CVE-2024-22178: CWE-73: External Control of File Name or Path in Open Automation Software OAS Platform
A file write vulnerability exists in the OAS Engine Save Security Configuration functionality of Open Automation Software OAS Platform V19.00.0057. A specially crafted series of network requests can lead to arbitrary file creation or overwrite. An attacker can send a sequence of requests to trigger this vulnerability.
AI Analysis
Technical Summary
CVE-2024-22178 is a vulnerability classified under CWE-73 (External Control of File Name or Path) affecting Open Automation Software's OAS Platform version 19.00.0057. The flaw exists in the OAS Engine's Save Security Configuration functionality, where an attacker can send a specially crafted sequence of network requests to trigger arbitrary file creation or overwriting on the system. This vulnerability arises because the software improperly validates or sanitizes file path inputs, allowing external control over file paths used during the save operation. Exploitation requires the attacker to have high privileges (PR:H) and network access (AV:N), but no user interaction is needed (UI:N). The vulnerability impacts the integrity of the system by enabling unauthorized modification of files, which could lead to altered configurations, potential privilege escalation, or disruption of normal operations. The CVSS v3.1 base score is 4.9, indicating a medium severity level. No known public exploits or patches are currently available, increasing the importance of proactive defensive measures. The vulnerability is particularly relevant for environments where the OAS Platform is used for industrial automation and control, as unauthorized file modifications could affect operational technology (OT) systems.
Potential Impact
For European organizations, especially those in manufacturing, energy, utilities, and critical infrastructure sectors that rely on the OAS Platform for automation and control, this vulnerability poses a risk to system integrity. Unauthorized file creation or overwriting could lead to altered security configurations, potentially enabling further exploitation or operational disruptions. While confidentiality and availability are not directly impacted, integrity compromises in industrial control systems can have cascading effects, including safety risks and production downtime. The requirement for high privileges limits the attack surface to insiders or attackers who have already gained elevated access, but network accessibility increases the risk of remote exploitation. Given the strategic importance of industrial automation in Europe’s economy and critical infrastructure, exploitation could disrupt essential services or manufacturing processes, leading to financial losses and reputational damage.
Mitigation Recommendations
1. Restrict network access to the OAS Engine Save Security Configuration interface using firewalls and network segmentation to limit exposure to trusted administrators only. 2. Enforce strict access controls and role-based permissions to ensure only authorized personnel have high-level privileges required to exploit this vulnerability. 3. Monitor file system changes and logs related to configuration saves for unusual or unauthorized file creation or modification activities. 4. Implement application-layer input validation and sanitization where possible to detect and block suspicious file path inputs. 5. Maintain an inventory of OAS Platform versions deployed and plan for timely patching once a vendor fix is released. 6. Conduct regular security audits and penetration testing focused on the OAS Platform to identify potential exploitation attempts. 7. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous network requests targeting the OAS Engine. 8. Educate system administrators about this vulnerability and the importance of safeguarding privileged credentials to prevent privilege escalation.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Sweden, Poland, Spain, Czech Republic
CVE-2024-22178: CWE-73: External Control of File Name or Path in Open Automation Software OAS Platform
Description
A file write vulnerability exists in the OAS Engine Save Security Configuration functionality of Open Automation Software OAS Platform V19.00.0057. A specially crafted series of network requests can lead to arbitrary file creation or overwrite. An attacker can send a sequence of requests to trigger this vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2024-22178 is a vulnerability classified under CWE-73 (External Control of File Name or Path) affecting Open Automation Software's OAS Platform version 19.00.0057. The flaw exists in the OAS Engine's Save Security Configuration functionality, where an attacker can send a specially crafted sequence of network requests to trigger arbitrary file creation or overwriting on the system. This vulnerability arises because the software improperly validates or sanitizes file path inputs, allowing external control over file paths used during the save operation. Exploitation requires the attacker to have high privileges (PR:H) and network access (AV:N), but no user interaction is needed (UI:N). The vulnerability impacts the integrity of the system by enabling unauthorized modification of files, which could lead to altered configurations, potential privilege escalation, or disruption of normal operations. The CVSS v3.1 base score is 4.9, indicating a medium severity level. No known public exploits or patches are currently available, increasing the importance of proactive defensive measures. The vulnerability is particularly relevant for environments where the OAS Platform is used for industrial automation and control, as unauthorized file modifications could affect operational technology (OT) systems.
Potential Impact
For European organizations, especially those in manufacturing, energy, utilities, and critical infrastructure sectors that rely on the OAS Platform for automation and control, this vulnerability poses a risk to system integrity. Unauthorized file creation or overwriting could lead to altered security configurations, potentially enabling further exploitation or operational disruptions. While confidentiality and availability are not directly impacted, integrity compromises in industrial control systems can have cascading effects, including safety risks and production downtime. The requirement for high privileges limits the attack surface to insiders or attackers who have already gained elevated access, but network accessibility increases the risk of remote exploitation. Given the strategic importance of industrial automation in Europe’s economy and critical infrastructure, exploitation could disrupt essential services or manufacturing processes, leading to financial losses and reputational damage.
Mitigation Recommendations
1. Restrict network access to the OAS Engine Save Security Configuration interface using firewalls and network segmentation to limit exposure to trusted administrators only. 2. Enforce strict access controls and role-based permissions to ensure only authorized personnel have high-level privileges required to exploit this vulnerability. 3. Monitor file system changes and logs related to configuration saves for unusual or unauthorized file creation or modification activities. 4. Implement application-layer input validation and sanitization where possible to detect and block suspicious file path inputs. 5. Maintain an inventory of OAS Platform versions deployed and plan for timely patching once a vendor fix is released. 6. Conduct regular security audits and penetration testing focused on the OAS Platform to identify potential exploitation attempts. 7. Consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous network requests targeting the OAS Engine. 8. Educate system administrators about this vulnerability and the importance of safeguarding privileged credentials to prevent privilege escalation.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- talos
- Date Reserved
- 2024-02-21T15:36:51.486Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690a474d6d939959c80223d3
Added to database: 11/4/2025, 6:34:53 PM
Last enriched: 11/4/2025, 9:43:53 PM
Last updated: 12/18/2025, 10:58:35 PM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-68386: CWE-863 Incorrect Authorization in Elastic Kibana
MediumCVE-2025-68422: CWE-863 Incorrect Authorization in Elastic Kibana
MediumCVE-2025-68390: CWE-770 Allocation of Resources Without Limits or Throttling in Elastic Elasticsearch
MediumCVE-2025-68389: CWE-770 Allocation of Resources Without Limits or Throttling in Elastic Kibana
MediumCVE-2025-68387: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Elastic Kibana
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.