OpenAEV Account Takeover: Critical Flaws in Password Reset

OpenAEV Account Takeover: Critical Flaws in Password Reset

The National Vulnerability Database (NVD) has detailed CVE-2026-24467, a critical account takeover vulnerability affecting OpenAEV versions 1.0.0 through 2.0.12. OpenAEV, an open-source platform for cyber adversary simulation, contains multiple weaknesses in its password reset implementation that enable unauthenticated remote attackers to gain full access to any user account.

The primary flaw, according to NVD, is that password reset tokens never expire. Once generated, a token remains valid indefinitely, allowing attackers to accumulate and reuse them at will. Compounding this, tokens are only 8 digits long. While 100 million combinations might seem sufficient in isolation, the ability to generate a large volume of valid tokens drastically reduces the brute-force effort. NVD explains that generating just 2,000 valid tokens can cut the brute-force requirement to approximately 50,000 attempts, which is trivial for automated attacks.

Combined, these issues permit an attacker to mass-generate valid password reset tokens and then efficiently brute-force them to find a match. This allows resetting any user’s password without needing the original password or any prior authentication. Given that user email addresses are exposed by design within OpenAEV, even administrator accounts can be compromised. Successful exploitation leads to platform compromise, enabling access to sensitive data and modification of payloads executed by deployed agents, effectively changing the scope of simulations and potentially compromising all hosts where agents are installed. Users must upgrade to version 2.0.13 immediately.

What This Means For You

  • If your organization uses OpenAEV for adversary simulation, you are at critical risk. Unauthenticated attackers can take over any account, including administrators, leading to full platform compromise and potential host compromise via agent manipulation. Verify your OpenAEV version immediately. If it's below 2.0.13, patch to the latest version without delay. Audit all user activity for anomalies if you suspect compromise.

Related ATT&CK Techniques

🛡️ Detection Rules

1 rule · 6 SIEM formats

1 detection rule mapped to MITRE ATT&CK. Sigma YAML is free — copy below.

critical T1190 Initial Access

OpenAEV Password Reset Token Abuse - CVE-2026-24467

Sigma YAML — free preview

Indicators of Compromise

IDTypeIndicator
CVE-2026-24467 Vulnerability CVE-2026-24467
CVE-2026-24467 Affected Product version 1.0.0 and
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedApril 20, 2026 at 19:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related Posts

CVE-2026-6662: Open CORS Policy in copilot-api Exposes Token Endpoint

CVE-2026-6662 — A vulnerability was found in ericc-ch copilot-api up to 0.7.0. The impacted element is the function cors of the file src/server.ts of the...

vulnerabilityCVEhigh-severitycwe-346cwe-942
/SCW Vulnerability Desk /HIGH /7.3 /⚑ 3 IOCs /⚙ 2 Sigma

KissFFT Integer Overflow: Heap Corruption Risk in Signal Processing

CVE-2026-41445 — KissFFT before commit 8a8e66e contains an integer overflow vulnerability in the kiss_fftndr_alloc() function in kiss_fftndr.c where the allocation size calculation dimOther*(dimReal+2)*sizeof(kiss_fft_scalar) overflows signed 32-bit...

vulnerabilityCVEhigh-severitybuffer-overflowcwe-122cwe-190
/SCW Vulnerability Desk /HIGH /8.8 /⚑ 4 IOCs /⚙ 3 Sigma

CVE-2026-35154 — IDRAC. A High Privileged Attacker With Local Access Vulnerability

CVE-2026-35154 — Dell PowerProtect Data Domain appliances, versions 7.7.1.0 through 8.7.0.0, LTS2025 release versions 8.3.1.0 through 8.3.1.20, LTS2024 release versions 7.13.1.0 through 7.13.1.60 contain an...

vulnerabilityCVEmedium-severitycwe-269
/SCW Vulnerability Desk /MEDIUM /6.3 /⚑ 2 IOCs /⚙ 2 Sigma