Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12225: Authentication Bypass Using an Alternate Path or Channel

0
Critical
VulnerabilityCVE-2024-12225cvecve-2024-12225
Published: Tue May 06 2025 (05/06/2025, 19:49:16 UTC)
Source: CVE

Description

A vulnerability was found in Quarkus in the quarkus-security-webauthn module. The Quarkus WebAuthn module publishes default REST endpoints for registering and logging users in while allowing developers to provide custom REST endpoints. When developers provide custom REST endpoints, the default endpoints remain accessible, potentially allowing attackers to obtain a login cookie that has no corresponding user in the Quarkus application or, depending on how the application is written, could correspond to an existing user that has no relation with the current attacker, allowing anyone to log in as an existing user by just knowing that user's user name.

AI-Powered Analysis

AILast updated: 11/20/2025, 07:54:21 UTC

Technical Analysis

CVE-2024-12225 is a critical security vulnerability identified in the Quarkus framework's quarkus-security-webauthn module, which handles Web Authentication (WebAuthn) for user registration and login via REST endpoints. Quarkus provides default REST endpoints for these operations but also allows developers to define custom endpoints tailored to their application needs. The vulnerability occurs when developers implement custom endpoints but fail to disable or restrict access to the default endpoints. Consequently, both sets of endpoints remain accessible simultaneously. An attacker can exploit this by interacting with the default endpoints to obtain a login cookie that either does not map to any user or, depending on the application's internal logic, maps to an existing user account unrelated to the attacker. This flaw enables an authentication bypass, allowing attackers to impersonate legitimate users simply by knowing their usernames, without requiring any authentication credentials or user interaction. The vulnerability has a CVSS v3.1 score of 9.1 (critical), reflecting its ease of exploitation (network vector, no privileges, no user interaction) and severe impact on confidentiality and integrity. While no known exploits are reported in the wild, the potential for unauthorized access and data compromise is significant. The root cause lies in the coexistence of default and custom endpoints without proper access control or endpoint disabling, leading to session management flaws and improper user association with authentication tokens.

Potential Impact

For European organizations, this vulnerability poses a severe risk to the confidentiality and integrity of user accounts and sensitive data. Attackers can bypass authentication controls and gain unauthorized access to applications using the Quarkus WebAuthn module, potentially leading to data breaches, identity theft, and unauthorized transactions. Organizations relying on Quarkus for critical web applications, especially those handling personal data under GDPR, face regulatory and reputational damage if exploited. The vulnerability could facilitate lateral movement within networks if attackers gain access to privileged accounts. Additionally, sectors such as finance, healthcare, and government services in Europe, which often use modern Java frameworks like Quarkus, are particularly vulnerable. The ease of exploitation without any authentication or user interaction increases the likelihood of automated attacks targeting exposed endpoints. The lack of known exploits in the wild suggests the window for proactive mitigation is still open, but the critical severity demands immediate attention.

Mitigation Recommendations

1. Immediately audit all Quarkus applications using the quarkus-security-webauthn module to identify if default REST endpoints are exposed alongside custom endpoints. 2. Disable or restrict access to the default WebAuthn REST endpoints when custom endpoints are implemented, ensuring only one set of endpoints is accessible. 3. Implement strict access controls and validation on all authentication endpoints to verify session tokens and user associations robustly. 4. Monitor application logs for unusual authentication activity, such as login attempts with valid usernames but unexpected session cookies. 5. Apply any official patches or updates from Quarkus or Red Hat addressing CVE-2024-12225 as soon as they become available. 6. Conduct thorough security testing, including penetration testing focused on authentication flows, to detect similar bypass issues. 7. Educate development teams on secure endpoint management and the risks of leaving default endpoints enabled. 8. Consider implementing Web Application Firewalls (WAF) rules to detect and block suspicious requests targeting default endpoints. 9. Review session management and cookie handling mechanisms to ensure strict binding between session tokens and authenticated users. 10. For critical applications, consider multi-factor authentication as an additional layer to mitigate unauthorized access risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-12-05T03:01:11.272Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9818c4522896dcbd81fd

Added to database: 5/21/2025, 9:08:40 AM

Last enriched: 11/20/2025, 7:54:21 AM

Last updated: 11/22/2025, 4:41:52 PM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats