CVE-2024-11604
Sensitive Information Exposure via Log Files in OpenText IDM SCIM Driver
Publication date: 2026-03-27
Last updated on: 2026-03-27
Assigner: OpenText
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| opentext | idm_scim_driver | From 1.0.0 (inc) to 1.0.1.0300 (inc) |
| opentext | idm_scim_driver | 1.1.0 |
| opentext | idm_scim_driver | 1.0.1 |
| opentext | idm_scim_driver | From 1.0.0.0000 (inc) to 1.0.1.0300 (inc) |
| opentext | idm_scim_driver | 1.1.0.0000 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-532 | The product writes sensitive information to a log file. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an Insertion of Sensitive Information into Log File issue found in the SCIM Driver module of OpenText IDM Driver and Extensions on Windows and Linux 64-bit systems. It allows authenticated local users to access sensitive information by viewing log files that contain this data. The affected versions of the IDM SCIM Driver are from 1.0.0.0000 through 1.0.1.0300 and 1.1.0.0000.
How can this vulnerability impact me? :
The vulnerability can impact you by allowing authenticated local users to obtain sensitive information through access to log files. This exposure of sensitive data could lead to unauthorized disclosure of confidential information, potentially compromising security and privacy within your environment.
What immediate steps should I take to mitigate this vulnerability?
To mitigate the vulnerability CVE-2024-11604 in the SCIM Driver module of OpenText IDM Driver and Extensions, you should upgrade to a fixed version of the SCIM Driver.
For Identity Manager 4.8.1 or later, upgrade to SCIM Driver version 1.0.1.0400 by:
- Downloading and installing SCIM Base Configuration (NETQSCIMBASE 1.0.2) and SCIM Default Configuration (NETQSCIMDCFG 1.0.2) packages.
- Using Designer to deploy the driver by checking for package updates, installing the packages, dragging the driver from the Designer Palette > Tools, and configuring it according to the SCIM Implementation Guide.
- Upgrading the driver files by extracting IDM_SCIM_1.0.1_P4.zip and installing the netiq-DXMLscim.rpm on Linux using the command `rpm -Uvh (binaries-path)/netiq-DXMLscim.rpm` or copying SCIMShim.jar and SCIMUtils.jar to the driver installation folder on Windows.
For Identity Manager 4.9, upgrade to SCIM Driver version 1.1.0.0100 by:
- Downloading and installing SCIM Base Configuration (NETQSCIMBASE 1.0.2) and SCIM Default Configuration (NETQSCIMDCFG 1.0.2) packages.
- Using Designer to deploy the driver similarly as above.
- Upgrading the driver files by unzipping IDM_SCIM_1.1.0_P1.zip and installing the netiq-DXMLscim.rpm on Linux using `rpm -ivh (path)/netiq-DXMLscim.rpm` or copying SCIMShim.jar and SCIMUtils.jar to the driver installation folder on Windows.
For non-root installations, ensure the presence of the /rpm directory with _db.* files, set the ROOTDIR environment variable to the non-root Identity Vault location, and install the RPM with appropriate relocation options.
After upgrading, start the Identity Vault and driver instances locally or start Remote Loader and driver instances if running remotely.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability involves insertion of sensitive information into log files, allowing authenticated local users to obtain sensitive information via access to these logs.
Exposure of sensitive information through log files can potentially lead to non-compliance with data protection regulations such as GDPR and HIPAA, which require protection of personal and sensitive data from unauthorized access.
However, the provided information does not explicitly state the impact on compliance with these standards or any specific regulatory implications.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
The provided resources do not include specific detection methods or commands to identify the presence of the CVE-2024-11604 vulnerability on a network or system.