CVE-2024-36068: n/a
CVE-2024-36068 is a high-severity incorrect access control vulnerability affecting Rubrik CDM versions prior to 9. 1. 2-p1, 9. 0. 3-p6, and 8. 1. 3-p12. It allows an attacker with network access to execute arbitrary code without authentication or user interaction. The vulnerability stems from improper enforcement of access controls (CWE-284), enabling remote code execution that impacts confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to organizations using affected Rubrik CDM versions.
AI Analysis
Technical Summary
CVE-2024-36068 is an incorrect access control vulnerability identified in Rubrik CDM (Cloud Data Management) software versions prior to 9.1.2-p1, 9.0.3-p6, and 8.1.3-p12. The vulnerability arises from improper enforcement of access control policies (classified under CWE-284), which allows an unauthenticated attacker with network access to execute arbitrary code remotely. This means an attacker can potentially take full control over the affected Rubrik CDM system without requiring valid credentials or user interaction. Rubrik CDM is widely used for enterprise data backup, recovery, and management, making this vulnerability particularly critical as it can lead to unauthorized data access, data manipulation, or service disruption. The CVSS v3.1 score of 7.5 indicates high severity, with attack vector being adjacent network (AV:A), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability all rated high (C:H/I:H/A:H). No public exploits have been reported yet, but the potential impact is significant given the critical role of Rubrik CDM in data protection workflows. The vulnerability was reserved in May 2024 and published in August 2024, indicating recent discovery and disclosure. Organizations using affected versions should urgently apply patches once available or implement compensating controls to limit network exposure.
Potential Impact
The impact of CVE-2024-36068 is substantial for organizations relying on Rubrik CDM for data backup and management. Successful exploitation allows remote attackers to execute arbitrary code, potentially leading to full system compromise. This can result in unauthorized data access, data corruption, deletion, or ransomware deployment, severely affecting data confidentiality, integrity, and availability. Disruption of backup and recovery processes can cause prolonged downtime and data loss, impacting business continuity. Given Rubrik’s deployment in enterprises, cloud providers, and critical infrastructure sectors, the vulnerability could be leveraged for espionage, sabotage, or financial gain. The high attack complexity somewhat limits exploitation to skilled attackers with network access, but the lack of required privileges or user interaction increases risk. Organizations without timely mitigation may face regulatory penalties, reputational damage, and operational losses.
Mitigation Recommendations
To mitigate CVE-2024-36068, organizations should: 1) Immediately identify and inventory all Rubrik CDM instances and verify their versions. 2) Apply official patches or updates from Rubrik as soon as they are released for versions 9.1.2-p1, 9.0.3-p6, and 8.1.3-p12 or later. 3) Restrict network access to Rubrik CDM management interfaces using network segmentation, firewalls, and VPNs to limit exposure to trusted hosts only. 4) Implement strict access control policies and monitor logs for unusual activity related to Rubrik CDM. 5) Employ intrusion detection/prevention systems (IDS/IPS) to detect potential exploitation attempts. 6) Conduct regular security assessments and penetration testing focused on backup infrastructure. 7) Develop and test incident response plans specifically addressing backup system compromise. 8) Engage with Rubrik support and subscribe to security advisories for timely updates. These steps go beyond generic advice by emphasizing network-level protections and proactive monitoring tailored to the backup environment.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, Singapore, India, Netherlands, Sweden, Switzerland
CVE-2024-36068: n/a
Description
CVE-2024-36068 is a high-severity incorrect access control vulnerability affecting Rubrik CDM versions prior to 9. 1. 2-p1, 9. 0. 3-p6, and 8. 1. 3-p12. It allows an attacker with network access to execute arbitrary code without authentication or user interaction. The vulnerability stems from improper enforcement of access controls (CWE-284), enabling remote code execution that impacts confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to organizations using affected Rubrik CDM versions.
AI-Powered Analysis
Technical Analysis
CVE-2024-36068 is an incorrect access control vulnerability identified in Rubrik CDM (Cloud Data Management) software versions prior to 9.1.2-p1, 9.0.3-p6, and 8.1.3-p12. The vulnerability arises from improper enforcement of access control policies (classified under CWE-284), which allows an unauthenticated attacker with network access to execute arbitrary code remotely. This means an attacker can potentially take full control over the affected Rubrik CDM system without requiring valid credentials or user interaction. Rubrik CDM is widely used for enterprise data backup, recovery, and management, making this vulnerability particularly critical as it can lead to unauthorized data access, data manipulation, or service disruption. The CVSS v3.1 score of 7.5 indicates high severity, with attack vector being adjacent network (AV:A), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability all rated high (C:H/I:H/A:H). No public exploits have been reported yet, but the potential impact is significant given the critical role of Rubrik CDM in data protection workflows. The vulnerability was reserved in May 2024 and published in August 2024, indicating recent discovery and disclosure. Organizations using affected versions should urgently apply patches once available or implement compensating controls to limit network exposure.
Potential Impact
The impact of CVE-2024-36068 is substantial for organizations relying on Rubrik CDM for data backup and management. Successful exploitation allows remote attackers to execute arbitrary code, potentially leading to full system compromise. This can result in unauthorized data access, data corruption, deletion, or ransomware deployment, severely affecting data confidentiality, integrity, and availability. Disruption of backup and recovery processes can cause prolonged downtime and data loss, impacting business continuity. Given Rubrik’s deployment in enterprises, cloud providers, and critical infrastructure sectors, the vulnerability could be leveraged for espionage, sabotage, or financial gain. The high attack complexity somewhat limits exploitation to skilled attackers with network access, but the lack of required privileges or user interaction increases risk. Organizations without timely mitigation may face regulatory penalties, reputational damage, and operational losses.
Mitigation Recommendations
To mitigate CVE-2024-36068, organizations should: 1) Immediately identify and inventory all Rubrik CDM instances and verify their versions. 2) Apply official patches or updates from Rubrik as soon as they are released for versions 9.1.2-p1, 9.0.3-p6, and 8.1.3-p12 or later. 3) Restrict network access to Rubrik CDM management interfaces using network segmentation, firewalls, and VPNs to limit exposure to trusted hosts only. 4) Implement strict access control policies and monitor logs for unusual activity related to Rubrik CDM. 5) Employ intrusion detection/prevention systems (IDS/IPS) to detect potential exploitation attempts. 6) Conduct regular security assessments and penetration testing focused on backup infrastructure. 7) Develop and test incident response plans specifically addressing backup system compromise. 8) Engage with Rubrik support and subscribe to security advisories for timely updates. These steps go beyond generic advice by emphasizing network-level protections and proactive monitoring tailored to the backup environment.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-05-19T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c5db7ef31ef0b5634de
Added to database: 2/25/2026, 9:40:45 PM
Last enriched: 2/26/2026, 4:59:18 AM
Last updated: 2/26/2026, 8:04:24 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.