CVE-2024-48248

Published Mar 4, 2025

Last updated 4 days ago

Overview

AI description

Generated using AI and has not been reviewed by Intruder. May contain errors.

CVE-2024-48248 is an absolute path traversal vulnerability found in NAKIVO Backup & Replication software versions before 11.0.0.88174. This vulnerability allows an unauthenticated attacker to read arbitrary files on the target host. The vulnerability is located in the `/c/router` endpoint, which can be exploited via `getImageByPath`. Successful exploitation of CVE-2024-48248 can lead to the exposure of sensitive information, including configuration files, backups, and credentials. This could potentially lead to data breaches or further security compromises. The vulnerability has been addressed in version 11.0.0.88174 of NAKIVO Backup & Replication.

Description
NAKIVO Backup & Replication before 11.0.0.88174 allows absolute path traversal for reading files via getImageByPath to /c/router (this may lead to remote code execution across the enterprise because PhysicalDiscovery has cleartext credentials).
Source
cve@mitre.org
NVD status
Awaiting Analysis

Risk scores

CVSS 3.1

Type
Secondary
Base score
8.6
Impact score
4
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Severity
HIGH

Known exploits

Data from CISA

Vulnerability name
NAKIVO Backup and Replication Absolute Path Traversal Vulnerability
Exploit added on
Mar 19, 2025
Exploit action due
Apr 9, 2025
Required action
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Weaknesses

cve@mitre.org
CWE-36

Social media

Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.

Hype score

1

  1. 💀 CISA just flagged this backup flaw as actively exploited! CVE-2024-48248 | Unauthenticated file read in NAKIVO Backup & Replication exposes sensitive data & credentials. 🔹 Exploit already public 🔹 Update before it’s too late https://t.co/ku4z7Ep1So

    @achi_tech

    21 Mar 2025

    24 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  2. CISA has added CVE-2024-48248, a high-severity absolute path traversal vulnerability in NAKIVO Backup & Replication (CVSS 8.6), to its KEV catalog due to active exploitation. https://t.co/lRFTw7rPHn

    @securityRSS

    21 Mar 2025

    25 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  3. CISAがNAKIVOバックアップの脆弱性を攻撃で活発に悪用されているとしてタグ付け(CVE-2024-48248) https://t.co/R7nOmMDBN6 #Security #セキュリティ #ニュース

    @SecureShield_

    21 Mar 2025

    33 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  4. #NAKIVO #Backup & Replication #vulnerability exploited by attackers (CVE-2024-48248) https://t.co/fJqOh4vR4L

    @ScyScan

    21 Mar 2025

    34 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  5. 🚨 Attention IT and cybersecurity professionals! A new high-severity vulnerability (CVE-2024-48248) has been identified in NAKIVO Backup & Replication software.

    @fynn_JourX

    21 Mar 2025

    18 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  6. 💀 CISA acaba de marcar esta vulnerabilidad en copias de seguridad como explotada activamente. CVE-2024-48248: Lectura de archivos sin autenticación en "NAKIVO Backup & Replication" expone datos sensibles y credenciales. 🔹 El exploit ya es público Más detalles:

    @Cyph3R_CyberSec

    20 Mar 2025

    32 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  7. CISA warned U.S. agencies to secure networks against CVE-2024-48248, a critical NAKIVO vulnerability. Attackers can exploit it to read files; NAKIVO issued a patch. Check logs for unauthorized access. #Security https://t.co/yCmCunhl3O

    @Strivehawk

    20 Mar 2025

    32 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  8. 🚨 Backup Security Risk! NAKIVO Backup & Replication is vulnerable to an absolute path traversal attack (CVE-2024-48248). Hackers can access system files & credentials. PoC exploit available! Patch now! Your guide to the darkweb: https://t.co/ZF7G3lwjoe https://t.co/YTkQb

    @godeepweb

    20 Mar 2025

    48 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  9. 💀 CISA just flagged this backup flaw as actively exploited! CVE-2024-48248 | Unauthenticated file read in NAKIVO Backup & Replication exposes sensitive data & credentials. 🔹 Exploit already public 🔹 Update before it’s too late Details: https://t.co/96n9uDIXFP

