Traversal Flaw

Vulnerability updated 2 months ago (2024-11-29T14:51:56.274Z)
Download STIX
Preview STIX
A traversal flaw is a vulnerability in software design or implementation that can be exploited by threat actors. One high-severity path traversal flaw, designated as CVE-2024-9381, has been identified in CSA impacting the same versions. This flaw allows a remote authenticated attacker with admin privileges to bypass restrictions. A similar flaw was previously discovered in the Fortinet SSL VPN, labelled as CVE-2018-13379. This path traversal flaw, which researchers have noted is relatively easy to exploit, was uncovered in July 2018 and subsequently patched by Fortinet in May 2019. Another notable flaw is CVE-2023-35078, a critical authentication bypass vulnerability that was exploited as a zero-day in attacks targeting Norwegian government entities. This flaw can be chained with a second directory traversal flaw (CVE-2023-35081), enabling threat actors with administrative privileges to deploy web shells. The combination of these flaws presents a significant security risk, as it provides attackers with the ability to bypass authentication processes and gain unauthorized access to sensitive data. In summary, traversal flaws represent a serious vulnerability in software systems, as evidenced by the cases of CVE-2024-9381, CVE-2018-13379, and CVE-2023-35078/35081. These vulnerabilities, if not properly addressed, allow attackers with administrative privileges to bypass security measures, potentially leading to unauthorized access and exploitation of systems. It is crucial for organizations to ensure they are regularly updating their software and implementing patches when they become available to mitigate the risk of such attacks.
Description last updated: 2024-10-09T12:16:55.845Z
What's your take? (Question 1 of 2)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Vulnerability
Exploit
ConnectWise
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the Traversal Flaw Vulnerability was read from the documents corpus below. This display is limited to 20 results, create a free account to see more