First published: Wed Jun 12 2024(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Logsign Unified SecOps Platform. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the implementation of the HTTP API. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
Logsign Unified SecOps Platform |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-CAN-24168 is classified as a high severity vulnerability due to its potential for remote code execution.
To fix ZDI-CAN-24168, update your Logsign Unified SecOps Platform to the latest version where the vulnerability has been patched.
No, ZDI-CAN-24168 requires authentication, but the existing authentication mechanism can be bypassed.
Exploitation of ZDI-CAN-24168 could lead to unauthorized remote code execution on affected systems.
Currently, no specific workaround is recommended for ZDI-CAN-24168 other than applying the necessary updates.