Description

Researchers have discovered CVE-2024-45488, a critical vulnerability in One Identity’s Safeguard for Privileged Passwords that allows for authentication bypass. This flaw could allow attackers to gain full administrative control of the virtual appliance. Once an attacker authenticates with an administrative session, they can perform actions such as reconfiguring appliance settings, modifying policies to extract passwords, and downloading and decrypting backups if the default backup encryption setting is used, which involves a hard-coded RSA key. AmberWolf researchers have demonstrated the exploit in action and provided an easy-to-understand write-up, along with a video demo. The vulnerability, known as "Skeleton Cookie," is caused by the use of a hard-coded cryptographic key in SPP virtual appliance images. This key can be exploited to forge session cookies, enabling attackers to bypass authentication. One Identity confirmed that only virtual appliance deployments on VMware or HyperV are affected, while physical appliances and those hosted on Azure, AWS, OCI, or other supported cloud platforms are not impacted. Users are advised to update to Safeguard for Privileged Passwords versions 7.0.5.1 LTS, 7.4.2, or 7.5.2, which include the patch. AmberWolf has also released a script to help users determine if their instances are vulnerable to this exploit.