RapidIdentity LTS through 2023.0.2 and Cloud through 2024.08.0 improperly restricts excessive authentication attempts and allows a remote attacker to cause a denial of service via the username parameters.
The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame.
Link | Tags |
---|---|
https://help.rapididentity.com/docs/rapididentity-lts-release-notes | release notes |
https://benrogozinski.github.io/CVE-2024-45589/ | third party advisory exploit |