CVE-2024-4846

6.3 MEDIUM

📋 TL;DR

This vulnerability allows an authenticated attacker to bypass two-factor authentication (2FA) in Devolutions Server by using another browser tab to authenticate as another user without being prompted for 2FA. It affects Devolutions Server 2024.1.14.0 and earlier versions. Users with 2FA enabled are vulnerable to account takeover.

💻 Affected Systems

Products:
  • Devolutions Server
Versions: 2024.1.14.0 and earlier
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with 2FA enabled. The vulnerability requires an authenticated attacker to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could gain unauthorized access to any user account, potentially compromising sensitive data, performing privileged actions, or maintaining persistent access to the system.

🟠

Likely Case

An attacker with valid credentials could bypass 2FA to access another user's account, leading to unauthorized data access or privilege escalation within the application.

🟢

If Mitigated

With proper network segmentation, strong authentication policies, and monitoring, impact would be limited to unauthorized access within the application scope rather than full system compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires an authenticated session and knowledge of another user's credentials. The attack vector involves browser tab manipulation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.1.15.0 or later

Vendor Advisory: https://devolutions.net/security/advisories/DEVO-2024-0009

Restart Required: Yes

Instructions:

1. Download the latest version from Devolutions website. 2. Backup your current installation. 3. Run the installer to upgrade to version 2024.1.15.0 or later. 4. Restart the Devolutions Server service.

🔧 Temporary Workarounds

Disable 2FA

all

Temporarily disable two-factor authentication to prevent the bypass vulnerability

Navigate to Administration > Security > Two-Factor Authentication and disable

Session Management

all

Implement strict session management policies to prevent tab-based attacks

Configure session timeout policies and single session per user

🧯 If You Can't Patch

  • Implement network segmentation to isolate Devolutions Server from critical systems
  • Enable detailed logging and monitoring for authentication events and account access patterns

🔍 How to Verify

Check if Vulnerable:

Check the Devolutions Server version in the web interface under Help > About or via the server console

Check Version:

In Devolutions Server web interface: Help > About, or check server logs for version information

Verify Fix Applied:

Verify the version is 2024.1.15.0 or later and test 2FA functionality with multiple browser tabs

📡 Detection & Monitoring

Log Indicators:

  • Multiple successful logins from same IP for different users in short timeframe
  • 2FA bypass attempts in authentication logs
  • Unusual account access patterns

Network Indicators:

  • Multiple authentication requests from same session
  • Concurrent logins from same client

SIEM Query:

source="devolutions_server" AND (event_type="authentication" AND result="success") | stats count by user, src_ip | where count > 1

🔗 References

📤 Share & Export