An authentication bypass vulnerability has been identified in the REST and SOAP API components of Tripwire Enterprise (TE) 9.1.0 when TE is configured to use LDAP/Active Directory SAML authentication and its optional "Auto-synchronize LDAP Users, Roles, and Groups" feature is enabled. This vulnerability allows unauthenticated attackers to bypass authentication if a valid username is known. Exploitation of this vulnerability could allow remote attackers to gain privileged access to the APIs and lead to unauthorized information disclosure or modification.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.fortra.com/security/advisory/fi-2024-006 |
![]() ![]() |
History
Fri, 29 Aug 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Fortra
Fortra tripwire Enterprise |
|
CPEs | cpe:2.3:a:fortra:tripwire_enterprise:9.1.0:*:*:*:*:*:*:* | |
Vendors & Products |
Fortra
Fortra tripwire Enterprise |
|
Metrics |
ssvc
|
Fri, 29 Aug 2025 20:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-306 |
Sat, 12 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|

Status: PUBLISHED
Assigner: Fortra
Published:
Updated: 2025-08-29T20:20:21.394Z
Reserved: 2024-04-29T22:31:16.171Z
Link: CVE-2024-4332

Updated: 2024-08-01T20:40:47.145Z

Status : Awaiting Analysis
Published: 2024-06-03T18:15:09.060
Modified: 2025-08-29T21:15:34.930
Link: CVE-2024-4332

No data.

No data.