CVE-2024-10125: CWE-290 Authentication Bypass by Spoofing in Amazon Amazon.ApplicationLoadBalancer.Identity.AspNetCore Middleware
The Amazon.ApplicationLoadBalancer.Identity.AspNetCore repo https://github.com/awslabs/aws-alb-identity-aspnetcore#validatetokensignature contains Middleware that can be used in conjunction with the Application Load Balancer (ALB) OpenId Connect integration and can be used in any ASP.NET https://dotnet.microsoft.com/apps/aspnet Core deployment scenario, including Fargate, EKS, ECS, EC2, and Lambda. In the JWT handling code, it performs signature validation but fails to validate the JWT issuer and signer identity. The signer omission, if combined with a scenario where the infrastructure owner allows internet traffic to the ALB targets (not a recommended configuration), can allow for JWT signing by an untrusted entity and an actor may be able to mimic valid OIDC-federated sessions to the ALB targets. The repository/package has been deprecated, is end of life, and is no longer supported. As a security best practice, ensure that your ELB targets (e.g. EC2 Instances, Fargate Tasks etc.) do not have public IP addresses. Ensure any forked or derivative code validate that the signer attribute in the JWT match the ARN of the Application Load Balancer that the service is configured to use.
AI Analysis
Technical Summary
CVE-2024-10125 affects the Amazon.ApplicationLoadBalancer.Identity.AspNetCore middleware, which facilitates integration of AWS Application Load Balancer (ALB) with OpenID Connect (OIDC) authentication in ASP.NET Core environments. This middleware performs JWT signature validation but critically omits validation of the JWT issuer and signer identity. This flaw means that an attacker can craft a JWT signed by an untrusted entity and have it accepted as valid by the middleware, effectively bypassing authentication controls. The vulnerability is particularly exploitable if the ALB targets (such as EC2 instances, Fargate tasks, or containers in EKS/ECS) are exposed to the internet with public IP addresses, a configuration that AWS advises against. Since the middleware is deprecated and unsupported, no official patches exist, increasing the risk for users who continue to rely on it. The vulnerability impacts all versions of the middleware. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges or user interaction required, but partial impact on integrity and limited scope. The lack of issuer validation (CWE-290) undermines the trust model of OIDC, allowing attackers to impersonate legitimate users or services. This can lead to unauthorized access to protected resources behind the ALB, potentially exposing sensitive data or enabling further lateral movement within cloud environments. No known exploits have been reported yet, but the risk remains significant in misconfigured environments.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized access to internal applications and services protected by ALB with OIDC authentication if they use the affected middleware and expose ALB targets publicly. Confidentiality and integrity of sensitive data could be compromised, especially in sectors with strict data protection requirements such as finance, healthcare, and government. Exploitation could lead to impersonation of legitimate users or services, enabling attackers to bypass authentication and gain access to internal systems. This could facilitate data exfiltration, service disruption, or further compromise of cloud infrastructure. The impact is amplified in multi-tenant or hybrid cloud environments common in Europe, where trust boundaries are critical. Organizations relying on deprecated middleware without active support face increased risk due to lack of patches. The medium severity rating reflects the need for careful network configuration and validation controls to prevent exploitation.
Mitigation Recommendations
1. Immediately audit all AWS ALB configurations to ensure that targets (EC2, Fargate, EKS, ECS, Lambda) do not have public IP addresses or are not directly accessible from the internet. 2. If public exposure is necessary, implement strict network controls such as AWS Security Groups, NACLs, and WAF rules to limit access only to trusted sources. 3. Replace the deprecated Amazon.ApplicationLoadBalancer.Identity.AspNetCore middleware with supported, actively maintained alternatives that properly validate JWT issuer and signer attributes. 4. For any forked or derivative versions of the middleware, implement explicit validation to ensure the JWT signer attribute matches the ARN of the ALB in use, preventing token spoofing. 5. Employ runtime monitoring and anomaly detection to identify unusual authentication patterns or token usage. 6. Conduct regular security reviews of identity federation and token validation logic in cloud-native applications. 7. Educate development and operations teams on secure JWT handling and AWS best practices for ALB deployment. 8. Consider implementing additional layers of authentication or authorization checks downstream of the ALB to mitigate risks from token spoofing.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Ireland, Italy
CVE-2024-10125: CWE-290 Authentication Bypass by Spoofing in Amazon Amazon.ApplicationLoadBalancer.Identity.AspNetCore Middleware
Description
The Amazon.ApplicationLoadBalancer.Identity.AspNetCore repo https://github.com/awslabs/aws-alb-identity-aspnetcore#validatetokensignature contains Middleware that can be used in conjunction with the Application Load Balancer (ALB) OpenId Connect integration and can be used in any ASP.NET https://dotnet.microsoft.com/apps/aspnet Core deployment scenario, including Fargate, EKS, ECS, EC2, and Lambda. In the JWT handling code, it performs signature validation but fails to validate the JWT issuer and signer identity. The signer omission, if combined with a scenario where the infrastructure owner allows internet traffic to the ALB targets (not a recommended configuration), can allow for JWT signing by an untrusted entity and an actor may be able to mimic valid OIDC-federated sessions to the ALB targets. The repository/package has been deprecated, is end of life, and is no longer supported. As a security best practice, ensure that your ELB targets (e.g. EC2 Instances, Fargate Tasks etc.) do not have public IP addresses. Ensure any forked or derivative code validate that the signer attribute in the JWT match the ARN of the Application Load Balancer that the service is configured to use.
