Description
User enumeration can occur in the Authentication REST API in Delinea PAM Secret Server 11.4. This allows a remote attacker to determine whether a user is valid because of a difference in responses from the /oauth2/token endpoint.
Published: 2024-03-14
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Feb 2026 06:15:00 +0000

Type Values Removed Values Added
First Time appeared Delinea Pam
Delinea Pam secret Server
CPEs cpe:2.3:a:delinea_pam:secret_server:11.4:*:*:*:*:*:*:*
Vendors & Products Delinea Pam
Delinea Pam secret Server
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 14 Oct 2025 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Delinea
Delinea secret Server
CPEs cpe:2.3:a:delinea:secret_server:11.4.000000:*:*:*:on-premises:*:*:*
Vendors & Products Delinea
Delinea secret Server

Thu, 22 Aug 2024 20:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-203
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Delinea Secret Server
Delinea Pam Secret Server
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-22T19:09:11.621Z

Reserved: 2024-02-09T00:00:00.000Z

Link: CVE-2024-25651

cve-icon Vulnrichment

Updated: 2024-08-01T23:44:09.882Z

cve-icon NVD

Status : Analyzed

Published: 2024-03-14T03:15:08.727

Modified: 2025-10-14T17:25:40.617

Link: CVE-2024-25651

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses