Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-7564: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Logsign Unified SecOps Platform

0
Medium
VulnerabilityCVE-2024-7564cvecve-2024-7564cwe-22
Published: Tue Aug 06 2024 (08/06/2024, 15:47:49 UTC)
Source: CVE Database V5
Vendor/Project: Logsign
Product: Unified SecOps Platform

Description

CVE-2024-7564 is a medium-severity path traversal vulnerability in Logsign Unified SecOps Platform version 6. 4. 11. It allows authenticated remote attackers to read arbitrary files with root privileges via the get_response_json_result endpoint due to improper validation of user-supplied paths. Exploitation does not require user interaction but does require valid authentication. The vulnerability can lead to sensitive information disclosure but does not affect integrity or availability. No known public exploits exist yet. Organizations using this platform should prioritize patching or applying mitigations to prevent unauthorized file access. The risk is higher in environments where attackers can gain valid credentials. Countries with significant Logsign deployments and critical infrastructure using this platform are most at risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 03:43:03 UTC

Technical Analysis

CVE-2024-7564 is a directory traversal vulnerability classified under CWE-22 affecting Logsign Unified SecOps Platform version 6.4.11. The flaw exists in the get_response_json_result endpoint, where the application fails to properly validate and sanitize user-supplied path inputs before performing file operations. This improper limitation allows an authenticated attacker to traverse directories and access files outside the intended restricted directory, potentially disclosing sensitive information with root-level privileges. The vulnerability requires authentication but no user interaction, making it exploitable remotely by any user with valid credentials. The CVSS v3.0 base score is 4.3, reflecting low complexity and limited impact confined to confidentiality. No integrity or availability impacts are reported. The vulnerability was assigned and published by the Zero Day Initiative (ZDI) as ZDI-CAN-24680 on August 6, 2024. No patches or public exploits are currently available, but the risk of sensitive data leakage is significant in environments where attackers can authenticate. This vulnerability highlights the importance of strict input validation and access control in security platforms managing sensitive operational data.

Potential Impact

The primary impact of CVE-2024-7564 is unauthorized disclosure of sensitive information stored on systems running Logsign Unified SecOps Platform 6.4.11. Since the vulnerability allows reading files with root privileges, attackers could access configuration files, logs, credentials, or other critical data, potentially facilitating further attacks or espionage. The requirement for authentication limits exploitation to insiders or attackers who have compromised credentials, reducing the attack surface but not eliminating risk. Organizations relying on this platform for security operations could face confidentiality breaches, undermining trust and compliance with data protection regulations. Although integrity and availability are not directly affected, the exposure of sensitive data could lead to indirect impacts such as targeted attacks, data leaks, or reputational damage. The absence of known exploits currently reduces immediate risk, but the vulnerability remains a significant concern for environments with high-value data and privileged users.

Mitigation Recommendations

To mitigate CVE-2024-7564, organizations should first verify if they are running Logsign Unified SecOps Platform version 6.4.11 and restrict access to the get_response_json_result endpoint to trusted users only. Since no official patch is currently available, administrators should implement strict access controls and monitor authentication logs for suspicious activity. Employ network segmentation and firewall rules to limit platform access to essential personnel and systems. Additionally, conduct regular credential audits and enforce strong authentication mechanisms to reduce the risk of compromised accounts. Implement application-layer input validation proxies or web application firewalls (WAFs) that can detect and block path traversal attempts targeting this endpoint. Finally, maintain close communication with the vendor for timely patch releases and apply updates promptly once available. Conduct thorough security assessments and penetration testing to identify any exploitation attempts or related vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2024-08-06T15:47:33.796Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 699f6c1ab7ef31ef0b55fef3

Added to database: 2/25/2026, 9:39:38 PM

Last enriched: 2/26/2026, 3:43:03 AM

Last updated: 2/26/2026, 8:06:00 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats