Skip to main content

CVE-2024-48248: CWE-36 Absolute Path Traversal in NAKIVO Backup & Replication Director

High
VulnerabilityCVE-2024-48248cvecve-2024-48248cwe-36
Published: Tue Mar 04 2025 (03/04/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: NAKIVO
Product: Backup & Replication Director

Description

NAKIVO Backup & Replication before 11.0.0.88174 allows absolute path traversal for reading files via getImageByPath to /c/router (this may lead to remote code execution across the enterprise because PhysicalDiscovery has cleartext credentials).

AI-Powered Analysis

AILast updated: 07/06/2025, 02:55:51 UTC

Technical Analysis

CVE-2024-48248 is a high-severity vulnerability affecting NAKIVO Backup & Replication Director versions prior to 11.0.0.88174. The vulnerability is classified as CWE-36, an Absolute Path Traversal flaw, which allows an unauthenticated remote attacker to read arbitrary files on the affected system by exploiting the getImageByPath function via the /c/router endpoint. This flaw enables attackers to bypass normal file access restrictions and access sensitive files anywhere on the filesystem. The critical risk arises because the PhysicalDiscovery component stores cleartext credentials within these files, which can be exfiltrated by the attacker. With these credentials, an attacker could potentially escalate privileges or move laterally within the enterprise environment, leading to remote code execution and broader compromise. The CVSS 3.1 base score of 8.6 reflects the vulnerability's network attack vector, low complexity, no required privileges or user interaction, and a scope change due to the potential for enterprise-wide impact. Although no known exploits are currently reported in the wild, the vulnerability's nature and impact make it a significant threat to organizations relying on NAKIVO Backup & Replication Director for data protection and disaster recovery. The absence of a patch link indicates that remediation may require vendor updates or configuration changes once available.

Potential Impact

For European organizations, this vulnerability poses a substantial risk to the confidentiality and integrity of backup data and enterprise credentials. Since backup systems often contain sensitive and critical data, unauthorized access could lead to data breaches, exposure of intellectual property, and disruption of business continuity. The ability to read cleartext credentials can facilitate further attacks such as lateral movement, privilege escalation, and potentially remote code execution within the enterprise network. This could compromise not only the backup infrastructure but also connected systems and services. Given the critical role of backup solutions in regulatory compliance and data protection mandates such as GDPR, exploitation of this vulnerability could result in legal penalties, reputational damage, and financial losses. The vulnerability's network accessibility and lack of required authentication increase the likelihood of exploitation, especially in environments where the backup system is exposed or insufficiently segmented from external or less trusted networks.

Mitigation Recommendations

European organizations should immediately assess their exposure by identifying instances of NAKIVO Backup & Replication Director in their environment and verifying the version in use. Until an official patch is released, organizations should implement strict network segmentation and firewall rules to restrict access to the backup management interfaces, limiting them to trusted administrative networks only. Employing VPNs or zero-trust network access solutions can further reduce exposure. Monitoring and logging access to the backup system should be enhanced to detect anomalous file access patterns indicative of exploitation attempts. Organizations should also audit the PhysicalDiscovery component and related credential storage mechanisms, considering temporary credential rotation or enhanced encryption where possible. Once NAKIVO releases a patch or update addressing CVE-2024-48248, prompt application of the update is critical. Additionally, organizations should review and strengthen backup system hardening guidelines, including disabling unnecessary services, enforcing strong authentication, and applying the principle of least privilege to backup system accounts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-08T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6835fd37182aa0cae21d8deb

Added to database: 5/27/2025, 5:58:15 PM

Last enriched: 7/6/2025, 2:55:51 AM

Last updated: 8/14/2025, 12:36:21 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats