{"dataType":"CVE_RECORD","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2024-25652","assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","dateUpdated":"2025-05-20T14:46:12.371Z","dateReserved":"2024-02-09T00:00:00.000Z","datePublished":"2024-03-14T00:00:00.000Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Secret Server","vendor":"Delinea","versions":[{"status":"affected","version":"11.4"}]}],"credits":[{"lang":"en","type":"finder","value":"Agenzia Per La Cybersicurezza Nazionale"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>In Delinea PAM Secret Server 11.4, it is possible for a user assigned \"Administer Reports\" permission and/or with access to Report functionality via UNLIMITED ADMIN MODE (with access to the Report functionality) to gain unauthorized access to remote sessions created by legitimate users through information obtained from the Custom Legacy Report functionality.</p>"}],"value":"In Delinea PAM Secret Server 11.4, it is possible for a user assigned \"Administer Reports\" permission and/or with access to Report functionality via UNLIMITED ADMIN MODE (with access to the Report functionality) to gain unauthorized access to remote sessions created by legitimate users through information obtained from the Custom Legacy Report functionality."}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.6,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-287","description":"CWE-287 Improper Authentication","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"1443cd92-d354-46d2-9290-d812316ca43a","shortName":"Delinea","dateUpdated":"2025-05-09T20:21:52.748Z"},"references":[{"tags":["third-party-advisory"],"url":"https://www.cvcn.gov.it/cvcn/cve/CVE-2024-25652"},{"tags":["release-notes"],"url":"https://docs.delinea.com/online-help/secret-server/release-notes/ssc-rn-2024-02-10.htm"},{"tags":["vendor-advisory"],"url":"https://trust.delinea.com/"},{"tags":["product","related"],"url":"https://docs.delinea.com/online-help/secret-server/admin/unlimited-administration-mode/index.htm?Highlight=unlimited%20admin"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Follow <a target=\"_blank\" rel=\"nofollow\" href=\"https://https://docs.delinea.com/online-help/secret-server/admin/unlimited-administration-mode/index.htm?Highlight=unlimited%20admin\">product hardening guidelines</a>&nbsp;(LINKED) for recommended use of unlimited admin mode, update to Secret Server Cloud versions 2024-02-10 or later.&nbsp;"}],"value":"Follow  product hardening guidelines https://https://docs.delinea.com/online-help/secret-server/admin/unlimited-administration-mode/index.htm  (LINKED) for recommended use of unlimited admin mode, update to Secret Server Cloud versions 2024-02-10 or later."}],"source":{"discovery":"EXTERNAL"},"x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"affected":[{"vendor":"delinea_pam","product":"secret_server","cpes":["cpe:2.3:a:delinea_pam:secret_server:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"11.4","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-03-14T15:37:14.867622Z","id":"CVE-2024-25652","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-05-20T14:46:12.371Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T23:44:09.758Z"},"title":"CVE Program Container","references":[{"url":"https://www.cvcn.gov.it/cvcn/cve/CVE-2024-25652","tags":["x_transferred"]}]}]},"dataVersion":"5.1"}