{"vulnerability": "CVE-2024-1403", "sightings": [{"uuid": "1dc5108f-19c6-4824-8edd-c89259fcbff0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1403", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10146", "content": "#exploit\n1. CVE-2024-1403:\nProgress OpenEdge Authentication Bypass\nhttps://www.horizon3.ai/attack-research/attack-blogs/cve-2024-1403-progress-openedge-authentication-bypass-deep-dive\n\n2. CVE-2023-20048:\nCisco Firepower Management Center RCE\nhttps://packetstormsecurity.com/files/177562/Cisco-Firepower-Management-Center-Remote-Command-Execution.html\n\n3. CVE-2023-49785:\nNextChat Super SSRF\nhttps://www.horizon3.ai/attack-research/attack-blogs/nextchat-an-ai-chatbot-that-lets-you-talk-to-anyone-you-want-to", "creation_timestamp": "2024-03-14T17:35:15.000000Z"}, {"uuid": "5fb36e07-d5f2-4650-8a72-c3a30f3e584a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1403", "type": "published-proof-of-concept", "source": "https://t.me/tengkorakcybercrewz/625", "content": "The Hacker News\nProof-of-Concept Exploit Released for Progress Software OpenEdge Vulnerability\n\nTechnical specifics and a proof-of-concept (PoC) exploit have been made available for a recently disclosed critical security flaw in Progress Software OpenEdge Authentication Gateway and AdminServer, which could be potentially exploited to bypass authentication protections.\nTracked as&nbsp;CVE-2024-1403, the vulnerability has a maximum severity rating of 10.0 on the CVSS scoring system. It", "creation_timestamp": "2024-03-11T08:43:11.000000Z"}, {"uuid": "14573580-a1fc-40df-8e07-905bdfc488bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1403", "type": "published-proof-of-concept", "source": "https://t.me/ctinow/201989", "content": "https://ift.tt/Ypq4W6Q\nCVE-2024-1403: Progress OpenEdge Authentication Bypass Deep-Dive", "creation_timestamp": "2024-03-07T02:16:08.000000Z"}, {"uuid": "02fca8e1-12eb-4951-ba94-c8605ab52783", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1403", "type": "published-proof-of-concept", "source": "https://t.me/thehackernews/4662", "content": "\u26a0\ufe0f URGENT patch needed! Progress OpenEdge Authentication Gateway/AdminServer vulnerability (CVE-2024-1403) allows authentication bypass. \n \nProof-of-concept exploit is available. \n \nLearn more: https://thehackernews.com/2024/03/proof-of-concept-exploit-released-for.html \n \nUpdate to supported versions ASAP.", "creation_timestamp": "2024-03-11T07:55:11.000000Z"}, {"uuid": "b36c2e3b-6f6c-4f77-8d37-64dcf53e6026", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-14032", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3mjgfmj3sxd2v", "content": "", "creation_timestamp": "2026-04-14T03:07:07.561707Z"}, {"uuid": "d1d4b297-6239-4885-9e9f-5b7cbda76c3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-14030", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mieb7dtnjm2t", "content": "", "creation_timestamp": "2026-03-31T13:17:39.561336Z"}, {"uuid": "07b1e97f-db0c-470f-8126-9fdbafa48a62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-14031", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mieayfhwwd2s", "content": "", "creation_timestamp": "2026-03-31T13:13:46.634633Z"}, {"uuid": "539dacca-e591-44ee-8e66-442fc41021e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-14031", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3miepoumr3p2l", "content": "", "creation_timestamp": "2026-03-31T17:36:53.214962Z"}, {"uuid": "9b258f24-076b-4b0d-bf61-2ee2781913ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-14030", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3mieqarh5eb2a", "content": "", "creation_timestamp": "2026-03-31T17:46:53.750528Z"}, {"uuid": "c0870a39-ff26-456f-97c1-5d6f883cc5b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-14034", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3mik5ocm6yt2i", "content": "", "creation_timestamp": "2026-04-02T21:30:25.222385Z"}, {"uuid": "3ae6a66a-a635-4ebc-af71-4544f0046585", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1403", "type": "seen", "source": "Telegram/7IHuOpm2I1nINl_TcWKu13Ih0LuVD6Z9jVi5kiU-NCOuRZ0g", "content": "", "creation_timestamp": "2025-02-14T10:03:10.000000Z"}, {"uuid": "3b6744a7-d9a1-4884-8f71-1857f170b050", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1403", "type": "published-proof-of-concept", "source": "Telegram/DmWMeTDS5LLd9ICI0JOA-sNsgnOQa0OH-pn4apVpBPknrg", "content": "", "creation_timestamp": "2024-03-11T08:28:58.000000Z"}, {"uuid": "e99f0703-8fa7-48ec-9893-fb611dc35626", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1403", "type": "published-proof-of-concept", "source": "https://t.me/KomunitiSiber/1612", "content": "Proof-of-Concept Exploit Released for Progress Software OpenEdge Vulnerability\nhttps://thehackernews.com/2024/03/proof-of-concept-exploit-released-for.html\n\nTechnical specifics and a proof-of-concept (PoC) exploit have been made available for a recently disclosed critical security flaw in Progress Software OpenEdge Authentication Gateway and AdminServer, which could be potentially exploited to bypass authentication protections.