CVE-2024-45102

6.8 MEDIUM

📋 TL;DR

This privilege escalation vulnerability allows authenticated Lenovo XClarity Administrator (LXCA) users to gain elevated permissions on connected XClarity Controller (XCC) instances when LXCA is configured as a Single Sign-On provider. It affects organizations using Lenovo's infrastructure management software with SSO enabled between LXCA and XCC. Attackers need valid LXCA credentials to exploit this vulnerability.

💻 Affected Systems

Products:
  • Lenovo XClarity Administrator
  • Lenovo XClarity Controller
Versions: LXCA versions prior to 5.5.2
Operating Systems: All supported LXCA operating systems
Default Config Vulnerable: ✅ No
Notes: Only affects configurations where LXCA is used as SSO provider for XCC instances. Standard authentication methods are not vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker gains administrative control over XCC instances, potentially compromising managed servers, accessing sensitive data, and executing arbitrary commands on infrastructure hardware.

🟠

Likely Case

Malicious insider or compromised account escalates privileges to modify XCC configurations, disrupt server management, or access restricted management interfaces.

🟢

If Mitigated

Attackers remain limited to their original LXCA permissions without gaining unauthorized XCC access, maintaining proper access segregation.

🌐 Internet-Facing: MEDIUM - While exploitation requires authentication, internet-facing LXCA instances could be targeted by credential theft or phishing attacks.
🏢 Internal Only: HIGH - Internal attackers with valid credentials can exploit this to gain unauthorized access to critical infrastructure management systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid LXCA credentials and SSO configuration. The vulnerability is in the SSO token validation mechanism.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: LXCA 5.5.2

Vendor Advisory: https://support.lenovo.com/us/en/product_security/LEN-154748

Restart Required: Yes

Instructions:

1. Download LXCA 5.5.2 from Lenovo support site. 2. Backup current LXCA configuration. 3. Apply the update through LXCA web interface or CLI. 4. Restart LXCA services. 5. Verify SSO functionality with XCC instances.

🔧 Temporary Workarounds

Disable SSO for XCC

all

Temporarily disable Single Sign-On between LXCA and XCC instances, requiring separate authentication for XCC access.

Navigate to LXCA web interface > Settings > Authentication > SSO Configuration > Disable XCC SSO

Restrict LXCA User Permissions

all

Apply principle of least privilege to LXCA users, limiting who can access XCC management functions.

Use LXCA role-based access control to create minimal privilege roles for standard users

🧯 If You Can't Patch

  • Implement network segmentation to isolate LXCA and XCC management interfaces from general user networks
  • Enable detailed logging and monitoring of all LXCA authentication and XCC access attempts

🔍 How to Verify

Check if Vulnerable:

Check LXCA version via web interface (Settings > About) or CLI command 'lxca version'. If version is below 5.5.2 and SSO is configured for XCC, system is vulnerable.

Check Version:

lxca version

Verify Fix Applied:

After updating to 5.5.2, verify version shows 5.5.2 and test SSO functionality with XCC instances to ensure proper authentication flow.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events in LXCA logs
  • Multiple failed SSO attempts followed by successful XCC access
  • XCC access from non-admin LXCA users

Network Indicators:

  • Unusual XCC management traffic patterns
  • SSO token requests from unexpected sources

SIEM Query:

source="lxca" AND (event_type="privilege_escalation" OR (auth_method="sso" AND target_system="xcc" AND user_role_change="true"))

🔗 References

📤 Share & Export