Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-41270: n/a

0
Critical
VulnerabilityCVE-2024-41270cvecve-2024-41270
Published: Tue Aug 06 2024 (08/06/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue discovered in the RunHTTPServer function in Gorush v1.18.4 allows attackers to intercept and manipulate data due to use of deprecated TLS version.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 05:36:42 UTC

Technical Analysis

CVE-2024-41270 is a critical security vulnerability identified in the RunHTTPServer function of Gorush version 1.18.4, a popular open-source push notification server. The root cause is the use of deprecated TLS versions within the server's HTTP communication layer, which exposes the system to interception and manipulation of data by remote attackers. TLS (Transport Layer Security) is essential for securing data in transit, and deprecated versions such as TLS 1.0 or 1.1 are known to have multiple cryptographic weaknesses that can be exploited to perform man-in-the-middle (MITM) attacks. This vulnerability falls under CWE-327, which involves the use of broken or risky cryptographic algorithms, indicating that the cryptographic protections are insufficient to guarantee confidentiality and integrity. The CVSS v3.1 base score of 9.1 reflects the critical nature of this vulnerability, with an attack vector over the network (AV:N), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality and integrity (C:H/I:H), but no impact on availability (A:N). The vulnerability allows attackers to eavesdrop on sensitive information or alter data exchanged between clients and the Gorush server, potentially leading to data breaches, unauthorized command injection, or session hijacking. While no public exploits have been reported yet, the ease of exploitation and severity necessitate urgent attention. The lack of a patch link suggests that a fix may not yet be available, emphasizing the need for interim mitigations such as disabling deprecated TLS protocols and enforcing modern TLS versions. Organizations using Gorush for push notifications, especially in environments handling sensitive or regulated data, must assess their exposure and implement controls to mitigate this risk promptly.

Potential Impact

The impact of CVE-2024-41270 is significant for organizations worldwide that deploy Gorush v1.18.4 or similar versions using deprecated TLS protocols. The vulnerability compromises the confidentiality and integrity of data transmitted between clients and the server, enabling attackers to intercept sensitive information such as authentication tokens, personal data, or internal commands. This can lead to unauthorized access, data leakage, and manipulation of push notification content, undermining trust and potentially causing operational disruptions. Since the vulnerability does not affect availability, denial-of-service is less likely, but the breach of data integrity and confidentiality can have severe consequences, including regulatory non-compliance, reputational damage, and financial losses. Industries relying heavily on secure push notifications—such as finance, healthcare, telecommunications, and government—are particularly vulnerable. The ease of exploitation without authentication or user interaction increases the attack surface, making automated or opportunistic attacks feasible. Although no known exploits are currently in the wild, the critical CVSS score and the widespread use of TLS for securing communications suggest that attackers may develop exploits rapidly. Organizations failing to address this vulnerability risk exposure to sophisticated MITM attacks and data compromise.

Mitigation Recommendations

To mitigate CVE-2024-41270 effectively, organizations should take several specific actions beyond generic advice: 1) Immediately audit Gorush deployments to identify affected versions, focusing on v1.18.4 and any others using deprecated TLS versions. 2) Disable support for deprecated TLS protocols such as TLS 1.0 and TLS 1.1 in the Gorush server configuration and enforce TLS 1.2 or higher, ensuring strong cipher suites are used. 3) If an official patch is released, prioritize applying it promptly; monitor Gorush project repositories and security advisories for updates. 4) Implement network-level protections such as TLS interception detection, anomaly-based intrusion detection systems (IDS), and strict firewall rules to limit exposure of the Gorush server to untrusted networks. 5) Use TLS certificate pinning where possible on client applications to reduce the risk of MITM attacks. 6) Conduct regular security assessments and penetration testing focused on TLS configurations and server communications. 7) Educate development and operations teams about the risks of using deprecated cryptographic protocols and enforce secure coding and deployment practices. 8) Consider deploying Web Application Firewalls (WAFs) or reverse proxies that can enforce secure TLS configurations and provide additional inspection capabilities. These targeted steps will reduce the risk of exploitation and protect data integrity and confidentiality in Gorush environments.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-07-18T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cb3b7ef31ef0b5682fb

Added to database: 2/25/2026, 9:42:11 PM

Last enriched: 2/28/2026, 5:36:42 AM

Last updated: 4/12/2026, 3:46:37 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses