Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-22047: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

0
Low
VulnerabilityCVE-2024-22047cvecve-2024-22047cwe-362
Published: Thu Jan 04 2024 (01/04/2024, 20:32:02 UTC)
Source: CVE Database V5

Description

A race condition exists in Audited 4.0.0 to 5.3.3 that can result in an authenticated user to cause audit log entries to be attributed to another user.

AI-Powered Analysis

AILast updated: 11/28/2025, 23:22:54 UTC

Technical Analysis

CVE-2024-22047 is a race condition vulnerability classified under CWE-362, affecting Audited software versions 4.0.0 through 5.3.3. The vulnerability stems from improper synchronization when multiple authenticated users perform concurrent operations that write to audit logs. Due to this race condition, audit log entries can be incorrectly attributed to a user other than the one who performed the action, compromising the integrity of audit trails. This flaw does not impact confidentiality or availability but affects the integrity of audit data, which is crucial for security monitoring, compliance, and forensic analysis. The vulnerability requires an authenticated user with at least low privileges to exploit and does not require user interaction. The CVSS v3.1 score is 3.1 (low), reflecting the limited scope and complexity of exploitation. No public exploits or patches are currently available, indicating that the vulnerability is newly disclosed and not yet actively exploited. The root cause is a concurrency issue in the handling of shared resources during audit log writes, which can be mitigated by proper synchronization mechanisms in the software codebase. Organizations relying on Audited for logging and compliance should prioritize monitoring and plan for upgrades once patches are released.

Potential Impact

For European organizations, the primary impact of CVE-2024-22047 lies in the potential corruption of audit log integrity. Audit logs are essential for regulatory compliance (e.g., GDPR, NIS Directive), security incident investigations, and internal accountability. Incorrect attribution of log entries can lead to misinterpretation of user actions, complicating forensic investigations and potentially allowing malicious activities to go undetected or misassigned. While the vulnerability does not directly expose sensitive data or cause service disruption, undermining audit reliability can weaken overall security posture and compliance standing. Sectors with stringent audit requirements such as finance, healthcare, and government are particularly sensitive to such integrity issues. The low severity and requirement for authenticated access limit the risk of widespread exploitation, but insider threats or compromised accounts could leverage this flaw to obscure malicious actions. Therefore, European organizations should consider this vulnerability a risk to audit trustworthiness rather than a direct breach vector.

Mitigation Recommendations

1. Monitor vendor communications closely for official patches or updates addressing CVE-2024-22047 and apply them promptly once available. 2. Until patches are released, restrict access to the Audited system to trusted and minimal necessary users to reduce the risk of exploitation. 3. Implement enhanced logging and monitoring around audit log creation and modification activities to detect anomalies or inconsistencies that may indicate exploitation attempts. 4. Conduct regular integrity checks of audit logs using cryptographic methods or external log management solutions to detect tampering or misattribution. 5. Review and tighten authentication and authorization controls to prevent unauthorized or low-privilege users from accessing audit log functionalities. 6. Consider deploying compensating controls such as immutable logging or write-once-read-many (WORM) storage for audit data to preserve log integrity. 7. Educate security and compliance teams about the potential impact of this vulnerability on audit reliability to ensure appropriate incident response readiness.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulnCheck
Date Reserved
2024-01-04T18:44:53.107Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f0dc2182aa0cae27ff439

Added to database: 6/3/2025, 2:59:14 PM

Last enriched: 11/28/2025, 11:22:54 PM

Last updated: 12/4/2025, 3:34:49 AM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats