CVE-2024-55374

MEDIUM5.3/ 10.0
Share:
Published: January 2, 2026 at 03:15 PM
Modified: January 12, 2026 at 03:27 PM
Source: cve@mitre.org

Vulnerability Description

REDCap 14.3.13 allows an attacker to enumerate usernames due to an observable discrepancy between login attempts.

CVSS Metrics

Base Score
5.3
Severity
MEDIUM
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Weaknesses (CWE)

Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0

AI Security Analysis

01 // Technical Summary

REDCap 14.3.13 is vulnerable to username enumeration, allowing attackers to identify valid user accounts. This vulnerability leverages a timing discrepancy in login attempt responses, enabling attackers to systematically probe for valid usernames and subsequently launch further attacks. Successful exploitation can lead to account compromise and potential data breaches.

02 // Vulnerability Mechanism

Step 1: Initial Probe: The attacker sends a login request with a known or guessed username and password to the REDCap login endpoint.

Step 2: Response Analysis: The attacker observes the response from the server. This could involve analyzing response times, error messages, or HTTP status codes.

Step 3: Username Iteration: The attacker iterates through a list of potential usernames, sending login requests for each.

Step 4: Differentiation: The attacker compares the responses received for each username. Valid usernames will exhibit a different response (e.g., slightly longer response time, different error message) compared to invalid usernames.

Step 5: Username Identification: The attacker identifies valid usernames based on the observed discrepancies.

Step 6: Further Exploitation (Optional): Once valid usernames are identified, the attacker can attempt password guessing, brute-force attacks, or other attacks targeting those accounts.

03 // Deep Technical Analysis

The vulnerability stems from an inconsistent response time or error message differentiation between valid and invalid username attempts. Specifically, the application likely provides slightly different feedback (e.g., response time, error message) depending on whether the entered username exists in the system. An attacker can leverage this observable difference to systematically probe the system with various usernames. The root cause is a lack of proper rate limiting or consistent error handling for login attempts, allowing attackers to differentiate between valid and invalid usernames. This flaw doesn't directly involve a buffer overflow or SQL injection, but rather a timing-based side-channel attack. The application's design fails to adequately obscure the presence or absence of a user account, making it susceptible to enumeration.

CVE-2024-55374 - MEDIUM Severity (5.3) | Free CVE Database | 4nuxd