First published: Wed May 29 2024(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of A10 Thunder ADC. Authentication is required to exploit this vulnerability. The specific flaw exists within the CsrRequestView class. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of a10user.
Affected Software | Affected Version | How to fix |
---|---|---|
A10 Thunder ADC |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-24-524 is considered critical due to its potential for remote code execution.
To fix ZDI-24-524, apply the latest security patches provided by A10 Networks for the Thunder ADC.
ZDI-24-524 affects installations of A10 Thunder ADC that have not implemented the necessary security updates.
Yes, exploitation of ZDI-24-524 requires authentication to the affected A10 Thunder ADC system.
If exploited, ZDI-24-524 allows attackers to execute arbitrary code on the affected system, potentially compromising its integrity.