First published: Thu May 23 2024(Updated: )
OpenCTI is an open source platform allowing organizations to manage their cyber threat intelligence knowledge and observables. Due to lack of certain security controls on the profile edit functionality, an authenticated attacker with low privileges can gain administrative privileges on the web application.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenCTI |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-26139 is classified as a medium-severity vulnerability due to the potential for authenticated attackers to escalate their privileges.
To fix CVE-2024-26139, ensure that proper security controls are implemented on the profile edit functionality in OpenCTI.
CVE-2024-26139 affects all versions of OpenCTI where the profile edit functionality lacks appropriate security measures.
An authenticated attacker with low privileges can exploit CVE-2024-26139 to gain administrative privileges in OpenCTI.
CVE-2024-26139 was disclosed recently, highlighting a critical security oversight in the OpenCTI platform.