First published: Tue Aug 06 2024(Updated: )
HaloITSM versions up to 2.146.1 are affected by a SAML XML Signature Wrapping (XSW) vulnerability. When having a SAML integration configured, anonymous actors could impersonate arbitrary HaloITSM users by just knowing their email address. HaloITSM versions past 2.146.1 (and patches starting from 2.143.61 ) fix the mentioned vulnerability.
Credit: vulnerability@ncsc.ch
Affected Software | Affected Version | How to fix |
---|---|---|
HaloITSM | <2.143.61 | |
HaloITSM | >=2.144<2.146.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6202 is considered a critical vulnerability due to its potential for unauthorized user impersonation.
To fix CVE-2024-6202, upgrade HaloITSM to version 2.146.2 or later.
CVE-2024-6202 affects all versions of HaloITSM up to and including 2.146.1.
CVE-2024-6202 enables attackers to perform SAML XML Signature Wrapping attacks allowing impersonation of other users.
If exploited, CVE-2024-6202 could allow unauthorized access to sensitive information by impersonating legitimate users.