Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-25651: n/a

0
Medium
VulnerabilityCVE-2024-25651cvecve-2024-25651
Published: Thu Mar 14 2024 (03/14/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

User enumeration can occur in the Authentication REST API in Delinea PAM Secret Server 11.4. This allows a remote attacker to determine whether a user is valid because of a difference in responses from the /oauth2/token endpoint.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 09:50:44 UTC

Technical Analysis

CVE-2024-25651 is a vulnerability identified in Delinea PAM Secret Server version 11.4, specifically affecting its Authentication REST API. The flaw allows remote attackers to perform user enumeration by exploiting differences in the responses returned by the /oauth2/token endpoint when queried with usernames. This endpoint is part of the OAuth 2.0 authentication flow, and the discrepancy in response messages or status codes reveals whether a username exists in the system. Because the vulnerability requires no authentication or user interaction, it can be exploited remotely with minimal effort. The vulnerability is categorized under CWE-203 (Information Exposure Through Discrepancy), indicating that the system leaks sensitive information through inconsistent error handling. Although this vulnerability does not allow direct compromise of credentials or system integrity, it facilitates reconnaissance by confirming valid user accounts, which can be leveraged in targeted phishing, brute force, or credential stuffing attacks. The CVSS v3.1 base score is 5.3, reflecting a medium severity level due to the vulnerability's limited impact on confidentiality (partial information disclosure), no impact on integrity or availability, and ease of exploitation without privileges or interaction. No patches or exploits are currently publicly available, but organizations using Delinea PAM Secret Server should be aware of this issue and prepare to apply fixes once released.

Potential Impact

The primary impact of CVE-2024-25651 is information disclosure through user enumeration, which can significantly aid attackers in mapping valid user accounts within an organization. This reconnaissance capability can increase the success rate of subsequent attacks such as password spraying, brute force, phishing, or social engineering campaigns. While the vulnerability does not directly compromise system integrity or availability, the exposure of valid usernames undermines security posture and can lead to more targeted and effective attacks. Organizations relying on Delinea PAM Secret Server for privileged access management are at risk of having their user lists exposed, which is particularly sensitive given the elevated privileges typically managed by PAM solutions. This can lead to increased risk of unauthorized access if attackers combine this information with other vulnerabilities or stolen credentials. The lack of known exploits in the wild suggests limited immediate risk, but the vulnerability's presence in critical infrastructure components means it could be targeted in the future. Overall, the impact is medium but with potential to facilitate more severe attacks if combined with other weaknesses.

Mitigation Recommendations

To mitigate CVE-2024-25651, organizations should implement the following specific measures: 1) Restrict access to the /oauth2/token endpoint by enforcing network-level controls such as IP whitelisting or VPN-only access to limit exposure to trusted users and systems. 2) Implement rate limiting and anomaly detection on authentication endpoints to detect and block automated enumeration attempts. 3) Standardize error messages and response codes from authentication APIs to avoid revealing whether a username exists, ensuring consistent responses regardless of input validity. 4) Monitor authentication logs for unusual patterns indicative of user enumeration, such as repeated failed attempts with different usernames from the same source. 5) Stay informed about vendor advisories and apply patches or updates promptly once available from Delinea. 6) Consider deploying Web Application Firewalls (WAFs) with rules designed to detect and block enumeration techniques targeting authentication endpoints. 7) Educate security teams about this vulnerability to enhance incident response readiness. These targeted actions go beyond generic advice by focusing on reducing information leakage and detecting enumeration attempts specifically in the context of Delinea PAM Secret Server.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-02-09T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d6cb7ef31ef0b57209e

Added to database: 2/25/2026, 9:45:16 PM

Last enriched: 2/28/2026, 9:50:44 AM

Last updated: 4/12/2026, 9:21:46 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses