CVE-2024-4332

Improper Authentication in Tripwire Enterprise 9.1.0 APIs

Description

An authentication bypass vulnerability has been identified in the REST and SOAP API components of Tripwire Enterprise (TE) 9.1.0 when TE is configured to use LDAP/Active Directory SAML authentication and its optional "Auto-synchronize LDAP Users, Roles, and Groups" feature is enabled. This vulnerability allows unauthenticated attackers to bypass authentication if a valid username is known. Exploitation of this vulnerability could allow remote attackers to gain privileged access to the APIs and lead to unauthorized information disclosure or modification.

Remediation

Solution:

  • Upgrade to Tripwire Enterprise 9.1.1 or higher to remediate the vulnerability.

Workaround:

  • To mitigate this issue in TE 9.1.0, disable the "Auto-synchronize LDAP Users, Roles, and Groups" feature when using LDAP/Active Directory SAML authentication. Be aware that doing so will disable API functionality. To continue using the APIs, configure an alternate login method or upgrade to TE 9.1.1 or higher.

Category

9.3
CVSS
Severity: Critical
CVSS 4.0 •
EPSS 0.77% Top 30%
Affected: Fortra Tripwire Enterprise
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2024-4332?
CVE-2024-4332 has been scored as a critical severity vulnerability.
How to fix CVE-2024-4332?
To fix CVE-2024-4332: Upgrade to Tripwire Enterprise 9.1.1 or higher to remediate the vulnerability.
Is CVE-2024-4332 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2024-4332 is being actively exploited. According to its EPSS score, there is a ~1% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2024-4332?
CVE-2024-4332 affects Fortra Tripwire Enterprise.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.