CVE-2024-5718: CWE-306: Missing Authentication for Critical Function in Logsign Unified SecOps Platform
Logsign Unified SecOps Platform Missing Authentication Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Logsign Unified SecOps Platform. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the cluster HTTP API, which listens on TCP port 1924 by default when enabled. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-24166.
AI Analysis
Technical Summary
CVE-2024-5718 is a vulnerability identified in Logsign Unified SecOps Platform version 6.4.6, classified under CWE-306 (Missing Authentication for Critical Function). The vulnerability arises from the cluster HTTP API component, which listens on TCP port 1924 by default when enabled. This API lacks proper authentication mechanisms, allowing remote attackers to access critical functionality without credentials. By exploiting this flaw, an attacker can execute arbitrary code remotely with root privileges, effectively gaining full control over the affected system. The vulnerability does not require any prior authentication or user interaction, making it highly exploitable over the network. The CVSS v3.0 score of 8.1 indicates a high severity level, with network attack vector, high impact on confidentiality, integrity, and availability, and no privileges or user interaction needed. Although no public exploits have been reported yet, the nature of the vulnerability and the root-level code execution potential make it a significant threat. The vulnerability was reserved in June 2024 and published in November 2024, with the Zero Day Initiative (ZDI) assigning the identifier ZDI-CAN-24166. No patches have been linked yet, emphasizing the need for immediate mitigation steps. The vulnerability could be leveraged by attackers to compromise security operations infrastructure, potentially disrupting incident detection and response capabilities.
Potential Impact
The impact of CVE-2024-5718 is severe for organizations using Logsign Unified SecOps Platform, as it allows unauthenticated remote code execution with root privileges. This can lead to complete system compromise, including unauthorized access to sensitive security data, manipulation or deletion of logs, disruption of security monitoring, and potential lateral movement within the network. The compromise of a SecOps platform undermines an organization's ability to detect and respond to other security incidents, increasing overall risk exposure. Attackers could implant persistent backdoors, exfiltrate confidential information, or disable security controls. Given the root-level access, recovery may require full system rebuilds. The vulnerability’s exploitation could also damage organizational reputation and lead to regulatory compliance violations if security monitoring is impaired. The lack of authentication and network accessibility make this vulnerability particularly dangerous in environments where the cluster API is exposed or insufficiently segmented.
Mitigation Recommendations
Until an official patch is released, organizations should take immediate, specific actions to mitigate this vulnerability: 1) Disable the cluster HTTP API on TCP port 1924 if it is not strictly necessary for operations. 2) Restrict network access to the cluster API port using firewall rules or network segmentation, limiting access only to trusted internal hosts. 3) Implement strict access controls and monitoring on the network segment hosting the Logsign platform to detect any unauthorized connection attempts. 4) Employ host-based intrusion detection systems (HIDS) to monitor for suspicious activity or unexpected process execution on the Logsign server. 5) Regularly audit and review logs for signs of exploitation attempts. 6) Prepare incident response plans specifically for potential compromise of the SecOps platform. 7) Engage with Logsign support or vendor channels to obtain updates on patches or official remediation guidance. 8) Consider deploying network-level authentication proxies or VPNs to add an authentication layer around the cluster API if disabling it is not feasible. These targeted mitigations go beyond generic advice by focusing on isolating and controlling access to the vulnerable API and enhancing detection capabilities.
Affected Countries
United States, Germany, United Kingdom, Netherlands, Australia, Canada, France, Japan, South Korea, Singapore
CVE-2024-5718: CWE-306: Missing Authentication for Critical Function in Logsign Unified SecOps Platform
Description
Logsign Unified SecOps Platform Missing Authentication Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Logsign Unified SecOps Platform. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the cluster HTTP API, which listens on TCP port 1924 by default when enabled. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-24166.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-5718 is a vulnerability identified in Logsign Unified SecOps Platform version 6.4.6, classified under CWE-306 (Missing Authentication for Critical Function). The vulnerability arises from the cluster HTTP API component, which listens on TCP port 1924 by default when enabled. This API lacks proper authentication mechanisms, allowing remote attackers to access critical functionality without credentials. By exploiting this flaw, an attacker can execute arbitrary code remotely with root privileges, effectively gaining full control over the affected system. The vulnerability does not require any prior authentication or user interaction, making it highly exploitable over the network. The CVSS v3.0 score of 8.1 indicates a high severity level, with network attack vector, high impact on confidentiality, integrity, and availability, and no privileges or user interaction needed. Although no public exploits have been reported yet, the nature of the vulnerability and the root-level code execution potential make it a significant threat. The vulnerability was reserved in June 2024 and published in November 2024, with the Zero Day Initiative (ZDI) assigning the identifier ZDI-CAN-24166. No patches have been linked yet, emphasizing the need for immediate mitigation steps. The vulnerability could be leveraged by attackers to compromise security operations infrastructure, potentially disrupting incident detection and response capabilities.
Potential Impact
The impact of CVE-2024-5718 is severe for organizations using Logsign Unified SecOps Platform, as it allows unauthenticated remote code execution with root privileges. This can lead to complete system compromise, including unauthorized access to sensitive security data, manipulation or deletion of logs, disruption of security monitoring, and potential lateral movement within the network. The compromise of a SecOps platform undermines an organization's ability to detect and respond to other security incidents, increasing overall risk exposure. Attackers could implant persistent backdoors, exfiltrate confidential information, or disable security controls. Given the root-level access, recovery may require full system rebuilds. The vulnerability’s exploitation could also damage organizational reputation and lead to regulatory compliance violations if security monitoring is impaired. The lack of authentication and network accessibility make this vulnerability particularly dangerous in environments where the cluster API is exposed or insufficiently segmented.
Mitigation Recommendations
Until an official patch is released, organizations should take immediate, specific actions to mitigate this vulnerability: 1) Disable the cluster HTTP API on TCP port 1924 if it is not strictly necessary for operations. 2) Restrict network access to the cluster API port using firewall rules or network segmentation, limiting access only to trusted internal hosts. 3) Implement strict access controls and monitoring on the network segment hosting the Logsign platform to detect any unauthorized connection attempts. 4) Employ host-based intrusion detection systems (HIDS) to monitor for suspicious activity or unexpected process execution on the Logsign server. 5) Regularly audit and review logs for signs of exploitation attempts. 6) Prepare incident response plans specifically for potential compromise of the SecOps platform. 7) Engage with Logsign support or vendor channels to obtain updates on patches or official remediation guidance. 8) Consider deploying network-level authentication proxies or VPNs to add an authentication layer around the cluster API if disabling it is not feasible. These targeted mitigations go beyond generic advice by focusing on isolating and controlling access to the vulnerable API and enhancing detection capabilities.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- zdi
- Date Reserved
- 2024-06-06T23:09:12.804Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 699f6bf0b7ef31ef0b55cd07
Added to database: 2/25/2026, 9:38:56 PM
Last enriched: 2/28/2026, 12:43:59 AM
Last updated: 4/12/2026, 9:27:46 AM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.