Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-49202: n/a

0
High
VulnerabilityCVE-2024-49202cvecve-2024-49202
Published: Wed Dec 18 2024 (12/18/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-49202 is a high-severity vulnerability affecting Keyfactor Command versions prior to 12. 5. 0, involving incorrect access control where access tokens are over-permissioned. This flaw allows attackers with limited privileges to gain elevated access, potentially compromising confidentiality, integrity, and availability of the system. Exploitation requires network access and low privileges but no user interaction. The vulnerability is identified as CWE-276 (Incorrect Default Permissions) and has a CVSS score of 7. 6. Fixed versions include 11. 5. 1.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:23:54 UTC

Technical Analysis

CVE-2024-49202 is an access control vulnerability in Keyfactor Command, a certificate lifecycle management platform. The issue arises from over-permissioned access tokens that grant more privileges than intended, violating the principle of least privilege. This misconfiguration can allow an attacker with low-level privileges to perform unauthorized actions, potentially leading to data exposure (high confidentiality impact), limited integrity compromise, and partial availability disruption. The vulnerability is classified under CWE-276, indicating incorrect default permissions or access control settings. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L) reflects that the attack can be performed remotely over the network with low complexity, requiring only low privileges and no user interaction, affecting the same security scope. The vulnerability affects all Keyfactor Command versions before 12.5.0, with multiple fixed versions released, including 11.5.1.1 through 24.4.0. Although no active exploits have been reported, the nature of the vulnerability makes it a significant risk for unauthorized access and potential lateral movement within affected environments. Organizations using Keyfactor Command for managing digital certificates and cryptographic keys should consider this vulnerability critical due to the sensitive nature of the data and operations involved.

Potential Impact

The vulnerability can lead to unauthorized access to sensitive certificate management functions, potentially allowing attackers to view, modify, or revoke certificates improperly. This compromises the confidentiality of cryptographic assets and may undermine trust in the organization's PKI infrastructure. Integrity impact is moderate as attackers might perform limited unauthorized actions, while availability impact is also limited but possible if attackers disrupt certificate issuance or revocation processes. Exploitation ease is high due to low complexity and no user interaction required, increasing the risk of compromise. Organizations relying on Keyfactor Command for securing digital identities, encryption, and authentication mechanisms face increased risk of data breaches, impersonation attacks, and disruption of secure communications. The vulnerability could facilitate further attacks within the network if attackers leverage elevated privileges gained through over-permissioned tokens.

Mitigation Recommendations

1. Immediately upgrade Keyfactor Command to one of the fixed versions: 11.5.1.1, 11.5.2.1, 11.5.3.1, 11.5.4.5, 11.5.6.1, 11.6.0, 12.2.0.1, 12.3.0.1, 12.4.0.1, 12.5.0, or 24.4.0. 2. Review and audit access token permissions to ensure they follow the principle of least privilege, removing any unnecessary permissions. 3. Implement network segmentation and restrict access to Keyfactor Command management interfaces to trusted administrators and systems only. 4. Monitor logs for unusual access patterns or privilege escalations related to certificate management operations. 5. Employ multi-factor authentication (MFA) for all administrative access to reduce risk from compromised credentials. 6. Conduct regular security assessments and penetration testing focused on access control mechanisms within Keyfactor Command. 7. Educate administrators on secure token handling and the risks of over-permissioned tokens to prevent recurrence.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-14T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b7eb7ef31ef0b555f1c

Added to database: 2/25/2026, 9:37:02 PM

Last enriched: 2/26/2026, 12:23:54 AM

Last updated: 2/26/2026, 8:51:55 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats