Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-7603: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Logsign Unified SecOps Platform

0
High
VulnerabilityCVE-2024-7603cvecve-2024-7603cwe-22
Published: Wed Aug 21 2024 (08/21/2024, 16:06:13 UTC)
Source: CVE Database V5
Vendor/Project: Logsign
Product: Unified SecOps Platform

Description

Logsign Unified SecOps Platform Directory Traversal Arbitrary Directory Deletion Vulnerability. This vulnerability allows remote attackers to delete arbitrary directories on affected installations of Logsign Unified SecOps Platform. Authentication is required to exploit this vulnerability. The specific flaw exists within the HTTP API service, which listens on TCP port 443 by default. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to delete directories in the context of root. Was ZDI-CAN-25028.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 01:53:57 UTC

Technical Analysis

CVE-2024-7603 is a directory traversal vulnerability classified under CWE-22 affecting Logsign Unified SecOps Platform version 6.4.20. The vulnerability exists in the HTTP API service, which listens on TCP port 443 by default. The root cause is the insufficient validation of user-supplied path inputs before they are used in file system operations. An authenticated attacker can exploit this flaw to craft specially crafted requests that traverse directories and delete arbitrary directories on the underlying system. Because the service runs with root privileges, the attacker can delete critical system or application directories, potentially causing denial of service or loss of important data. The vulnerability requires authentication but no user interaction, making it easier to exploit once credentials are obtained. The CVSS v3.0 base score is 7.1 (high), reflecting network attack vector, low attack complexity, required privileges, no user interaction, and high impact on availability and integrity. No public exploits have been reported yet, but the vulnerability was assigned and published by the Zero Day Initiative (ZDI) as ZDI-CAN-25028. The affected product is primarily used in security operations centers, making the impact significant for organizations relying on this platform for security monitoring and incident response.

Potential Impact

The vulnerability allows attackers with valid credentials to delete arbitrary directories on the affected system with root privileges. This can lead to significant disruption of the Logsign Unified SecOps Platform, potentially causing denial of service by removing critical application files or system directories. The loss of data integrity and availability can impair security monitoring and incident response capabilities, increasing organizational risk. In environments where the platform is integrated with other security tools, this could cascade into broader operational impacts. Additionally, if attackers gain access to credentials through other means, they could leverage this vulnerability to escalate damage. The impact is particularly severe for organizations that depend heavily on this platform for real-time security operations, including enterprises, managed security service providers, and government agencies.

Mitigation Recommendations

Organizations should immediately verify if they are running Logsign Unified SecOps Platform version 6.4.20 and restrict access to the HTTP API service on port 443 to trusted administrators only. Implement strict network segmentation and multi-factor authentication to reduce the risk of credential compromise. Monitor logs for suspicious API requests that attempt directory traversal patterns. If a patch or update is released by Logsign, apply it promptly. Until a patch is available, consider deploying web application firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting the API. Conduct regular audits of user privileges to ensure only necessary users have access to the platform. Backup critical configuration and data regularly to enable recovery in case of directory deletion. Finally, educate administrators about the risks of credential theft and enforce strong password policies.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
zdi
Date Reserved
2024-08-08T00:16:56.033Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 699f6c1ab7ef31ef0b55ff71

Added to database: 2/25/2026, 9:39:38 PM

Last enriched: 2/28/2026, 1:53:57 AM

Last updated: 4/12/2026, 12:27:15 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses