CVE-2024-4555

7.7 HIGH

📋 TL;DR

CVE-2024-4555 is an improper privilege management vulnerability in OpenText NetIQ Access Manager that allows user account impersonation in specific scenarios. This affects organizations using NetIQ Access Manager versions before 5.0.4.1 and before 5.1 for identity and access management.

💻 Affected Systems

Products:
  • OpenText NetIQ Access Manager
Versions: All versions before 5.0.4.1 and all versions before 5.1
Operating Systems: All supported platforms for NetIQ Access Manager
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments of vulnerable versions regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could impersonate legitimate users to gain unauthorized access to sensitive systems and data, potentially leading to data breaches, privilege escalation, and lateral movement within the network.

🟠

Likely Case

Authenticated attackers could impersonate other users to bypass access controls and access resources they shouldn't have permission to view or modify.

🟢

If Mitigated

With proper network segmentation, monitoring, and least privilege principles, the impact would be limited to specific segments and detectable through audit logs.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access and specific conditions to exploit. No public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.0.4.1 or 5.1

Vendor Advisory: https://www.microfocus.com/documentation/access-manager/5.0/accessmanager504-p1-release-notes/accessmanager504-p1-release-notes.html

Restart Required: Yes

Instructions:

1. Download the appropriate patch (5.0.4.1 for 5.0.x deployments or 5.1 for newer deployments). 2. Backup current configuration. 3. Apply the patch following OpenText documentation. 4. Restart NetIQ Access Manager services. 5. Verify functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to NetIQ Access Manager administration interfaces to trusted networks only

Enhanced Monitoring

all

Increase logging and monitoring for user impersonation events and unusual authentication patterns

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the NetIQ Access Manager interfaces
  • Enable detailed audit logging and implement real-time alerting for suspicious authentication events

🔍 How to Verify

Check if Vulnerable:

Check NetIQ Access Manager version via administration console or configuration files

Check Version:

Check administration console or review installation logs for version information

Verify Fix Applied:

Verify version is 5.0.4.1 or higher for 5.0.x deployments, or 5.1 or higher for newer deployments

📡 Detection & Monitoring

Log Indicators:

  • Multiple authentication attempts from same source with different user identities
  • Unusual user impersonation events
  • Authentication logs showing user context switching

Network Indicators:

  • Unusual authentication traffic patterns to NetIQ Access Manager
  • Multiple user sessions from single IP address

SIEM Query:

source="netiq-access-manager" AND (event_type="authentication" OR event_type="impersonation") | stats count by src_ip, user

🔗 References

📤 Share & Export