Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-34885: n/a

0
Medium
VulnerabilityCVE-2024-34885cvecve-2024-34885
Published: Mon Nov 04 2024 (11/04/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Insufficiently protected credentials in SMTP server settings in 1C-Bitrix Bitrix24 23.300.100 allows remote administrators to read SMTP accounts passwords via HTTP GET request.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 04:49:47 UTC

Technical Analysis

CVE-2024-34885 is a medium-severity vulnerability identified in the 1C-Bitrix Bitrix24 platform, specifically related to the insufficient protection of SMTP server credentials within the application’s settings. Bitrix24 is a widely used collaboration and CRM platform, and this vulnerability allows remote administrators to extract SMTP account passwords by sending crafted HTTP GET requests to the affected system. The root cause is the improper safeguarding of sensitive credentials (classified under CWE-522: Insufficiently Protected Credentials), which are exposed through an interface accessible to users with remote administrative privileges. The vulnerability does not require user interaction but does require the attacker to have high-level privileges, which limits exploitation to authorized administrators or those who have compromised such accounts. The CVSS 3.1 base score of 6.8 reflects the network attack vector (AV:N), low attack complexity (AC:L), requirement for privileges (PR:H), no user interaction (UI:N), and a scope change (S:C) with a high impact on confidentiality (C:H) but no impact on integrity (I:N) or availability (A:N). This means that while the vulnerability does not allow disruption or modification of data, it enables unauthorized disclosure of sensitive SMTP credentials, which could be leveraged for further attacks such as email spoofing, phishing, or lateral movement within the network. No public exploits have been reported yet, but the presence of this vulnerability in a widely deployed platform makes it a significant concern for organizations relying on Bitrix24 for communication and collaboration.

Potential Impact

The primary impact of CVE-2024-34885 is the unauthorized disclosure of SMTP server credentials, which compromises the confidentiality of sensitive authentication data. Attackers with remote administrative privileges can extract these credentials and potentially use them to send spoofed emails, intercept or manipulate email communications, or gain further foothold within the organization’s infrastructure. This can lead to phishing campaigns, data leakage, and erosion of trust in organizational communications. Although the vulnerability does not directly affect system integrity or availability, the indirect consequences of credential compromise can be severe, including reputational damage and regulatory compliance violations. Organizations worldwide using Bitrix24 for email integration and collaboration are at risk, especially if administrative access controls are weak or compromised. The medium severity rating reflects the balance between the requirement for high privileges and the significant confidentiality impact.

Mitigation Recommendations

To mitigate CVE-2024-34885, organizations should implement the following specific measures: 1) Restrict remote administrative access to Bitrix24 instances using network segmentation, VPNs, or IP whitelisting to limit exposure. 2) Enforce strong authentication mechanisms for administrative accounts, including multi-factor authentication (MFA), to reduce the risk of privilege compromise. 3) Monitor and audit access logs for unusual or unauthorized HTTP GET requests targeting SMTP settings endpoints. 4) Regularly review and rotate SMTP credentials to minimize the window of exposure if credentials are leaked. 5) Apply security patches or updates from 1C-Bitrix as soon as they become available to address this vulnerability directly. 6) Consider implementing application-layer protections such as web application firewalls (WAFs) to detect and block suspicious requests targeting sensitive configuration endpoints. 7) Educate administrators about the risks of credential exposure and the importance of secure configuration management. These steps go beyond generic advice by focusing on access control, monitoring, and credential hygiene specific to the nature of this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-05-09T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c54b7ef31ef0b5630a5

Added to database: 2/25/2026, 9:40:36 PM

Last enriched: 2/26/2026, 4:49:47 AM

Last updated: 4/12/2026, 4:22:06 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses