Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-11944: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in iXsystems TrueNAS CORE

0
High
VulnerabilityCVE-2024-11944cvecve-2024-11944cwe-22
Published: Mon Dec 30 2024 (12/30/2024, 20:12:12 UTC)
Source: CVE Database V5
Vendor/Project: iXsystems
Product: TrueNAS CORE

Description

iXsystems TrueNAS CORE tarfile.extractall Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of iXsystems TrueNAS devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the tarfile.extractall method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-25626.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 05:11:16 UTC

Technical Analysis

CVE-2024-11944 is a path traversal vulnerability classified under CWE-22 found in the tarfile.extractall method of iXsystems TrueNAS CORE version 13.3-RELEASE. The vulnerability arises because the method does not properly validate user-supplied file paths before extracting tar archives, allowing an attacker to write files outside the intended directory structure. This improper limitation of pathname enables directory traversal attacks, which can be leveraged to overwrite critical system files or place malicious executables. Exploitation requires network adjacency but no authentication or user interaction, making it accessible to remote attackers within the same network segment. The flaw can be combined with other vulnerabilities to escalate privileges and execute arbitrary code with root privileges, severely compromising the system. TrueNAS CORE is widely used in enterprise and data center environments for network-attached storage solutions, making this vulnerability particularly impactful. Although no public exploits have been reported yet, the vulnerability was assigned a CVSS v3.0 score of 7.5, indicating high severity due to its potential impact on confidentiality, integrity, and availability. The vulnerability was publicly disclosed on December 30, 2024, and is tracked as ZDI-CAN-25626 in addition to the CVE identifier. No official patches were listed at the time of disclosure, emphasizing the need for immediate mitigation measures.

Potential Impact

The impact of CVE-2024-11944 is substantial for organizations relying on TrueNAS CORE 13.3-RELEASE for critical storage infrastructure. Successful exploitation allows attackers to execute arbitrary code remotely without authentication, potentially leading to full system compromise with root privileges. This jeopardizes the confidentiality of sensitive data stored on the NAS, the integrity of system and user files, and the availability of storage services. Attackers could deploy ransomware, steal or alter data, disrupt backup and storage operations, or use compromised devices as footholds for lateral movement within corporate networks. Given TrueNAS CORE's deployment in enterprises, government agencies, and data centers, the vulnerability poses a significant risk to business continuity and data security worldwide. The lack of known exploits currently provides a window for proactive defense, but the ease of exploitation and high impact necessitate urgent attention.

Mitigation Recommendations

Organizations should immediately restrict network access to TrueNAS CORE management interfaces and storage services to trusted hosts only, ideally isolating them within secure VLANs or VPNs. Monitor network traffic for unusual tar archive extraction requests or unexpected file writes outside designated directories. Employ intrusion detection/prevention systems with custom rules targeting path traversal patterns. Until an official patch is released, consider disabling or restricting tarfile.extractall functionality if feasible or applying manual input validation wrappers around extraction processes. Regularly audit system logs and file integrity to detect early signs of exploitation. Engage with iXsystems support for updates and apply patches promptly once available. Additionally, implement robust backup and recovery procedures to mitigate data loss risks from potential exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2024-11-27T23:37:05.474Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 699f6e28b7ef31ef0b596f0d

Added to database: 2/25/2026, 9:48:24 PM

Last enriched: 2/26/2026, 5:11:16 AM

Last updated: 4/12/2026, 3:54:19 PM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses