Governance & Risk Management,
Patch Management,
Vulnerability Assessment & Penetration Testing (VA/PT)
Security Flaw in Popular Policy Management Tool Exposes Users to Credential Theft
A recently addressed security vulnerability in a widely utilized tool for managing security policies poses a significant risk, potentially allowing attackers to extract sensitive credentials from millions of users. This flaw was identified by security researchers from Tenable.
The vulnerability, categorized as CVE-2024-8260, threatens Windows systems running Styra’s Open Policy Agent (OPA). Tenable has assigned a CVSS score of 6.1 to this flaw, marking it as of medium severity. It is imperative that organizations utilizing prior versions of OPA on Windows apply the necessary patches immediately to mitigate this risk.
Exploitation of the vulnerability occurs when an attacker manipulates OPA into authenticating with a malicious remote server by sending specially crafted commands. This process can lead to the leakage of NTLM credentials, which are critical for accessing machines within Windows environments.
It is important to note that this security flaw can be exploited as part of post-compromise operations, wherein attackers initially gain access to a system. They may utilize social engineering tactics, such as tricking a user into executing OPA via a malicious email attachment. Once they secure a foothold within the system, attackers can then exploit the vulnerability by directing the compromised system to connect to their malicious server using a Universal Naming Convention (UNC) path, a standard format for network resource identification.
In a detailed analysis, Tenable researchers explained that the exploitation relies on carefully constructed Rego rules, which serve as policy statements in OPA’s policy language. Attackers can alter these rules to embed the UNC path, thus redirecting OPA to engage with the attacker’s server. Moreover, they can manipulate command-line interface parameters when executing OPA, enhancing their ability to compromise sensitive authentication data.
According to Tenable, “When a user or application attempts to access a remote share on Windows, the local machine must authenticate to the remote server via NTLM.” During this authentication, the NTLM hash of the local user is transmitted to the remote server, effectively leaving a window for credential relaying or direct unauthorized access to other systems.
Although exploiting the OPA vulnerability requires a certain level of access — either direct local access to the target server or successful execution via social engineering or prior vulnerabilities — the risk escalates significantly if the vulnerable OPA server accepts untrusted input, particularly if exposed to the internet. Given that numerous organizations deploy OPA for enforcing security policies in cloud-native applications, the potential for exploitation increases, posing a pressing concern for business owners focused on cybersecurity.