CVE-2024-30369: CWE-732: Incorrect Permission Assignment for Critical Resource in A10 Thunder ADC
A10 Thunder ADC Incorrect Permission Assignment Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of A10 Thunder ADC. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the installer. The issue results from incorrect permissions on a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-22754.
AI Analysis
Technical Summary
CVE-2024-30369 is a vulnerability classified under CWE-732 (Incorrect Permission Assignment for Critical Resource) affecting A10 Thunder ADC version 6.0.2 build 68. The vulnerability stems from improper file permissions set on an installer component, which can be manipulated by a local attacker who already has limited code execution capabilities on the device. By exploiting this misconfiguration, the attacker can escalate privileges to root, thereby gaining full control over the affected system. This escalation enables execution of arbitrary code with the highest system privileges, compromising the device's confidentiality, integrity, and availability. The vulnerability does not require user interaction but does require local access and some level of prior code execution capability. The CVSS v3.0 score is 7.8, reflecting high severity due to the potential impact and relatively low complexity of exploitation. While no public patches or known exploits are currently available, the vulnerability was assigned by the Zero Day Initiative (ZDI) as ZDI-CAN-22754 and published in June 2024. Given the critical role of A10 Thunder ADC devices in application delivery and network traffic management, this vulnerability poses a significant risk if exploited.
Potential Impact
The impact of CVE-2024-30369 is substantial for organizations deploying A10 Thunder ADC appliances. Successful exploitation allows an attacker with limited local access to gain root privileges, effectively taking full control of the device. This can lead to unauthorized disclosure of sensitive data, manipulation or disruption of network traffic, and potential pivoting to other internal systems. Since ADCs are often positioned in critical network paths for load balancing and security functions, compromise can degrade service availability and integrity, impacting business continuity. The elevated privileges also enable attackers to install persistent backdoors or disrupt security controls, increasing the risk of prolonged undetected intrusions. Organizations relying on A10 Thunder ADC for application delivery, especially in sectors like finance, healthcare, telecommunications, and government, face heightened risk due to the critical nature of these systems.
Mitigation Recommendations
To mitigate CVE-2024-30369, organizations should: 1) Immediately restrict local access to A10 Thunder ADC devices to trusted administrators only, minimizing the risk of low-privileged code execution. 2) Monitor and audit local user activities and file permission changes on the ADC systems to detect suspicious behavior. 3) Apply principle of least privilege rigorously, ensuring that users and processes have only the permissions necessary for their roles. 4) Engage with A10 Networks support to obtain any available patches or security advisories addressing this vulnerability and apply them promptly once released. 5) Implement network segmentation to isolate ADC devices from less trusted network zones, reducing the attack surface. 6) Use host-based intrusion detection systems (HIDS) on ADC appliances if supported, to alert on unauthorized privilege escalations or file permission modifications. 7) Regularly review and harden the configuration of the ADC devices, including installer and management components, to prevent exploitation of permission misconfigurations. 8) Prepare incident response plans specific to ADC compromise scenarios to enable rapid containment and recovery.
Affected Countries
United States, United Kingdom, Germany, France, Japan, South Korea, Australia, Canada, India, Singapore
CVE-2024-30369: CWE-732: Incorrect Permission Assignment for Critical Resource in A10 Thunder ADC
Description
A10 Thunder ADC Incorrect Permission Assignment Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of A10 Thunder ADC. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the installer. The issue results from incorrect permissions on a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-22754.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-30369 is a vulnerability classified under CWE-732 (Incorrect Permission Assignment for Critical Resource) affecting A10 Thunder ADC version 6.0.2 build 68. The vulnerability stems from improper file permissions set on an installer component, which can be manipulated by a local attacker who already has limited code execution capabilities on the device. By exploiting this misconfiguration, the attacker can escalate privileges to root, thereby gaining full control over the affected system. This escalation enables execution of arbitrary code with the highest system privileges, compromising the device's confidentiality, integrity, and availability. The vulnerability does not require user interaction but does require local access and some level of prior code execution capability. The CVSS v3.0 score is 7.8, reflecting high severity due to the potential impact and relatively low complexity of exploitation. While no public patches or known exploits are currently available, the vulnerability was assigned by the Zero Day Initiative (ZDI) as ZDI-CAN-22754 and published in June 2024. Given the critical role of A10 Thunder ADC devices in application delivery and network traffic management, this vulnerability poses a significant risk if exploited.
Potential Impact
The impact of CVE-2024-30369 is substantial for organizations deploying A10 Thunder ADC appliances. Successful exploitation allows an attacker with limited local access to gain root privileges, effectively taking full control of the device. This can lead to unauthorized disclosure of sensitive data, manipulation or disruption of network traffic, and potential pivoting to other internal systems. Since ADCs are often positioned in critical network paths for load balancing and security functions, compromise can degrade service availability and integrity, impacting business continuity. The elevated privileges also enable attackers to install persistent backdoors or disrupt security controls, increasing the risk of prolonged undetected intrusions. Organizations relying on A10 Thunder ADC for application delivery, especially in sectors like finance, healthcare, telecommunications, and government, face heightened risk due to the critical nature of these systems.
Mitigation Recommendations
To mitigate CVE-2024-30369, organizations should: 1) Immediately restrict local access to A10 Thunder ADC devices to trusted administrators only, minimizing the risk of low-privileged code execution. 2) Monitor and audit local user activities and file permission changes on the ADC systems to detect suspicious behavior. 3) Apply principle of least privilege rigorously, ensuring that users and processes have only the permissions necessary for their roles. 4) Engage with A10 Networks support to obtain any available patches or security advisories addressing this vulnerability and apply them promptly once released. 5) Implement network segmentation to isolate ADC devices from less trusted network zones, reducing the attack surface. 6) Use host-based intrusion detection systems (HIDS) on ADC appliances if supported, to alert on unauthorized privilege escalations or file permission modifications. 7) Regularly review and harden the configuration of the ADC devices, including installer and management components, to prevent exploitation of permission misconfigurations. 8) Prepare incident response plans specific to ADC compromise scenarios to enable rapid containment and recovery.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- zdi
- Date Reserved
- 2024-03-26T18:52:36.418Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 699f6dc1b7ef31ef0b58db97
Added to database: 2/25/2026, 9:46:41 PM
Last enriched: 2/26/2026, 2:41:59 PM
Last updated: 4/11/2026, 10:12:16 PM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.