Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-40595: n/a

0
Medium
VulnerabilityCVE-2024-40595cvecve-2024-40595
Published: Thu Oct 24 2024 (10/24/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-40595 is an authentication bypass vulnerability in the RDP component of One Identity Safeguard for Privileged Sessions (SPS) On Premise versions before 7. 5. 1 and LTS before 7. 0. 5. 1. This flaw allows man-in-the-middle attackers to intercept cleartext RDP protocol data and gain unauthorized access to privileged sessions on targeted resources. The vulnerability stems from improper handling of authentication in the RDP protocol, categorized under CWE-319 (Cleartext Transmission of Sensitive Information). Exploitation requires network-level access and is considered medium severity with a CVSS score of 5. 3.

AI-Powered Analysis

AILast updated: 02/26/2026, 06:51:01 UTC

Technical Analysis

CVE-2024-40595 identifies a medium-severity authentication bypass vulnerability in the Remote Desktop Protocol (RDP) component of One Identity Safeguard for Privileged Sessions (SPS) On Premise, specifically in versions prior to 7.5.1 and LTS versions before 7.0.5.1. The vulnerability allows a man-in-the-middle (MitM) attacker to intercept cleartext RDP protocol information, bypassing authentication mechanisms and gaining unauthorized access to privileged sessions on target systems. This issue is rooted in the improper protection of RDP authentication data, leading to exposure of sensitive session credentials or tokens during transmission. The vulnerability is classified under CWE-319, indicating that sensitive information is transmitted in cleartext, facilitating interception and exploitation. The CVSS 3.1 base score is 5.3, reflecting medium severity, with attack vector being adjacent network (AV:A), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and high confidentiality impact (C:H) but no impact on integrity or availability. No public exploits have been reported yet, but the risk remains significant due to the privileged nature of the sessions involved. The affected product is widely used in enterprise environments to secure privileged access, making this vulnerability a critical concern for organizations managing sensitive administrative operations. The vulnerability underscores the importance of securing RDP communications and ensuring robust authentication mechanisms in privileged session management solutions.

Potential Impact

The primary impact of CVE-2024-40595 is unauthorized access to privileged sessions managed by One Identity Safeguard for Privileged Sessions. Successful exploitation allows attackers to bypass authentication by intercepting cleartext RDP data, potentially leading to exposure of sensitive administrative credentials and session information. This can result in unauthorized administrative actions, data exposure, and lateral movement within enterprise networks. The confidentiality of privileged sessions is severely compromised, although integrity and availability are not directly affected. Organizations relying on One Identity SPS for privileged access management face increased risk of insider threats and external attackers gaining elevated access. The medium CVSS score reflects the requirement for network proximity and high attack complexity, limiting widespread exploitation but still posing a significant threat to targeted environments. The absence of known exploits in the wild suggests limited current exploitation but does not preclude future attacks. Overall, the vulnerability threatens the security of critical infrastructure and sensitive enterprise systems where privileged session management is essential.

Mitigation Recommendations

To mitigate CVE-2024-40595, organizations should prioritize upgrading One Identity Safeguard for Privileged Sessions to version 7.5.1 or later, or LTS version 7.0.5.1 or later, once patches are released. Until patches are available, network segmentation should be enforced to restrict access to the SPS RDP component, limiting exposure to trusted networks only. Deploy strong network-level encryption such as VPNs or IPsec tunnels to protect RDP traffic from interception. Implement strict monitoring and anomaly detection on privileged session activities to identify potential unauthorized access attempts. Employ multi-factor authentication (MFA) for administrative access where possible to add an additional layer of security. Regularly audit and review privileged session logs for suspicious behavior. Additionally, consider disabling or restricting RDP access if not essential, or replacing it with more secure remote access technologies. Engage with One Identity support for guidance and early access to patches or workarounds. Finally, educate security teams about the risks of cleartext transmission vulnerabilities and the importance of securing privileged session management tools.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-07-06T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cafb7ef31ef0b568070

Added to database: 2/25/2026, 9:42:07 PM

Last enriched: 2/26/2026, 6:51:01 AM

Last updated: 2/26/2026, 7:27:29 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats