Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12369: Insufficient Verification of Data Authenticity

0
Medium
VulnerabilityCVE-2024-12369cvecve-2024-12369
Published: Mon Dec 09 2024 (12/09/2024, 20:53:09 UTC)
Source: CVE Database V5

Description

A vulnerability was found in OIDC-Client. When using the RH SSO OIDC adapter with EAP 7.x or when using the elytron-oidc-client subsystem with EAP 8.x, authorization code injection attacks can occur, allowing an attacker to inject a stolen authorization code into the attacker's own session with the client with a victim's identity. This is usually done with a Man-in-the-Middle (MitM) or phishing attack.

AI-Powered Analysis

AILast updated: 11/11/2025, 17:19:18 UTC

Technical Analysis

CVE-2024-12369 is a vulnerability identified in the OIDC-Client implementation used by Red Hat Single Sign-On (RH SSO) adapters integrated with JBoss Enterprise Application Platform (EAP) versions 7.x and 8.x. The flaw arises from insufficient verification of data authenticity during the OAuth 2.0 authorization code flow. Specifically, an attacker can inject a stolen authorization code into their own session with the client, effectively impersonating the victim's identity. This attack vector typically requires a Man-in-the-Middle (MitM) scenario or phishing to capture the authorization code. The vulnerability compromises the integrity and confidentiality of user sessions by allowing unauthorized access without proper validation of the authorization code's origin. The CVSS v3.1 score is 4.2 (medium), reflecting that exploitation requires high attack complexity, no privileges, and user interaction, with limited impact on confidentiality and integrity and no impact on availability. No public exploits have been reported yet, but the vulnerability poses a risk to applications relying on these Red Hat components for authentication and authorization, especially in environments where OAuth 2.0 flows are critical for access control.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized access to sensitive applications and data by allowing attackers to impersonate legitimate users. This undermines trust in identity and access management systems, potentially exposing personal data protected under GDPR and other privacy regulations. The attack could facilitate lateral movement within networks, data exfiltration, or fraudulent transactions. Sectors with high reliance on Red Hat EAP and RH SSO for secure authentication—such as finance, government, healthcare, and critical infrastructure—are at particular risk. The need for user interaction and the requirement for MitM or phishing conditions somewhat limit the attack surface, but targeted spear-phishing campaigns or compromised network environments could exploit this vulnerability effectively. Failure to address this issue could result in regulatory penalties, reputational damage, and operational disruptions.

Mitigation Recommendations

European organizations should immediately assess their use of Red Hat EAP 7.x and 8.x with RH SSO OIDC adapters or elytron-oidc-client subsystems. Since no patch links are currently provided, organizations should implement compensating controls such as enforcing strict TLS configurations to prevent MitM attacks, deploying advanced phishing detection and user awareness training, and monitoring OAuth authorization flows for anomalies. Implementing additional validation layers on authorization codes, such as binding codes to client sessions or using Proof Key for Code Exchange (PKCE) if supported, can reduce risk. Network segmentation and zero-trust principles should be applied to limit attacker movement if compromise occurs. Organizations should subscribe to Red Hat security advisories for timely patch releases and test updates in controlled environments before deployment. Logging and alerting on suspicious authentication events will aid in early detection of exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2024-12-09T16:33:36.277Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e0f3c0b66c7f7acdd3d07e

Added to database: 10/4/2025, 10:15:28 AM

Last enriched: 11/11/2025, 5:19:18 PM

Last updated: 12/3/2025, 5:43:35 PM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats