Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-11944: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in iXsystems TrueNAS CORE

0
High
VulnerabilityCVE-2024-11944cvecve-2024-11944cwe-22
Published: Mon Dec 30 2024 (12/30/2024, 20:12:12 UTC)
Source: CVE Database V5
Vendor/Project: iXsystems
Product: TrueNAS CORE

Description

CVE-2024-11944 is a high-severity path traversal vulnerability in iXsystems TrueNAS CORE 13. 3-RELEASE affecting the tarfile. extractall method. It allows network-adjacent attackers to execute arbitrary code remotely without authentication by exploiting improper validation of user-supplied paths. This flaw can be chained with other vulnerabilities to achieve root-level code execution. The vulnerability impacts confidentiality, integrity, and availability of affected systems. No known exploits are currently in the wild, but the risk is significant due to the lack of authentication and potential for full system compromise. Organizations using TrueNAS CORE 13. 3-RELEASE should prioritize patching once available and implement strict network controls. Countries with significant TrueNAS deployments and critical infrastructure reliance on NAS devices are at higher risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 05:11:16 UTC

Technical Analysis

CVE-2024-11944 is a path traversal vulnerability classified under CWE-22 found in the tarfile.extractall method of iXsystems TrueNAS CORE version 13.3-RELEASE. The vulnerability arises because the method does not properly validate user-supplied file paths before extracting tar archives, allowing an attacker to write files outside the intended directory structure. This improper limitation of pathname enables directory traversal attacks, which can be leveraged to overwrite critical system files or place malicious executables. Exploitation requires network adjacency but no authentication or user interaction, making it accessible to remote attackers within the same network segment. The flaw can be combined with other vulnerabilities to escalate privileges and execute arbitrary code with root privileges, severely compromising the system. TrueNAS CORE is widely used in enterprise and data center environments for network-attached storage solutions, making this vulnerability particularly impactful. Although no public exploits have been reported yet, the vulnerability was assigned a CVSS v3.0 score of 7.5, indicating high severity due to its potential impact on confidentiality, integrity, and availability. The vulnerability was publicly disclosed on December 30, 2024, and is tracked as ZDI-CAN-25626 in addition to the CVE identifier. No official patches were listed at the time of disclosure, emphasizing the need for immediate mitigation measures.

Potential Impact

The impact of CVE-2024-11944 is substantial for organizations relying on TrueNAS CORE 13.3-RELEASE for critical storage infrastructure. Successful exploitation allows attackers to execute arbitrary code remotely without authentication, potentially leading to full system compromise with root privileges. This jeopardizes the confidentiality of sensitive data stored on the NAS, the integrity of system and user files, and the availability of storage services. Attackers could deploy ransomware, steal or alter data, disrupt backup and storage operations, or use compromised devices as footholds for lateral movement within corporate networks. Given TrueNAS CORE's deployment in enterprises, government agencies, and data centers, the vulnerability poses a significant risk to business continuity and data security worldwide. The lack of known exploits currently provides a window for proactive defense, but the ease of exploitation and high impact necessitate urgent attention.

Mitigation Recommendations

Organizations should immediately restrict network access to TrueNAS CORE management interfaces and storage services to trusted hosts only, ideally isolating them within secure VLANs or VPNs. Monitor network traffic for unusual tar archive extraction requests or unexpected file writes outside designated directories. Employ intrusion detection/prevention systems with custom rules targeting path traversal patterns. Until an official patch is released, consider disabling or restricting tarfile.extractall functionality if feasible or applying manual input validation wrappers around extraction processes. Regularly audit system logs and file integrity to detect early signs of exploitation. Engage with iXsystems support for updates and apply patches promptly once available. Additionally, implement robust backup and recovery procedures to mitigate data loss risks from potential exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2024-11-27T23:37:05.474Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 699f6e28b7ef31ef0b596f0d

Added to database: 2/25/2026, 9:48:24 PM

Last enriched: 2/26/2026, 5:11:16 AM

Last updated: 2/26/2026, 8:07:25 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats