CVE-2024-3049: Insufficient Verification of Data Authenticity
A flaw was found in Booth, a cluster ticket manager. If a specially-crafted hash is passed to gcry_md_get_algo_dlen(), it may allow an invalid HMAC to be accepted by the Booth server.
AI Analysis
Technical Summary
CVE-2024-3049 is a medium-severity vulnerability affecting Booth, a cluster ticket manager software, specifically version 1.0-283.1. The flaw arises from insufficient verification of data authenticity during the handling of HMACs (Hash-based Message Authentication Codes). The vulnerability is triggered when a specially crafted hash is passed to the function gcry_md_get_algo_dlen(), which is responsible for retrieving the digest length of a cryptographic hash algorithm. Due to improper validation, the Booth server may accept an invalid HMAC, effectively bypassing the integrity check that ensures the authenticity and integrity of messages or tickets managed by the system. This weakness could allow an attacker to forge or manipulate authentication tokens or tickets without detection, potentially leading to unauthorized actions within the cluster management environment. The vulnerability does not require privileges or user interaction to exploit but has a higher attack complexity, as crafting the specific hash input is non-trivial. The CVSS v3.1 base score is 5.9, reflecting a medium severity with no impact on confidentiality or availability but a significant impact on integrity. No known exploits are currently reported in the wild, and no patches or vendor advisories have been linked yet. The vulnerability was assigned by Red Hat and published in June 2024.
Potential Impact
For European organizations utilizing Booth as a cluster ticket manager, this vulnerability poses a risk to the integrity of their cluster authentication mechanisms. Attackers exploiting this flaw could forge or tamper with authentication tickets, potentially gaining unauthorized access to cluster resources or disrupting cluster operations by impersonating legitimate components or users. This could lead to unauthorized configuration changes, privilege escalation within the cluster environment, or manipulation of workload scheduling. While confidentiality and availability are not directly impacted, the integrity compromise can undermine trust in the cluster management system and cause operational disruptions or data integrity issues. Organizations in sectors relying heavily on clustered computing environments, such as research institutions, financial services, and critical infrastructure providers, may face increased risk. The absence of known exploits provides a window for proactive mitigation, but the medium severity and complexity of exploitation suggest that targeted attacks by skilled adversaries are the primary concern.
Mitigation Recommendations
European organizations should immediately assess their use of Booth cluster ticket manager versions, specifically version 1.0-283.1, and plan for an upgrade or patch once available. In the interim, they should implement strict network segmentation and access controls to limit exposure of the Booth server to untrusted networks or users. Monitoring and logging of authentication ticket validation failures should be enhanced to detect anomalous or suspicious HMAC validation attempts. Additionally, organizations can consider deploying application-layer firewalls or intrusion detection systems configured to identify malformed or suspicious hash inputs targeting gcry_md_get_algo_dlen() calls. Reviewing and hardening the cryptographic libraries and their usage within Booth, including validating inputs before processing, can reduce the risk of exploitation. Finally, organizations should maintain close communication with vendors and security advisories for timely patch deployment and update incident response plans to address potential exploitation scenarios.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy
CVE-2024-3049: Insufficient Verification of Data Authenticity
Description
A flaw was found in Booth, a cluster ticket manager. If a specially-crafted hash is passed to gcry_md_get_algo_dlen(), it may allow an invalid HMAC to be accepted by the Booth server.
AI-Powered Analysis
Technical Analysis
CVE-2024-3049 is a medium-severity vulnerability affecting Booth, a cluster ticket manager software, specifically version 1.0-283.1. The flaw arises from insufficient verification of data authenticity during the handling of HMACs (Hash-based Message Authentication Codes). The vulnerability is triggered when a specially crafted hash is passed to the function gcry_md_get_algo_dlen(), which is responsible for retrieving the digest length of a cryptographic hash algorithm. Due to improper validation, the Booth server may accept an invalid HMAC, effectively bypassing the integrity check that ensures the authenticity and integrity of messages or tickets managed by the system. This weakness could allow an attacker to forge or manipulate authentication tokens or tickets without detection, potentially leading to unauthorized actions within the cluster management environment. The vulnerability does not require privileges or user interaction to exploit but has a higher attack complexity, as crafting the specific hash input is non-trivial. The CVSS v3.1 base score is 5.9, reflecting a medium severity with no impact on confidentiality or availability but a significant impact on integrity. No known exploits are currently reported in the wild, and no patches or vendor advisories have been linked yet. The vulnerability was assigned by Red Hat and published in June 2024.
Potential Impact
For European organizations utilizing Booth as a cluster ticket manager, this vulnerability poses a risk to the integrity of their cluster authentication mechanisms. Attackers exploiting this flaw could forge or tamper with authentication tickets, potentially gaining unauthorized access to cluster resources or disrupting cluster operations by impersonating legitimate components or users. This could lead to unauthorized configuration changes, privilege escalation within the cluster environment, or manipulation of workload scheduling. While confidentiality and availability are not directly impacted, the integrity compromise can undermine trust in the cluster management system and cause operational disruptions or data integrity issues. Organizations in sectors relying heavily on clustered computing environments, such as research institutions, financial services, and critical infrastructure providers, may face increased risk. The absence of known exploits provides a window for proactive mitigation, but the medium severity and complexity of exploitation suggest that targeted attacks by skilled adversaries are the primary concern.
Mitigation Recommendations
European organizations should immediately assess their use of Booth cluster ticket manager versions, specifically version 1.0-283.1, and plan for an upgrade or patch once available. In the interim, they should implement strict network segmentation and access controls to limit exposure of the Booth server to untrusted networks or users. Monitoring and logging of authentication ticket validation failures should be enhanced to detect anomalous or suspicious HMAC validation attempts. Additionally, organizations can consider deploying application-layer firewalls or intrusion detection systems configured to identify malformed or suspicious hash inputs targeting gcry_md_get_algo_dlen() calls. Reviewing and hardening the cryptographic libraries and their usage within Booth, including validating inputs before processing, can reduce the risk of exploitation. Finally, organizations should maintain close communication with vendors and security advisories for timely patch deployment and update incident response plans to address potential exploitation scenarios.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- redhat
- Date Reserved
- 2024-03-28T17:17:50.507Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d31604d7c5ea9f4b3f281
Added to database: 5/21/2025, 1:50:24 AM
Last enriched: 7/6/2025, 6:10:32 AM
Last updated: 8/7/2025, 11:23:15 AM
Views: 10
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.