CVE-2024-45404: OpenCTI's lack of Rate Limit lead to OTP brute forcing

8.1 CVSS

Description

OpenCTI is an open-source cyber threat intelligence platform. In versions below 6.2.18, because the function to limit the rate of OTP does not exist, an attacker with valid credentials or a malicious user who commits internal fraud can break through the two-factor authentication and hijack the account. This is because the otpLogin mutation does not implement One Time Password rate limiting. As of time of publication, it is unknown whether a patch is available.

Classification

CVE ID: CVE-2024-45404

CVSS Base Severity: HIGH

CVSS Base Score: 8.1

Affected Products

Vendor: OpenCTI-Platform

Product: opencti

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.04% (probability of being exploited)

EPSS Percentile: 11.48% (scored less or equal to compared to others)

EPSS Date: 2025-02-04 (when was this score calculated)

References

https://github.com/OpenCTI-Platform/opencti/security/advisories/GHSA-hg56-r6hh-56j7

Timeline