An authentication bypass vulnerability has been identified in the REST and SOAP API components of Tripwire Enterprise (TE) 9.1.0 when TE is configured to use LDAP/Active Directory SAML authentication and its optional "Auto-synchronize LDAP Users, Roles, and Groups" feature is enabled. This vulnerability allows unauthenticated attackers to bypass authentication if a valid username is known. Exploitation of this vulnerability could allow remote attackers to gain privileged access to the APIs and lead to unauthorized information disclosure or modification.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://www.fortra.com/security/advisory/fi-2024-006 |
|
History
Fri, 29 Aug 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fortra
Fortra tripwire Enterprise |
|
| CPEs | cpe:2.3:a:fortra:tripwire_enterprise:9.1.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Fortra
Fortra tripwire Enterprise |
|
| Metrics |
ssvc
|
Fri, 29 Aug 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-306 |
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: Fortra
Published: 2024-06-03T17:38:54.516Z
Updated: 2025-08-29T20:20:21.394Z
Reserved: 2024-04-29T22:31:16.171Z
Link: CVE-2024-4332
Updated: 2024-08-01T20:40:47.145Z
Status : Awaiting Analysis
Published: 2024-06-03T18:15:09.060
Modified: 2025-08-29T21:15:34.930
Link: CVE-2024-4332
No data.