CVE-2024-42165

6.3 MEDIUM

📋 TL;DR

This vulnerability in FIWARE Keyrock allows attackers to predict activation tokens due to insufficient randomness, enabling unauthorized account activation for any user. Systems running FIWARE Keyrock version 8.4 or earlier are affected, potentially compromising user accounts and authentication integrity.

💻 Affected Systems

Products:
  • FIWARE Keyrock
Versions: <= 8.4
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All installations using the default activation token generation mechanism are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could activate accounts for any registered user, gaining unauthorized access to user data and potentially escalating privileges within the system.

🟠

Likely Case

Attackers would activate accounts for targeted users, gaining access to their data and potentially using those accounts for further attacks.

🟢

If Mitigated

With proper monitoring and rate limiting, unauthorized activation attempts could be detected and blocked before successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires predicting activation tokens, which may be feasible due to insufficient randomness in token generation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: > 8.4

Vendor Advisory: https://www.ait.ac.at/themen/cyber-security/pentesting/security-advisories

Restart Required: Yes

Instructions:

1. Upgrade FIWARE Keyrock to version 8.5 or later. 2. Restart the Keyrock service. 3. Verify the fix by testing activation token generation.

🔧 Temporary Workarounds

Disable User Self-Registration

all

Temporarily disable user self-registration to prevent new account activation attacks.

Modify Keyrock configuration to disable user registration

Implement Rate Limiting

all

Add rate limiting to activation endpoints to prevent brute-force token prediction attempts.

Configure web server or application rate limiting for /v1/auth/activate endpoints

🧯 If You Can't Patch

  • Implement network-level controls to restrict access to activation endpoints
  • Monitor activation logs for suspicious patterns and implement alerting

🔍 How to Verify

Check if Vulnerable:

Check FIWARE Keyrock version. If version is 8.4 or earlier, the system is vulnerable.

Check Version:

Check Keyrock configuration files or API endpoints for version information

Verify Fix Applied:

Verify the installation is running Keyrock version 8.5 or later and test activation token generation for randomness.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed activation attempts from single IP
  • Successful activation for users who didn't request it
  • Unusual activation patterns outside normal business hours

Network Indicators:

  • High volume of requests to activation endpoints
  • Requests to /v1/auth/activate with predictable token patterns

SIEM Query:

source="keyrock.log" AND ("activate" OR "activation") AND status="200" | stats count by src_ip, user

🔗 References

📤 Share & Export