Thursday, March 20, 2025
HomeCVE/vulnerabilityCISA Warns of NAKIVO Backup Flaw Exploited in Attacks with PoC Released

CISA Warns of NAKIVO Backup Flaw Exploited in Attacks with PoC Released

Published on

SIEM as a Service

Follow Us on Google News

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about a serious vulnerability in the NAKIVO Backup and Replication software, known as CVE-2024-48248.

This vulnerability allows attackers to exploit an absolute path traversal flaw, enabling them to read arbitrary files without authentication.

The vulnerability resides in the Director Web Interface of the NAKIVO Backup and Replication solution, specifically in the STPreLoadManagement action through the /c/router endpoint.

By manipulating the file path parameter, attackers can access any file on the system the software is running on. This includes critical system files and backup data, which could lead to unauthorized data exfiltration or other malicious activities.

Impact and Exploitation

Given the nature of the vulnerability, attackers can exploit it to read sensitive information such as system files, database credentials, and backup data.

The NAKIVO software often integrates with cloud environments, virtual infrastructure, and network devices, making the potential impact extensive.

The attackers could use this vulnerability to access AWS keys, SSH credentials, or other privileged information stored by NAKIVO for backup operations.

Proof of Concept (PoC) Demonstrated

A proof-of-concept (PoC) for this vulnerability has been demonstrated. It involves sending a crafted request to the /c/router endpoint with the following payload:

POST /c/router HTTP/1.1

Host: {{Hostname}}

Content-Type: application/json

Connection: keep-alive

Content-Length: 121

{

  "action": "STPreLoadManagement",

  "method": "getImageByPath",

  "data": ["C:/windows/win.ini"],

  "type": "rpc",

  "tid": 3980,

  "sid": ""

}

This request uses the getImageByPath method of the STPreLoadManagement action to read the C:/windows/win.ini file on a Windows system.

Similarly, attackers could use this method to read sensitive files like /etc/shadow on Linux systems.

Mitigation and Vendor Response

NAKIVO has quietly patched the vulnerability in version 11.0.0.88174 and later releases.

The fix prevents directory traversal by ensuring that file paths are sanitized using the FileUtils library, which constructs a safe file path by stripping parent directory references and path manipulation attempts.

In the patched version:

public byte[] getImageByPath(String path) throws IOException {

  String fileName = FilenameUtils.getName(path);

  File targetFile = FileUtils.getFile(new String[] { "userdata", "branding", fileName });

  if (!targetFile.exists() || !targetFile.canRead() || targetFile.isDirectory()) {

    throw new IOException(Lang.get("services.branding.no.file", new Object[0]));

  }

  return FileUtils.readFileToByteArray(targetFile);

}

CISA recommends that users apply vendor-provided patches immediately. If patches are not available, users should consider discontinuing use of the product until a fix is provided.

Additionally, following best practices for securing cloud services, as outlined in Binding Operational Directive (BOD) 22-01, can help mitigate potential risks associated with vulnerabilities like CVE-2024-48248.

The NAKIVO vulnerability highlights the increasing importance of securing backup solutions, particularly in environments where these systems often hold critical data.

As ransomware attacks continue to evolve, ensuring that backup mechanisms are robust and secure is crucial.

Users and organizations must remain vigilant and proactive in addressing vulnerabilities such as CVE-2024-48248 to protect against emerging threats.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

New Steganographic Malware Hides in JPEG Files to Spread Infostealers

A recent cybersecurity threat has been identified, where steganographic malware is being distributed through...

RansomHub Affiliate Deploys New Custom Backdoor “Betruger” for Persistent Access

Symantec's Threat Hunter team has identified a sophisticated custom backdoor named "Betruger" linked to...

New Arcane Stealer Spreads via YouTube, Stealing VPN and Browser Login Credentials

A new malware campaign has been uncovered, involving a sophisticated stealer known as Arcane,...

North Korean IT Workers Exploit GitHub to Launch Global Cyberattacks

A recent investigation by cybersecurity firm Nisos has uncovered a coordinated effort by North...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

New Steganographic Malware Hides in JPEG Files to Spread Infostealers

A recent cybersecurity threat has been identified, where steganographic malware is being distributed through...

RansomHub Affiliate Deploys New Custom Backdoor “Betruger” for Persistent Access

Symantec's Threat Hunter team has identified a sophisticated custom backdoor named "Betruger" linked to...

New Arcane Stealer Spreads via YouTube, Stealing VPN and Browser Login Credentials

A new malware campaign has been uncovered, involving a sophisticated stealer known as Arcane,...