Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-24780: Remote Code Execution with untrusted URI of User-defined function in Apache Software Foundation Apache IoTDB

0
Critical
VulnerabilityCVE-2024-24780cvecve-2024-24780
Published: Wed May 14 2025 (05/14/2025, 10:42:20 UTC)
Source: CVE
Vendor/Project: Apache Software Foundation
Product: Apache IoTDB

Description

Remote Code Execution with untrusted URI of UDF vulnerability in Apache IoTDB. The attacker who has privilege to create UDF can register malicious function from untrusted URI. This issue affects Apache IoTDB: from 1.0.0 before 1.3.4. Users are recommended to upgrade to version 1.3.4, which fixes the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 20:18:07 UTC

Technical Analysis

CVE-2024-24780 is a critical remote code execution (RCE) vulnerability affecting Apache IoTDB, an open-source time-series database designed for Internet of Things (IoT) data management. The vulnerability stems from improper validation of user-defined functions (UDFs) that can be registered from untrusted URIs. Specifically, an attacker who possesses the privilege to create UDFs can register a malicious function hosted on an untrusted URI, which the system then executes without sufficient validation or sandboxing. This leads to arbitrary code execution on the server running Apache IoTDB. The flaw is classified under CWE-94, indicating improper control over code generation or execution. The vulnerability affects all versions from 1.0.0 up to but not including 1.3.4. The CVSS 3.1 base score is 9.8, reflecting the ease of exploitation (network vector, no privileges or user interaction required) and the high impact on confidentiality, integrity, and availability. While no public exploits have been reported yet, the severity and nature of the flaw make it a critical threat, especially in environments where IoTDB is deployed to handle sensitive or critical data streams. The Apache Software Foundation has addressed this issue in version 1.3.4, and users are urged to upgrade immediately to mitigate risk.

Potential Impact

The impact of CVE-2024-24780 is severe for organizations using Apache IoTDB, particularly those managing IoT data, industrial control systems, or other critical time-series data infrastructures. Successful exploitation allows attackers to execute arbitrary code remotely without authentication or user interaction, potentially leading to full system compromise. This can result in data theft, data manipulation, service disruption, or use of the compromised system as a pivot point for further network intrusion. Given IoTDB's role in aggregating and analyzing sensor data, attacks could disrupt operational technology environments, cause data integrity loss, or enable espionage. The broad impact on confidentiality, integrity, and availability combined with the ease of exploitation makes this a critical risk for any organization running vulnerable versions. The absence of known exploits in the wild currently provides a window for proactive mitigation, but the threat of weaponization remains high.

Mitigation Recommendations

To mitigate CVE-2024-24780, organizations should immediately upgrade Apache IoTDB to version 1.3.4 or later, where the vulnerability is patched. Until upgrading is possible, restrict the ability to create or register user-defined functions to only highly trusted administrators and monitor such activities closely. Implement network segmentation and firewall rules to limit access to the IoTDB management interfaces, reducing exposure to untrusted networks. Employ application-layer controls to validate and whitelist UDF sources, preventing registration from untrusted URIs. Additionally, enable runtime application monitoring and anomaly detection to identify suspicious behavior indicative of exploitation attempts. Regularly audit IoTDB configurations and logs for unauthorized UDF registrations. Finally, maintain an incident response plan tailored to IoTDB environments to quickly contain and remediate any compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
apache
Date Reserved
2024-01-30T10:43:03.969Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec78a

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 2/26/2026, 8:18:07 PM

Last updated: 3/25/2026, 4:20:46 AM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses