Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-51954: CWE-284: Improper Access Control in Esri ArcGIS Server

0
High
VulnerabilityCVE-2024-51954cvecve-2024-51954cwe-284
Published: Mon Mar 03 2025 (03/03/2025, 19:53:21 UTC)
Source: CVE Database V5
Vendor/Project: Esri
Product: ArcGIS Server

Description

CVE-2024-51954 is a high-severity improper access control vulnerability affecting Esri ArcGIS Server versions 11. 3 and below on Windows and Linux. It allows a remote, low-privileged authenticated attacker to access secure services on standalone (unfederated) ArcGIS Server instances beyond their authorized scope, resulting in unauthorized data exposure. The vulnerability impacts confidentiality significantly, with limited integrity impact and no effect on availability. Exploitation requires authentication but no user interaction, and the attack surface includes network access to the server. There are currently no known exploits in the wild, and no official patches have been released yet. European organizations using ArcGIS Server for geospatial data services, especially in government, utilities, and critical infrastructure sectors, face increased risk due to potential unauthorized data access. Mitigation should focus on strict access control reviews, network segmentation, and monitoring of ArcGIS Server usage. Countries with high adoption of Esri products and strategic geospatial data use, such as Germany, France, the UK, and the Netherlands, are most likely to be affected.

AI-Powered Analysis

AILast updated: 02/06/2026, 06:44:41 UTC

Technical Analysis

CVE-2024-51954 is an improper access control vulnerability (CWE-284) identified in Esri ArcGIS Server versions 11.3 and earlier, affecting both Windows and Linux deployments. The flaw arises in standalone (unfederated) ArcGIS Server instances where, under specific conditions, a remote attacker with low-level authentication privileges can bypass intended authorization boundaries to access secure services that should be restricted. This represents a scope change vulnerability, allowing attackers to escalate their access rights beyond their assigned permissions. The vulnerability primarily compromises confidentiality by exposing protected geospatial services and data, while integrity is only minimally impacted since the attacker does not gain modification rights, and availability remains unaffected. The CVSS v3.1 score is 8.5 (high severity), reflecting the network attack vector, low attack complexity, required privileges (low), no user interaction, and scope change. No public exploits or patches are currently available, increasing the importance of proactive mitigation. ArcGIS Server is widely used in geospatial data management for government, utilities, transportation, and environmental monitoring, making this vulnerability particularly sensitive. The issue demands careful access control audits and network security enhancements to prevent unauthorized data exposure.

Potential Impact

For European organizations, the impact of CVE-2024-51954 is significant due to the sensitive nature of geospatial data managed by ArcGIS Server. Unauthorized access to secure services can lead to exposure of critical infrastructure layouts, government planning data, utility networks, and other confidential spatial information. This could facilitate further targeted attacks, espionage, or disruption of services reliant on this data. The confidentiality breach could undermine trust in public services and cause regulatory compliance issues under GDPR and other data protection laws. Although integrity and availability impacts are low or none, the unauthorized data disclosure alone can have severe operational and reputational consequences. Organizations in sectors such as public administration, defense, transportation, energy, and environmental agencies are particularly vulnerable. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time.

Mitigation Recommendations

1. Conduct immediate access control audits on all standalone ArcGIS Server instances to verify that service permissions are correctly configured and no unauthorized access paths exist. 2. Implement strict network segmentation and firewall rules to limit ArcGIS Server access only to trusted internal networks and authenticated users. 3. Monitor ArcGIS Server logs for unusual access patterns or attempts to access services outside assigned permissions. 4. Apply the principle of least privilege rigorously for all authenticated users interacting with ArcGIS Server. 5. Where possible, federate ArcGIS Server instances with ArcGIS Enterprise to leverage centralized security controls and reduce standalone exposure. 6. Stay alert for official patches or updates from Esri and apply them promptly once available. 7. Consider deploying Web Application Firewalls (WAFs) or Intrusion Detection Systems (IDS) with signatures tuned for ArcGIS Server traffic to detect anomalous requests. 8. Educate administrators and users about the risks of improper access control and enforce strong authentication mechanisms. 9. Review and update incident response plans to include scenarios involving unauthorized access to geospatial data.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Esri
Date Reserved
2024-11-04T16:54:39.392Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69858a71f9fa50a62fe12646

Added to database: 2/6/2026, 6:30:09 AM

Last enriched: 2/6/2026, 6:44:41 AM

Last updated: 2/6/2026, 7:38:55 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats