CVE-2024-7346

7.2 HIGH

📋 TL;DR

This vulnerability allows attackers to bypass TLS host name validation when OpenEdge default certificates are used for network connections, enabling man-in-the-middle attacks. It affects OpenEdge installations using default TLS certificates for network security. Organizations relying on TLS certificate validation for secure communications are impacted.

💻 Affected Systems

Products:
  • Progress OpenEdge
Versions: Specific versions not specified in advisory; all versions using default TLS certificates are affected
Operating Systems: All platforms running OpenEdge
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using OpenEdge default certificates for TLS connections; systems using CA-signed certificates are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of encrypted communications allowing interception, decryption, and modification of sensitive data in transit between OpenEdge clients and servers.

🟠

Likely Case

Man-in-the-middle attacks where attackers can intercept and potentially modify network traffic between OpenEdge components, leading to data exposure or unauthorized access.

🟢

If Mitigated

Limited impact if proper TLS certificate validation is already enforced through CA-signed certificates or network segmentation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to intercept TLS connections; no authentication needed as this is a protocol-level vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in advisory; consult Progress support for specific version

Vendor Advisory: https://community.progress.com/s/article/Client-connections-using-default-TLS-certificates-from-OpenEdge-may-bypass-TLS-host-name-validation

Restart Required: Yes

Instructions:

1. Apply the latest OpenEdge update from Progress. 2. Replace all default TLS certificates with CA-signed certificates from recognized certificate authorities. 3. Restart OpenEdge services. 4. Verify host name validation is now enforced.

🔧 Temporary Workarounds

Replace Default Certificates

all

Immediately replace OpenEdge default certificates with CA-signed certificates containing proper host name information

Consult OpenEdge documentation for certificate replacement procedures specific to your version

Network Segmentation

all

Isolate OpenEdge network traffic to trusted segments to reduce attack surface

🧯 If You Can't Patch

  • Replace all default TLS certificates with CA-signed certificates immediately
  • Implement strict network segmentation and monitor for unusual TLS handshake patterns

🔍 How to Verify

Check if Vulnerable:

Check if OpenEdge is using default certificates by examining certificate configuration files and verifying certificates are not CA-signed

Check Version:

Consult OpenEdge documentation for version check command specific to your installation

Verify Fix Applied:

Test TLS connections to verify host name validation is now enforced and default certificates are rejected

📡 Detection & Monitoring

Log Indicators:

  • Failed TLS handshakes with host name validation errors
  • Connections using default certificate identifiers

Network Indicators:

  • Unusual TLS negotiation patterns
  • Connections bypassing expected certificate validation

SIEM Query:

Search for OpenEdge TLS connection events where certificate validation is bypassed or default certificates are used

🔗 References

📤 Share & Export