An issue was discovered in Vaultwarden (formerly Bitwarden_RS) 1.30.3. It lacks an offboarding process for members who leave an organization. As a result, the shared organization key is not rotated when a member departs. Consequently, the departing member, whose access should be revoked, retains a copy of the organization key. Additionally, the application fails to adequately protect some encrypted data stored on the server. Consequently, an authenticated user could gain unauthorized access to encrypted data of any organization, even if the user is not a member of the targeted organization. However, the user would need to know the corresponding organizationId. Hence, if a user (whose access to an organization has been revoked) already possesses the organization key, that user could use the key to decrypt the leaked data.
History

Mon, 11 Nov 2024 21:00:00 +0000

Type Values Removed Values Added
References

Fri, 13 Sep 2024 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Vaultwarden
Vaultwarden vaultwarden
Weaknesses CWE-269
CPEs cpe:2.3:a:vaultwarden:vaultwarden:*:*:*:*:*:*:*:*
Vendors & Products Vaultwarden
Vaultwarden vaultwarden
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 13 Sep 2024 17:30:00 +0000

Type Values Removed Values Added
Description An issue was discovered in Vaultwarden (formerly Bitwarden_RS) 1.30.3. It lacks an offboarding process for members who leave an organization. As a result, the shared organization key is not rotated when a member departs. Consequently, the departing member, whose access should be revoked, retains a copy of the organization key. Additionally, the application fails to adequately protect some encrypted data stored on the server. Consequently, an authenticated user could gain unauthorized access to encrypted data of any organization, even if the user is not a member of the targeted organization. However, the user would need to know the corresponding organizationId. Hence, if a user (whose access to an organization has been revoked) already possesses the organization key, that user could use the key to decrypt the leaked data.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2024-09-13T00:00:00

Updated: 2024-11-11T20:43:51.976002

Reserved: 2024-07-03T00:00:00

Link: CVE-2024-39925

cve-icon Vulnrichment

Updated: 2024-09-13T19:19:21.785Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-09-13T18:15:03.927

Modified: 2024-11-11T21:15:06.237

Link: CVE-2024-39925

cve-icon Redhat

No data.