Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-2199: Improper Input Validation

0
Medium
VulnerabilityCVE-2024-2199cvecve-2024-2199
Published: Tue May 28 2024 (05/28/2024, 12:04:07 UTC)
Source: CVE Database V5

Description

A denial of service vulnerability was found in 389-ds-base ldap server. This issue may allow an authenticated user to cause a server crash while modifying `userPassword` using malformed input.

AI-Powered Analysis

AILast updated: 11/03/2025, 22:13:18 UTC

Technical Analysis

CVE-2024-2199 identifies a denial of service vulnerability in the 389-ds-base LDAP server, a widely used open-source directory service often deployed in enterprise environments for identity and access management. The flaw arises from improper input validation when an authenticated user attempts to modify the userPassword attribute with malformed data. Specifically, the server fails to correctly handle certain malformed input during this operation, leading to a crash and thus denial of service. The vulnerability requires the attacker to have valid credentials (authenticated user) but does not require any user interaction beyond submitting the malformed modification request. The CVSS 3.1 vector (AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) indicates the attack can be performed remotely over a network with low complexity, requires privileges (authenticated user), no user interaction, and impacts availability only. No known exploits have been reported in the wild as of the publication date. The affected versions are not explicitly detailed beyond the placeholder '0', but the vulnerability is assigned and published by Red Hat, indicating it affects versions of 389-ds-base distributed or maintained by Red Hat. The vulnerability could be leveraged by malicious insiders or compromised accounts to disrupt directory services, potentially impacting authentication and authorization processes dependent on LDAP.

Potential Impact

For European organizations, the impact centers on availability disruption of LDAP services, which are critical for authentication, authorization, and directory lookups. A successful denial of service could cause authentication failures, service outages, and operational disruptions across enterprise applications relying on 389-ds-base LDAP servers. This could affect sectors with high dependency on centralized identity management such as finance, government, healthcare, and telecommunications. Although confidentiality and integrity are not directly impacted, the loss of availability can lead to cascading operational risks and potential compliance issues under regulations like GDPR if service continuity is compromised. Organizations with large-scale deployments or those using Red Hat Enterprise Linux or derivatives that include 389-ds-base are particularly at risk. The requirement for authenticated access limits exploitation to insiders or attackers with stolen credentials, but this does not eliminate risk given the prevalence of credential compromise in targeted attacks.

Mitigation Recommendations

To mitigate CVE-2024-2199, organizations should: 1) Apply vendor patches or updates as soon as they become available from Red Hat or the 389-ds-base maintainers. 2) Restrict modification permissions on the userPassword attribute to the minimum necessary set of users and service accounts to reduce the attack surface. 3) Implement robust monitoring and alerting on LDAP server crashes or unusual modification attempts to detect exploitation attempts early. 4) Enforce strong authentication and credential management policies to prevent unauthorized access by limiting the pool of authenticated users who can modify passwords. 5) Consider deploying LDAP service redundancy and failover mechanisms to maintain availability in case of service disruption. 6) Conduct regular security audits of LDAP configurations and access controls. 7) Use network segmentation and firewall rules to limit access to LDAP servers to trusted hosts and networks only. These steps go beyond generic advice by focusing on access control hardening, monitoring, and operational resilience specific to the nature of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2024-03-05T18:54:52.210Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092149fe7723195e054423

Added to database: 11/3/2025, 9:40:25 PM

Last enriched: 11/3/2025, 10:13:18 PM

Last updated: 11/5/2025, 2:08:13 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats