CVE-2024-45101

6.8 MEDIUM

📋 TL;DR

This privilege escalation vulnerability in Lenovo XClarity Controller Administrator (LXCA) with Single Sign-On enabled allows attackers to hijack authenticated user sessions via malicious URLs. Attackers can gain administrative access to XCC management sessions if they trick users into clicking crafted links. This affects organizations using Lenovo's LXCA with SSO enabled.

💻 Affected Systems

Products:
  • Lenovo XClarity Controller Administrator (LXCA)
Versions: All versions prior to 4.0.0
Operating Systems: Not OS-specific - affects LXCA appliance
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when Single Sign-On (SSO) is enabled. Standard authentication methods are not affected.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full administrative compromise of XCC management infrastructure, allowing attacker to modify firmware, access sensitive server data, or disrupt operations.

🟠

Likely Case

Unauthorized access to XCC management interface with the privileges of the hijacked user session, potentially leading to configuration changes or data exposure.

🟢

If Mitigated

Limited impact with proper network segmentation, user awareness training, and prompt patching.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires social engineering to trick authenticated users into clicking malicious URLs. Session hijacking occurs after successful user authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: LXCA 4.0.0

Vendor Advisory: https://support.lenovo.com/us/en/product_security/LEN-154748

Restart Required: Yes

Instructions:

1. Download LXCA 4.0.0 from Lenovo support portal. 2. Backup current LXCA configuration. 3. Apply the update through LXCA web interface. 4. Restart the LXCA appliance as prompted.

🔧 Temporary Workarounds

Disable Single Sign-On

all

Temporarily disable SSO authentication and use standard authentication methods until patching.

Navigate to LXCA web interface > Settings > Authentication > Disable SSO

Network Segmentation

all

Restrict access to LXCA management interface to trusted networks only.

Configure firewall rules to limit LXCA access to authorized IP ranges

🧯 If You Can't Patch

  • Implement strict user awareness training about clicking unknown links while authenticated to LXCA
  • Enable multi-factor authentication for LXCA access and monitor for unusual session activity

🔍 How to Verify

Check if Vulnerable:

Check LXCA version in web interface (Settings > About) and verify if SSO is enabled in authentication settings.

Check Version:

Not applicable - check via LXCA web interface

Verify Fix Applied:

Confirm LXCA version is 4.0.0 or later in Settings > About page.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts followed by successful SSO login from unusual IP
  • Session ID reuse from different IP addresses
  • Administrative actions from non-standard user accounts

Network Indicators:

  • Unusual HTTP redirect patterns to LXCA SSO endpoints
  • External connections to LXCA management interface

SIEM Query:

source="lxca.log" AND (event="SSO_AUTH" AND src_ip NOT IN trusted_ips) OR (event="SESSION_HIJACK")

🔗 References

📤 Share & Export