CVE-2024-9798

Cleartext Storage of Sensitive Information (CWE-312)

Published: Oct 10, 2024 / Updated: 40d ago

010
CVSS 9EPSS 0.04%Critical
CVE info copied to clipboard

Summary

The health endpoint is public, allowing anyone to see a list of all services. This information is potentially valuable for attackers. The vulnerability has a high impact on confidentiality, integrity, and availability. It can be exploited over the network without requiring user interaction or privileges, although the attack complexity is high. The scope of the vulnerability is changed, indicating potential impact beyond the vulnerable component.

Impact

This vulnerability could allow attackers to gain unauthorized access to sensitive information about the system's services. With this information, attackers could: 1. Map out the entire service infrastructure, identifying potential targets for further attacks. 2. Discover less secure or unpatched services that could be exploited. 3. Use the information to craft more sophisticated and targeted attacks against specific services. 4. Potentially disrupt or manipulate services, given the high integrity and availability impact. The changed scope suggests that the vulnerability could affect components beyond the initial target, potentially leading to a wider system compromise.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

Based on the provided information, there is no mention of an available patch for this vulnerability.

Mitigation

Given the lack of specific patch information, here are some general mitigation recommendations: 1. Restrict access to the health endpoint immediately, limiting it to authorized personnel only. 2. Implement strong authentication and access controls for all service endpoints. 3. Use network segmentation to isolate critical services from potential external access. 4. Regularly audit and review exposed endpoints and services to ensure only necessary information is publicly accessible. 5. Monitor for unusual access patterns or attempts to enumerate services. 6. Keep all services and systems up-to-date with the latest security patches as they become available. 7. Consider implementing a Web Application Firewall (WAF) to add an extra layer of protection against potential exploits.

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

Timeline

CVE Assignment

NVD published the first details for CVE-2024-9798

Oct 10, 2024 at 8:15 AM
CVSS

A CVSS base score of 9 has been assigned.

Oct 10, 2024 at 8:15 AM / nvd
First Article

Feedly found the first article mentioning CVE-2024-9798. See article

Oct 10, 2024 at 8:18 AM / National Vulnerability Database
CVSS Estimate

Feedly estimated the CVSS score as MEDIUM

Oct 10, 2024 at 8:18 AM
EPSS

EPSS Score was set to: 0.04% (Percentile: 9.7%)

Oct 11, 2024 at 10:19 AM
Static CVE Timeline Graph

Affected Systems

Apache/synapse
+null more

Links to Mitre Att&cks

T1552.004:
+null more

Attack Patterns

CAPEC-37: Retrieve Embedded Sensitive Data
+null more

News

NA - CVE-2024-9798 - The health endpoint is public so everybody can...
The health endpoint is public so everybody can see a list of all services. It is potentially valuable information for attackers.
cveNotify : 🚨 CVE-2024-9798The health endpoint is public so everybody can see a list of all services. It is potentially valuable information for attackers.🎖@cveNotify
cveNotify : 🚨 CVE-2024-9798The health endpoint is public so everybody can see a list of all services. It is potentially valuable information for attackers.🎖@cveNotify
CVE-2024-9798
The health endpoint is public so everybody can see a list of all services. It is potentially valuable information for...
CVE-2024-9798 - Apache Synapse Information Disclosure
CVE ID : CVE-2024-9798 Published : Oct. 10, 2024, 8:15 a.m. 50 minutes ago Description : The health endpoint is public so everybody can see a list of all services. It is potentially valuable information for attackers. Severity: 9.0
CVE-2024-9798 | Open Mainframe Project Zowe up to 1.28.7/2.17.x Health Endpoint information disclosure
A vulnerability, which was classified as problematic , has been found in Open Mainframe Project Zowe up to 1.28.7/2.17.x . Affected by this issue is some unknown functionality of the component Health Endpoint . The manipulation leads to information disclosure. This vulnerability is handled as CVE-2024-9798 . The attack may be launched remotely. There is no exploit available. It is recommended to upgrade the affected component.
See 4 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:High
Privileges Required:None
User Interaction:None
Scope:Changed
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI