CVE-2024-6914

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to reset any user's password via a flawed SOAP admin service in WSO2 products, leading to complete account takeover including privileged accounts. It affects WSO2 products with exposed account recovery SOAP services. Organizations using affected WSO2 products with these services accessible are at risk.

💻 Affected Systems

Products:
  • WSO2 API Manager
  • WSO2 Identity Server
  • WSO2 Enterprise Integrator
  • WSO2 Micro Integrator
  • WSO2 Streaming Integrator
  • WSO2 Micro Gateway
Versions: WSO2 products from 4.0.0 up to and including 4.2.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires access to account recovery SOAP admin services via /services context path. Impact reduced if these endpoints are restricted per WSO2 security guidelines.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all user accounts including administrative accounts, leading to full system control, data exfiltration, and potential lateral movement.

🟠

Likely Case

Targeted account takeover of specific users, potentially including administrators, leading to unauthorized access and privilege escalation.

🟢

If Mitigated

Limited impact if SOAP admin services are properly restricted to trusted networks as per WSO2 security guidelines.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires network access to vulnerable SOAP endpoints but no authentication. Attack complexity is low once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply security patch WSO2-2024-3561

Vendor Advisory: https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2024/WSO2-2024-3561/

Restart Required: Yes

Instructions:

1. Download security patch WSO2-2024-3561 from WSO2. 2. Apply patch to affected WSO2 products. 3. Restart all WSO2 services. 4. Verify patch application.

🔧 Temporary Workarounds

Restrict SOAP Admin Services

linux

Block access to account recovery SOAP admin services via network controls

iptables -A INPUT -p tcp --dport 9443 -s !TRUSTED_NETWORK -j DROP
firewall-cmd --permanent --add-rich-rule='rule family="ipv4" source address="!TRUSTED_NETWORK" port port="9443" protocol="tcp" reject'

Disable SOAP Admin Service Exposure

all

Configure WSO2 to not expose SOAP admin services to untrusted networks

Modify carbon.xml to restrict service exposure
Update axis2.xml to limit service access

🧯 If You Can't Patch

  • Immediately restrict network access to /services context path to trusted IPs only
  • Implement additional authentication/authorization controls for SOAP admin services

🔍 How to Verify

Check if Vulnerable:

Check if WSO2 product version is between 4.0.0 and 4.2.0 and if /services endpoint is accessible

Check Version:

Check WSO2 product documentation for version check command specific to your installation

Verify Fix Applied:

Verify patch WSO2-2024-3561 is applied and test password reset functionality is properly authorized

📡 Detection & Monitoring

Log Indicators:

  • Unusual SOAP requests to account recovery services
  • Multiple password reset attempts from single source
  • Successful password resets for privileged accounts

Network Indicators:

  • SOAP requests to /services/AccountRecoveryAdminService from untrusted sources
  • Unusual traffic patterns to WSO2 admin ports

SIEM Query:

source="wso2-logs" AND (uri_path="/services/AccountRecoveryAdminService" OR message="password reset")

🔗 References

📤 Share & Export