Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2024-43973 | An authentication bypass vulnerability has been identified in the REST and SOAP API components of Tripwire Enterprise (TE) 9.1.0 when TE is configured to use LDAP/Active Directory SAML authentication and its optional "Auto-synchronize LDAP Users, Roles, and Groups" feature is enabled. This vulnerability allows unauthenticated attackers to bypass authentication if a valid username is known. Exploitation of this vulnerability could allow remote attackers to gain privileged access to the APIs and lead to unauthorized information disclosure or modification. |
Solution
Upgrade to Tripwire Enterprise 9.1.1 or higher to remediate the vulnerability.
Workaround
To mitigate this issue in TE 9.1.0, disable the "Auto-synchronize LDAP Users, Roles, and Groups" feature when using LDAP/Active Directory SAML authentication. Be aware that doing so will disable API functionality. To continue using the APIs, configure an alternate login method or upgrade to TE 9.1.1 or higher.
Link | Providers |
---|---|
https://www.fortra.com/security/advisory/fi-2024-006 |
![]() ![]() |
Fri, 29 Aug 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Fortra
Fortra tripwire Enterprise |
|
CPEs | cpe:2.3:a:fortra:tripwire_enterprise:9.1.0:*:*:*:*:*:*:* | |
Vendors & Products |
Fortra
Fortra tripwire Enterprise |
|
Metrics |
ssvc
|
Fri, 29 Aug 2025 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-306 |
Sat, 12 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|

Status: PUBLISHED
Assigner: Fortra
Published:
Updated: 2025-08-29T20:20:21.394Z
Reserved: 2024-04-29T22:31:16.171Z
Link: CVE-2024-4332

Updated: 2024-08-01T20:40:47.145Z

Status : Awaiting Analysis
Published: 2024-06-03T18:15:09.060
Modified: 2025-08-29T21:15:34.930
Link: CVE-2024-4332

No data.

No data.