Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12225: Authentication Bypass Using an Alternate Path or Channel

0
Critical
VulnerabilityCVE-2024-12225cvecve-2024-12225
Published: Tue May 06 2025 (05/06/2025, 19:49:16 UTC)
Source: CVE

Description

A vulnerability was found in Quarkus in the quarkus-security-webauthn module. The Quarkus WebAuthn module publishes default REST endpoints for registering and logging users in while allowing developers to provide custom REST endpoints. When developers provide custom REST endpoints, the default endpoints remain accessible, potentially allowing attackers to obtain a login cookie that has no corresponding user in the Quarkus application or, depending on how the application is written, could correspond to an existing user that has no relation with the current attacker, allowing anyone to log in as an existing user by just knowing that user's user name.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 11:41:48 UTC

Technical Analysis

CVE-2024-12225 is a critical security vulnerability identified in the Quarkus framework's quarkus-security-webauthn module, which facilitates Web Authentication (WebAuthn) via REST endpoints. Quarkus publishes default REST endpoints for user registration and login, but it also allows developers to define custom endpoints. The vulnerability occurs when developers implement custom REST endpoints but fail to disable or restrict access to the default endpoints. This oversight enables attackers to interact with the default endpoints to obtain a login cookie that either has no associated user or, depending on the application logic, corresponds to an existing user unrelated to the attacker. Consequently, an attacker can bypass authentication and impersonate any user by simply knowing their username, without needing credentials or user interaction. The vulnerability is exploitable remotely over the network, requires no privileges, and no user interaction, making it highly accessible to attackers. The CVSS 3.1 score of 9.1 reflects the critical impact on confidentiality and integrity, as unauthorized access to user accounts can lead to data breaches, privilege escalation, and further compromise. Although no known exploits have been reported in the wild yet, the vulnerability's nature and ease of exploitation make it a significant risk for applications using the affected module. The issue highlights the importance of properly managing default and custom authentication endpoints to prevent alternate path or channel attacks that bypass intended security controls.

Potential Impact

The impact of CVE-2024-12225 is severe for organizations using the Quarkus WebAuthn module. Successful exploitation allows attackers to bypass authentication controls and impersonate legitimate users by simply knowing their usernames. This can lead to unauthorized access to sensitive data, user account takeover, and potential lateral movement within affected systems. Confidentiality and integrity of user data are at high risk, as attackers can access personal information, perform actions on behalf of users, or escalate privileges if the compromised accounts have elevated rights. The vulnerability does not affect availability directly but can indirectly cause service disruptions if attackers misuse compromised accounts. Organizations relying on Quarkus for secure authentication, especially those in sectors handling sensitive or regulated data (e.g., finance, healthcare, government), face increased risk of data breaches, compliance violations, and reputational damage. The ease of exploitation without authentication or user interaction broadens the attack surface, making automated attacks and large-scale exploitation feasible if the vulnerability is not promptly addressed.

Mitigation Recommendations

To mitigate CVE-2024-12225, organizations should take the following specific actions: 1) Immediately audit all Quarkus applications using the quarkus-security-webauthn module to identify whether default REST endpoints remain accessible alongside custom endpoints. 2) Disable or restrict access to the default WebAuthn REST endpoints if custom endpoints are implemented, ensuring only one set of endpoints is active and properly secured. 3) Implement strict access controls and input validation on all authentication endpoints to prevent unauthorized cookie issuance. 4) Monitor authentication logs for unusual login cookie issuance or login attempts that do not correspond to valid user sessions. 5) Apply any available patches or updates from Quarkus or related vendors as soon as they are released. 6) Conduct thorough security testing, including penetration testing focused on authentication flows, to verify that no alternate paths allow bypassing authentication. 7) Educate developers on secure endpoint management and the risks of leaving default endpoints enabled when custom ones are in use. 8) Consider implementing multi-factor authentication (MFA) to add an additional layer of security beyond WebAuthn. These measures go beyond generic advice by focusing on endpoint management, monitoring, and developer awareness specific to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-12-05T03:01:11.272Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9818c4522896dcbd81fd

Added to database: 5/21/2025, 9:08:40 AM

Last enriched: 2/28/2026, 11:41:48 AM

Last updated: 3/22/2026, 5:11:06 AM

Views: 76

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses