The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2023-4727

CVE-2023-4727: Dogtag PKI Auth Bypass Vulnerability

CVE-2023-4727 is an authentication bypass flaw in Dogtag PKI and pki-core that allows LDAP injection attacks. Attackers can bypass token authentication to hijack sessions and escalate privileges. This article covers technical details, affected versions, impact, and mitigation strategies.

Published: January 27, 2026

CVE-2023-4727 Overview

A critical authentication bypass vulnerability has been discovered in dogtag-pki and pki-core, the certificate authority and identity management system used widely in Red Hat Enterprise Linux environments. The vulnerability allows attackers to bypass the token authentication scheme through LDAP injection, potentially leading to privilege escalation and unauthorized access to the PKI system.

By crafting a malicious query string parameter sessionID=*, an attacker can authenticate using any existing session stored in the LDAP directory server. This fundamentally undermines the session management security model, allowing unauthorized users to hijack legitimate sessions and gain elevated privileges within the PKI infrastructure.

Critical Impact

Attackers on adjacent networks can bypass authentication entirely and escalate privileges by hijacking existing LDAP sessions, compromising certificate authority operations and trust chains.

Affected Products

  • Dogtag PKI (unpatched versions)
  • pki-core (unpatched versions)
  • Red Hat Enterprise Linux Certificate System (various versions - see Red Hat advisories)

Discovery Timeline

  • June 11, 2024 - CVE CVE-2023-4727 published to NVD
  • November 21, 2024 - Last updated in NVD database

Technical Details for CVE-2023-4727

Vulnerability Analysis

This vulnerability falls under CWE-305 (Authentication Bypass by Primary Weakness), specifically manifesting as an LDAP injection flaw in the token authentication mechanism. The PKI system relies on LDAP-based session storage and retrieval for authenticating users via session tokens. However, insufficient input validation on the sessionID parameter allows attackers to inject LDAP filter wildcards.

When a user submits a session authentication request, the application constructs an LDAP query to validate the session token against stored sessions in the directory server. The vulnerable code does not properly sanitize or escape the sessionID input before incorporating it into the LDAP filter. This allows an attacker to supply a wildcard character (*) as the session identifier, which matches any existing session in the LDAP directory.

The attack requires adjacent network access, meaning the attacker must be on the same network segment as the PKI server. While this limits exposure compared to internet-facing vulnerabilities, enterprise PKI systems are often deployed on internal networks where lateral movement by attackers is a significant concern.

Root Cause

The root cause is improper input validation and sanitization of the sessionID parameter before its use in LDAP queries. The authentication system fails to implement proper LDAP escaping for special characters, allowing the wildcard operator to be interpreted as a valid LDAP filter component rather than a literal string value.

This represents a classic injection vulnerability where user-controlled input is directly incorporated into a structured query language without adequate sanitization. The LDAP protocol interprets certain characters as filter operators, and the * character specifically acts as a wildcard matching any value.

Attack Vector

The attack leverages the adjacent network attack vector, requiring the attacker to have network access to the PKI system. The exploitation flow works as follows:

  1. The attacker identifies a dogtag-pki or pki-core instance accessible from their network position
  2. The attacker sends an authentication request with the parameter sessionID=* to the token authentication endpoint
  3. The vulnerable system constructs an LDAP filter containing the wildcard, effectively matching any stored session
  4. The LDAP server returns the first matching session record
  5. The authentication system accepts this as a valid session, granting the attacker access with the privileges of the hijacked session

The attack does not require any prior authentication or user interaction, and the complexity is high due to the timing requirements of having an active session available for hijacking. Successful exploitation results in complete compromise of confidentiality, integrity, and availability of the affected PKI system.

Detection Methods for CVE-2023-4727

Indicators of Compromise

  • Unusual authentication requests containing wildcard characters (*) or other LDAP special characters in session parameters
  • Multiple successful authentications from different source IPs using the same session token
  • Anomalous LDAP query patterns in directory server logs showing filter wildcards
  • Unexpected session sharing or concurrent access patterns in PKI audit logs

Detection Strategies

  • Monitor authentication logs for requests containing sessionID=* or similar LDAP injection patterns
  • Implement anomaly detection on LDAP query patterns to identify filter manipulation attempts
  • Deploy network intrusion detection signatures targeting LDAP injection in HTTP parameters
  • Enable verbose logging on PKI authentication endpoints to capture full request parameters

Monitoring Recommendations

  • Enable audit logging on both the PKI server and the backend LDAP directory server
  • Configure SIEM rules to alert on session parameter anomalies and LDAP special character usage
  • Monitor for multiple authentication events using session identifiers that don't correlate with legitimate session creation
  • Review LDAP server logs for unusual filter patterns or excessive session lookups

How to Mitigate CVE-2023-4727

Immediate Actions Required

  • Apply the latest security updates from Red Hat as referenced in the security advisories RHSA-2024:4051 through RHSA-2024:4413
  • Audit current PKI deployment for signs of compromise using the detection methods outlined above
  • Restrict network access to PKI systems to only essential management hosts
  • Enable enhanced authentication logging to support incident investigation if needed

Patch Information

Red Hat has released multiple security advisories addressing this vulnerability across different product versions. Organizations should apply the appropriate patches based on their deployed Red Hat Enterprise Linux and Certificate System versions:

  • RHSA-2024:4051
  • RHSA-2024:4070
  • RHSA-2024:4164
  • RHSA-2024:4165
  • RHSA-2024:4179
  • RHSA-2024:4222
  • RHSA-2024:4367
  • RHSA-2024:4403
  • RHSA-2024:4413

For detailed technical information, consult the Red Hat CVE Analysis for CVE-2023-4727 and Red Hat Bug Report #2232218.

Workarounds

  • Implement network segmentation to isolate PKI infrastructure from general network access
  • Deploy a web application firewall (WAF) configured to block requests containing LDAP injection patterns
  • Enable strict input validation at the network perimeter for requests to PKI authentication endpoints
  • Consider implementing additional authentication factors that don't rely solely on session tokens
bash
# Example: Restrict network access to PKI server using firewall rules
# Only allow connections from authorized management hosts
firewall-cmd --permanent --zone=internal --add-rich-rule='rule family="ipv4" source address="10.0.0.0/24" port protocol="tcp" port="8443" accept'
firewall-cmd --permanent --zone=public --add-rich-rule='rule family="ipv4" port protocol="tcp" port="8443" drop'
firewall-cmd --reload

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechDogtag Pki

  • SeverityHIGH

  • CVSS Score7.5

  • EPSS Probability0.05%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-305
  • Technical References
  • Red Hat Security Advisory RHSA-2024:4051

  • Red Hat Security Advisory RHSA-2024:4070

  • Red Hat Security Advisory RHSA-2024:4164

  • Red Hat Security Advisory RHSA-2024:4165

  • Red Hat Security Advisory RHSA-2024:4179

  • Red Hat Security Advisory RHSA-2024:4222

  • Red Hat Security Advisory RHSA-2024:4367

  • Red Hat Security Advisory RHSA-2024:4403

  • Red Hat Security Advisory RHSA-2024:4413

  • Red Hat CVE Analysis CVE-2023-4727

  • Red Hat Bug Report #2232218
  • Latest CVEs
  • CVE-2025-70797: LimeSurvey XSS Vulnerability

  • CVE-2025-30650: Juniper Junos OS Auth Bypass Vulnerability

  • CVE-2026-35471: Goshs Path Traversal Vulnerability

  • CVE-2026-35393: Goshs Path Traversal Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English