The U.S. Cybersecurity and Infrastructure Safety Company (CISA) has added a high-severity safety flaw impacting NAKIVO Backup & Replication software program to its Recognized Exploited Vulnerabilities (KEV) catalog, citing proof of energetic exploitation.
The vulnerability in query is CVE-2024-48248 (CVSS rating: 8.6), an absolute path traversal bug that would enable an unauthenticated attacker to learn information on the goal host, together with delicate ones corresponding to “/and many others/shadow” by way of the endpoint “/c/router.” It impacts all variations of the software program previous to model 10.11.3.86570.
“NAKIVO Backup and Replication incorporates an absolute path traversal vulnerability that permits an attacker to learn arbitrary information,” CISA stated in an advisory.
Profitable exploitation of the shortcoming may enable an adversary to learn delicate knowledge, together with configuration information, backups, and credentials, which may then act as a stepping stone for additional compromises.
There are at present no particulars on how the vulnerability is being exploited within the wild, however the growth comes after watchTowr Labs published a proof-of-concept (PoC) exploit in the direction of the top of final month. The problem has been addressed as of November 2024 with model v11.0.0.88174.
The cybersecurity agency additional famous that the unauthenticated arbitrary file learn vulnerability may very well be weaponized to acquire all saved credentials utilized by the goal NAKIVO resolution and hosted on the database “product01.h2.db.”
Additionally added to the KEV catalog are two different flaws –
- CVE-2025-1316 (CVSS rating: 9.3) – Edimax IC-7100 IP digicam incorporates an OS command injection vulnerability because of improper enter sanitization that enables an attacker to attain distant code execution by way of specifically crafted requests (Unpatched as a result of machine reaching end-of-life)
- CVE-2017-12637 (CVSS rating: 7.5) – SAP NetWeaver Utility Server (AS) Java incorporates a directory traversal vulnerability in scheduler/ui/js/ffffffffbca41eb4/UIUtilJavaScriptJS that enables a distant attacker to learn arbitrary information by way of a .. (dot dot) within the question string
Final week, Akamai revealed that CVE-2025-1316 is being weaponized by dangerous actors to focus on cameras with default credentials as a way to deploy no less than two completely different Mirai botnet variants since Could 2024.
In mild of energetic exploitation, Federal Civilian Government Department (FCEB) businesses are required to use the required mitigations by April 9, 2025, to safe their networks.