First published: Mon Mar 03 2025(Updated: )
There is an improper access control issue in ArcGIS Server versions 10.9.1 through 11.3 on Windows and Linux, which under unique circumstances, could potentially allow a remote, low privileged authenticated attacker to access secure services published a standalone (Unfederated) ArcGIS Server instance. If successful this compromise would have a high impact on Confidentiality, low impact on integrity and no impact to availability of the software.
Credit: psirt@esri.com
Affected Software | Affected Version | How to fix |
---|---|---|
ESRI ArcGIS for Server | >=10.9.1<=11.3 | |
All of | ||
ESRI ArcGIS for Server | >=10.9.1<=11.3 | |
Any of | ||
Linux Kernel | ||
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-51954 is classified as a moderate severity vulnerability due to improper access control in ArcGIS Server.
To fix CVE-2024-51954, update Esri ArcGIS Server to the latest version above 11.3 which addresses the access control issue.
CVE-2024-51954 affects users of Esri ArcGIS Server versions 10.9.1 through 11.3 on both Windows and Linux platforms.
CVE-2024-51954 potentially allows a remote, low privileged authenticated attacker to access secure services.
CVE-2024-51954 was disclosed in 2024 as part of security updates for Esri software products.