information.

💻 Affected Systems

Products:
  • Keyfactor AWS Orchestrator
Versions: through 2.0
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments of Keyfactor AWS Orchestrator up to and including version 2.0 are affected. The vulnerability is present in the default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of AWS credentials, certificate private keys, and configuration secrets leading to unauthorized access to AWS resources and certificate infrastructure.

🟠

Likely Case

Exposure of configuration details, API keys, or internal network information that could facilitate further attacks against the certificate management system.

🟢

If Mitigated

Limited exposure of non-critical configuration data with proper network segmentation and access controls in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CWE-200 indicates information exposure, suggesting the vulnerability may be accessible without authentication. No public exploit code has been identified at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 2.0

Vendor Advisory: https://trust.keyfactor.com/?itemUid=d73921fd-bc9e-4e35-a974-cfb628e6a226&source=click

Restart Required: Yes

Instructions:

1. Review the Keyfactor advisory at the provided URL. 2. Upgrade to the latest version of Keyfactor AWS Orchestrator (post-2.0). 3. Restart the orchestrator service after upgrade. 4. Verify the fix by checking the version and testing for the vulnerability.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to the Keyfactor AWS Orchestrator to only trusted IP addresses and required services.

Access Control Hardening

all

Implement strict authentication and authorization controls for all orchestrator endpoints.

🧯 If You Can't Patch

  • Implement network-level controls to restrict access to the orchestrator to only necessary IP addresses and services.
  • Monitor access logs for unusual patterns and implement alerting for unauthorized access attempts.

🔍 How to Verify

Check if Vulnerable:

Check if Keyfactor AWS Orchestrator version is 2.0 or earlier. Review configuration files and logs for signs of unauthorized information access.

Check Version:

Check the orchestrator web interface or configuration files for version information. Typically found in admin panels or about pages.

Verify Fix Applied:

Verify the orchestrator version is greater than 2.0. Test that sensitive information endpoints are properly secured and require authentication.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to sensitive endpoints
  • Unusual data retrieval patterns from the orchestrator

Network Indicators:

  • Unexpected outbound connections from the orchestrator
  • Traffic to sensitive endpoints without proper authentication

SIEM Query:

source="keyfactor-orchestrator" AND (status=401 OR status=403) | count by src_ip, endpoint

🔗 References

📤 Share & Export