Cyber Security News

CISA Warns of NAKIVO Backup Flaw Exploited in Attacks with PoC Released

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about a serious vulnerability in the NAKIVO Backup and Replication software, known as CVE-2024-48248.

This vulnerability allows attackers to exploit an absolute path traversal flaw, enabling them to read arbitrary files without authentication.

The vulnerability resides in the Director Web Interface of the NAKIVO Backup and Replication solution, specifically in the STPreLoadManagement action through the /c/router endpoint.

By manipulating the file path parameter, attackers can access any file on the system the software is running on. This includes critical system files and backup data, which could lead to unauthorized data exfiltration or other malicious activities.

Impact and Exploitation

Given the nature of the vulnerability, attackers can exploit it to read sensitive information such as system files, database credentials, and backup data.

The NAKIVO software often integrates with cloud environments, virtual infrastructure, and network devices, making the potential impact extensive.

The attackers could use this vulnerability to access AWS keys, SSH credentials, or other privileged information stored by NAKIVO for backup operations.

Proof of Concept (PoC) Demonstrated

A proof-of-concept (PoC) for this vulnerability has been demonstrated. It involves sending a crafted request to the /c/router endpoint with the following payload:

POST /c/router HTTP/1.1

Host: {{Hostname}}

Content-Type: application/json

Connection: keep-alive

Content-Length: 121

{

  "action": "STPreLoadManagement",

  "method": "getImageByPath",

  "data": ["C:/windows/win.ini"],

  "type": "rpc",

  "tid": 3980,

  "sid": ""

}

This request uses the getImageByPath method of the STPreLoadManagement action to read the C:/windows/win.ini file on a Windows system.

Similarly, attackers could use this method to read sensitive files like /etc/shadow on Linux systems.

Mitigation and Vendor Response

NAKIVO has quietly patched the vulnerability in version 11.0.0.88174 and later releases.

The fix prevents directory traversal by ensuring that file paths are sanitized using the FileUtils library, which constructs a safe file path by stripping parent directory references and path manipulation attempts.

In the patched version:

public byte[] getImageByPath(String path) throws IOException {

  String fileName = FilenameUtils.getName(path);

  File targetFile = FileUtils.getFile(new String[] { "userdata", "branding", fileName });

  if (!targetFile.exists() || !targetFile.canRead() || targetFile.isDirectory()) {

    throw new IOException(Lang.get("services.branding.no.file", new Object[0]));

  }

  return FileUtils.readFileToByteArray(targetFile);

}

CISA recommends that users apply vendor-provided patches immediately. If patches are not available, users should consider discontinuing use of the product until a fix is provided.

Additionally, following best practices for securing cloud services, as outlined in Binding Operational Directive (BOD) 22-01, can help mitigate potential risks associated with vulnerabilities like CVE-2024-48248.

The NAKIVO vulnerability highlights the increasing importance of securing backup solutions, particularly in environments where these systems often hold critical data.

As ransomware attacks continue to evolve, ensuring that backup mechanisms are robust and secure is crucial.

Users and organizations must remain vigilant and proactive in addressing vulnerabilities such as CVE-2024-48248 to protect against emerging threats.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

Over 150 US Government Database Servers Vulnerable to Internet Exposure

A recent open-source investigation has uncovered one of the largest exposures of US government data…

12 minutes ago

Hackers Actively Exploit Apache Tomcat Servers via CVE-2025-24813 – Patch Now

A concerning development has emerged with the active exploitation of Apache Tomcat servers through the…

1 hour ago

UAT-5918 Hackers Exploit N-Day Vulnerabilities in Exposed Web and Application Servers

A recent cybersecurity threat, identified as UAT-5918, has been actively targeting entities in Taiwan, particularly…

1 hour ago

MEDUSA Ransomware Deploys Malicious ABYSSWORKER Driver to Disable EDR

In a recent analysis by Elastic Security Labs, a malicious driver known as ABYSSWORKER has…

1 hour ago

Veeam RCE Vulnerability Allows Domain Users to Hack Backup Servers

Researchers uncovered critical Remote Code Execution (RCE) vulnerabilities in the Veeam Backup & Replication solution.…

1 hour ago

VanHelsing Ransomware Targets Windows Systems with New Evasion Tactics and File Extension

The cybersecurity landscape has been recently disrupted by the emergence of the VanHelsing ransomware, a…

3 hours ago