CVE-2024-10125
C# vulnerability analysis and mitigation

Overview

The Amazon.ApplicationLoadBalancer.Identity.AspNetCore repository contains Middleware used with the Application Load Balancer (ALB) OpenId Connect integration for ASP.NET Core deployments. This vulnerability (CVE-2024-10125) was discovered and disclosed on October 21, 2024, affecting all versions of the middleware. The vulnerability impacts deployments across various AWS services including Fargate, EKS, ECS, EC2, and Lambda (AWS Security Bulletin).

Technical details

The vulnerability stems from a failure in JWT handling code where, although signature validation is performed, it fails to properly validate both the JWT issuer and signer identity. The vulnerability has been assigned a CVSS v3.1 base score of 7.5 (HIGH) with vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N, indicating a network-accessible vulnerability requiring no privileges or user interaction (GitHub Advisory).

Impact

When combined with a configuration where infrastructure allows internet traffic to ALB targets (though not recommended), this vulnerability enables attackers to sign JWTs with untrusted entities and potentially mimic valid OIDC-federated sessions to the ALB targets. This could lead to unauthorized access to protected resources (AWS Security Bulletin).

Mitigation and workarounds

The repository and package have been deprecated and marked as End of Life, with no active support. As workarounds, AWS recommends ensuring ELB targets (EC2 Instances, Fargate Tasks, etc.) do not have public IP addresses. For any forked or derivative code, it's crucial to validate that the signer attribute in the JWT matches the ARN of the Application Load Balancer that the service is configured to use (AWS Security Bulletin).

Community reactions

The vulnerability was responsibly disclosed through collaboration between Miggo Security and AWS through their coordinated disclosure process (AWS Security Bulletin).

Additional resources


SourceThis report was generated using AI

Related C# vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-64113CRITICAL9.3
  • C#C#
  • MediaBrowser.Server.Core
NoYesDec 09, 2025
CVE-2025-66628HIGH7.5
  • C#C#
  • seal-ImageMagick
NoYesDec 10, 2025
CVE-2025-66631HIGH7.2
  • C#C#
  • Csla
NoYesDec 09, 2025
CVE-2025-66625MEDIUM4.9
  • C#C#
  • Umbraco.Cms
NoYesDec 09, 2025
CVE-2025-65955MEDIUM4.9
  • C#C#
  • Magick.NET-Q16-AnyCPU
NoYesDec 02, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management