Unrated severityNVD Advisory· Published Dec 11, 2024· Updated Dec 12, 2024
OpenCTI's lack of Rate Limit lead to OTP brute forcing
CVE-2024-45404
Description
OpenCTI is an open-source cyber threat intelligence platform. In versions below 6.2.18, because the function to limit the rate of OTP does not exist, an attacker with valid credentials or a malicious user who commits internal fraud can break through the two-factor authentication and hijack the account. This is because the otpLogin mutation does not implement One Time Password rate limiting. As of time of publication, it is unknown whether a patch is available.
Affected products
1- Range: < 6.2.8
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- github.com/OpenCTI-Platform/opencti/security/advisories/GHSA-hg56-r6hh-56j7mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.