Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-47211: n/a

0
Medium
VulnerabilityCVE-2024-47211cvecve-2024-47211
Published: Fri Oct 04 2024 (10/04/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

In OpenStack Ironic before 21.4.4, 22.x and 23.x before 23.0.3, 23.x and 24.x before 24.1.3, and 25.x and 26.x before 26.1.0, there is a lack of checksum validation of supplied image_source URLs when configured to convert images to a raw format for streaming.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 08:48:14 UTC

Technical Analysis

CVE-2024-47211 is a vulnerability identified in OpenStack Ironic, a bare metal provisioning service widely used in cloud environments. The flaw exists in versions before 21.4.4, 22.x and 23.x before 23.0.3, 23.x and 24.x before 24.1.3, and 25.x and 26.x before 26.1.0. The root cause is the absence of checksum validation on image_source URLs when the system is configured to convert images to a raw format for streaming. This means that when an image is fetched from a supplied URL for deployment, the system does not verify the integrity of the image data via checksums, allowing potentially corrupted or malicious images to be processed. While the vulnerability does not allow direct compromise of confidentiality or integrity of data, it can lead to denial of service by causing failures or disruptions in the image streaming and provisioning process. Exploitation requires no privileges or user interaction and can be triggered remotely over the network. The vulnerability has a CVSS v3.1 base score of 5.3, indicating medium severity. No public exploits have been reported yet, but the vulnerability poses a risk to cloud providers and enterprises using OpenStack Ironic for automated bare metal provisioning. The lack of checksum validation undermines trust in the image deployment pipeline, potentially impacting service availability and operational continuity.

Potential Impact

The primary impact of CVE-2024-47211 is on the availability of services relying on OpenStack Ironic for bare metal provisioning. Attackers can supply malicious or corrupted image_source URLs that bypass integrity checks, potentially causing image streaming failures or provisioning disruptions. This can lead to denial of service conditions, delaying or preventing deployment of bare metal nodes. Organizations operating large-scale cloud infrastructure or data centers using OpenStack Ironic may experience operational downtime or degraded service quality. Although confidentiality and integrity of data are not directly compromised, the disruption of provisioning workflows can have cascading effects on service delivery and maintenance activities. The vulnerability could also increase operational costs due to troubleshooting and recovery efforts. Since exploitation requires no authentication and can be performed remotely, the attack surface is broad, especially in environments exposing the Ironic API endpoints. However, the absence of known exploits in the wild suggests limited immediate threat but warrants proactive mitigation.

Mitigation Recommendations

To mitigate CVE-2024-47211, organizations should promptly upgrade OpenStack Ironic to the fixed versions: 21.4.4 or later, 23.0.3 or later, 24.1.3 or later, and 26.1.0 or later as applicable. If immediate upgrade is not feasible, administrators should implement strict network segmentation and firewall rules to restrict access to the Ironic API endpoints, limiting exposure to trusted networks and users only. Monitoring and logging of image_source URL requests can help detect anomalous or suspicious activity. Additionally, organizations can implement manual or automated validation of image sources outside of Ironic to verify checksums before provisioning. Employing image signing and verification mechanisms at the infrastructure level can further enhance trust in deployed images. Regular security audits and vulnerability scanning of OpenStack components should be conducted to identify and remediate similar issues proactively. Finally, maintaining an incident response plan tailored to cloud infrastructure disruptions will help minimize operational impact in case of exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-09-21T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d08b7ef31ef0b56d596

Added to database: 2/25/2026, 9:43:36 PM

Last enriched: 2/26/2026, 8:48:14 AM

Last updated: 4/13/2026, 11:48:07 PM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses