Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-56083: n/a

0
High
VulnerabilityCVE-2024-56083cvecve-2024-56083
Published: Mon Dec 16 2024 (12/16/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Cognition Devin before 2024-12-12 provides write access to code by an attacker who discovers the https://vscode-randomly_generated_string.devinapps.com URL (aka the VSCode live share URL) for a specific "Use Devin's Machine" session. For example, this URL may be discovered if a customer posts a screenshot of a Devin session to social media, or publicly streams their Devin session.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 23:56:34 UTC

Technical Analysis

CVE-2024-56083 is a vulnerability affecting Cognition Devin software versions prior to 2024-12-12. The issue arises from the exposure of a VSCode Live Share URL, which is a randomly generated link used to enable remote collaboration on code within a "Use Devin's Machine" session. If an attacker discovers this URL, for example through publicly posted screenshots or live streams, they can gain unauthorized write access to the codebase within the session. This vulnerability is classified under CWE-125 (Out-of-bounds Read), indicating improper handling of memory or data boundaries that may facilitate unauthorized access. The CVSS v3.1 base score is 8.1, with vector AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N, meaning the attack can be performed remotely over the network without privileges but requires user interaction (accessing the URL). The vulnerability impacts confidentiality and integrity by allowing attackers to modify code, potentially injecting malicious code or altering functionality. Availability is not impacted. No patches or fixes are currently listed, and no known exploits have been reported in the wild as of the publication date. The vulnerability highlights the risk of inadvertent exposure of sensitive collaboration URLs and the need for secure session management and user awareness.

Potential Impact

The primary impact of CVE-2024-56083 is unauthorized code modification, which threatens the confidentiality and integrity of software projects using Cognition Devin. Attackers gaining write access can inject malicious code, backdoors, or alter application logic, potentially leading to downstream supply chain compromises or deployment of vulnerable or malicious software. Organizations relying on Cognition Devin for remote collaboration may face intellectual property theft, reputational damage, and increased risk of further exploitation if attackers leverage the compromised codebase. Although availability is not directly affected, the integrity breach can cause significant operational and security consequences. The ease of exploitation—requiring only discovery of the URL—amplifies the risk, especially if users inadvertently expose session links publicly. This vulnerability is particularly concerning for organizations with high-value codebases or those in regulated industries where code integrity is critical.

Mitigation Recommendations

To mitigate CVE-2024-56083, organizations should immediately educate users about the risks of sharing or publicly exposing VSCode Live Share URLs, especially screenshots or live streams of active Devin sessions. Implement strict policies prohibiting public disclosure of session information. Until a patch is available, consider disabling the "Use Devin's Machine" feature or restricting its use to trusted networks and users. Employ network-level controls such as IP whitelisting or VPN requirements to limit access to collaboration sessions. Monitor logs for unusual access patterns to live share URLs. Once a patch or update is released by Cognition Devin, apply it promptly. Additionally, consider integrating session expiration and multi-factor authentication for live share sessions to reduce the risk of unauthorized access. Regularly audit and review collaboration tools and their configurations to ensure secure usage.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-12-16T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bd2b7ef31ef0b55b373

Added to database: 2/25/2026, 9:38:26 PM

Last enriched: 2/27/2026, 11:56:34 PM

Last updated: 4/12/2026, 7:54:58 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses