Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-55374: n/a

0
Medium
VulnerabilityCVE-2024-55374cvecve-2024-55374
Published: Fri Jan 02 2026 (01/02/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

REDCap 14.3.13 allows an attacker to enumerate usernames due to an observable discrepancy between login attempts.

AI-Powered Analysis

AILast updated: 01/09/2026, 16:55:52 UTC

Technical Analysis

CVE-2024-55374 identifies a vulnerability in REDCap version 14.3.13, a widely used electronic data capture platform for research studies. The flaw arises from an inconsistent response behavior during login attempts, which allows an unauthenticated remote attacker to enumerate valid usernames. This is classified under CWE-203 (Information Exposure Through Discrepancy). Specifically, the application returns distinguishable error messages or response times when a username exists versus when it does not, enabling attackers to confirm valid accounts. The vulnerability has a CVSS 3.1 base score of 5.3, indicating medium severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact is limited to confidentiality as it leaks username information but does not affect integrity or availability. No known exploits have been reported, and no official patches have been released at the time of this report. The vulnerability can be leveraged as a reconnaissance step in multi-stage attacks, such as targeted phishing, credential stuffing, or brute force password attacks, increasing the risk to affected organizations. REDCap’s role in managing sensitive clinical and research data makes protecting user credentials critical to maintaining data confidentiality and compliance with data protection regulations.

Potential Impact

For European organizations, the primary impact of CVE-2024-55374 is the exposure of valid usernames, which can significantly aid attackers in crafting targeted attacks such as phishing campaigns or brute force password attempts. While the vulnerability does not directly compromise data integrity or availability, the leakage of usernames can lead to unauthorized access if combined with weak or reused passwords. This is particularly concerning for institutions handling sensitive health and research data, where unauthorized access could lead to data breaches, reputational damage, and regulatory penalties under GDPR. The vulnerability may also increase the attack surface for ransomware or espionage campaigns targeting research institutions. Organizations relying on REDCap for clinical trials or epidemiological studies could face operational disruptions if attackers leverage enumerated usernames to gain further access. The absence of patches means organizations must rely on compensating controls until an official fix is available.

Mitigation Recommendations

1. Implement uniform error messages and response times for all login failures to prevent attackers from distinguishing valid usernames. 2. Enable account lockout or throttling mechanisms after a defined number of failed login attempts to deter brute force attacks. 3. Monitor authentication logs for unusual patterns indicative of username enumeration or brute force attempts. 4. Enforce strong password policies and encourage multi-factor authentication (MFA) for all REDCap user accounts to reduce the risk of credential compromise. 5. Restrict access to the REDCap login interface via IP whitelisting or VPN where feasible, especially for administrative accounts. 6. Stay informed on REDCap vendor advisories and apply patches promptly once available. 7. Conduct regular security awareness training for users to recognize and report phishing attempts that may leverage enumerated usernames. 8. Consider deploying web application firewalls (WAFs) with rules to detect and block enumeration patterns.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-12-06T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6957e0a8db813ff03ef14201

Added to database: 1/2/2026, 3:13:44 PM

Last enriched: 1/9/2026, 4:55:52 PM

Last updated: 2/7/2026, 6:28:21 AM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats