Nextcloud server is a self hosted personal cloud system. Under some circumstance it was possible to bypass the second factor of 2FA after successfully providing the user credentials. It is recommended that the Nextcloud Server is upgraded to 26.0.13, 27.1.8 or 28.0.4 and Nextcloud Enterprise Server is upgraded to,,,,, 26.0.13, 27.1.8 or 28.0.4.


Assigner: [email protected]

CWE: CWE-287

  • nextcloud nextcloud_server 26.0.13
  • nextcloud nextcloud_server 27.1.8
  • nextcloud nextcloud_server 28.0.4
  • nextcloud nextcloud_enterprise_server
  • nextcloud nextcloud_enterprise_server
  • nextcloud nextcloud_enterprise_server
  • nextcloud nextcloud_enterprise_server
  • nextcloud nextcloud_enterprise_server
  • nextcloud nextcloud_enterprise_server 26.0.13
  • nextcloud nextcloud_enterprise_server 27.1.8
  • nextcloud nextcloud_enterprise_server 28.0.4


CVSS version: 3.1 Base score: 7.3
Base severity: HIGH Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Exploitability score: 3.9 Impact score: 3.4

Can you explain the CVE description?

This CVE description refers to a vulnerability in the Nextcloud server, a self-hosted personal cloud system. The vulnerability allowed attackers to bypass the second factor of two-factor authentication (2FA) after successfully providing user credentials. To mitigate this issue, it is recommended to upgrade the Nextcloud Server to version 26.0.13, 27.1.8, or 28.0.4, and the Nextcloud Enterprise Server to version,,,,, 26.0.13, 27.1.8, or 28.0.4. The Common Vulnerabilities and Exposures (CVE) identifier for this vulnerability is CVE-2024-37313, with a CVSS (Common Vulnerability Scoring System) score of 7.3, indicating a high severity level. The vulnerability is classified under CWE-287. The published date and last modified date for this CVE entry are both on June 14, 2024. The status of the vulnerability is EARLY_WARNING. The CVE description includes links to resources such as the GitHub security advisories page, a GitHub pull request, and a report on HackerOne related to this vulnerability. The CVSS vector for this vulnerability is AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L, indicating the attack vector, access complexity, privileges required, user interaction, scope, confidentiality impact, integrity impact, and availability impact. The exploitability score for this vulnerability is 3.9, and the impact score is 3.4. The assigner of this CVE is [email protected].

How can this vulnerability be part of an attack tree?

This vulnerability can be part of an attack tree by being used as a stepping stone for an attacker to gain unauthorized access to sensitive information or perform malicious actions within the Nextcloud server environment. By bypassing the second factor of 2FA after successfully providing user credentials, an attacker could potentially compromise user accounts, access confidential data, or carry out unauthorized activities within the system. The attacker could exploit this vulnerability by leveraging known exploits or techniques to bypass 2FA, such as phishing attacks, brute force attacks, or exploiting weaknesses in the authentication process. Once the attacker has bypassed 2FA, they could escalate their privileges, exfiltrate sensitive data, or carry out other malicious activities within the Nextcloud server. Overall, this vulnerability could serve as a critical point of entry for an attacker aiming to compromise the security of the Nextcloud server and its users, making it an important component of an attack tree.

Generated on: 2024-07-01