CVE-2024-33891
Severity CVSS v4.0:
Pending analysis
Type:
CWE-321
Use of Hard-coded Cryptographic Key
Publication date:
28/04/2024
Last modified:
28/10/2025
Description
Delinea Secret Server before 11.7.000001 allows attackers to bypass authentication via the SOAP API in SecretServer/webservices/SSWebService.asmx. This is related to a hardcoded key, the use of the integer 2 for the Admin user, and removal of the oauthExpirationId attribute.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:delinea:secret_server:*:*:*:*:on-premises:*:*:* | 11.7.000001 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://delinea.com/products/secret-server
- https://docs.delinea.com/online-help/secret-server/release-notes/ss-rn-11-7-000001.htm
- https://straightblast.medium.com/all-your-secrets-are-belong-to-us-a-delinea-secret-server-authn-authz-bypass-adc26c800ad3
- https://trust.delinea.com/?tcuUid=17aaf4ef-ada9-46d5-bf97-abd3b07daae3
- https://delinea.com/products/secret-server
- https://docs.delinea.com/online-help/secret-server/release-notes/ss-rn-11-7-000001.htm
- https://straightblast.medium.com/all-your-secrets-are-belong-to-us-a-delinea-secret-server-authn-authz-bypass-adc26c800ad3
- https://trust.delinea.com/?tcuUid=17aaf4ef-ada9-46d5-bf97-abd3b07daae3
- https://github.com/straightblast/My-PoC-Exploits/blob/master/CVE-2024-33891.py



