Initiatives for
As the national authority for Cybersecurity the CCB has developed several initiatives for specific publics which are presented here.
Reference:
Advisory #2024-34
Version:
2.0
Affected software:
Progress OpenEdge Release 11.7.18 and earlier
Progress OpenEdge Release 12.2.13 and earlier
Progress OpenEdge Release 12.8.0
Type:
Authentication bypass
CVE/CVSS:
CVE-2024-1403 :CVSS 10(CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)
When OpenEdge is configured with OS local authentication there exists a vulnerability in the authentication routines. Exploitation of this vulnerability may lead to unauthorized access on attempted logins. The access gained from this vulnerability may allow a malicious actor to compromise your organization.
Update 2024/03/13: A Proof of Concept (PoC) for an exploit for this vulnerability has been released. This significantly increases the likelihood of exploitation of this vulnerability by malicious actors.
There are two systems affected by this vulnerability. The OpenEdge Authentication Gateway (OEAG) when it is configured with OS local authentication, and when an AdminServer connection is made by OpenEdge Explorer (OEE) or OpenEdge Management (OEM).Progress notes: “The AdminServer logins are always potentially vulnerable because they only support OS local logins.“
Patch
The Centre for Cybersecurity Belgium strongly recommends installing updates for vulnerable devices with the highest priority, after thorough testing.
Fixed versions:
A temporary mitigation is possible with the steps provided in the advisory from Progress.
Monitor/Detect
The CCB recommends organizations upscale monitoring and detection capabilities to identify any related suspicious activity, ensuring a swift response in case of an intrusion.
In case of an intrusion, you can report an incident via: https://ccb.belgium.be/cert/report-incident
While patching appliances or software to the newest version may provide safety from future exploitation, it does not remediate historic compromise.