Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-36068: n/a

0
High
VulnerabilityCVE-2024-36068cvecve-2024-36068
Published: Tue Aug 27 2024 (08/27/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-36068 is a high-severity incorrect access control vulnerability affecting Rubrik CDM versions prior to 9. 1. 2-p1, 9. 0. 3-p6, and 8. 1. 3-p12. It allows an attacker with network access to execute arbitrary code without authentication or user interaction. The vulnerability stems from improper enforcement of access controls (CWE-284), enabling remote code execution that impacts confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to organizations using affected Rubrik CDM versions.

AI-Powered Analysis

AILast updated: 02/26/2026, 04:59:18 UTC

Technical Analysis

CVE-2024-36068 is an incorrect access control vulnerability identified in Rubrik CDM (Cloud Data Management) software versions prior to 9.1.2-p1, 9.0.3-p6, and 8.1.3-p12. The vulnerability arises from improper enforcement of access control policies (classified under CWE-284), which allows an unauthenticated attacker with network access to execute arbitrary code remotely. This means an attacker can potentially take full control over the affected Rubrik CDM system without requiring valid credentials or user interaction. Rubrik CDM is widely used for enterprise data backup, recovery, and management, making this vulnerability particularly critical as it can lead to unauthorized data access, data manipulation, or service disruption. The CVSS v3.1 score of 7.5 indicates high severity, with attack vector being adjacent network (AV:A), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability all rated high (C:H/I:H/A:H). No public exploits have been reported yet, but the potential impact is significant given the critical role of Rubrik CDM in data protection workflows. The vulnerability was reserved in May 2024 and published in August 2024, indicating recent discovery and disclosure. Organizations using affected versions should urgently apply patches once available or implement compensating controls to limit network exposure.

Potential Impact

The impact of CVE-2024-36068 is substantial for organizations relying on Rubrik CDM for data backup and management. Successful exploitation allows remote attackers to execute arbitrary code, potentially leading to full system compromise. This can result in unauthorized data access, data corruption, deletion, or ransomware deployment, severely affecting data confidentiality, integrity, and availability. Disruption of backup and recovery processes can cause prolonged downtime and data loss, impacting business continuity. Given Rubrik’s deployment in enterprises, cloud providers, and critical infrastructure sectors, the vulnerability could be leveraged for espionage, sabotage, or financial gain. The high attack complexity somewhat limits exploitation to skilled attackers with network access, but the lack of required privileges or user interaction increases risk. Organizations without timely mitigation may face regulatory penalties, reputational damage, and operational losses.

Mitigation Recommendations

To mitigate CVE-2024-36068, organizations should: 1) Immediately identify and inventory all Rubrik CDM instances and verify their versions. 2) Apply official patches or updates from Rubrik as soon as they are released for versions 9.1.2-p1, 9.0.3-p6, and 8.1.3-p12 or later. 3) Restrict network access to Rubrik CDM management interfaces using network segmentation, firewalls, and VPNs to limit exposure to trusted hosts only. 4) Implement strict access control policies and monitor logs for unusual activity related to Rubrik CDM. 5) Employ intrusion detection/prevention systems (IDS/IPS) to detect potential exploitation attempts. 6) Conduct regular security assessments and penetration testing focused on backup infrastructure. 7) Develop and test incident response plans specifically addressing backup system compromise. 8) Engage with Rubrik support and subscribe to security advisories for timely updates. These steps go beyond generic advice by emphasizing network-level protections and proactive monitoring tailored to the backup environment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-05-19T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c5db7ef31ef0b5634de

Added to database: 2/25/2026, 9:40:45 PM

Last enriched: 2/26/2026, 4:59:18 AM

Last updated: 2/26/2026, 8:04:24 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats