Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-25649: n/a

0
Medium
VulnerabilityCVE-2024-25649cvecve-2024-25649
Published: Thu Mar 14 2024 (03/14/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

In Delinea PAM Secret Server 11.4, it is possible for an attacker (with Administrator access to the Secret Server machine) to read the following data from a memory dump: the decrypted master key, database credentials (when SQL Server Authentication is enabled), the encryption key of RabbitMQ queue messages, and session cookies.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 09:50:17 UTC

Technical Analysis

CVE-2024-25649 is a vulnerability identified in Delinea PAM Secret Server version 11.4. The flaw arises because sensitive cryptographic keys and credentials are stored in memory in a way that they can be extracted from a memory dump by an attacker who has Administrator-level access to the machine hosting the Secret Server. The exposed data includes the decrypted master key used to protect stored secrets, database credentials when SQL Server Authentication is enabled, the encryption key used for RabbitMQ queue messages, and session cookies. This vulnerability is classified under CWE-316, which relates to cleartext storage of sensitive information in memory. The attack vector is local (AV:L), requiring low attack complexity (AC:L) but high privileges (PR:H), and no user interaction (UI:N). The scope is changed (S:C) because the compromise of these keys can affect other components and systems relying on the Secret Server. The confidentiality impact is high as critical secrets can be extracted, integrity impact is low, and availability is not affected. No patches or public exploits are currently available, but the risk is significant due to the sensitivity of the exposed data. This vulnerability highlights the importance of secure memory handling and limiting administrative access on critical PAM infrastructure.

Potential Impact

The primary impact of CVE-2024-25649 is the compromise of highly sensitive credentials and cryptographic keys stored in memory by Delinea PAM Secret Server 11.4. An attacker with Administrator access to the host can extract the decrypted master key, which protects all stored secrets, potentially allowing full decryption of all privileged credentials managed by the PAM solution. Database credentials for SQL Server (if used) can be stolen, enabling unauthorized database access. The RabbitMQ encryption key exposure can allow interception or manipulation of message queues used for internal communication. Session cookies disclosure can lead to session hijacking. This breach of confidentiality could lead to widespread lateral movement, privilege escalation, and data exfiltration within an organization. Although the vulnerability requires local admin privileges, the impact on organizations relying on Delinea PAM for privileged access management is severe, as it undermines the trustworthiness of the PAM system itself. This could result in significant operational disruption, regulatory compliance violations, and reputational damage.

Mitigation Recommendations

To mitigate CVE-2024-25649, organizations should: 1) Restrict and tightly control Administrator access to the Secret Server host machines, employing the principle of least privilege and just-in-time access controls. 2) Implement host-based memory protection mechanisms such as encrypted memory or memory access controls to prevent unauthorized memory dumps. 3) Monitor and audit all administrative activities on the Secret Server hosts to detect suspicious behavior early. 4) Use secure boot and trusted platform modules (TPM) to harden the host environment against unauthorized modifications. 5) If possible, isolate the Secret Server in dedicated, hardened environments with minimal additional software to reduce attack surface. 6) Regularly update and patch Delinea PAM products when vendor patches become available for this vulnerability. 7) Consider additional encryption layers or hardware security modules (HSMs) for key storage to reduce exposure in memory. 8) Conduct periodic memory forensic analysis to detect unauthorized memory access or dumps. These steps go beyond generic advice by focusing on host hardening, access control, and memory protection specific to the nature of this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-02-09T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d6cb7ef31ef0b572098

Added to database: 2/25/2026, 9:45:16 PM

Last enriched: 2/28/2026, 9:50:17 AM

Last updated: 4/12/2026, 5:14:23 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses