CVE-2024-56404

9.9 CRITICAL

📋 TL;DR

An insecure direct object reference (IDOR) vulnerability in One Identity Identity Manager 9.x before version 9.3 allows authenticated attackers to escalate privileges by accessing unauthorized resources. Only on-premise installations are affected, not cloud deployments. This vulnerability enables attackers to gain higher-level permissions than intended.

💻 Affected Systems

Products:
  • One Identity Identity Manager
Versions: 9.x versions before 9.3
Operating Systems: Windows Server (typical deployment)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects on-premise installations. Cloud deployments are not vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative privileges, potentially compromising the entire identity management system, accessing sensitive user data, modifying permissions, and creating backdoor accounts.

🟠

Likely Case

Authenticated users with limited privileges escalate to higher roles, accessing unauthorized resources and performing actions beyond their intended permissions.

🟢

If Mitigated

With proper access controls and monitoring, exploitation attempts can be detected and contained before significant damage occurs.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access but exploitation is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.3

Vendor Advisory: https://support.oneidentity.com/product-notification/noti-00001678

Restart Required: Yes

Instructions:

1. Download Identity Manager 9.3 from One Identity support portal. 2. Backup current configuration and database. 3. Run the 9.3 installer on all Identity Manager servers. 4. Restart all Identity Manager services. 5. Verify functionality post-upgrade.

🔧 Temporary Workarounds

Network segmentation and access restriction

all

Restrict network access to Identity Manager to only trusted administrative networks and implement strict authentication requirements.

🧯 If You Can't Patch

  • Implement strict access controls and monitor for unusual privilege escalation attempts
  • Segment Identity Manager from general user networks and limit authentication sources

🔍 How to Verify

Check if Vulnerable:

Check Identity Manager version in administration console or via 'About' section. If version is 9.x and less than 9.3, system is vulnerable.

Check Version:

Check via Identity Manager web interface: Administration > About, or check installed programs in Windows Control Panel.

Verify Fix Applied:

Verify version shows 9.3 or higher in administration console and test that authenticated users cannot access unauthorized resources.

📡 Detection & Monitoring

Log Indicators:

  • Unusual privilege escalation events
  • Access to administrative functions by non-admin users
  • Failed authorization attempts followed by successful access

Network Indicators:

  • Unusual authentication patterns to Identity Manager endpoints
  • Access to administrative API endpoints from non-admin accounts

SIEM Query:

source="identity_manager" AND (event_type="privilege_escalation" OR (user_role="user" AND action="admin_operation"))

🔗 References

📤 Share & Export