CVE-2024-28058: n/a
In RSA NetWitness (NW) Platform before 12.5.1, even when an administrator revokes the access of a specific user with an active session, an internal threat actor could impersonate the revoked user and gain unauthorized access to sensitive data.
AI Analysis
Technical Summary
CVE-2024-28058 is a vulnerability identified in the RSA NetWitness Platform prior to version 12.5.1. The core issue stems from improper session management: when an administrator revokes a user's access rights, the platform fails to terminate any active sessions associated with that user. Consequently, an internal threat actor with access to the system can continue to use the active session tokens or credentials of the revoked user to impersonate them and gain unauthorized access to sensitive data. This vulnerability is categorized under CWE-276 (Incorrect Default Permissions) and has a CVSS 3.1 base score of 7.5, indicating high severity. The CVSS vector (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) highlights that the vulnerability is remotely exploitable over the network without requiring privileges or user interaction, and it primarily impacts confidentiality without affecting integrity or availability. The flaw is particularly dangerous in environments where internal threat actors or compromised insiders can exploit lingering sessions to bypass access controls. No patches or exploit code are currently publicly available, but the risk remains significant due to the sensitive nature of data handled by RSA NetWitness, a widely used security monitoring and threat detection platform.
Potential Impact
The vulnerability allows unauthorized access to sensitive data by impersonating revoked users with active sessions, severely compromising confidentiality. This can lead to data leakage, unauthorized data exfiltration, and potential exposure of critical security monitoring information. Since the platform is often used for incident detection and response, attackers exploiting this flaw could manipulate or view security logs and alerts, undermining organizational security posture. The risk is amplified in large enterprises and government agencies where RSA NetWitness is deployed extensively. The flaw could facilitate insider threats, lateral movement within networks, and prolonged undetected access. Although integrity and availability are not directly impacted, the breach of confidentiality alone can have cascading effects on trust, compliance, and operational security.
Mitigation Recommendations
Organizations should upgrade RSA NetWitness Platform to version 12.5.1 or later where this vulnerability is addressed. Until patching is possible, administrators must enforce strict session management policies, including manual termination of active sessions immediately after access revocation. Monitoring for unusual session activity and implementing network segmentation to limit internal threat actor movement can reduce risk. Employ multi-factor authentication and enhanced logging to detect anomalous access patterns. Regular audits of user sessions and access rights should be conducted to identify lingering sessions. Additionally, consider deploying compensating controls such as endpoint detection and response (EDR) tools to monitor for suspicious behavior originating from compromised sessions. Coordination with RSA support for any available hotfixes or workarounds is recommended.
Affected Countries
United States, United Kingdom, Germany, Australia, Canada, France, Japan, South Korea, Netherlands, Singapore
CVE-2024-28058: n/a
Description
In RSA NetWitness (NW) Platform before 12.5.1, even when an administrator revokes the access of a specific user with an active session, an internal threat actor could impersonate the revoked user and gain unauthorized access to sensitive data.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-28058 is a vulnerability identified in the RSA NetWitness Platform prior to version 12.5.1. The core issue stems from improper session management: when an administrator revokes a user's access rights, the platform fails to terminate any active sessions associated with that user. Consequently, an internal threat actor with access to the system can continue to use the active session tokens or credentials of the revoked user to impersonate them and gain unauthorized access to sensitive data. This vulnerability is categorized under CWE-276 (Incorrect Default Permissions) and has a CVSS 3.1 base score of 7.5, indicating high severity. The CVSS vector (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) highlights that the vulnerability is remotely exploitable over the network without requiring privileges or user interaction, and it primarily impacts confidentiality without affecting integrity or availability. The flaw is particularly dangerous in environments where internal threat actors or compromised insiders can exploit lingering sessions to bypass access controls. No patches or exploit code are currently publicly available, but the risk remains significant due to the sensitive nature of data handled by RSA NetWitness, a widely used security monitoring and threat detection platform.
Potential Impact
The vulnerability allows unauthorized access to sensitive data by impersonating revoked users with active sessions, severely compromising confidentiality. This can lead to data leakage, unauthorized data exfiltration, and potential exposure of critical security monitoring information. Since the platform is often used for incident detection and response, attackers exploiting this flaw could manipulate or view security logs and alerts, undermining organizational security posture. The risk is amplified in large enterprises and government agencies where RSA NetWitness is deployed extensively. The flaw could facilitate insider threats, lateral movement within networks, and prolonged undetected access. Although integrity and availability are not directly impacted, the breach of confidentiality alone can have cascading effects on trust, compliance, and operational security.
Mitigation Recommendations
Organizations should upgrade RSA NetWitness Platform to version 12.5.1 or later where this vulnerability is addressed. Until patching is possible, administrators must enforce strict session management policies, including manual termination of active sessions immediately after access revocation. Monitoring for unusual session activity and implementing network segmentation to limit internal threat actor movement can reduce risk. Employ multi-factor authentication and enhanced logging to detect anomalous access patterns. Regular audits of user sessions and access rights should be conducted to identify lingering sessions. Additionally, consider deploying compensating controls such as endpoint detection and response (EDR) tools to monitor for suspicious behavior originating from compromised sessions. Coordination with RSA support for any available hotfixes or workarounds is recommended.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-03-01T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6d89b7ef31ef0b587f90
Added to database: 2/25/2026, 9:45:45 PM
Last enriched: 2/26/2026, 7:28:49 PM
Last updated: 4/11/2026, 6:29:04 PM
Views: 17
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.