AI description
CVE-2024-48248 is an absolute path traversal vulnerability found in NAKIVO Backup & Replication software versions before 11.0.0.88174. This vulnerability allows an unauthenticated attacker to read arbitrary files on the target host. The vulnerability is located in the `/c/router` endpoint, which can be exploited via `getImageByPath`. Successful exploitation of CVE-2024-48248 can lead to the exposure of sensitive information, including configuration files, backups, and credentials. This could potentially lead to data breaches or further security compromises. The vulnerability has been addressed in version 11.0.0.88174 of NAKIVO Backup & Replication.
- Description
- NAKIVO Backup & Replication before 11.0.0.88174 allows absolute path traversal for reading files via getImageByPath to /c/router (this may lead to remote code execution across the enterprise because PhysicalDiscovery has cleartext credentials).
- Source
- cve@mitre.org
- NVD status
- Awaiting Analysis
CVSS 3.1
- Type
- Secondary
- Base score
- 8.6
- Impact score
- 4
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
- Severity
- HIGH
Data from CISA
- Vulnerability name
- NAKIVO Backup and Replication Absolute Path Traversal Vulnerability
- Exploit added on
- Mar 19, 2025
- Exploit action due
- Apr 9, 2025
- Required action
- Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- cve@mitre.org
- CWE-36
Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.
- Hype score
1
💀 CISA just flagged this backup flaw as actively exploited! CVE-2024-48248 | Unauthenticated file read in NAKIVO Backup & Replication exposes sensitive data & credentials. 🔹 Exploit already public 🔹 Update before it’s too late https://t.co/ku4z7Ep1So
@achi_tech
21 Mar 2025
24 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA has added CVE-2024-48248, a high-severity absolute path traversal vulnerability in NAKIVO Backup & Replication (CVSS 8.6), to its KEV catalog due to active exploitation. https://t.co/lRFTw7rPHn
@securityRSS
21 Mar 2025
25 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISAがNAKIVOバックアップの脆弱性を攻撃で活発に悪用されているとしてタグ付け(CVE-2024-48248) https://t.co/R7nOmMDBN6 #Security #セキュリティ #ニュース
@SecureShield_
21 Mar 2025
33 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
#NAKIVO #Backup & Replication #vulnerability exploited by attackers (CVE-2024-48248) https://t.co/fJqOh4vR4L
@ScyScan
21 Mar 2025
34 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Attention IT and cybersecurity professionals! A new high-severity vulnerability (CVE-2024-48248) has been identified in NAKIVO Backup & Replication software.
@fynn_JourX
21 Mar 2025
18 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
💀 CISA acaba de marcar esta vulnerabilidad en copias de seguridad como explotada activamente. CVE-2024-48248: Lectura de archivos sin autenticación en "NAKIVO Backup & Replication" expone datos sensibles y credenciales. 🔹 El exploit ya es público Más detalles:
@Cyph3R_CyberSec
20 Mar 2025
32 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
CISA warned U.S. agencies to secure networks against CVE-2024-48248, a critical NAKIVO vulnerability. Attackers can exploit it to read files; NAKIVO issued a patch. Check logs for unauthorized access. #Security https://t.co/yCmCunhl3O
@Strivehawk
20 Mar 2025
32 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Backup Security Risk! NAKIVO Backup & Replication is vulnerable to an absolute path traversal attack (CVE-2024-48248). Hackers can access system files & credentials. PoC exploit available! Patch now! Your guide to the darkweb: https://t.co/ZF7G3lwjoe https://t.co/YTkQb
@godeepweb
20 Mar 2025
48 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
💀 CISA just flagged this backup flaw as actively exploited! CVE-2024-48248 | Unauthenticated file read in NAKIVO Backup & Replication exposes sensitive data & credentials. 🔹 Exploit already public 🔹 Update before it’s too late Details: https://t.co/96n9uDIXFP
@TheHackersNews
20 Mar 2025
10854 Impressions
38 Retweets
84 Likes
12 Bookmarks
2 Replies
1 Quote
🛡️ We added Edimax, SAP, and NAKIVO vulnerabilities, CVE-2025-1316, CVE-2017-12637, & CVE-2024-48248 to our Known Exploited Vulnerabilities Catalog. Visit https://t.co/myxOwap1Tf & apply mitigations to protect your org from cyberattacks. #Cybersecurity #InfoSec https://t
@CISACyber
19 Mar 2025
358 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2024-48248
@transilienceai
7 Mar 2025
13 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2024-48248
@transilienceai
5 Mar 2025
16 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
CVE-2024-48248 NAKIVO Backup & Replication before 11.0.0.88174 allows absolute path traversal for reading files via getImageByPath to /c/router (this may lead to remote code executi… https://t.co/mpb5lBsNlS
@CVEnew
5 Mar 2025
135 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2024-48248 🔴 HIGH (8.6) 🏢 NAKIVO - Backup & Replication Director 🏗️ 0 🔗 https://t.co/GnsnK1j3Se 🔗 https://t.co/kRb0NlNsBM #CyberCron #VulnAlert #InfoSec https://t.co/vDHjRJjfeC
@cybercronai
4 Mar 2025
8 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚨🔥 CVE-2024-48248: NAKIVO Expuesto! Hackers Pueden Leer Archivos Críticos https://t.co/rQPgX2vpRn
@tpx_Security
2 Mar 2025
156 Impressions
2 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-48248として識別された重大な脆弱性がNakivo Backup &… https://t.co/pCFQqIeCwD
@yousukezan
28 Feb 2025
592 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
Critical flaw in Nakivo Backup Tool (CVE-2024-48248)! Unauthenticated attackers can read sensitive files, risking full system compromise. Patched quietly in Nov 2024. Learn more: https://t.co/2MwGowG1sb
@DCryptaris86649
28 Feb 2025
20 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Data protection firm Nakivo has patched a critical vulnerability (CVE-2024-48248) that allowed hackers to access sensitive data. Major companies like Coca-Cola and Cisco could be affected.🔒 #Nakivo #DataBreach #USA link: https://t.co/o1UWJjpKXk https://t.co/1fwgC2yEcb
@TweetThreatNews
27 Feb 2025
9 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
csirt_it: ‼ #NAKIVO: disponibile un #PoC per lo sfruttamento della CVE-2024-48248 relativa alla soluzione #BackupandReplication Rischio: 🟠 Tipologia: 🔸 Arbitrary File Read 🔗 https://t.co/BFZLHMB6WG ⚠ Importante mantenere aggiornati i sistemi https://t.co/p7eEzf8BeC
@Vulcanux_
27 Feb 2025
41 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
The Best Security Is When We All Agree To Keep Everything Secret (Except The Secrets) - NAKIVO Backup & Replication (CVE-2024-48248) - watchTowr Labs https://t.co/VaFw9WiBIC https://t.co/xHgbEPF2Vb
@secharvesterx
26 Feb 2025
100 Impressions
0 Retweets
1 Like
1 Bookmark
0 Replies
0 Quotes
Today, we’re diving into the abyss of NAKIVO’s Backup & Replication solution! Join the watchTowr Labs team on our discovery and exploitation journey into CVE-2024-48248. Enjoy! https://t.co/64cL1HfPG1
@watchtowrcyber
26 Feb 2025
5607 Impressions
32 Retweets
84 Likes
20 Bookmarks
1 Reply
1 Quote