First published: Wed Jun 12 2024(Updated: )
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Logsign Unified SecOps Platform. Authentication is not required to exploit this vulnerability. The specific flaw exists within the HTTP API. The issue results from using a hard-coded cryptographic key. An attacker can leverage this vulnerability to execute code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
Logsign Unified SecOps Platform |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-CAN-24170 has been categorized as critical due to potential remote code execution by unauthenticated attackers.
To mitigate ZDI-CAN-24170, update to the latest version of the Logsign Unified SecOps Platform where the vulnerability has been addressed.
ZDI-CAN-24170 allows network-adjacent attackers to execute arbitrary code via the HTTP API without authentication.
ZDI-CAN-24170 specifically affects the Logsign Unified SecOps Platform.
No, ZDI-CAN-24170 can be exploited without any authentication, making it highly critical.