\nTracked as\u00a0CVE-2024-1403, the vulnerability has a maximum severity rating of 10.0 on the CVSS scoring system. It", "creation_timestamp": "2024-03-11T08:01:35.000000Z"}, {"uuid": "18858d85-28ae-4c2e-8645-cb5dc0f242cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1403", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/1935", "content": "CVE-2024-1403\n*\nProgress OpenEdge Authentication Bypass \n*\nexploit proof of concept", "creation_timestamp": "2024-03-07T07:53:11.000000Z"}, {"uuid": "9c3ed5d5-45f2-4fd7-83df-4d8edb404408", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1403", "type": "published-proof-of-concept", "source": "https://t.me/true_secator/5505", "content": "\u041d\u0435 MOVEit 0-day, \u043a\u043e\u043d\u0435\u0447\u043d\u043e, \u043d\u043e \u043d\u0435 \u043c\u0435\u043d\u0435\u0435 \u043e\u043f\u0430\u0441\u043d\u0430\u044f CVE-2024-1403 \u0432 Progress Software OpenEdge Authentication Gateway \u0438 AdminServer \u0441 \u043c\u0430\u043a\u0441\u0438\u043c\u0430\u043b\u044c\u043d\u044b\u043c \u0443\u0440\u043e\u0432\u043d\u0435\u043c \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438 10,0 CVSS \u043e\u0431\u0437\u0430\u0432\u0435\u043b\u0430\u0441\u044c PoC-\u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u043c.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u043b\u0438\u044f\u0435\u0442 \u043d\u0430 \u0432\u0435\u0440\u0441\u0438\u0438 OpenEdge 11.7.18, 12.2.13 (\u0438 \u0431\u043e\u043b\u0435\u0435 \u0440\u0430\u043d\u043d\u0438\u0435) \u0438 12.8.0, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044f \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0440\u0435\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u0442\u044c \u043e\u0431\u0445\u043e\u0434 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0438 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0434\u043e\u0441\u0442\u0443\u043f\u0443 \u0434\u043b\u044f \u0432\u0445\u043e\u0434\u0430 \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0443.\n\nProgress Software \u043e\u0442\u043c\u0435\u0442\u0438\u043b\u0430, \u0447\u0442\u043e \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u043e\u0431\u0443\u0441\u043b\u043e\u0432\u043b\u0435\u043d\u0430 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e\u0439 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u043e\u0439 \u043d\u0435\u043f\u0440\u0435\u0434\u0432\u0438\u0434\u0435\u043d\u043d\u044b\u0445 \u0442\u0438\u043f\u043e\u0432 \u0438\u043c\u0435\u043d \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0438 \u043f\u0430\u0440\u043e\u043b\u0435\u0439 \u0438 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430 \u0432 \u0432\u0435\u0440\u0441\u0438\u044f\u0445 OpenEdge LTS Update 11.7.19, 12.2.14 \u0438 12.8.1.\n\nHorizon3.ai \u043f\u0440\u043e\u0432\u0435\u043b\u0430 \u0440\u0435\u0432\u0435\u0440\u0441-\u0438\u043d\u0436\u0438\u043d\u0438\u0440\u0438\u043d\u0433 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0439 \u0441\u043b\u0443\u0436\u0431\u044b AdminServer \u0438 \u043f\u043e \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0430\u043c \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430\u00a0PoC \u0434\u043b\u044f CVE-2024-1403, \u0437\u0430\u044f\u0432\u0438\u0432, \u0447\u0442\u043e \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0444\u0443\u043d\u043a\u0446\u0438\u0435\u0439 \u043f\u043e\u0434 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435\u043c Connect(), \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0432\u044b\u0437\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u043f\u0440\u0438 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0435 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0441\u043e\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u044f.