First published: Thu Mar 20 2025(Updated: )
In h2oai/h2o-3 version 3.46.0, an endpoint exposing a custom EncryptionTool allows an attacker to encrypt any files on the target server with a key of their choosing. The chosen key can also be overwritten, resulting in ransomware-like behavior. This vulnerability makes it possible for an attacker to encrypt arbitrary files with keys of their choice, making it exceedingly difficult for the target to recover the keys needed for decryption.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
H2O-3 | ||
maven/ai.h2o:h2o-core | >=3.32.1.2<=3.46.0 | |
pip/h2o | >=3.32.1.2<=3.46.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6863 is a critical vulnerability that allows an attacker to encrypt any files on the target server, potentially leading to data loss and ransom-like scenarios.
To fix CVE-2024-6863, it is advised to upgrade to version 3.46.1 or later of H2O-3, or implement proper access controls to the EncryptionTool endpoint.
CVE-2024-6863 affects H2O-3 versions from 3.32.1.2 to 3.46.0 inclusive.
CVE-2024-6863 poses significant risks to data security, allowing unauthorized encryption of files which can lead to data loss or ransom demands.
Yes, CVE-2024-6863 can be exploited remotely if the EncryptionTool endpoint is exposed to the internet.