Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-56086: n/a

0
High
VulnerabilityCVE-2024-56086cvecve-2024-56086
Published: Mon Dec 16 2024 (12/16/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Logpoint before 7.5.0. Authenticated users can inject payloads in Report Templates. These are executed when the backup process is initiated, leading to Remote Code Execution.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 23:57:23 UTC

Technical Analysis

CVE-2024-56086 is a vulnerability identified in Logpoint, a security information and event management (SIEM) platform, affecting versions prior to 7.5.0. The flaw arises from improper input validation in Report Templates, where authenticated users can inject malicious payloads. These payloads are executed during the backup process, which runs with elevated privileges, leading to remote code execution (RCE). The vulnerability is classified under CWE-77 (Improper Neutralization of Special Elements used in a Command), indicating command injection risks. Exploitation requires the attacker to have authenticated access with low privileges, but no user interaction is needed beyond that. The attack complexity is high because the attacker must craft a payload that successfully executes during backup. The CVSS v3.1 score of 7.1 reflects a high-severity risk with attack vector being adjacent network (AV:A), requiring low privileges (PR:L), no user interaction (UI:N), and impacting confidentiality, integrity, and availability (all high). No public exploits or active exploitation have been reported yet. The vulnerability allows attackers to execute arbitrary commands on the Logpoint server, potentially leading to full system compromise, data theft, or disruption of security monitoring functions. Since Logpoint is used in security operations centers worldwide, this vulnerability poses a significant risk if left unpatched.

Potential Impact

The impact of CVE-2024-56086 is substantial for organizations relying on Logpoint for security monitoring and incident response. Successful exploitation can lead to remote code execution on the Logpoint server, compromising the confidentiality, integrity, and availability of security logs and monitoring data. Attackers could manipulate or delete logs, hide malicious activities, or use the compromised system as a pivot point for further network intrusion. This undermines the organization's security posture and incident detection capabilities. Additionally, disruption or takeover of the SIEM platform can delay or prevent timely response to other security incidents. Organizations in critical infrastructure sectors, finance, government, and large enterprises that depend heavily on Logpoint are particularly vulnerable. The requirement for authenticated access limits exposure but insider threats or compromised credentials could enable exploitation. The absence of known exploits in the wild provides a window for remediation, but the high severity demands urgent attention.

Mitigation Recommendations

To mitigate CVE-2024-56086, organizations should immediately upgrade Logpoint to version 7.5.0 or later where the vulnerability is patched. If upgrading is not immediately feasible, restrict access to the Logpoint management interface to trusted administrators only, enforce strong authentication mechanisms including multi-factor authentication, and monitor for unusual activity related to report template modifications or backup processes. Implement strict role-based access controls to limit who can create or edit report templates. Audit and review existing report templates for suspicious or unauthorized changes. Network segmentation should isolate the Logpoint server to reduce exposure. Additionally, monitor logs for signs of command injection attempts or unexpected backup process behavior. Regularly update and patch SIEM and related infrastructure components to minimize attack surface. Finally, educate administrators about the risks of injecting untrusted input into report templates and enforce secure coding and configuration practices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-12-16T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bd2b7ef31ef0b55b37f

Added to database: 2/25/2026, 9:38:26 PM

Last enriched: 2/27/2026, 11:57:23 PM

Last updated: 4/12/2026, 5:08:32 PM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses