Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-0822: Weak Authentication

0
High
VulnerabilityCVE-2024-0822cvecve-2024-0822
Published: Thu Jan 25 2024 (01/25/2024, 15:18:20 UTC)
Source: CVE Database V5

Description

An authentication bypass vulnerability was found in overt-engine. This flaw allows the creation of users in the system without authentication due to a flaw in the CreateUserSession command.

AI-Powered Analysis

AILast updated: 11/20/2025, 07:57:58 UTC

Technical Analysis

CVE-2024-0822 identifies a critical authentication bypass vulnerability in overt-engine version 4.5.0. The vulnerability resides in the CreateUserSession command, which is intended to establish authenticated user sessions. Due to a flaw in its implementation, attackers can invoke this command remotely without any authentication or user interaction, allowing them to create new user accounts on the system. This bypasses all normal authentication controls, compromising the integrity of the user management process. The vulnerability has a CVSS v3.1 base score of 7.5, reflecting its high severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The scope is unchanged (S:U), and the impact affects integrity (I:H) but not confidentiality or availability. Although no public exploits have been reported yet, the ease of exploitation and the critical nature of user account creation make this a significant threat. The flaw could be leveraged to establish persistent unauthorized access, escalate privileges, or facilitate further attacks within the affected environment. The vulnerability was published on January 25, 2024, and assigned by Red Hat. No patches or mitigation links are currently provided, indicating the need for immediate defensive measures by users of overt-engine 4.5.0.

Potential Impact

For European organizations, this vulnerability poses a serious risk to system integrity and security posture. Unauthorized user creation can lead to privilege escalation, unauthorized access to sensitive data, and potential lateral movement within networks. Critical sectors such as finance, healthcare, government, and telecommunications that rely on overt-engine 4.5.0 for authentication or session management are particularly vulnerable. Exploitation could undermine trust in identity and access management systems, disrupt business operations, and lead to regulatory non-compliance, especially under GDPR mandates concerning access controls and data protection. The lack of confidentiality impact reduces the risk of direct data leakage, but the integrity compromise can facilitate more damaging attacks. The absence of known exploits in the wild provides a window for proactive defense, but the vulnerability’s ease of exploitation demands urgent attention.

Mitigation Recommendations

1. Immediately restrict network access to the overt-engine service, ideally limiting it to trusted internal IP addresses or VPN connections. 2. Implement strict monitoring and alerting for any new user account creations or unusual authentication events within overt-engine logs. 3. Employ network-level controls such as firewalls and intrusion detection/prevention systems to detect and block anomalous CreateUserSession command usage. 4. Coordinate with the overt-engine vendor or community to obtain patches or updates addressing CVE-2024-0822 as soon as they become available. 5. Consider temporary compensating controls such as disabling the CreateUserSession command if feasible or enforcing multi-factor authentication on all user accounts to reduce risk. 6. Conduct a thorough audit of existing user accounts to identify and remove any unauthorized accounts created prior to mitigation. 7. Educate IT and security teams about this vulnerability to ensure rapid response to any suspicious activity. 8. Review and tighten overall access control policies and session management configurations within overt-engine deployments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-01-23T14:15:45.514Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e7a5cfba0e608b4f98d83d

Added to database: 10/9/2025, 12:08:47 PM

Last enriched: 11/20/2025, 7:57:58 AM

Last updated: 12/4/2025, 4:22:24 PM

Views: 81

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats