CVE-2024-48248
CVE-2024-48248 is a critical vulnerability in NAKIVO Backup & Replication before version 11.0.0.88174, allowing for absolute path traversal. This flaw can be exploited through getImageByPath to /c/router, potentially leading to remote code execution across an organization. SOCRadar's Vulnerability Risk Score (SVRS) for CVE-2024-48248 is 80, indicating a critical threat demanding immediate action. The vulnerability arises from inadequate path validation, which permits attackers to read arbitrary files on the system. This access can expose sensitive information, including cleartext credentials used by PhysicalDiscovery, making it possible to compromise the entire enterprise. With active exploits already available and tagged as "In The Wild" and listed in CISA's KEV, the risk of exploitation is elevated, requiring prompt patching or mitigation.
Description
CVE-2024-48248 is a critical vulnerability affecting NAKIVO Backup & Replication versions prior to 11.0.0.88174. It involves an absolute path traversal vulnerability through the getImageByPath
function in the /c/router
endpoint, potentially allowing unauthorized reading of arbitrary files on the system. Given the SVRS score of 82, this vulnerability is considered critical and necessitates immediate attention. The description specifies this vulnerability "may lead to remote code execution across the enterprise because PhysicalDiscovery has cleartext credentials". The Cybersecurity and Infrastructure Security Agency (CISA) has warned of the vulnerability, calling for immediate and necessary measures.
Key Insights
- Remote Code Execution Risk: The vulnerability can expose cleartext credentials within the
PhysicalDiscovery
functionality, potentially leading to remote code execution across the entire enterprise network. The ability to read arbitrary files via path traversal amplifies the risk. - Actively Exploited: The vulnerability is actively exploited by hackers "In The Wild," increasing the urgency for patching and mitigation.
- CISA KEV Designation: The Cybersecurity and Infrastructure Security Agency (CISA) has included this vulnerability in its Known Exploited Vulnerabilities (KEV) catalog, indicating it poses a significant risk to federal agencies and encouraging all organizations to prioritize remediation. Active exploits have been published to exploit the vulnerability.
- Exploit Availability: There are active exploits have been published to exploit the vulnerability.
Mitigation Strategies
- Immediate Patching: Upgrade NAKIVO Backup & Replication to version 11.0.0.88174 or later to remediate the vulnerability. This is the most critical step to prevent exploitation.
- Credential Rotation: If an upgrade is not immediately feasible, rotate all credentials potentially exposed by the
PhysicalDiscovery
functionality, especially those used by NAKIVO Backup & Replication. - Network Segmentation: Implement network segmentation to limit the potential impact of a successful exploit. Restrict access to sensitive systems and data from the NAKIVO Backup & Replication server.
- Web Application Firewall (WAF) Rules: Deploy or update WAF rules to detect and block path traversal attempts targeting the
/c/router
endpoint. Consider input validation to prevent malicious requests.
Additional Information
If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.