Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-54662: n/a

0
Critical
VulnerabilityCVE-2024-54662cvecve-2024-54662
Published: Tue Dec 17 2024 (12/17/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Dante 1.4.0 through 1.4.3 (fixed in 1.4.4) has incorrect access control for some sockd.conf configurations involving socksmethod.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:21:58 UTC

Technical Analysis

CVE-2024-54662 is a critical security vulnerability identified in the Dante SOCKS proxy server software, specifically in versions 1.4.0 through 1.4.3. The root cause is incorrect access control enforcement related to the socksmethod configuration directive within the sockd.conf file. This misconfiguration can allow remote attackers to bypass intended access restrictions without authentication, effectively granting unauthorized access to the proxy service. The vulnerability is classified under CWE-863 (Incorrect Authorization), highlighting a failure to properly enforce access control policies. The CVSS v3.1 base score of 9.1 reflects the vulnerability's high impact: it can be exploited remotely over the network (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and affects confidentiality and integrity (C:H/I:H) but not availability (A:N). Although no public exploits have been reported yet, the flaw's nature and severity suggest that exploitation could lead to unauthorized data interception, manipulation, or use of the proxy for malicious purposes. The issue was addressed and fixed in Dante version 1.4.4, which corrects the access control logic to properly enforce restrictions based on socksmethod settings. Given Dante's role as a SOCKS proxy server, this vulnerability poses significant risks to organizations relying on it for secure network traffic routing and access control.

Potential Impact

The impact of CVE-2024-54662 is substantial for organizations using affected versions of Dante as a SOCKS proxy server. Successful exploitation allows unauthenticated remote attackers to bypass access controls, potentially gaining unauthorized access to internal network resources or sensitive data transmitted through the proxy. This can lead to confidentiality breaches, such as interception of sensitive communications, and integrity violations, including manipulation of data or proxy configurations. The vulnerability does not directly affect availability but can facilitate further attacks, such as lateral movement or data exfiltration. Organizations in sectors with stringent data privacy requirements or critical infrastructure relying on Dante proxies are at heightened risk. The ease of exploitation without authentication or user interaction increases the threat level, making it attractive for attackers. Although no known exploits are currently in the wild, the vulnerability's critical severity necessitates immediate attention to prevent potential compromise.

Mitigation Recommendations

To mitigate CVE-2024-54662, organizations should take the following specific actions: 1) Immediately upgrade Dante to version 1.4.4 or later, where the access control issue is resolved. 2) Review and audit sockd.conf configurations, especially the socksmethod directives, to ensure they enforce strict access controls aligned with organizational security policies. 3) Implement network-level restrictions such as firewall rules to limit access to the SOCKS proxy service only to trusted hosts and networks. 4) Monitor proxy logs for unusual or unauthorized connection attempts that could indicate exploitation attempts. 5) Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics tuned to detect anomalous SOCKS proxy activity. 6) Consider isolating the proxy server in a segmented network zone to reduce potential lateral movement if compromised. 7) Educate administrators on secure configuration best practices for Dante and regularly verify compliance. These targeted steps go beyond generic patching advice by emphasizing configuration review, network controls, and monitoring to reduce exposure and detect exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-12-04T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bc4b7ef31ef0b55acb8

Added to database: 2/25/2026, 9:38:12 PM

Last enriched: 2/28/2026, 3:21:58 AM

Last updated: 4/12/2026, 3:45:11 PM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses