CVE-2024-45404

OpenCTI is an open-source cyber threat intelligence platform. In versions below 6.2.18, because the function to limit the rate of OTP does not exist, an attacker with valid credentials or a malicious user who commits internal fraud can break through the two-factor authentication and hijack the account. This is because the otpLogin mutation does not implement One Time Password rate limiting. As of time of publication, it is unknown whether a patch is available.
Configurations

Configuration 1 (hide)

cpe:2.3:a:citeum:opencti:*:*:*:*:*:*:*:*

History

17 May 2025, 02:05

Type Values Removed Values Added
CPE cpe:2.3:a:citeum:opencti:*:*:*:*:*:*:*:*
First Time Citeum
Citeum opencti
CWE CWE-307
References () https://github.com/OpenCTI-Platform/opencti/security/advisories/GHSA-hg56-r6hh-56j7 - () https://github.com/OpenCTI-Platform/opencti/security/advisories/GHSA-hg56-r6hh-56j7 - Vendor Advisory

12 Dec 2024, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-12 02:02

Updated : 2025-05-17 02:05


NVD link : CVE-2024-45404

Mitre link : CVE-2024-45404

CVE.ORG link : CVE-2024-45404


JSON object : View

Products Affected

citeum

  • opencti
CWE
CWE-287

Improper Authentication

CWE-307

Improper Restriction of Excessive Authentication Attempts