CVE-2024-47611
CVE-2024-47611: A command line argument injection vulnerability exists in XZ Utils versions 5.6.2 and older when built for native Windows. This flaw arises because Unicode characters in command lines are converted to similar-looking ASCII characters via best-fit mapping, potentially altering command meaning. This can be exploited using malicious filenames to execute argument injection or directory traversal attacks. While this issue is resolved in version 5.6.3, systems running vulnerable versions are at risk. Despite a low CVSS score, the "In The Wild" tag emphasizes potential active exploitation. The SOCRadar Vulnerability Risk Score (SVRS) of 30 indicates a moderate risk, suggesting that while not critical, the vulnerability should be monitored and patched promptly to mitigate potential security breaches, especially given the "In The Wild" tag. This highlights the importance of timely updates and careful handling of filenames containing Unicode characters.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.