Sunday, April 6, 2025
HomeCVE/vulnerabilityTrueNAS CORE Vulnerability Let Attackers Execute Remote Code

TrueNAS CORE Vulnerability Let Attackers Execute Remote Code

Published on

SIEM as a Service

Follow Us on Google News

Security researchers Daan Keuper, Thijs Alkemade, and Khaled Nassar from Computest Sector 7 disclosed a critical vulnerability in TrueNAS CORE, a widely-used open-source storage operating system developed by iXsystems.

The vulnerability, CVE-2024-11944, allows network-adjacent attackers to execute arbitrary code on affected installations without requiring authentication.

This discovery was presented during the renowned cybersecurity competition Pwn2Own.

- Advertisement - Google News

2024 MITRE ATT&CK Evaluation Results for SMEs & MSPs -> Download Free Guide

Vulnerability Details

The flaw resides in the tarfile.extractall method used by TrueNAS CORE. Improper validation of user-supplied paths enables attackers to exploit this directory traversal vulnerability.

By crafting a malicious payload, an attacker can perform unintended file operations, potentially leading to remote code execution (RCE) with root privileges.

While the vulnerability has a high CVSS score of 7.5, signaling its critical impact, exploitation is complex due to its need for precise conditions.

Advanced attackers, leveraging other security gaps, may exploit this flaw to gain full control over the system, compromising confidentiality, integrity, and availability of the data stored on TrueNAS devices.

This vulnerability affects multiple versions of TrueNAS CORE, and iXsystems has confirmed its presence in the system’s default configuration. Since this flaw requires no prior authentication or user interaction, it poses a significant risk to unpatched systems in network-adjacent environments.

iXsystems has promptly released a patch to address the vulnerability. Users are strongly advised to update their systems to the latest version, TrueNAS CORE 13.0-U6.3, which resolves this issue.

Security researchers Daan Keuper, Thijs Alkemade, and Khaled Nassar from Computest Sector 7 discovered and disclosed the vulnerability, as per a report by Zero Day Initiative.

Their research emphasizes the importance of proactive security testing in identifying and mitigating critical vulnerabilities.

CVE-2024-11944 underlines the challenges of maintaining robust security in open-source software. Administrators using TrueNAS CORE are urged to apply the update immediately to prevent potential exploitation.

This incident also reminds us of the importance of frequent system updates and vigilant network security practices.

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Hack The box “Ghost” Challenge Cracked – A Detailed Technical Exploit

Cybersecurity researcher "0xdf" has cracked the "Ghost" challenge on Hack The Box (HTB), a...

Sec-Gemini v1 – Google’s New AI Model for Cybersecurity Threat Intelligence

Google has unveiled Sec-Gemini v1, an AI model designed to redefine cybersecurity operations by...

U.S. Secures Extradition of Rydox Cybercrime Marketplace Admins from Kosovo in Major International Operation

The United States has successfully extradited two Kosovo nationals, Ardit Kutleshi, 26, and Jetmir...

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hack The box “Ghost” Challenge Cracked – A Detailed Technical Exploit

Cybersecurity researcher "0xdf" has cracked the "Ghost" challenge on Hack The Box (HTB), a...

Sec-Gemini v1 – Google’s New AI Model for Cybersecurity Threat Intelligence

Google has unveiled Sec-Gemini v1, an AI model designed to redefine cybersecurity operations by...

U.S. Secures Extradition of Rydox Cybercrime Marketplace Admins from Kosovo in Major International Operation

The United States has successfully extradited two Kosovo nationals, Ardit Kutleshi, 26, and Jetmir...