Article Details
Scrape Timestamp (UTC): 2025-03-20 09:49:05.210
Source: https://thehackernews.com/2025/03/cisa-adds-nakivo-vulnerability-to-kev.html
Original Article Text
Click to Toggle View
CISA Adds NAKIVO Vulnerability to KEV Catalog Amid Active Exploitation. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a high-severity security flaw impacting NAKIVO Backup & Replication software to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability in question is CVE-2024-48248 (CVSS score: 8.6), an absolute path traversal bug that could allow an unauthenticated attacker to read files on the target host, including sensitive ones such as "/etc/shadow" via the endpoint "/c/router." It affects all versions of the software prior to version 10.11.3.86570. "NAKIVO Backup and Replication contains an absolute path traversal vulnerability that enables an attacker to read arbitrary files," CISA said in an advisory. Successful exploitation of the shortcoming could allow an adversary to read sensitive data, including configuration files, backups, and credentials, which could then act as a stepping stone for further compromises. There are currently no details on how the vulnerability is being exploited in the wild, but the development comes after watchTowr Labs published a proof-of-concept (PoC) exploit towards the end of last month. The issue has been addressed as of November 2024 with version v11.0.0.88174. The cybersecurity firm further noted that the unauthenticated arbitrary file read vulnerability could be weaponized to obtain all stored credentials utilized by the target NAKIVO solution and hosted on the database "product01.h2.db." Also added to the KEV catalog are two other flaws - Last week, Akamai revealed that CVE-2025-1316 is being weaponized by bad actors to target cameras with default credentials in order to deploy at least two different Mirai botnet variants since May 2024. In light of active exploitation, Federal Civilian Executive Branch (FCEB) agencies are required to apply the necessary mitigations by April 9, 2025, to secure their networks.
Daily Brief Summary
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has documented a new vulnerability in NAKIVO Backup & Replication software as part of its KEV catalog.
The vulnerability, identified as CVE-2024-48248 with a high severity score of 8.6, allows unauthorized file access through a path traversal flaw.
All versions of the software before version 10.11.3.86570 are affected, permitting attackers to read sensitive files such as "/etc/shadow."
Successful exploitation can lead to exposure of confidential data like system configurations, backups, and credentials, which could facilitate further cyber attacks.
Despite the lack of detailed insights into current exploitation tactics, the issue has been resolved in the latest software update version v11.0.0.88174 released in November 2024.
The exploit was precedentially confirmed by a proof-of-concept shared by watchTowr Labs.
CISA mandates that Federal Civilian Executive Branch agencies implement recommended security patches by April 9, 2025, to bolster their defenses against potential breaches.