CVE-2024-49755
C# vulnerability analysis and mitigation

Overview

Duende IdentityServer, an OpenID Connect and OAuth 2.x framework for ASP.NET Core, contains a vulnerability in its local API authentication handler that performs insufficient validation of the cnf claim in DPoP access tokens. The vulnerability was discovered and disclosed on October 28, 2024, affecting versions 7.0.0 and above. This security issue allows attackers to use leaked DPoP access tokens at local API endpoints without possessing the private key for signing proof tokens (GitHub Advisory).

Technical details

The vulnerability specifically affects the LocalApiAuthenticationHandler component when configured with DPoP authentication. The issue stems from insufficient validation of the confirmation (cnf) claim in DPoP access tokens. The vulnerability is tracked as CVE-2024-49755 with a CVSS v3.1 base score of 3.1 (LOW), with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N. This indicates that while the vulnerability is network-accessible, it requires high attack complexity and user interaction (GitHub Advisory).

Impact

The vulnerability only impacts custom endpoints within an IdentityServer implementation that have explicitly used the LocalApiAuthenticationHandler for authentication. It does not affect OAuth or OIDC protocol endpoints, typical UI pages within an IdentityServer implementation, the use of DPoP to create sender-constrained tokens consumed by external API resources, or the use of DPoP to sender-constrain refresh tokens issued to public clients (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in IdentityServer version 7.0.8. Version 6.3 and below are unaffected as they do not support DPoP in Local APIs. Organizations using affected versions should upgrade to version 7.0.8 or later to address this security issue (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related C# vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-68924HIGH7.5
  • C#C#
  • UmbracoForms
NoNoJan 16, 2026
CVE-2025-68618HIGH7.5
  • C#C#
  • ImageMagick-config-7-upstream-open
NoYesDec 30, 2025
CVE-2021-47776MEDIUM6.9
  • C#C#
  • UmbracoCms
NoNoJan 15, 2026
CVE-2025-68950MEDIUM6.2
  • C#C#
  • Magick.NET-Q8-AnyCPU
NoYesDec 30, 2025
CVE-2025-67291MEDIUM6.1
  • C#C#
  • Piranha
NoNoDec 22, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management