\n\n\u042d\u0442\u0430 \u0444\u0443\u043d\u043a\u0446\u0438\u044f, \u0432 \u0441\u0432\u043e\u044e \u043e\u0447\u0435\u0440\u0435\u0434\u044c, \u0432\u044b\u0437\u044b\u0432\u0430\u0435\u0442 \u0434\u0440\u0443\u0433\u0443\u044e \u0444\u0443\u043d\u043a\u0446\u0438\u044e, authorizeUser(), \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u044f\u0435\u0442, \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0443\u044e\u0442 \u043b\u0438 \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0435 \u0443\u0447\u0435\u0442\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435 \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u043d\u044b\u043c \u043a\u0440\u0438\u0442\u0435\u0440\u0438\u044f\u043c, \u0438 \u043f\u0435\u0440\u0435\u0434\u0430\u0435\u0442 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u0440\u0443\u0433\u043e\u0439 \u0447\u0430\u0441\u0442\u0438 \u043a\u043e\u0434\u0430, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043d\u0430\u043f\u0440\u044f\u043c\u0443\u044e \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u0443\u0435\u0442 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f, \u0435\u0441\u043b\u0438 \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u043d\u043e\u0435 \u0438\u043c\u044f \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0443\u0435\u0442 NT AUTHORITY\\SYSTEM. \u0412 \u044d\u0442\u043e\u043c \u0438 \u0435\u0441\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c.\n\n\u041f\u043e\u043c\u0438\u043c\u043e PoC \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0442\u0430\u043a\u0436\u0435 \u043d\u0430\u0448\u043b\u0438 \u043f\u043e\u0434\u0445\u043e\u0434\u044b \u043a \u0440\u0430\u0437\u0432\u0438\u0442\u0438\u044e \u0430\u0442\u0430\u043a\u0438 \u0438 \u0443\u0432\u0435\u043b\u0438\u0447\u0435\u043d\u0438\u044e \u0435\u0435 \u043f\u043e\u0432\u0435\u0440\u0445\u043d\u043e\u0441\u0442\u0438 \u0437\u0430 \u0441\u0447\u0435\u0442 \u0437\u043b\u043e\u0443\u043f\u043e\u0442\u0440\u0435\u0431\u043b\u0435\u043d\u0438\u044f \u0444\u0443\u043d\u043a\u0446\u0438\u044f\u043c\u0438 \u0432 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0445 \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0430\u0445 RMI, \u0447\u0442\u043e\u0431\u044b \u0434\u043e\u0431\u0438\u0442\u044c\u0441\u044f \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430.\n\n\u041e\u0431\u0435\u0449\u0430\u044e\u0442 \u043f\u0440\u0438\u043b\u043e\u0436\u0438\u0442\u044c \u0431\u043e\u043b\u044c\u0448\u0435 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u0438\u0445 \u0443\u0441\u0438\u043b\u0438\u0439 \u0438 \u043f\u043e\u043a\u0430\u0437\u0430\u0442\u044c \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442. \u0422\u0430\u043a \u0447\u0442\u043e \u0431\u0443\u0434\u0435\u043c \u043f\u043e\u0441\u043c\u043e\u0442\u0440\u0435\u0442\u044c.", "creation_timestamp": "2024-03-11T13:45:05.000000Z"}, {"uuid": "2f75accf-6234-4d34-8c6b-38a9bdb79d5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1403", "type": "seen", "source": "https://t.me/ctinow/203124", "content": "https://ift.tt/9OL0Jj6\nCVE-2024-1403 Exploit", "creation_timestamp": "2024-03-08T08:16:59.000000Z"}, {"uuid": "77420f99-3015-42b6-ac03-1a55736c9f25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1403", "type": "seen", "source": "https://t.me/ctinow/194646", "content": "https://ift.tt/GKA10Cy\nCVE-2024-1403", "creation_timestamp": "2024-02-27T17:28:10.000000Z"}, {"uuid": "0782d415-44b4-4ebb-8390-9f57aad3bf54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1403", "type": "seen", "source": "https://t.me/ctinow/194635", "content": "https://ift.tt/GKA10Cy\nCVE-2024-1403", "creation_timestamp": "2024-02-27T17:27:56.000000Z"}, {"uuid": "f7682fb6-7f08-4910-ae4f-9c34f45da628", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-14032", "type": "seen", "source": "https://bsky.app/profile/postac001.bsky.social/post/3mitwpdda7s2z", "content": "", "creation_timestamp": "2026-04-06T18:52:21.408060Z"}, {"uuid": "9756ecb7-be5a-49e2-a703-0f0206871ed2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1403", "type": "published-proof-of-concept", "source": "https://t.me/tengkorakcybercrewz/4015", "content": "The Hacker News\nProof-of-Concept Exploit Released for Progress Software OpenEdge Vulnerability\n\nTechnical specifics and a proof-of-concept (PoC) exploit have been made available for a recently disclosed critical security flaw in Progress Software OpenEdge Authentication Gateway and AdminServer, which could be potentially exploited to bypass authentication protections.\nTracked as&nbsp;CVE-2024-1403, the vulnerability has a maximum severity rating of 10.0 on the CVSS scoring system. It", "creation_timestamp": "2024-03-11T08:43:11.000000Z"}, {"uuid": "b40b9d84-f22b-401d-b263-24dc6f1e8366", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-1403", "type": "published-proof-of-concept", "source": "Telegram/HeU-e9ajve8MpOwTzADp9SUq-UegNjuKDUk4VfU3k3Lz6Q", "content": "", "creation_timestamp": "2024-03-11T11:50:07.000000Z"}]}