CVE-2024-57785
CVE-2024-57785: Local File Inclusion vulnerability in Zenitel AlphaWeb XE v11.2.3.10. Discovered in amc_uploads.php, this vulnerability allows attackers to include local files, potentially leading to sensitive information disclosure. With a SOCRadar Vulnerability Risk Score (SVRS) of 49, this vulnerability requires monitoring and further assessment to determine the potential impact on your systems. Although the CVSS score is 4.9, indicating a medium severity, the SVRS provides a more nuanced view of the real-world risk. Successful exploitation could allow unauthorized access to configuration files, source code, or other sensitive data stored on the server. Immediate patching is advised for systems running vulnerable versions of AlphaWeb XE. Protect your systems from potential attacks. Given the 'In The Wild' tag, monitor for potential exploitation attempts.
Description
CVE-2024-57785 affects Zenitel AlphaWeb XE v11.2.3.10 and allows attackers to exploit a local file inclusion vulnerability via the amc_uploads.php
component. While the CVSS score is 0, the SOCRadar Vulnerability Risk Score (SVRS) is 38, signifying a moderate vulnerability requiring attention. The vulnerability has been observed "In The Wild," indicating active exploitation.
Key Insights
- Local File Inclusion: The vulnerability allows attackers to include arbitrary files from the local system, granting them access to sensitive data or even the ability to execute malicious code.
- Unpatched Systems: Systems running Zenitel AlphaWeb XE v11.2.3.10 are vulnerable to this exploit.
- Active Exploitation: This vulnerability is actively being exploited by attackers "In The Wild," indicating a pressing need for immediate action.
- Potential for Data Breaches: Successful exploitation could lead to data breaches, data exfiltration, and system compromise, potentially impacting confidentiality, integrity, and availability.
Mitigation Strategies
- Update to the Latest Version: Immediately update to the latest version of Zenitel AlphaWeb XE, which includes a patch for this vulnerability.
- Disable or Remove
amc_uploads.php
: If updating is not immediately feasible, disable or remove theamc_uploads.php
component to mitigate the risk. - Implement Strong Access Control: Ensure strong access control measures are in place to limit access to vulnerable systems and components.
- Regular Security Audits: Conduct regular security audits to identify and address vulnerabilities proactively.
Additional Information
For further information on this incident, or to discuss specific mitigation strategies for your organization, please use the 'Ask to Analyst' feature within SOCRadar, contact SOCRadar directly, or open a support ticket.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.