CVE-2024-11944: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in iXsystems TrueNAS CORE
iXsystems TrueNAS CORE tarfile.extractall Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of iXsystems TrueNAS devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the tarfile.extractall method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-25626.
AI Analysis
Technical Summary
CVE-2024-11944 is a path traversal vulnerability classified under CWE-22 found in the tarfile.extractall method of iXsystems TrueNAS CORE version 13.3-RELEASE. The vulnerability arises because the method does not properly validate user-supplied file paths before extracting tar archives, allowing an attacker to write files outside the intended directory structure. This improper limitation of pathname enables directory traversal attacks, which can be leveraged to overwrite critical system files or place malicious executables. Exploitation requires network adjacency but no authentication or user interaction, making it accessible to remote attackers within the same network segment. The flaw can be combined with other vulnerabilities to escalate privileges and execute arbitrary code with root privileges, severely compromising the system. TrueNAS CORE is widely used in enterprise and data center environments for network-attached storage solutions, making this vulnerability particularly impactful. Although no public exploits have been reported yet, the vulnerability was assigned a CVSS v3.0 score of 7.5, indicating high severity due to its potential impact on confidentiality, integrity, and availability. The vulnerability was publicly disclosed on December 30, 2024, and is tracked as ZDI-CAN-25626 in addition to the CVE identifier. No official patches were listed at the time of disclosure, emphasizing the need for immediate mitigation measures.
Potential Impact
The impact of CVE-2024-11944 is substantial for organizations relying on TrueNAS CORE 13.3-RELEASE for critical storage infrastructure. Successful exploitation allows attackers to execute arbitrary code remotely without authentication, potentially leading to full system compromise with root privileges. This jeopardizes the confidentiality of sensitive data stored on the NAS, the integrity of system and user files, and the availability of storage services. Attackers could deploy ransomware, steal or alter data, disrupt backup and storage operations, or use compromised devices as footholds for lateral movement within corporate networks. Given TrueNAS CORE's deployment in enterprises, government agencies, and data centers, the vulnerability poses a significant risk to business continuity and data security worldwide. The lack of known exploits currently provides a window for proactive defense, but the ease of exploitation and high impact necessitate urgent attention.
Mitigation Recommendations
Organizations should immediately restrict network access to TrueNAS CORE management interfaces and storage services to trusted hosts only, ideally isolating them within secure VLANs or VPNs. Monitor network traffic for unusual tar archive extraction requests or unexpected file writes outside designated directories. Employ intrusion detection/prevention systems with custom rules targeting path traversal patterns. Until an official patch is released, consider disabling or restricting tarfile.extractall functionality if feasible or applying manual input validation wrappers around extraction processes. Regularly audit system logs and file integrity to detect early signs of exploitation. Engage with iXsystems support for updates and apply patches promptly once available. Additionally, implement robust backup and recovery procedures to mitigate data loss risks from potential exploitation.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Japan, Netherlands, South Korea, Singapore
CVE-2024-11944: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in iXsystems TrueNAS CORE
Description
iXsystems TrueNAS CORE tarfile.extractall Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of iXsystems TrueNAS devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the tarfile.extractall method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-25626.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-11944 is a path traversal vulnerability classified under CWE-22 found in the tarfile.extractall method of iXsystems TrueNAS CORE version 13.3-RELEASE. The vulnerability arises because the method does not properly validate user-supplied file paths before extracting tar archives, allowing an attacker to write files outside the intended directory structure. This improper limitation of pathname enables directory traversal attacks, which can be leveraged to overwrite critical system files or place malicious executables. Exploitation requires network adjacency but no authentication or user interaction, making it accessible to remote attackers within the same network segment. The flaw can be combined with other vulnerabilities to escalate privileges and execute arbitrary code with root privileges, severely compromising the system. TrueNAS CORE is widely used in enterprise and data center environments for network-attached storage solutions, making this vulnerability particularly impactful. Although no public exploits have been reported yet, the vulnerability was assigned a CVSS v3.0 score of 7.5, indicating high severity due to its potential impact on confidentiality, integrity, and availability. The vulnerability was publicly disclosed on December 30, 2024, and is tracked as ZDI-CAN-25626 in addition to the CVE identifier. No official patches were listed at the time of disclosure, emphasizing the need for immediate mitigation measures.
Potential Impact
The impact of CVE-2024-11944 is substantial for organizations relying on TrueNAS CORE 13.3-RELEASE for critical storage infrastructure. Successful exploitation allows attackers to execute arbitrary code remotely without authentication, potentially leading to full system compromise with root privileges. This jeopardizes the confidentiality of sensitive data stored on the NAS, the integrity of system and user files, and the availability of storage services. Attackers could deploy ransomware, steal or alter data, disrupt backup and storage operations, or use compromised devices as footholds for lateral movement within corporate networks. Given TrueNAS CORE's deployment in enterprises, government agencies, and data centers, the vulnerability poses a significant risk to business continuity and data security worldwide. The lack of known exploits currently provides a window for proactive defense, but the ease of exploitation and high impact necessitate urgent attention.
Mitigation Recommendations
Organizations should immediately restrict network access to TrueNAS CORE management interfaces and storage services to trusted hosts only, ideally isolating them within secure VLANs or VPNs. Monitor network traffic for unusual tar archive extraction requests or unexpected file writes outside designated directories. Employ intrusion detection/prevention systems with custom rules targeting path traversal patterns. Until an official patch is released, consider disabling or restricting tarfile.extractall functionality if feasible or applying manual input validation wrappers around extraction processes. Regularly audit system logs and file integrity to detect early signs of exploitation. Engage with iXsystems support for updates and apply patches promptly once available. Additionally, implement robust backup and recovery procedures to mitigate data loss risks from potential exploitation.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- zdi
- Date Reserved
- 2024-11-27T23:37:05.474Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 699f6e28b7ef31ef0b596f0d
Added to database: 2/25/2026, 9:48:24 PM
Last enriched: 2/26/2026, 5:11:16 AM
Last updated: 4/12/2026, 3:54:19 PM
Views: 21
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.