An authentication bypass vulnerability has been identified in the REST and SOAP API components of Tripwire Enterprise (TE) 9.1.0 when TE is configured to use LDAP/Active Directory SAML authentication and its optional "Auto-synchronize LDAP Users, Roles, and Groups" feature is enabled. This vulnerability allows unauthenticated attackers to bypass authentication if a valid username is known. Exploitation of this vulnerability could allow remote attackers to gain privileged access to the APIs and lead to unauthorized information disclosure or modification.
                
            Metrics
Affected Vendors & Products
References
        | Link | Providers | 
|---|---|
| https://www.fortra.com/security/advisory/fi-2024-006 | 
                     | 
            
History
                    Fri, 29 Aug 2025 21:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Fortra
         Fortra tripwire Enterprise  | 
|
| CPEs | cpe:2.3:a:fortra:tripwire_enterprise:9.1.0:*:*:*:*:*:*:* | |
| Vendors & Products | 
        
        Fortra
         Fortra tripwire Enterprise  | 
|
| Metrics | 
        
        ssvc
         
  | 
Fri, 29 Aug 2025 20:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Weaknesses | CWE-306 | 
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        
        epss
         
  | 
    
        
        
        epss
         
  | 
Status: PUBLISHED
Assigner: Fortra
Published: 2024-06-03T17:38:54.516Z
Updated: 2025-08-29T20:20:21.394Z
Reserved: 2024-04-29T22:31:16.171Z
Link: CVE-2024-4332
Updated: 2024-08-01T20:40:47.145Z
Status : Awaiting Analysis
Published: 2024-06-03T18:15:09.060
Modified: 2025-08-29T21:15:34.930
Link: CVE-2024-4332
No data.
ReportizFlow