    @TheHackersNews

    20 Mar 2025

    10854 Impressions

    38 Retweets

    84 Likes

    12 Bookmarks

    2 Replies

    1 Quote

  10. 🛡️ We added Edimax, SAP, and NAKIVO vulnerabilities, CVE-2025-1316, CVE-2017-12637, & CVE-2024-48248 to our Known Exploited Vulnerabilities Catalog. Visit https://t.co/myxOwap1Tf & apply mitigations to protect your org from cyberattacks. #Cybersecurity #InfoSec https://t

    @CISACyber

    19 Mar 2025

    358 Impressions

    1 Retweet

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  11. Actively exploited CVE : CVE-2024-48248

    @transilienceai

    7 Mar 2025

    13 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  12. Actively exploited CVE : CVE-2024-48248

    @transilienceai

    5 Mar 2025

    16 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  13. CVE-2024-48248 NAKIVO Backup & Replication before 11.0.0.88174 allows absolute path traversal for reading files via getImageByPath to /c/router (this may lead to remote code executi… https://t.co/mpb5lBsNlS

    @CVEnew

    5 Mar 2025

    135 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  14. 🚨 CVE-2024-48248 🔴 HIGH (8.6) 🏢 NAKIVO - Backup & Replication Director 🏗️ 0 🔗 https://t.co/GnsnK1j3Se 🔗 https://t.co/kRb0NlNsBM #CyberCron #VulnAlert #InfoSec https://t.co/vDHjRJjfeC

    @cybercronai

    4 Mar 2025

    8 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  15. 🚨🔥 CVE-2024-48248: NAKIVO Expuesto! Hackers Pueden Leer Archivos Críticos https://t.co/rQPgX2vpRn

    @tpx_Security

    2 Mar 2025

    156 Impressions

    2 Retweets

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  16. CVE-2024-48248として識別された重大な脆弱性がNakivo Backup &… https://t.co/pCFQqIeCwD

    @yousukezan

    28 Feb 2025

    592 Impressions

    0 Retweets

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  17. Critical flaw in Nakivo Backup Tool (CVE-2024-48248)! Unauthenticated attackers can read sensitive files, risking full system compromise. Patched quietly in Nov 2024. Learn more: https://t.co/2MwGowG1sb

    @DCryptaris86649

    28 Feb 2025

    20 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  18. Data protection firm Nakivo has patched a critical vulnerability (CVE-2024-48248) that allowed hackers to access sensitive data. Major companies like Coca-Cola and Cisco could be affected.🔒 #Nakivo #DataBreach #USA link: https://t.co/o1UWJjpKXk https://t.co/1fwgC2yEcb

    @TweetThreatNews

    27 Feb 2025

    9 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  19. csirt_it: ‼ #NAKIVO: disponibile un #PoC per lo sfruttamento della CVE-2024-48248 relativa alla soluzione #BackupandReplication Rischio: 🟠 Tipologia: 🔸 Arbitrary File Read 🔗 https://t.co/BFZLHMB6WG ⚠ Importante mantenere aggiornati i sistemi https://t.co/p7eEzf8BeC

    @Vulcanux_

    27 Feb 2025

    41 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  20. The Best Security Is When We All Agree To Keep Everything Secret (Except The Secrets) - NAKIVO Backup & Replication (CVE-2024-48248) - watchTowr Labs https://t.co/VaFw9WiBIC https://t.co/xHgbEPF2Vb

    @secharvesterx

    26 Feb 2025

    100 Impressions

    0 Retweets

    1 Like

    1 Bookmark

    0 Replies

    0 Quotes

  21. Today, we’re diving into the abyss of NAKIVO’s Backup & Replication solution! Join the watchTowr Labs team on our discovery and exploitation journey into CVE-2024-48248. Enjoy! https://t.co/64cL1HfPG1

    @watchtowrcyber

    26 Feb 2025

    5607 Impressions

    32 Retweets

    84 Likes

    20 Bookmarks

    1 Reply

    1 Quote