CVE-2024-21870: CWE-73: External Control of File Name or Path in Open Automation Software OAS Platform
A file write vulnerability exists in the OAS Engine Tags Configuration functionality of Open Automation Software OAS Platform V19.00.0057. A specially crafted series of network requests can lead to arbitrary file creation or overwrite. An attacker can send a sequence of requests to trigger this vulnerability.
AI Analysis
Technical Summary
CVE-2024-21870 is a vulnerability classified under CWE-73 (External Control of File Name or Path) affecting Open Automation Software's OAS Platform version 19.00.0057. The flaw exists in the OAS Engine Tags Configuration functionality, where an attacker can send a specially crafted sequence of network requests to cause arbitrary file creation or overwriting on the system. This vulnerability arises because the software does not properly validate or sanitize file path inputs, allowing external control over file names or paths. Exploitation requires the attacker to have high-level privileges (PR:H) but does not require user interaction (UI:N), and the attack can be performed remotely over the network (AV:N). The vulnerability impacts the integrity of the system by enabling unauthorized modification of files, which could lead to altered configurations, insertion of malicious code, or disruption of normal operations. The CVSS v3.1 base score is 4.9, indicating a medium severity level. No public exploits have been reported yet, but the potential for misuse in industrial control or automation environments is significant given the critical nature of these systems. The vulnerability is particularly concerning for environments where the OAS Platform is used to manage industrial processes, as file overwrites could lead to operational disruptions or safety risks. The lack of a patch at the time of publication necessitates immediate mitigation steps to reduce exposure.
Potential Impact
For European organizations, especially those in manufacturing, energy, utilities, and critical infrastructure sectors that rely on the OAS Platform for industrial automation and control, this vulnerability poses a risk to system integrity. Unauthorized file creation or overwriting can lead to configuration corruption, insertion of malicious payloads, or disruption of automated processes, potentially causing operational downtime or safety hazards. Given the interconnected nature of industrial control systems, exploitation could propagate effects beyond a single system, impacting supply chains or critical services. The requirement for high privileges limits the attack surface to insiders or attackers who have already compromised credentials, but the remote network attack vector increases risk if access controls are weak. The absence of known exploits reduces immediate threat but does not eliminate the risk of future attacks. European organizations with stringent regulatory requirements around industrial cybersecurity (such as those under NIS2 Directive) must consider this vulnerability a significant risk to operational continuity and compliance.
Mitigation Recommendations
1. Restrict network access to the OAS Engine Tags Configuration interface using network segmentation, firewalls, and VPNs to limit exposure to trusted administrators only. 2. Enforce strong authentication and authorization controls to ensure only authorized personnel have high-level privileges required to exploit this vulnerability. 3. Implement rigorous monitoring and logging of configuration changes and network requests to detect anomalous or suspicious activity indicative of exploitation attempts. 4. Conduct regular audits of file system integrity and configuration files to identify unauthorized modifications promptly. 5. Apply vendor patches or updates as soon as they become available; engage with Open Automation Software support to obtain timelines or workarounds. 6. Educate administrators on the risks of this vulnerability and the importance of safeguarding credentials and access paths. 7. Consider deploying application-layer protections or web application firewalls (WAFs) that can detect and block malicious payloads targeting file path manipulation. 8. Develop and test incident response plans specific to industrial control system compromises to minimize impact if exploitation occurs.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Sweden, Poland, Czech Republic, Spain
CVE-2024-21870: CWE-73: External Control of File Name or Path in Open Automation Software OAS Platform
Description
A file write vulnerability exists in the OAS Engine Tags Configuration functionality of Open Automation Software OAS Platform V19.00.0057. A specially crafted series of network requests can lead to arbitrary file creation or overwrite. An attacker can send a sequence of requests to trigger this vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2024-21870 is a vulnerability classified under CWE-73 (External Control of File Name or Path) affecting Open Automation Software's OAS Platform version 19.00.0057. The flaw exists in the OAS Engine Tags Configuration functionality, where an attacker can send a specially crafted sequence of network requests to cause arbitrary file creation or overwriting on the system. This vulnerability arises because the software does not properly validate or sanitize file path inputs, allowing external control over file names or paths. Exploitation requires the attacker to have high-level privileges (PR:H) but does not require user interaction (UI:N), and the attack can be performed remotely over the network (AV:N). The vulnerability impacts the integrity of the system by enabling unauthorized modification of files, which could lead to altered configurations, insertion of malicious code, or disruption of normal operations. The CVSS v3.1 base score is 4.9, indicating a medium severity level. No public exploits have been reported yet, but the potential for misuse in industrial control or automation environments is significant given the critical nature of these systems. The vulnerability is particularly concerning for environments where the OAS Platform is used to manage industrial processes, as file overwrites could lead to operational disruptions or safety risks. The lack of a patch at the time of publication necessitates immediate mitigation steps to reduce exposure.
Potential Impact
For European organizations, especially those in manufacturing, energy, utilities, and critical infrastructure sectors that rely on the OAS Platform for industrial automation and control, this vulnerability poses a risk to system integrity. Unauthorized file creation or overwriting can lead to configuration corruption, insertion of malicious payloads, or disruption of automated processes, potentially causing operational downtime or safety hazards. Given the interconnected nature of industrial control systems, exploitation could propagate effects beyond a single system, impacting supply chains or critical services. The requirement for high privileges limits the attack surface to insiders or attackers who have already compromised credentials, but the remote network attack vector increases risk if access controls are weak. The absence of known exploits reduces immediate threat but does not eliminate the risk of future attacks. European organizations with stringent regulatory requirements around industrial cybersecurity (such as those under NIS2 Directive) must consider this vulnerability a significant risk to operational continuity and compliance.
Mitigation Recommendations
1. Restrict network access to the OAS Engine Tags Configuration interface using network segmentation, firewalls, and VPNs to limit exposure to trusted administrators only. 2. Enforce strong authentication and authorization controls to ensure only authorized personnel have high-level privileges required to exploit this vulnerability. 3. Implement rigorous monitoring and logging of configuration changes and network requests to detect anomalous or suspicious activity indicative of exploitation attempts. 4. Conduct regular audits of file system integrity and configuration files to identify unauthorized modifications promptly. 5. Apply vendor patches or updates as soon as they become available; engage with Open Automation Software support to obtain timelines or workarounds. 6. Educate administrators on the risks of this vulnerability and the importance of safeguarding credentials and access paths. 7. Consider deploying application-layer protections or web application firewalls (WAFs) that can detect and block malicious payloads targeting file path manipulation. 8. Develop and test incident response plans specific to industrial control system compromises to minimize impact if exploitation occurs.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- talos
- Date Reserved
- 2024-02-21T15:30:16.095Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a474b6d939959c80223a1
Added to database: 11/4/2025, 6:34:51 PM
Last enriched: 11/4/2025, 9:56:22 PM
Last updated: 12/16/2025, 10:51:50 PM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-34288: CWE-732 Incorrect Permission Assignment for Critical Resource in Nagios Enterprises Nagios XI
HighCVE-2025-68274: CWE-476: NULL Pointer Dereference in emiago sipgo
HighCVE-2025-64520: CWE-862: Missing Authorization in glpi-project glpi
MediumCVE-2025-14466: CWE-770 Allocation of Resources Without Limits or Throttling in Güralp Systems Fortimus Series
MediumCVE-2025-0852
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.