CVE-2024-2045: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Session Session
Session version 1.17.5 allows obtaining internal application files and public files from the user's device without the user's consent. This is possible because the application is vulnerable to Local File Read via chat attachments.
AI Analysis
Technical Summary
CVE-2024-2045 is a medium-severity vulnerability classified under CWE-22, which pertains to improper limitation of a pathname to a restricted directory, commonly known as a path traversal vulnerability. This specific vulnerability affects Session version 1.17.5, an application used for secure messaging. The flaw allows an attacker to exploit the application's handling of chat attachments to perform a Local File Read attack. By leveraging this vulnerability, an attacker can access internal application files and public files stored on the user's device without their consent. The vulnerability arises because the application fails to properly sanitize or restrict file path inputs, enabling traversal outside the intended directories. The CVSS 3.1 score is 5.5, indicating a medium severity level, with the vector string CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N. This means the attack requires local access (AV:L), low attack complexity (AC:L), no privileges (PR:N), but does require user interaction (UI:R). The impact is primarily on confidentiality, as the attacker can read sensitive files, but does not affect integrity or availability. There are no known exploits in the wild at this time, and no patches have been linked yet. The vulnerability was published on February 29, 2024, and has been enriched by CISA, indicating recognition by US cybersecurity authorities. Overall, this vulnerability poses a risk of unauthorized data disclosure through local exploitation via chat attachments in the Session app version 1.17.5.
Potential Impact
For European organizations, the impact of CVE-2024-2045 can be significant, especially for entities relying on the Session application for secure communications. The ability to read internal and public files on user devices without consent threatens the confidentiality of sensitive corporate data, intellectual property, and personal information. This could lead to data breaches, regulatory non-compliance (e.g., GDPR violations), and erosion of trust in secure communication tools. Since the attack requires local access and user interaction, the risk is higher in environments where devices are shared, or users may be tricked into opening malicious chat attachments. The vulnerability could be exploited by insiders or through social engineering campaigns targeting employees. Although the vulnerability does not affect integrity or availability, the unauthorized disclosure of files could facilitate further attacks or espionage. Organizations handling sensitive information, such as financial institutions, healthcare providers, and government agencies, are particularly at risk. The lack of a patch increases the urgency for mitigation measures to prevent exploitation.
Mitigation Recommendations
To mitigate CVE-2024-2045, European organizations should implement the following specific measures: 1) Immediately restrict the use of Session version 1.17.5 within the organization until a patched version is released. 2) Educate users about the risks of opening chat attachments from untrusted or unknown sources, emphasizing the potential for local file disclosure. 3) Employ endpoint security solutions that monitor and restrict unauthorized file access attempts, especially those initiated by messaging applications. 4) Use application whitelisting and sandboxing techniques to limit the Session app's file system access to only necessary directories. 5) Monitor logs and user activity for suspicious behavior indicative of exploitation attempts, such as unusual file access patterns. 6) Coordinate with the Session vendor to obtain updates or patches and apply them promptly once available. 7) Consider deploying Data Loss Prevention (DLP) tools to detect and block unauthorized exfiltration of sensitive files. 8) Implement strict device usage policies to minimize local attack vectors, including restricting physical access to devices and enforcing strong authentication. These targeted actions go beyond generic advice by focusing on controlling local access and user behavior related to the vulnerable application.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Norway, Denmark
CVE-2024-2045: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Session Session
Description
Session version 1.17.5 allows obtaining internal application files and public files from the user's device without the user's consent. This is possible because the application is vulnerable to Local File Read via chat attachments.
AI-Powered Analysis
Technical Analysis
CVE-2024-2045 is a medium-severity vulnerability classified under CWE-22, which pertains to improper limitation of a pathname to a restricted directory, commonly known as a path traversal vulnerability. This specific vulnerability affects Session version 1.17.5, an application used for secure messaging. The flaw allows an attacker to exploit the application's handling of chat attachments to perform a Local File Read attack. By leveraging this vulnerability, an attacker can access internal application files and public files stored on the user's device without their consent. The vulnerability arises because the application fails to properly sanitize or restrict file path inputs, enabling traversal outside the intended directories. The CVSS 3.1 score is 5.5, indicating a medium severity level, with the vector string CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N. This means the attack requires local access (AV:L), low attack complexity (AC:L), no privileges (PR:N), but does require user interaction (UI:R). The impact is primarily on confidentiality, as the attacker can read sensitive files, but does not affect integrity or availability. There are no known exploits in the wild at this time, and no patches have been linked yet. The vulnerability was published on February 29, 2024, and has been enriched by CISA, indicating recognition by US cybersecurity authorities. Overall, this vulnerability poses a risk of unauthorized data disclosure through local exploitation via chat attachments in the Session app version 1.17.5.
Potential Impact
For European organizations, the impact of CVE-2024-2045 can be significant, especially for entities relying on the Session application for secure communications. The ability to read internal and public files on user devices without consent threatens the confidentiality of sensitive corporate data, intellectual property, and personal information. This could lead to data breaches, regulatory non-compliance (e.g., GDPR violations), and erosion of trust in secure communication tools. Since the attack requires local access and user interaction, the risk is higher in environments where devices are shared, or users may be tricked into opening malicious chat attachments. The vulnerability could be exploited by insiders or through social engineering campaigns targeting employees. Although the vulnerability does not affect integrity or availability, the unauthorized disclosure of files could facilitate further attacks or espionage. Organizations handling sensitive information, such as financial institutions, healthcare providers, and government agencies, are particularly at risk. The lack of a patch increases the urgency for mitigation measures to prevent exploitation.
Mitigation Recommendations
To mitigate CVE-2024-2045, European organizations should implement the following specific measures: 1) Immediately restrict the use of Session version 1.17.5 within the organization until a patched version is released. 2) Educate users about the risks of opening chat attachments from untrusted or unknown sources, emphasizing the potential for local file disclosure. 3) Employ endpoint security solutions that monitor and restrict unauthorized file access attempts, especially those initiated by messaging applications. 4) Use application whitelisting and sandboxing techniques to limit the Session app's file system access to only necessary directories. 5) Monitor logs and user activity for suspicious behavior indicative of exploitation attempts, such as unusual file access patterns. 6) Coordinate with the Session vendor to obtain updates or patches and apply them promptly once available. 7) Consider deploying Data Loss Prevention (DLP) tools to detect and block unauthorized exfiltration of sensitive files. 8) Implement strict device usage policies to minimize local attack vectors, including restricting physical access to devices and enforcing strong authentication. These targeted actions go beyond generic advice by focusing on controlling local access and user behavior related to the vulnerable application.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Fluid Attacks
- Date Reserved
- 2024-02-29T23:31:27.739Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb541
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 7/4/2025, 1:55:45 PM
Last updated: 10/16/2025, 12:43:54 PM
Views: 35
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9955: Vulnerability in WSO2 WSO2 Enterprise Integrator
MediumCVE-2025-10611: Vulnerability in WSO2 WSO2 API Manager
CriticalFuji Electric HMI Configurator Flaws Expose Industrial Organizations to Hacking
MediumCVE-2025-58426: Use of hard-coded cryptographic key in NEOJAPAN Inc. desknet's NEO
MediumCVE-2025-58079: Improper Protection of Alternate Path in NEOJAPAN Inc. desknet's NEO
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.