Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-23674: n/a

0
Critical
VulnerabilityCVE-2024-23674cvecve-2024-23674
Published: Thu Feb 15 2024 (02/15/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-23674 is a critical vulnerability affecting the Online-Ausweis-Funktion eID scheme in the German National Identity card system. It enables an attacker to bypass authentication by spoofing, allowing man-in-the-middle attacks to impersonate victims and access sensitive government, medical, and financial services. The exploit requires the victim to have installed a modified eID kernel, often through a fake app, and leverages insecure PIN entry methods and deeplinking vulnerabilities. This flaw compromises confidentiality, integrity, and availability of personal data and services. The German Federal Office for Information Security (BSI) emphasizes that securing the client environment is the cardholder's responsibility. No patches are currently available, and no known exploits have been reported in the wild. The CVSS score is 9. 6, indicating critical severity. Organizations relying on the German eID system must urgently assess and mitigate risks associated with this vulnerability.

AI-Powered Analysis

AILast updated: 02/26/2026, 10:14:57 UTC

Technical Analysis

CVE-2024-23674 targets the Online-Ausweis-Funktion (eID) scheme used in the German National Identity card, allowing attackers to bypass authentication mechanisms through spoofing attacks, dubbed the "sPACE (Spoofing Password Authenticated Connection Establishment)" issue. The vulnerability arises from a combination of insecure PIN entry on basic card readers and the use of eid:// deeplinking, which can be exploited by a man-in-the-middle attacker to assume the identity of the victim. The attack requires the victim to have a modified eID kernel, typically installed by tricking the user into installing a counterfeit version of an official eID app. Once exploited, the attacker can access sensitive government, medical, and financial resources and extract personal data stored on the card. The vulnerability is classified under CWE-290 (Authentication Bypass) and has a CVSS v3.1 score of 9.6 (critical), reflecting its high impact on confidentiality, integrity, and availability with no privileges required but user interaction necessary. The German Federal Office for Information Security (BSI) highlights that securing the client environment is the responsibility of the cardholder, implying that the vulnerability is partly due to client-side security weaknesses. No official patches or fixes have been released as of the publication date, and no active exploitation has been reported in the wild.

Potential Impact

The impact of CVE-2024-23674 is severe for individuals and organizations relying on the German eID system for authentication and access to critical services. Successful exploitation allows attackers to impersonate victims, gaining unauthorized access to government portals, healthcare records, and financial accounts, potentially leading to identity theft, fraud, and privacy violations. The extraction of personal data from the card further exacerbates privacy risks and could facilitate subsequent targeted attacks. For organizations, this undermines trust in digital identity verification processes and may result in regulatory and reputational damage. The requirement for a modified eID kernel means that social engineering or malware distribution campaigns could be leveraged to compromise users, increasing the attack surface. The lack of patches and reliance on user-side security measures complicate mitigation efforts, potentially prolonging exposure. Overall, this vulnerability threatens the confidentiality, integrity, and availability of sensitive personal and institutional data within Germany's digital identity ecosystem.

Mitigation Recommendations

Mitigation should focus on multiple layers: First, users must be educated to avoid installing unofficial or modified eID applications and to verify app authenticity through official channels. Organizations and the BSI should enhance awareness campaigns emphasizing the importance of maintaining a secure operational environment on client devices. Deployment of endpoint security solutions capable of detecting unauthorized modifications to the eID kernel or suspicious app installations is recommended. Developers should consider implementing stronger PIN entry protections, such as hardware-based secure PIN entry or multi-factor authentication mechanisms that do not rely solely on PINs. The BSI and relevant authorities should expedite development and release of official patches or updated eID app versions that address deeplinking vulnerabilities and enforce integrity checks on the eID kernel. Additionally, monitoring for phishing or social engineering campaigns targeting eID users can help reduce the risk of kernel compromise. Organizations relying on eID authentication should implement anomaly detection and additional verification steps for high-risk transactions. Finally, users should be advised to regularly update their devices and apps to incorporate any forthcoming security improvements.

Affected Countries

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-01-19T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d51b7ef31ef0b5704e2

Added to database: 2/25/2026, 9:44:49 PM

Last enriched: 2/26/2026, 10:14:57 AM

Last updated: 2/26/2026, 11:08:00 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats