Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-55956: n/a

0
Critical
VulnerabilityCVE-2024-55956cvecve-2024-55956
Published: Fri Dec 13 2024 (12/13/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

In Cleo Harmony before 5.8.0.24, VLTrader before 5.8.0.24, and LexiCom before 5.8.0.24, an unauthenticated user can import and execute arbitrary Bash or PowerShell commands on the host system by leveraging the default settings of the Autorun directory.

AI-Powered Analysis

AILast updated: 10/21/2025, 19:15:43 UTC

Technical Analysis

CVE-2024-55956 is a critical vulnerability identified in Cleo Harmony, VLTrader, and LexiCom managed file transfer (MFT) products prior to version 5.8.0.24. The flaw arises from insecure default configurations of the Autorun directory feature, which allows an unauthenticated attacker to import and execute arbitrary commands on the host system. Specifically, the vulnerability enables execution of arbitrary Bash commands on Unix-like systems or PowerShell commands on Windows hosts. This is a classic command injection vulnerability (CWE-77) that does not require any authentication or user interaction, making it highly exploitable remotely over the network. The vulnerability impacts confidentiality, integrity, and availability by allowing full system compromise, including data theft, system manipulation, or denial of service. The CVSS v3.1 score of 9.8 reflects the ease of exploitation (network vector, no privileges required, no user interaction) and the critical impact on all security properties. Although no public exploits have been reported yet, the severity and nature of the flaw make it a prime target for attackers once weaponized. The lack of available patches at the time of disclosure necessitates immediate risk mitigation by disabling Autorun features or restricting access until updates are applied.

Potential Impact

For European organizations, this vulnerability poses a significant threat due to the widespread use of Cleo Harmony and related products in secure file transfer and business process automation. Successful exploitation can lead to full system compromise, allowing attackers to steal sensitive data, disrupt operations, or pivot within networks. Critical sectors such as finance, healthcare, manufacturing, and government agencies that rely on these MFT solutions are particularly vulnerable. The ability to execute arbitrary commands without authentication increases the risk of ransomware deployment, espionage, or sabotage. Additionally, the vulnerability could be leveraged to breach compliance requirements under GDPR by exposing personal or confidential data. The potential for widespread impact is high given the network-exploitable nature and the critical role these products play in data exchange.

Mitigation Recommendations

Organizations should immediately verify if they are running affected versions of Cleo Harmony, VLTrader, or LexiCom prior to 5.8.0.24. Until patches are available, it is critical to disable or restrict the Autorun directory feature to prevent automatic execution of imported scripts. Network segmentation and firewall rules should be applied to limit access to the management interfaces of these products to trusted administrators only. Monitoring and logging should be enhanced to detect suspicious command execution or unauthorized file imports. Employ application whitelisting and endpoint protection to block unauthorized script execution. Organizations should also prepare to deploy patches as soon as they are released by the vendor and conduct thorough incident response readiness exercises. Regular backups and recovery plans should be validated to mitigate potential ransomware or destructive attacks stemming from this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-12-13T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9b6247d717aace26c4d

Added to database: 10/21/2025, 7:06:30 PM

Last enriched: 10/21/2025, 7:15:43 PM

Last updated: 10/30/2025, 9:05:22 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats