Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-30369: CWE-732: Incorrect Permission Assignment for Critical Resource in A10 Thunder ADC

0
High
VulnerabilityCVE-2024-30369cvecve-2024-30369cwe-732
Published: Thu Jun 06 2024 (06/06/2024, 17:53:01 UTC)
Source: CVE Database V5
Vendor/Project: A10
Product: Thunder ADC

Description

A10 Thunder ADC Incorrect Permission Assignment Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of A10 Thunder ADC. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the installer. The issue results from incorrect permissions on a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-22754.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 14:41:59 UTC

Technical Analysis

CVE-2024-30369 is a vulnerability classified under CWE-732 (Incorrect Permission Assignment for Critical Resource) affecting A10 Thunder ADC version 6.0.2 build 68. The vulnerability stems from improper file permissions set on an installer component, which can be manipulated by a local attacker who already has limited code execution capabilities on the device. By exploiting this misconfiguration, the attacker can escalate privileges to root, thereby gaining full control over the affected system. This escalation enables execution of arbitrary code with the highest system privileges, compromising the device's confidentiality, integrity, and availability. The vulnerability does not require user interaction but does require local access and some level of prior code execution capability. The CVSS v3.0 score is 7.8, reflecting high severity due to the potential impact and relatively low complexity of exploitation. While no public patches or known exploits are currently available, the vulnerability was assigned by the Zero Day Initiative (ZDI) as ZDI-CAN-22754 and published in June 2024. Given the critical role of A10 Thunder ADC devices in application delivery and network traffic management, this vulnerability poses a significant risk if exploited.

Potential Impact

The impact of CVE-2024-30369 is substantial for organizations deploying A10 Thunder ADC appliances. Successful exploitation allows an attacker with limited local access to gain root privileges, effectively taking full control of the device. This can lead to unauthorized disclosure of sensitive data, manipulation or disruption of network traffic, and potential pivoting to other internal systems. Since ADCs are often positioned in critical network paths for load balancing and security functions, compromise can degrade service availability and integrity, impacting business continuity. The elevated privileges also enable attackers to install persistent backdoors or disrupt security controls, increasing the risk of prolonged undetected intrusions. Organizations relying on A10 Thunder ADC for application delivery, especially in sectors like finance, healthcare, telecommunications, and government, face heightened risk due to the critical nature of these systems.

Mitigation Recommendations

To mitigate CVE-2024-30369, organizations should: 1) Immediately restrict local access to A10 Thunder ADC devices to trusted administrators only, minimizing the risk of low-privileged code execution. 2) Monitor and audit local user activities and file permission changes on the ADC systems to detect suspicious behavior. 3) Apply principle of least privilege rigorously, ensuring that users and processes have only the permissions necessary for their roles. 4) Engage with A10 Networks support to obtain any available patches or security advisories addressing this vulnerability and apply them promptly once released. 5) Implement network segmentation to isolate ADC devices from less trusted network zones, reducing the attack surface. 6) Use host-based intrusion detection systems (HIDS) on ADC appliances if supported, to alert on unauthorized privilege escalations or file permission modifications. 7) Regularly review and harden the configuration of the ADC devices, including installer and management components, to prevent exploitation of permission misconfigurations. 8) Prepare incident response plans specific to ADC compromise scenarios to enable rapid containment and recovery.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2024-03-26T18:52:36.418Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 699f6dc1b7ef31ef0b58db97

Added to database: 2/25/2026, 9:46:41 PM

Last enriched: 2/26/2026, 2:41:59 PM

Last updated: 4/11/2026, 10:12:16 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses