March 11, 2024 at 02:45AM
A critical security flaw (CVE-2024-1403) in Progress Software OpenEdge Authentication Gateway and AdminServer allows unauthorized access via bypassing authentication protections. Exploit specifics and technical details disclosed, with severity rating of 10.0. Addressed in versions OpenEdge LTS Update 11.7.19, 12.2.14, and 12.8.1. Horizon3.ai released a proof-of-concept, identifying potential remote code execution risk.
Key Takeaways from the meeting notes regarding the newsroom network security vulnerability:
1. **Vulnerability Description**: A critical security flaw in Progress Software OpenEdge Authentication Gateway and AdminServer has been disclosed, allowing potential unauthorized access by exploiting authentication routines.
2. **CVE Details**: Tracked as CVE-2024-1403, the vulnerability has a maximum severity rating of 10.0 on the CVSS scoring system and impacts specific OpenEdge versions.
3. **Affected Systems**: The flaw affects OpenEdge Authentication Gateway when configured with an OpenEdge Domain using the OS local authentication provider, as well as AdminServer connections made by OpenEdge Explorer (OEE) and OpenEdge Management (OEM).
4. **Resolution**: The vulnerability has been addressed in newer versions OpenEdge LTS Update 11.7.19, 12.2.14, and 12.8.1.
5. **Proof of Concept (PoC)**: Horizon3.ai has reverse-engineered the vulnerable AdminServer service and released a PoC for CVE-2024-1403, pointing to potential remote code execution via built-in functionality with enough research effort.
Please let me know if there’s anything else you would like to highlight or discuss further.