Security Advisory WSO2-2024-3414/CVE-2024-5617

Published: 2025-03-18

Updated: 2025-03-18

Version: 1.0.0

Severity: Medium

CVSS Score: 4.8 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)


AFFECTED PRODUCTS

  • WSO2 API Manager 4.3.0, 4.2.0, 4.1.0
  • WSO2 Identity Server 7.0.0, 6.1.0, 6.0.0, 5.11.0

OVERVIEW

Potential brute force vulnerability due to the functional flaw in the account lock feature.

DESCRIPTION

Due to the functional flaw in the account lock feature, user accounts in the primary user store don't get locked upon reaching the maximum failed attempts, when users with the same username exist in both the primary and secondary user stores. Instead, only the user account in the secondary user store is locked.

IMPACT

Brute force attacks pose a significant risk to the security of the system. If successful, attackers can gain unauthorized access to sensitive information or accounts by systematically trying all possible combinations of usernames and passwords.

SOLUTION

Community Users (Open Source)

We highly recommend to migrate to the latest version of respective WSO2 products to mitigate the identified vulnerabilities.

Support Subscription Holders

Update your product to the specified update level—or a higher update level—to apply the fix.

Info

WSO2 Support Subscription Holders may use WSO2 Updates in order to apply the fix.

Product Version U2 Update Level
WSO2 API Manager 4.3.0 13
WSO2 API Manager 4.2.0 95
WSO2 API Manager 4.0.0 298
WSO2 Identity Server 7.0.0 33
WSO2 Identity Server 6.1.0 162
WSO2 Identity Server 6.0.0 194
WSO2 Identity Server 5.11.0 348