Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-51954: CWE-284: Improper Access Control in Esri ArcGIS Server

0
High
VulnerabilityCVE-2024-51954cvecve-2024-51954cwe-284
Published: Mon Mar 03 2025 (03/03/2025, 19:53:21 UTC)
Source: CVE Database V5
Vendor/Project: Esri
Product: ArcGIS Server

Description

There is an improper access control issue in ArcGIS Server versions 11.3 and below on Windows and Linux which, under unique circumstances, could allow a remote, low‑privileged authenticated attacker to access secure services published to a standalone (unfederated) ArcGIS Server instance. Successful exploitation results in unauthorized access to protected services outside the attacker’s originally assigned authorization boundary, constituting a scope change. If exploited, this issue would have a high impact on confidentiality, a low impact on integrity, and no impact on the availability of the software.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/06/2026, 06:44:41 UTC

Technical Analysis

CVE-2024-51954 is an improper access control vulnerability (CWE-284) identified in Esri ArcGIS Server versions 11.3 and earlier, affecting both Windows and Linux deployments. The flaw arises in standalone (unfederated) ArcGIS Server instances where, under specific conditions, a remote attacker with low-level authentication privileges can bypass intended authorization boundaries to access secure services that should be restricted. This represents a scope change vulnerability, allowing attackers to escalate their access rights beyond their assigned permissions. The vulnerability primarily compromises confidentiality by exposing protected geospatial services and data, while integrity is only minimally impacted since the attacker does not gain modification rights, and availability remains unaffected. The CVSS v3.1 score is 8.5 (high severity), reflecting the network attack vector, low attack complexity, required privileges (low), no user interaction, and scope change. No public exploits or patches are currently available, increasing the importance of proactive mitigation. ArcGIS Server is widely used in geospatial data management for government, utilities, transportation, and environmental monitoring, making this vulnerability particularly sensitive. The issue demands careful access control audits and network security enhancements to prevent unauthorized data exposure.

Potential Impact

For European organizations, the impact of CVE-2024-51954 is significant due to the sensitive nature of geospatial data managed by ArcGIS Server. Unauthorized access to secure services can lead to exposure of critical infrastructure layouts, government planning data, utility networks, and other confidential spatial information. This could facilitate further targeted attacks, espionage, or disruption of services reliant on this data. The confidentiality breach could undermine trust in public services and cause regulatory compliance issues under GDPR and other data protection laws. Although integrity and availability impacts are low or none, the unauthorized data disclosure alone can have severe operational and reputational consequences. Organizations in sectors such as public administration, defense, transportation, energy, and environmental agencies are particularly vulnerable. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time.

Mitigation Recommendations

1. Conduct immediate access control audits on all standalone ArcGIS Server instances to verify that service permissions are correctly configured and no unauthorized access paths exist. 2. Implement strict network segmentation and firewall rules to limit ArcGIS Server access only to trusted internal networks and authenticated users. 3. Monitor ArcGIS Server logs for unusual access patterns or attempts to access services outside assigned permissions. 4. Apply the principle of least privilege rigorously for all authenticated users interacting with ArcGIS Server. 5. Where possible, federate ArcGIS Server instances with ArcGIS Enterprise to leverage centralized security controls and reduce standalone exposure. 6. Stay alert for official patches or updates from Esri and apply them promptly once available. 7. Consider deploying Web Application Firewalls (WAFs) or Intrusion Detection Systems (IDS) with signatures tuned for ArcGIS Server traffic to detect anomalous requests. 8. Educate administrators and users about the risks of improper access control and enforce strong authentication mechanisms. 9. Review and update incident response plans to include scenarios involving unauthorized access to geospatial data.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Esri
Date Reserved
2024-11-04T16:54:39.392Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69858a71f9fa50a62fe12646

Added to database: 2/6/2026, 6:30:09 AM

Last enriched: 2/6/2026, 6:44:41 AM

Last updated: 3/23/2026, 12:01:45 PM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses