Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-48248: CWE-36 Absolute Path Traversal in NAKIVO Backup & Replication Director

0
High
VulnerabilityCVE-2024-48248cvecve-2024-48248cwe-36
Published: Tue Mar 04 2025 (03/04/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: NAKIVO
Product: Backup & Replication Director

Description

NAKIVO Backup & Replication before 11.0.0.88174 allows absolute path traversal for reading files via getImageByPath to /c/router (this may lead to remote code execution across the enterprise because PhysicalDiscovery has cleartext credentials).

AI-Powered Analysis

AILast updated: 10/21/2025, 19:57:52 UTC

Technical Analysis

CVE-2024-48248 is an absolute path traversal vulnerability classified under CWE-36 affecting NAKIVO Backup & Replication Director versions before 11.0.0.88174. The flaw exists in the getImageByPath functionality accessible via the /c/router endpoint, which improperly sanitizes input paths, allowing attackers to specify absolute file paths and read arbitrary files on the underlying system. This vulnerability is particularly dangerous because it exposes cleartext credentials used by the PhysicalDiscovery component, a module responsible for discovering physical infrastructure within the backup environment. Exposure of these credentials can lead to unauthorized access and potentially remote code execution within the enterprise network. The vulnerability is remotely exploitable over the network without requiring any authentication or user interaction, significantly increasing its risk profile. The CVSS v3.1 score of 8.6 reflects a high severity rating, emphasizing the critical confidentiality impact and the broad scope of affected systems. Although no public exploits have been observed in the wild, the vulnerability's nature and the sensitive role of backup software in enterprise environments make it a prime target for attackers. The lack of available patches at the time of publication necessitates immediate risk mitigation through network controls and monitoring. Organizations should audit their NAKIVO Backup & Replication installations, restrict access to the vulnerable endpoint, and prepare to apply vendor patches once released.

Potential Impact

The impact of CVE-2024-48248 on European organizations is significant due to the critical role backup and replication software plays in data protection and disaster recovery. Exploitation allows attackers to read arbitrary files, including sensitive configuration files containing cleartext credentials, which can lead to lateral movement and remote code execution within enterprise networks. This compromises confidentiality and potentially integrity, threatening business continuity and data security. Enterprises in Europe, especially those in regulated sectors such as finance, healthcare, and critical infrastructure, face increased risk of data breaches and compliance violations. The ability to remotely exploit this vulnerability without authentication or user interaction increases the likelihood of automated attacks and widespread compromise. Additionally, the exposure of backup infrastructure credentials can undermine trust in data recovery processes, complicating incident response and recovery efforts. The vulnerability could also be leveraged for espionage or sabotage in geopolitical contexts, given the strategic importance of backup systems.

Mitigation Recommendations

To mitigate CVE-2024-48248, European organizations should implement the following specific measures: 1) Immediately restrict network access to the NAKIVO Backup & Replication Director management interfaces, especially the /c/router endpoint, using firewalls and network segmentation to limit exposure to trusted administrators only. 2) Conduct thorough audits of backup infrastructure logs and configurations to detect any unauthorized access attempts or suspicious activity related to the getImageByPath functionality. 3) Encrypt sensitive configuration files and credentials where possible to reduce the impact of file disclosure. 4) Employ intrusion detection and prevention systems (IDS/IPS) with custom signatures to monitor for exploitation attempts targeting absolute path traversal patterns. 5) Coordinate with NAKIVO to obtain and apply security patches or updates as soon as they become available. 6) Implement multi-factor authentication (MFA) for all administrative access to backup systems to reduce the risk of credential misuse. 7) Educate IT and security teams about this vulnerability to ensure rapid detection and response. 8) Consider deploying application-layer gateways or web application firewalls (WAFs) to filter malicious requests targeting vulnerable endpoints.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-08T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6835fd37182aa0cae21d8deb

Added to database: 5/27/2025, 5:58:15 PM

Last enriched: 10/21/2025, 7:57:52 PM

Last updated: 12/1/2025, 6:22:00 PM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats