Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-48953: n/a

0
High
VulnerabilityCVE-2024-48953cvecve-2024-48953
Published: Thu Nov 07 2024 (11/07/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Logpoint before 7.5.0. Endpoints for creating, editing, or deleting third-party authentication modules lacked proper authorization checks. This allowed unauthenticated users to register their own authentication plugins in Logpoint, resulting in unauthorized access.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 21:48:19 UTC

Technical Analysis

CVE-2024-48953 is a vulnerability identified in Logpoint SIEM software versions prior to 7.5.0. The issue arises because the endpoints that handle creation, editing, or deletion of third-party authentication modules do not enforce proper authorization checks. This lack of authorization validation means that unauthenticated users can interact with these endpoints to register their own authentication plugins. By registering malicious authentication modules, attackers can bypass normal authentication mechanisms, gaining unauthorized access to the Logpoint system. The vulnerability is classified under CWE-306 (Missing Authentication for Critical Function). According to the CVSS v3.1 score of 7.5, the attack vector is adjacent network (AV:A), with high attack complexity (AC:H), no privileges required (PR:N), and no user interaction needed (UI:N). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Although no public exploits have been reported yet, the potential for severe impact is significant because Logpoint is often used to monitor and protect critical IT infrastructure. The vulnerability was reserved on October 10, 2024, and published on November 7, 2024. No official patches or mitigation links were provided at the time of this report, indicating that organizations must be vigilant and implement compensating controls until an update is available.

Potential Impact

The exploitation of CVE-2024-48953 can have severe consequences for organizations worldwide. Unauthorized registration of authentication modules allows attackers to bypass authentication controls, potentially gaining administrative or elevated access to the Logpoint SIEM system. This can lead to unauthorized access to sensitive security logs, manipulation or deletion of critical event data, and disruption of security monitoring capabilities. Attackers could use this foothold to hide their activities, escalate privileges, or move laterally within the network. The compromise of SIEM infrastructure undermines an organization's ability to detect and respond to other security incidents, increasing the risk of prolonged undetected breaches. Given Logpoint's role in security operations, this vulnerability could impact confidentiality, integrity, and availability of security data, potentially affecting compliance with regulatory requirements and damaging organizational reputation.

Mitigation Recommendations

To mitigate CVE-2024-48953, organizations should immediately restrict network access to Logpoint management and authentication module endpoints to trusted administrators only, ideally via VPN or secure management networks. Implement strict firewall rules and network segmentation to limit exposure of Logpoint interfaces. Monitor logs and audit trails for any unauthorized or suspicious changes to authentication modules. Employ multi-factor authentication (MFA) for administrative access to Logpoint systems to reduce risk if credentials are compromised. Until an official patch is released, consider disabling third-party authentication module management features if feasible. Engage with Logpoint support or vendor channels for updates and apply patches promptly once available. Conduct regular security assessments and penetration testing focused on Logpoint deployments to detect potential exploitation attempts early.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-10T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b7eb7ef31ef0b555e86

Added to database: 2/25/2026, 9:37:02 PM

Last enriched: 2/27/2026, 9:48:19 PM

Last updated: 4/12/2026, 6:13:13 PM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses