Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-7601: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Logsign Unified SecOps Platform

0
High
VulnerabilityCVE-2024-7601cvecve-2024-7601cwe-22
Published: Wed Aug 21 2024 (08/21/2024, 16:06:06 UTC)
Source: CVE Database V5
Vendor/Project: Logsign
Product: Unified SecOps Platform

Description

Logsign Unified SecOps Platform Directory data_export_delete_all Traversal Arbitrary File Deletion Vulnerability. This vulnerability allows remote attackers to delete arbitrary files on affected installations of Logsign Unified SecOps Platform. Authentication is required to exploit this vulnerability. The specific flaw exists within the HTTP API service, which listens on TCP port 443 by default. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to delete files in the context of root. Was ZDI-CAN-25026.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 01:53:28 UTC

Technical Analysis

CVE-2024-7601 is a path traversal vulnerability identified in the Logsign Unified SecOps Platform, specifically affecting version 6.4.20. The flaw resides in the HTTP API service, which operates over HTTPS on TCP port 443. The vulnerability arises from insufficient validation of user-supplied file paths in the 'data_export_delete_all' functionality, allowing an authenticated attacker to traverse directories and delete arbitrary files on the host system. Because the deletion occurs with root-level privileges, the attacker can remove critical system or application files, potentially leading to denial of service or compromising system integrity. The vulnerability requires authentication but does not require additional user interaction, making it easier to exploit once credentials are obtained. The CVSS v3.0 score of 7.1 reflects a high severity due to the network attack vector, low attack complexity, and significant impact on availability and integrity. No public exploits have been reported yet, but the vulnerability was reserved and published recently, indicating it is a fresh threat. The root cause is categorized under CWE-22, which involves improper limitation of pathname to a restricted directory, a common issue in file handling operations. The lack of patch links suggests that a fix may not yet be publicly available, emphasizing the need for immediate mitigation steps.

Potential Impact

The primary impact of this vulnerability is the potential for an attacker with valid credentials to delete arbitrary files on the affected system with root privileges. This can lead to severe consequences including denial of service due to deletion of critical system or application files, loss of important logs or configuration data, and disruption of security monitoring capabilities provided by the Logsign platform. Organizations relying on this platform for security operations could face operational downtime, increased risk of undetected security incidents, and potential data loss. The ability to delete files remotely over the network without user interaction increases the risk of automated or scripted attacks once credentials are compromised. This vulnerability could also be leveraged as part of a broader attack chain to weaken the security posture of targeted organizations.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first verify if they are running Logsign Unified SecOps Platform version 6.4.20 and restrict access to the HTTP API service to trusted networks and users only. Implement strict access controls and monitor authentication logs for suspicious activity to detect unauthorized access attempts. Employ network segmentation and firewall rules to limit exposure of the management interface on port 443. Until an official patch is released, consider disabling or restricting the 'data_export_delete_all' API endpoint if possible. Conduct regular backups of critical files and configurations to enable recovery in case of file deletion. Additionally, enforce strong authentication mechanisms such as multi-factor authentication to reduce the risk of credential compromise. Monitor vendor advisories closely for patches or updates addressing this vulnerability and apply them promptly once available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2024-08-08T00:16:45.531Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 699f6c1ab7ef31ef0b55ff69

Added to database: 2/25/2026, 9:39:38 PM

Last enriched: 2/28/2026, 1:53:28 AM

Last updated: 4/12/2026, 5:11:56 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses