Vulnerability Description
OpenCTI is an open-source cyber threat intelligence platform. In versions below 6.2.18, because the function to limit the rate of OTP does not exist, an attacker with valid credentials or a malicious user who commits internal fraud can break through the two-factor authentication and hijack the account. This is because the otpLogin mutation does not implement One Time Password rate limiting. As of time of publication, it is unknown whether a patch is available.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Citeum | Opencti | < 6.2.18 |
Related Weaknesses (CWE)
References
- https://github.com/OpenCTI-Platform/opencti/security/advisories/GHSA-hg56-r6hh-5Vendor Advisory
- https://github.com/OpenCTI-Platform/opencti/security/advisories/GHSA-hg56-r6hh-5Vendor Advisory
FAQ
What is CVE-2024-45404?
CVE-2024-45404 is a vulnerability with a CVSS score of 8.1 (HIGH). OpenCTI is an open-source cyber threat intelligence platform. In versions below 6.2.18, because the function to limit the rate of OTP does not exist, an attacker with valid credentials or a malicious ...
How severe is CVE-2024-45404?
CVE-2024-45404 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-45404?
Check the references section above for vendor advisories and patch information. Affected products include: Citeum Opencti.