Plattform
other
Komponente
just-in-time-jit-elevation-module
Behoben in
2023.3.15
CVE-2024-1764 describes a privilege escalation vulnerability affecting the Just-in-time (JIT) elevation module in Devolutions Server. This flaw allows a user to retain elevated privileges even after they should have expired, potentially granting unauthorized access. The vulnerability impacts Devolutions Server versions 0 through 2023.3.14.0. A fix is available in version 2023.3.15.
The primary impact of CVE-2024-1764 is the potential for unauthorized privilege escalation. An attacker who successfully exploits this vulnerability could maintain elevated access to Devolutions Server resources even after the JIT elevation period has ended. This could allow them to access confidential data, modify configurations, or perform actions they are not normally authorized to do. The blast radius is limited to the scope of the Devolutions Server environment and the privileges granted through the JIT elevation process. Successful exploitation could lead to data breaches, system compromise, and disruption of business operations.
CVE-2024-1764 was publicly disclosed on March 5, 2024. As of this writing, it is not listed on the CISA KEV catalog, and no public proof-of-concept exploits are known. The EPSS score is currently unavailable, indicating a low to medium probability of exploitation. Monitor security advisories and threat intelligence feeds for any updates regarding active exploitation campaigns.
Organizations utilizing Devolutions Server versions 0 through 2023.3.14.0, particularly those relying on the JIT elevation module for privilege management, are at risk. Environments with sensitive data or critical infrastructure managed through Devolutions Server should prioritize patching.
disclosure
Exploit-Status
EPSS
0.09% (26% Perzentil)
The primary mitigation for CVE-2024-1764 is to upgrade Devolutions Server to version 2023.3.15 or later, which contains the fix for this vulnerability. If an immediate upgrade is not possible, consider temporarily restricting the scope of JIT elevation privileges to minimize potential impact. Review and audit JIT elevation configurations to ensure they adhere to the principle of least privilege. Monitor Devolutions Server logs for any unusual activity related to JIT elevation processes. After upgrading, confirm the fix by testing JIT elevation and verifying that privileges expire as expected.
Actualice Devolutions Server a una versión posterior a 2023.3.14.0 para corregir la vulnerabilidad de elevación de privilegios. Consulte el aviso de seguridad de Devolutions para obtener más detalles e instrucciones específicas de actualización.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2024-1764 is a vulnerability in Devolutions Server allowing users to retain elevated privileges beyond their expiration, potentially leading to unauthorized access. Severity is pending evaluation.
If you are using Devolutions Server versions 0–2023.3.14.0, you are potentially affected by this vulnerability. Upgrade to 2023.3.15 to mitigate the risk.
Upgrade Devolutions Server to version 2023.3.15 or later. This version contains the fix for the privilege escalation issue.
Currently, there are no confirmed reports of active exploitation of CVE-2024-1764, but it's crucial to apply the patch proactively.
Please refer to the official Devolutions security advisory for detailed information and updates regarding CVE-2024-1764: [https://devolutions.com/support/security/security-advisory-2024-0002](https://devolutions.com/support/security/security-advisory-2024-0002)
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.