Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-6535: Use of Default Credentials

0
Medium
VulnerabilityCVE-2024-6535cvecve-2024-6535
Published: Wed Jul 17 2024 (07/17/2024, 02:25:25 UTC)
Source: CVE Database V5

Description

A flaw was found in Skupper. When Skupper is initialized with the console-enabled and with console-auth set to Openshift, it configures the openshift oauth-proxy with a static cookie-secret. In certain circumstances, this may allow an attacker to bypass authentication to the Skupper console via a specially-crafted cookie.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:47:48 UTC

Technical Analysis

CVE-2024-6535 is a vulnerability identified in Skupper, an open-source project that facilitates secure communication between applications across different Kubernetes clusters. The flaw arises when Skupper is initialized with the console enabled and the console-auth parameter set to Openshift. Under these conditions, the openshift oauth-proxy component is configured with a static cookie-secret. This static secret is used to sign authentication cookies, and because it is not dynamically generated or unique per deployment, an attacker can craft a specially-crafted cookie that the oauth-proxy will accept as valid. This allows the attacker to bypass the authentication mechanism protecting the Skupper console, gaining unauthorized access. The vulnerability does not expose confidential data directly nor does it impact system availability, but it compromises the integrity of the console access control. The attack vector is network-based, requiring no privileges or user interaction, making it relatively easy to exploit if the attacker can reach the console endpoint. The vulnerability was published on July 17, 2024, with a CVSS v3.1 score of 5.3 (medium severity), indicating moderate risk. No known exploits have been reported in the wild, and no official patches or mitigations have been linked yet. The issue stems from insecure default configuration and static secrets, a common security anti-pattern that can lead to authentication bypasses.

Potential Impact

The primary impact of CVE-2024-6535 is unauthorized access to the Skupper console, which could allow attackers to manipulate or view configuration and operational data related to cross-cluster communication. While this does not directly expose sensitive data or disrupt service availability, unauthorized console access can lead to further compromise, such as modifying routing rules, injecting malicious configurations, or escalating privileges within the environment. Organizations relying on Skupper for secure multi-cluster communication may face increased risk of lateral movement or persistent access if this vulnerability is exploited. Given that no authentication is required and no user interaction is needed, the attack surface is broad for exposed Skupper consoles configured with Openshift oauth-proxy and static cookie secrets. This could affect cloud-native environments, DevOps pipelines, and microservices architectures that depend on Skupper for connectivity. The medium severity rating reflects the moderate but significant risk posed by integrity compromise without direct confidentiality or availability impact.

Mitigation Recommendations

To mitigate CVE-2024-6535, organizations should first verify if their Skupper deployments have the console enabled with console-auth set to Openshift. If so, they should avoid using static cookie-secrets in the oauth-proxy configuration. Instead, configure oauth-proxy to use dynamically generated, unique cookie secrets per deployment to prevent cookie forgery. If possible, disable the console or restrict network access to it via firewall rules or network policies to limit exposure. Monitor access logs for unusual authentication bypass attempts or suspicious cookie usage. Stay updated with Skupper and Openshift security advisories for patches or configuration guidance addressing this issue. Consider implementing additional authentication layers or integrating with stronger identity providers that do not rely on static secrets. Conduct regular security reviews of Kubernetes and related components to detect insecure defaults. Finally, educate DevOps and security teams about the risks of static secrets and enforce secure configuration management practices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2024-07-05T18:48:04.548Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691f730d28b41f27b438b879

Added to database: 11/20/2025, 7:59:09 PM

Last enriched: 2/28/2026, 3:47:48 AM

Last updated: 3/24/2026, 1:35:10 PM

Views: 152

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses