Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-23768: n/a in n/a

0
High
VulnerabilityCVE-2024-23768cvecve-2024-23768
Published: Mon Jan 22 2024 (01/22/2024, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

Dremio before 24.3.1 allows path traversal. An authenticated user who has no privileges on certain folders (and the files and datasets in these folders) can access these folders, files, and datasets. To be successful, the user must have access to the source and at least one folder in the source. Affected versions are: 24.0.0 through 24.3.0, 23.0.0 through 23.2.3, and 22.0.0 through 22.2.2. Fixed versions are: 24.3.1 and later, 23.2.4 and later, and 22.2.3 and later.

AI-Powered Analysis

AILast updated: 07/08/2025, 17:14:48 UTC

Technical Analysis

CVE-2024-23768 is a high-severity path traversal vulnerability affecting multiple versions of Dremio, a data lake engine platform widely used for data analytics and querying. The vulnerability exists in versions 22.0.0 through 22.2.2, 23.0.0 through 23.2.3, and 24.0.0 through 24.3.0, and was fixed starting from versions 22.2.3, 23.2.4, and 24.3.1 respectively. The flaw allows an authenticated user with limited privileges—specifically, a user who has access to the source and at least one folder within that source but no privileges on certain other folders—to perform a path traversal attack. This enables unauthorized access to folders, files, and datasets that the user should not be able to access. The vulnerability is classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory) and has a CVSS v3.1 base score of 8.8, indicating a high impact. The attack vector is network-based (AV:N), requires low privileges (PR:L), does not require user interaction (UI:N), and affects confidentiality, integrity, and availability to a high degree (C:H/I:H/A:H). Exploitation does not require UI and can be performed remotely by an authenticated user, making it a significant risk in environments where user accounts are shared or where privilege boundaries are critical. No known exploits are currently reported in the wild, but the severity and ease of exploitation warrant immediate attention. The vulnerability could lead to unauthorized data disclosure, data tampering, or disruption of data services within the affected Dremio deployments.

Potential Impact

For European organizations, the impact of CVE-2024-23768 can be substantial, especially for enterprises relying on Dremio for data analytics, business intelligence, and data lake management. Unauthorized access to restricted folders and datasets could lead to exposure of sensitive personal data, intellectual property, or confidential business information, potentially violating GDPR and other data protection regulations. The integrity of critical datasets could be compromised, leading to erroneous analytics results and poor business decisions. Availability could also be affected if attackers manipulate or delete datasets. Organizations in sectors such as finance, healthcare, telecommunications, and government, which often handle sensitive data and rely heavily on data analytics platforms, are particularly at risk. The requirement for authentication reduces the risk from external unauthenticated attackers but does not eliminate insider threats or risks from compromised credentials. The vulnerability could also facilitate lateral movement within an organization's data infrastructure, increasing the attack surface and complicating incident response efforts.

Mitigation Recommendations

European organizations should prioritize upgrading affected Dremio instances to the fixed versions: 22.2.3 or later, 23.2.4 or later, and 24.3.1 or later. Until patches are applied, organizations should enforce strict access controls and monitor user activities closely, especially for users with access to data sources and folders. Implementing robust authentication mechanisms such as multi-factor authentication (MFA) can reduce the risk of credential compromise. Network segmentation and limiting access to Dremio instances to trusted networks can reduce exposure. Regular audits of user privileges and folder access permissions should be conducted to ensure least privilege principles are enforced. Additionally, organizations should enable detailed logging and monitoring to detect unusual access patterns indicative of exploitation attempts. Incident response plans should be updated to include scenarios involving unauthorized data access via path traversal. Finally, educating users about the risks of credential sharing and phishing can help mitigate the risk of attackers gaining authenticated access.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-01-22T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6839c41d182aa0cae2b4361c

Added to database: 5/30/2025, 2:43:41 PM

Last enriched: 7/8/2025, 5:14:48 PM

Last updated: 12/2/2025, 1:26:44 AM

Views: 41

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats