CVSS4
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/SC:L/VI:H/SI:L/VA:H/SA:N/S:N/AU:Y/U:Red/R:U/V:C/RE:L
AI Score
Confidence
Low
EPSS
Percentile
9.0%
An authentication bypass vulnerability has been identified in the REST and SOAP API components of Tripwire Enterprise (TE) 9.1.0 when TE is configured to use LDAP/Active Directory SAML authentication and its optional “Auto-synchronize LDAP Users, Roles, and Groups” feature is enabled. This vulnerability allows unauthenticated attackers to bypass authentication if a valid username is known. Exploitation of this vulnerability could allow remote attackers to gain privileged access to the APIs and lead to unauthorized information disclosure or modification.
[
{
"defaultStatus": "unaffected",
"modules": [
"API authentication",
"REST API",
"SOAP API"
],
"product": "Tripwire Enterprise",
"vendor": "Fortra",
"versions": [
{
"status": "affected",
"version": "9.1.0"
}
]
}
]