AI-Powered Analysis
Technical Analysis
CVE-2024-10125 affects the Amazon.ApplicationLoadBalancer.Identity.AspNetCore middleware, which facilitates integration of AWS Application Load Balancer (ALB) with OpenID Connect (OIDC) authentication in ASP.NET Core environments. This middleware performs JWT signature validation but critically omits validation of the JWT issuer and signer identity. This flaw means that an attacker can craft a JWT signed by an untrusted entity and have it accepted as valid by the middleware, effectively bypassing authentication controls. The vulnerability is particularly exploitable if the ALB targets (such as EC2 instances, Fargate tasks, or containers in EKS/ECS) are exposed to the internet with public IP addresses, a configuration that AWS advises against. Since the middleware is deprecated and unsupported, no official patches exist, increasing the risk for users who continue to rely on it. The vulnerability impacts all versions of the middleware. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges or user interaction required, but partial impact on integrity and limited scope. The lack of issuer validation (CWE-290) undermines the trust model of OIDC, allowing attackers to impersonate legitimate users or services. This can lead to unauthorized access to protected resources behind the ALB, potentially exposing sensitive data or enabling further lateral movement within cloud environments. No known exploits have been reported yet, but the risk remains significant in misconfigured environments.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized access to internal applications and services protected by ALB with OIDC authentication if they use the affected middleware and expose ALB targets publicly. Confidentiality and integrity of sensitive data could be compromised, especially in sectors with strict data protection requirements such as finance, healthcare, and government. Exploitation could lead to impersonation of legitimate users or services, enabling attackers to bypass authentication and gain access to internal systems. This could facilitate data exfiltration, service disruption, or further compromise of cloud infrastructure. The impact is amplified in multi-tenant or hybrid cloud environments common in Europe, where trust boundaries are critical. Organizations relying on deprecated middleware without active support face increased risk due to lack of patches. The medium severity rating reflects the need for careful network configuration and validation controls to prevent exploitation.
Mitigation Recommendations
1. Immediately audit all AWS ALB configurations to ensure that targets (EC2, Fargate, EKS, ECS, Lambda) do not have public IP addresses or are not directly accessible from the internet. 2. If public exposure is necessary, implement strict network controls such as AWS Security Groups, NACLs, and WAF rules to limit access only to trusted sources. 3. Replace the deprecated Amazon.ApplicationLoadBalancer.Identity.AspNetCore middleware with supported, actively maintained alternatives that properly validate JWT issuer and signer attributes. 4. For any forked or derivative versions of the middleware, implement explicit validation to ensure the JWT signer attribute matches the ARN of the ALB in use, preventing token spoofing. 5. Employ runtime monitoring and anomaly detection to identify unusual authentication patterns or token usage. 6. Conduct regular security reviews of identity federation and token validation logic in cloud-native applications. 7. Educate development and operations teams on secure JWT handling and AWS best practices for ALB deployment. 8. Consider implementing additional layers of authentication or authorization checks downstream of the ALB to mitigate risks from token spoofing.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- AMZN
- Date Reserved
- 2024-10-18T13:08:55.032Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68ee9ff531414aa8fc5df080
Added to database: 10/14/2025, 7:09:41 PM
Last enriched: 10/14/2025, 7:21:56 PM
Last updated: 10/16/2025, 2:04:14 PM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9804: Vulnerability in WSO2 WSO2 Identity Server as Key Manager
CriticalCVE-2025-9152: Vulnerability in WSO2 WSO2 API Manager
CriticalCVE-2025-9955: Vulnerability in WSO2 WSO2 Enterprise Integrator
MediumCVE-2025-10611: Vulnerability in WSO2 WSO2 API Manager
CriticalFuji Electric HMI Configurator Flaws Expose Industrial Organizations to Hacking
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.