Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-5720: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Logsign Unified SecOps Platform

0
High
VulnerabilityCVE-2024-5720cvecve-2024-5720cwe-78
Published: Fri Nov 22 2024 (11/22/2024, 20:05:32 UTC)
Source: CVE Database V5
Vendor/Project: Logsign
Product: Unified SecOps Platform

Description

Logsign Unified SecOps Platform Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Logsign Unified SecOps Platform. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the implementation of the HTTP API. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-24168.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 00:44:25 UTC

Technical Analysis

CVE-2024-5720 is an OS command injection vulnerability identified in Logsign Unified SecOps Platform version 6.4.6. The flaw arises from improper neutralization of special elements in user-supplied input that is passed to system calls within the HTTP API implementation. This lack of input validation allows an attacker to inject arbitrary OS commands, which the system executes with root privileges. Although the vulnerability nominally requires authentication, the existing authentication mechanism can be bypassed, effectively allowing unauthenticated remote code execution. The vulnerability is classified under CWE-78 and was assigned a CVSS v3.0 score of 8.8, indicating high severity. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No patches or public exploits have been reported as of the publication date. The vulnerability was reserved in June 2024 and published in November 2024. This vulnerability could allow attackers to fully compromise affected systems, leading to data breaches, system manipulation, or disruption of security operations managed by the platform.

Potential Impact

The vulnerability enables remote attackers to execute arbitrary commands with root privileges on affected Logsign Unified SecOps Platform installations. This can lead to complete system compromise, including unauthorized access to sensitive security data, manipulation or deletion of logs, disruption of security monitoring, and potential lateral movement within the victim network. The ability to bypass authentication exacerbates the risk, making it easier for attackers to exploit the flaw remotely without valid credentials. Organizations relying on this platform for security operations risk losing visibility into their security posture, which could delay detection and response to other attacks. The high severity and root-level access mean attackers could deploy persistent backdoors, exfiltrate data, or disrupt critical infrastructure. The absence of known public exploits currently limits immediate widespread exploitation, but the potential impact remains significant if exploited.

Mitigation Recommendations

1. Immediately apply any available patches or updates from Logsign addressing this vulnerability once released. 2. If patches are not yet available, restrict access to the Logsign Unified SecOps Platform HTTP API to trusted networks only, using network segmentation and firewall rules. 3. Implement strict input validation and sanitization on all user inputs interacting with the platform, especially those that may be passed to system commands. 4. Employ multi-factor authentication and monitor authentication logs closely to detect potential bypass attempts. 5. Use application-layer firewalls or web application firewalls (WAFs) to detect and block suspicious command injection patterns targeting the HTTP API. 6. Regularly audit and monitor system and application logs for unusual activities indicative of exploitation attempts. 7. Limit the privileges of the service account running the platform where possible to reduce the impact of a successful exploit. 8. Conduct penetration testing and code reviews focused on input validation and authentication mechanisms to identify similar weaknesses. 9. Prepare incident response plans specifically for potential exploitation of this vulnerability to enable rapid containment and remediation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2024-06-06T23:09:25.043Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 699f6bf0b7ef31ef0b55cd0f

Added to database: 2/25/2026, 9:38:56 PM

Last enriched: 2/28/2026, 12:44:25 AM

Last updated: 4/11/2026, 8:49:26 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses