Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-10125: CWE-290 Authentication Bypass by Spoofing in Amazon Amazon.ApplicationLoadBalancer.Identity.AspNetCore Middleware

0
Medium
VulnerabilityCVE-2024-10125cvecve-2024-10125cwe-290
Published: Mon Oct 21 2024 (10/21/2024, 23:25:11 UTC)
Source: CVE Database V5
Vendor/Project: Amazon
Product: Amazon.ApplicationLoadBalancer.Identity.AspNetCore Middleware

Description

The Amazon.ApplicationLoadBalancer.Identity.AspNetCore repo https://github.com/awslabs/aws-alb-identity-aspnetcore#validatetokensignature contains Middleware that can be used in conjunction with the Application Load Balancer (ALB) OpenId Connect integration and can be used in any ASP.NET https://dotnet.microsoft.com/apps/aspnet Core deployment scenario, including Fargate, EKS, ECS, EC2, and Lambda. In the JWT handling code, it performs signature validation but fails to validate the JWT issuer and signer identity. The signer omission, if combined with a scenario where the infrastructure owner allows internet traffic to the ALB targets (not a recommended configuration), can allow for JWT signing by an untrusted entity and an actor may be able to mimic valid OIDC-federated sessions to the ALB targets. The repository/package has been deprecated, is end of life, and is no longer supported. As a security best practice, ensure that your ELB targets (e.g. EC2 Instances, Fargate Tasks etc.) do not have public IP addresses. Ensure any forked or derivative code validate that the signer attribute in the JWT match the ARN of the Application Load Balancer that the service is configured to use.

AI-Powered Analysis

AILast updated: 10/14/2025, 19:21:56 UTC

Technical Analysis

CVE-2024-10125 affects the Amazon.ApplicationLoadBalancer.Identity.AspNetCore middleware, which facilitates integration of AWS Application Load Balancer (ALB) with OpenID Connect (OIDC) authentication in ASP.NET Core environments. This middleware performs JWT signature validation but critically omits validation of the JWT issuer and signer identity. This flaw means that an attacker can craft a JWT signed by an untrusted entity and have it accepted as valid by the middleware, effectively bypassing authentication controls. The vulnerability is particularly exploitable if the ALB targets (such as EC2 instances, Fargate tasks, or containers in EKS/ECS) are exposed to the internet with public IP addresses, a configuration that AWS advises against. Since the middleware is deprecated and unsupported, no official patches exist, increasing the risk for users who continue to rely on it. The vulnerability impacts all versions of the middleware. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges or user interaction required, but partial impact on integrity and limited scope. The lack of issuer validation (CWE-290) undermines the trust model of OIDC, allowing attackers to impersonate legitimate users or services. This can lead to unauthorized access to protected resources behind the ALB, potentially exposing sensitive data or enabling further lateral movement within cloud environments. No known exploits have been reported yet, but the risk remains significant in misconfigured environments.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized access to internal applications and services protected by ALB with OIDC authentication if they use the affected middleware and expose ALB targets publicly. Confidentiality and integrity of sensitive data could be compromised, especially in sectors with strict data protection requirements such as finance, healthcare, and government. Exploitation could lead to impersonation of legitimate users or services, enabling attackers to bypass authentication and gain access to internal systems. This could facilitate data exfiltration, service disruption, or further compromise of cloud infrastructure. The impact is amplified in multi-tenant or hybrid cloud environments common in Europe, where trust boundaries are critical. Organizations relying on deprecated middleware without active support face increased risk due to lack of patches. The medium severity rating reflects the need for careful network configuration and validation controls to prevent exploitation.

Mitigation Recommendations

1. Immediately audit all AWS ALB configurations to ensure that targets (EC2, Fargate, EKS, ECS, Lambda) do not have public IP addresses or are not directly accessible from the internet. 2. If public exposure is necessary, implement strict network controls such as AWS Security Groups, NACLs, and WAF rules to limit access only to trusted sources. 3. Replace the deprecated Amazon.ApplicationLoadBalancer.Identity.AspNetCore middleware with supported, actively maintained alternatives that properly validate JWT issuer and signer attributes. 4. For any forked or derivative versions of the middleware, implement explicit validation to ensure the JWT signer attribute matches the ARN of the ALB in use, preventing token spoofing. 5. Employ runtime monitoring and anomaly detection to identify unusual authentication patterns or token usage. 6. Conduct regular security reviews of identity federation and token validation logic in cloud-native applications. 7. Educate development and operations teams on secure JWT handling and AWS best practices for ALB deployment. 8. Consider implementing additional layers of authentication or authorization checks downstream of the ALB to mitigate risks from token spoofing.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
AMZN
Date Reserved
2024-10-18T13:08:55.032Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68ee9ff531414aa8fc5df080

Added to database: 10/14/2025, 7:09:41 PM

Last enriched: 10/14/2025, 7:21:56 PM

Last updated: 10/16/2025, 2:04:14 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats