Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-24386: n/a

0
High
VulnerabilityCVE-2024-24386cvecve-2024-24386
Published: Thu Feb 15 2024 (02/15/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-24386 is a high-severity vulnerability in VitalPBX version 3. 2. 4-5 that allows an attacker with high privileges to execute arbitrary code by delivering a crafted payload to the /var/lib/vitalpbx/scripts directory. The vulnerability requires the attacker to have prior authenticated access and does not require user interaction. Exploitation could lead to full system compromise, impacting confidentiality, integrity, and availability. No known exploits are currently in the wild, and no patches have been published yet. Organizations using VitalPBX 3. 2. 4-5 should prioritize risk assessment and implement strict access controls to mitigate potential exploitation. This vulnerability is particularly relevant to countries with widespread VitalPBX deployments and critical telephony infrastructure.

AI-Powered Analysis

AILast updated: 02/26/2026, 10:24:32 UTC

Technical Analysis

CVE-2024-24386 is a vulnerability identified in VitalPBX version 3.2.4-5, a popular open-source PBX (Private Branch Exchange) system used for telephony services. The flaw allows an attacker with high-level privileges (PR:H) to execute arbitrary code by submitting a specially crafted payload to the /var/lib/vitalpbx/scripts directory. This directory is presumably used for script execution within the PBX environment. The vulnerability is classified under CWE-284, indicating an authorization issue where insufficient access control allows unauthorized code execution. The CVSS v3.1 base score is 7.2, reflecting high severity due to network attack vector (AV:N), low attack complexity (AC:L), and no user interaction (UI:N). The attacker must already have some level of privileged access, which suggests exploitation might occur post-authentication or through lateral movement within a compromised network. Successful exploitation could allow the attacker to run arbitrary commands with the privileges of the VitalPBX service, potentially leading to full system compromise, data theft, service disruption, or further network infiltration. No patches or known exploits are currently available, indicating that the vulnerability is newly disclosed and may not yet be actively exploited in the wild.

Potential Impact

The impact of CVE-2024-24386 is significant for organizations relying on VitalPBX for their telephony infrastructure. Arbitrary code execution can lead to complete system compromise, allowing attackers to intercept or manipulate voice communications, disrupt telephony services, or pivot to other internal systems. Confidentiality is at risk due to potential data exfiltration, integrity is compromised by unauthorized code execution, and availability may be affected by service disruption or denial-of-service conditions. Given the critical role of PBX systems in business communications, exploitation could result in operational downtime, financial loss, reputational damage, and regulatory compliance issues. Organizations with VitalPBX deployments in sectors such as finance, healthcare, government, and critical infrastructure are particularly vulnerable due to the sensitive nature of their communications and the potential cascading effects of telephony outages.

Mitigation Recommendations

To mitigate CVE-2024-24386, organizations should implement the following specific measures: 1) Restrict access to the /var/lib/vitalpbx/scripts directory to only trusted system processes and administrators using strict file system permissions and access control lists (ACLs). 2) Enforce strong authentication and authorization policies to limit the number of users with high privileges capable of interacting with the vulnerable component. 3) Monitor logs and system activity for unusual script execution or file modifications within the scripts directory to detect potential exploitation attempts early. 4) Segment the network to isolate the VitalPBX server from less trusted network zones, reducing the risk of lateral movement by attackers. 5) Prepare for rapid deployment of patches or updates from VitalPBX once they become available by maintaining an up-to-date asset inventory and patch management process. 6) Conduct regular security audits and penetration testing focused on PBX systems to identify and remediate similar vulnerabilities proactively. 7) Consider deploying application whitelisting or runtime application self-protection (RASP) solutions to prevent unauthorized code execution within the PBX environment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-01-25T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d5ab7ef31ef0b570a25

Added to database: 2/25/2026, 9:44:58 PM

Last enriched: 2/26/2026, 10:24:32 AM

Last updated: 2/26/2026, 11:11:42 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats