Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-34399: n/a

0
Critical
VulnerabilityCVE-2024-34399cvecve-2024-34399
Published: Wed Sep 18 2024 (09/18/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

**UNSUPPORTED WHEN ASSIGNED** An issue was discovered in BMC Remedy Mid Tier 7.6.04. An unauthenticated remote attacker is able to access any user account without using any password. NOTE: This vulnerability only affects products that are no longer supported by the maintainer and the impacted version for this vulnerability is 7.6.04 only.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:11:06 UTC

Technical Analysis

CVE-2024-34399 identifies a critical authentication bypass vulnerability in BMC Remedy Mid Tier version 7.6.04. This vulnerability allows an unauthenticated remote attacker to gain access to any user account without providing any password or credentials. The flaw stems from improper authentication enforcement (CWE-287), enabling attackers to bypass all authentication controls. Since the affected version is no longer supported by BMC, no official patches or fixes are available. The vulnerability is remotely exploitable over the network without any user interaction or privileges, making it highly accessible to attackers. The CVSS v3.1 base score of 9.8 reflects the vulnerability's critical impact on confidentiality, integrity, and availability, as attackers can fully compromise user accounts and potentially the entire system. The vulnerability was reserved in May 2024 and published in September 2024, with no known exploits currently in the wild. BMC Remedy Mid Tier is widely used in IT service management environments, often integrated with enterprise systems, making this vulnerability particularly dangerous for organizations still running legacy versions. Given the lack of vendor support, organizations must rely on compensating controls or migration to mitigate risk.

Potential Impact

The impact of CVE-2024-34399 is severe for organizations still operating BMC Remedy Mid Tier 7.6.04. An attacker exploiting this vulnerability can gain unauthorized access to any user account, including administrative accounts, leading to full system compromise. This can result in data breaches, unauthorized changes to IT service management workflows, disruption of critical business processes, and potential lateral movement within the enterprise network. The complete bypass of authentication threatens confidentiality, integrity, and availability of the affected systems. Since the product is no longer supported, organizations cannot rely on vendor patches, increasing the risk of prolonged exposure. This vulnerability could be leveraged in targeted attacks against enterprises, government agencies, and critical infrastructure sectors that depend on BMC Remedy for IT operations, potentially causing significant operational and reputational damage.

Mitigation Recommendations

Given the absence of vendor support and patches for BMC Remedy Mid Tier 7.6.04, organizations should prioritize the following mitigations: 1) Immediately isolate the vulnerable system from untrusted networks, restricting access to trusted administrators only. 2) Implement strict network segmentation and firewall rules to limit exposure of the Remedy Mid Tier interface. 3) Employ multi-factor authentication (MFA) on any integrated systems to reduce risk from compromised accounts. 4) Monitor logs and network traffic for unusual access patterns or unauthorized account usage. 5) Plan and execute an upgrade or migration to a supported version of BMC Remedy Mid Tier or an alternative ITSM platform. 6) If upgrade is not immediately feasible, consider deploying web application firewalls (WAFs) with custom rules to detect and block exploitation attempts. 7) Conduct regular security assessments and penetration tests focusing on legacy systems to identify and remediate similar risks. These steps go beyond generic advice by focusing on compensating controls and strategic migration planning.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-05-03T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c4fb7ef31ef0b562273

Added to database: 2/25/2026, 9:40:31 PM

Last enriched: 2/28/2026, 3:11:06 AM

Last updated: 4/12/2026, 11:45:26 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses