CVE-2024-48951: n/a
CVE-2024-48951 is a high-severity Server-Side Request Forgery (SSRF) vulnerability affecting Logpoint SOAR versions prior to 7. 5. 0. Exploiting this flaw allows an attacker to leak Logpoint's API token, which can lead to authentication bypass. The vulnerability does not require user interaction or privileges but has a high attack complexity and requires network-level access. Successful exploitation compromises confidentiality, integrity, and availability of the Logpoint system, potentially allowing unauthorized access and control. No known exploits are currently reported in the wild. Organizations using vulnerable Logpoint SOAR versions should prioritize patching once available and implement network-level mitigations to restrict SSRF attack vectors.
AI Analysis
Technical Summary
CVE-2024-48951 is a Server-Side Request Forgery (SSRF) vulnerability identified in Logpoint SOAR versions before 7.5.0. SSRF vulnerabilities occur when an attacker can manipulate a server to make unintended requests to internal or external resources. In this case, the SSRF flaw allows an attacker to trick the Logpoint SOAR server into leaking its API token. This token is critical for authenticating API requests, and its exposure leads to authentication bypass, enabling attackers to perform unauthorized actions within the Logpoint environment. The vulnerability has a CVSS v3.1 base score of 7.5, indicating high severity, with attack vector classified as adjacent network (AV:A), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), and impacts confidentiality, integrity, and availability (C:H/I:H/A:H). The SSRF can be exploited remotely by an unauthenticated attacker with network access to the Logpoint SOAR server, but the attack complexity is high, suggesting some conditions must be met for successful exploitation. No patches or exploits are currently publicly available, but the risk remains significant due to the potential for full system compromise. The vulnerability is categorized under CWE-918 (Server-Side Request Forgery).
Potential Impact
The impact of CVE-2024-48951 is substantial for organizations using vulnerable Logpoint SOAR versions. By leaking the API token, attackers can bypass authentication mechanisms, gaining unauthorized access to the SOAR platform. This can lead to unauthorized data access, manipulation of security orchestration workflows, and disruption of incident response processes. The compromise of confidentiality, integrity, and availability could result in exposure of sensitive security data, manipulation or disabling of security controls, and potential lateral movement within the network. Given Logpoint SOAR's role in security operations, exploitation could severely degrade an organization's ability to detect and respond to threats, increasing overall risk exposure. The absence of known exploits in the wild currently reduces immediate risk but does not diminish the urgency for mitigation.
Mitigation Recommendations
Organizations should immediately assess their use of Logpoint SOAR and verify the version in deployment. Since no official patches are currently available, temporary mitigations include restricting network access to the SOAR server to trusted sources only, implementing strict egress and ingress filtering to prevent SSRF exploitation, and monitoring network traffic for unusual outbound requests originating from the SOAR server. Additionally, review and tighten API token management policies, including rotation and scope limitation, to reduce potential damage if tokens are leaked. Once Logpoint releases a patch for version 7.5.0 or later, organizations must prioritize prompt application of the update. Security teams should also audit SOAR logs for suspicious activity indicative of SSRF attempts or token misuse. Employing web application firewalls (WAFs) with SSRF detection capabilities can provide an additional layer of defense.
Affected Countries
United States, Germany, United Kingdom, Netherlands, France, Canada, Australia, Sweden, Norway, Finland
CVE-2024-48951: n/a
Description
CVE-2024-48951 is a high-severity Server-Side Request Forgery (SSRF) vulnerability affecting Logpoint SOAR versions prior to 7. 5. 0. Exploiting this flaw allows an attacker to leak Logpoint's API token, which can lead to authentication bypass. The vulnerability does not require user interaction or privileges but has a high attack complexity and requires network-level access. Successful exploitation compromises confidentiality, integrity, and availability of the Logpoint system, potentially allowing unauthorized access and control. No known exploits are currently reported in the wild. Organizations using vulnerable Logpoint SOAR versions should prioritize patching once available and implement network-level mitigations to restrict SSRF attack vectors.
AI-Powered Analysis
Technical Analysis
CVE-2024-48951 is a Server-Side Request Forgery (SSRF) vulnerability identified in Logpoint SOAR versions before 7.5.0. SSRF vulnerabilities occur when an attacker can manipulate a server to make unintended requests to internal or external resources. In this case, the SSRF flaw allows an attacker to trick the Logpoint SOAR server into leaking its API token. This token is critical for authenticating API requests, and its exposure leads to authentication bypass, enabling attackers to perform unauthorized actions within the Logpoint environment. The vulnerability has a CVSS v3.1 base score of 7.5, indicating high severity, with attack vector classified as adjacent network (AV:A), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), and impacts confidentiality, integrity, and availability (C:H/I:H/A:H). The SSRF can be exploited remotely by an unauthenticated attacker with network access to the Logpoint SOAR server, but the attack complexity is high, suggesting some conditions must be met for successful exploitation. No patches or exploits are currently publicly available, but the risk remains significant due to the potential for full system compromise. The vulnerability is categorized under CWE-918 (Server-Side Request Forgery).
Potential Impact
The impact of CVE-2024-48951 is substantial for organizations using vulnerable Logpoint SOAR versions. By leaking the API token, attackers can bypass authentication mechanisms, gaining unauthorized access to the SOAR platform. This can lead to unauthorized data access, manipulation of security orchestration workflows, and disruption of incident response processes. The compromise of confidentiality, integrity, and availability could result in exposure of sensitive security data, manipulation or disabling of security controls, and potential lateral movement within the network. Given Logpoint SOAR's role in security operations, exploitation could severely degrade an organization's ability to detect and respond to threats, increasing overall risk exposure. The absence of known exploits in the wild currently reduces immediate risk but does not diminish the urgency for mitigation.
Mitigation Recommendations
Organizations should immediately assess their use of Logpoint SOAR and verify the version in deployment. Since no official patches are currently available, temporary mitigations include restricting network access to the SOAR server to trusted sources only, implementing strict egress and ingress filtering to prevent SSRF exploitation, and monitoring network traffic for unusual outbound requests originating from the SOAR server. Additionally, review and tighten API token management policies, including rotation and scope limitation, to reduce potential damage if tokens are leaked. Once Logpoint releases a patch for version 7.5.0 or later, organizations must prioritize prompt application of the update. Security teams should also audit SOAR logs for suspicious activity indicative of SSRF attempts or token misuse. Employing web application firewalls (WAFs) with SSRF detection capabilities can provide an additional layer of defense.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-10-10T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6b7cb7ef31ef0b555e05
Added to database: 2/25/2026, 9:37:00 PM
Last enriched: 2/26/2026, 12:23:09 AM
Last updated: 2/26/2026, 7:07:15 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.