CVE-2024-57378

7.3 HIGH

📋 TL;DR

CVE-2024-57378 is a broken access control vulnerability in Wazuh SIEM 4.8.2 that allows unauthorized creation of internal users without proper role assignment. This can lead to privilege escalation and unauthorized access to sensitive security data. Organizations running affected Wazuh versions are vulnerable.

💻 Affected Systems

Products:
  • Wazuh SIEM
Versions: 4.8.2
Operating Systems: All platforms running Wazuh
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default installations of Wazuh 4.8.2. Earlier versions may also be affected but not confirmed.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers create administrative users, gain full control over the SIEM system, access all security logs and alerts, and potentially pivot to other systems.

🟠

Likely Case

Unauthorized users are created with limited privileges, allowing access to sensitive security monitoring data and potentially modifying alert rules.

🟢

If Mitigated

With proper network segmentation and authentication controls, impact is limited to the Wazuh management interface only.

🌐 Internet-Facing: HIGH if Wazuh management interface is exposed to the internet without proper authentication controls.
🏢 Internal Only: MEDIUM as it requires internal network access but could be exploited by compromised internal systems or malicious insiders.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires access to the Wazuh API/interface but doesn't require authentication for the user creation endpoint. Technical details are available in the GitHub reference.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.8.3 or later

Vendor Advisory: https://github.com/wazuh/wazuh/releases

Restart Required: No

Instructions:

1. Backup current configuration. 2. Update Wazuh to version 4.8.3 or later using package manager. 3. Verify the update completed successfully. 4. Test user creation functionality.

🔧 Temporary Workarounds

Restrict API Access

all

Implement network access controls to restrict access to Wazuh API endpoints, particularly user management endpoints.

iptables -A INPUT -p tcp --dport 55000 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 55000 -j DROP

Disable Unnecessary User Creation

all

Temporarily disable user creation functionality via configuration changes.

Edit /var/ossec/etc/ossec.conf and restrict user management permissions

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Wazuh management interface
  • Enable detailed audit logging for all user creation attempts and monitor for anomalies

🔍 How to Verify

Check if Vulnerable:

Check Wazuh version: cat /etc/ossec-init.conf | grep VERSION. If version is 4.8.2, system is vulnerable.

Check Version:

cat /etc/ossec-init.conf | grep VERSION

Verify Fix Applied:

After update, verify version is 4.8.3 or later and test that unauthorized user creation is blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized POST requests to /security/user/ endpoints
  • New user creation events without proper authentication logs
  • Failed authentication attempts followed by successful user creation

Network Indicators:

  • Unusual API calls to user management endpoints from unexpected sources
  • Traffic to Wazuh API port (default 55000) from unauthorized IPs

SIEM Query:

source="wazuh" AND (event_type="user_creation" OR api_endpoint="/security/user/") AND NOT user="authenticated_admin"

🔗 References

📤 Share & Export