Cyber Posture

CVE-2024-39327

Critical

Published: 18 February 2025

Published
18 February 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0008 23.3th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Incorrect Access Control vulnerability in Atos Eviden IDRA before 2.6.1 could allow the possibility to obtain CA signing in an illegitimate way.

Security Summary

CVE-2024-39327 is an Incorrect Access Control vulnerability (CWE-284) in Atos Eviden IDRA versions before 2.6.1. The issue enables the possibility of obtaining CA signing capabilities in an illegitimate way, earning a CVSS v3.1 base score of 9.9 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). Published on 2025-02-18, it affects the IDRA component used in digital identity and PKI environments.

A low-privileged remote attacker (PR:L) can exploit this over the network (AV:N) with low complexity (AC:L) and no user interaction (UI:N). Exploitation changes scope (S:C) and results in high impacts across confidentiality, integrity, and availability (C:I:A:H), allowing illegitimate CA signing that could lead to privilege escalation, certificate forgery, or broader system compromise.

Advisories recommend updating to Atos Eviden IDRA 2.6.1 or later for mitigation. Relevant guidance appears in the Eviden digital identity solutions page at https://eviden.com/solutions/digital-security/digital-identity/ and Bull PSIRT bulletin PSIRT-1335 (TLP:CLEAR v2.10) at https://support.bull.com/ols/product/security/psirt/security-bulletins/potential-privilege-escalation-in-idpki-psirt-1335-tlp-clear-version-2-10-cve-2024-39327-cve-2024-39328-cve-2024-51505/view, which addresses this CVE alongside CVE-2024-39328 and CVE-2024-51505 in the IDPKI context.

Details

CWE(s)
CWE-284

References