Skip to main content

CVE-2024-6364: Vulnerability in Absolute Security Absolute Persistence

Medium
VulnerabilityCVE-2024-6364cvecve-2024-6364
Published: Tue May 13 2025 (05/13/2025, 17:00:07 UTC)
Source: CVE
Vendor/Project: Absolute Security
Product: Absolute Persistence

Description

A vulnerability in Absolute Persistence® versions before 2.8 exists when it is not activated. This may allow a skilled attacker with both physical access to the device, and full hostile network control, to initiate OS commands on the device. To remediate this vulnerability, update the device firmware to the latest available version. Please contact the device manufacturer for upgrade instructions or contact Absolute Security, see reference below.

AI-Powered Analysis

AILast updated: 07/04/2025, 19:41:07 UTC

Technical Analysis

CVE-2024-6364 is a vulnerability identified in Absolute Security's Absolute Persistence product, specifically in versions prior to 2.8 when the product is not activated. Absolute Persistence is a firmware-based security and device management solution often embedded in endpoint devices for persistent security controls. The vulnerability allows a skilled attacker who has both physical access to the device and full hostile network control to execute operating system commands on the affected device. This implies that the attacker must be able to interact directly with the device hardware and simultaneously control the network environment to exploit the flaw. The vulnerability is classified under CWE-284, which relates to improper access control, indicating that the product fails to adequately restrict command execution under certain conditions. The CVSS 4.0 base score is 6.9 (medium severity), reflecting that exploitation requires high attack complexity and privileges but results in high confidentiality and integrity impacts. The vulnerability does not require user interaction but does require physical presence and network control, limiting remote exploitation. No known exploits are reported in the wild yet. The recommended remediation is to update the device firmware to the latest version (2.8 or later) where the vulnerability is fixed. Since Absolute Persistence is embedded firmware, updating may require coordination with device manufacturers or Absolute Security support. This vulnerability highlights risks in endpoint firmware security, especially in scenarios where devices may be physically accessible to attackers, such as in shared or public environments or during device transit.

Potential Impact

For European organizations, this vulnerability poses a significant risk primarily in environments where devices are physically accessible to potential attackers, such as corporate offices, public access points, or supply chains. Exploitation could lead to unauthorized OS command execution, potentially allowing attackers to manipulate system configurations, exfiltrate sensitive data, or disrupt device operations. The high impact on confidentiality and integrity could compromise sensitive corporate or personal data, leading to regulatory non-compliance under GDPR and other data protection laws. The requirement for physical access and hostile network control limits the threat to scenarios involving insider threats, targeted physical attacks, or sophisticated supply chain compromises. However, given the widespread use of Absolute Persistence in endpoint security solutions, organizations relying on this product must consider the risk of lateral movement or persistent footholds established by attackers exploiting this vulnerability. The lack of known exploits in the wild reduces immediate risk but does not eliminate the potential for future attacks, especially as firmware vulnerabilities tend to be attractive targets for advanced threat actors.

Mitigation Recommendations

1. Immediate firmware upgrade: Coordinate with device manufacturers or Absolute Security to obtain and deploy the latest firmware version (2.8 or later) that patches this vulnerability. 2. Physical security enhancements: Strengthen physical access controls to devices, including secure storage, restricted access areas, and tamper-evident seals to reduce the risk of unauthorized physical access. 3. Network segmentation: Isolate critical devices and enforce strict network segmentation to limit the ability of an attacker to gain hostile network control simultaneously with physical access. 4. Endpoint monitoring: Implement advanced endpoint detection and response (EDR) solutions capable of detecting unusual OS command execution or firmware tampering attempts. 5. Supply chain security: Verify device integrity upon receipt and consider secure boot or hardware attestation mechanisms to detect unauthorized firmware modifications. 6. Incident response readiness: Develop and test incident response plans that include scenarios involving firmware compromise and physical device attacks. 7. User awareness: Educate staff about the risks of physical device exposure and encourage reporting of suspicious activity or device tampering.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Absolute
Date Reserved
2024-06-26T22:42:45.308Z
Cisa Enriched
true
Cvss Version
4.0
State
PUBLISHED

Threat ID: 682d9815c4522896dcbd5f96

Added to database: 5/21/2025, 9:08:37 AM

Last enriched: 7/4/2025, 7:41:07 PM

Last updated: 8/14/2025, 10:55:44 AM

Views: 29

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats