CVE-2024-48248

Published Mar 4, 2025

Last updated 23 days ago

Overview

AI description

Generated using AI and has not been reviewed by Intruder. May contain errors.

CVE-2024-48248 is an absolute path traversal vulnerability found in NAKIVO Backup & Replication software versions before 11.0.0.88174. This vulnerability allows an unauthenticated attacker to read arbitrary files on the target host. The vulnerability is located in the `/c/router` endpoint, which can be exploited via `getImageByPath`. Successful exploitation of CVE-2024-48248 can lead to the exposure of sensitive information, including configuration files, backups, and credentials. This could potentially lead to data breaches or further security compromises. The vulnerability has been addressed in version 11.0.0.88174 of NAKIVO Backup & Replication.

Description
NAKIVO Backup & Replication before 11.0.0.88174 allows absolute path traversal for reading files via getImageByPath to /c/router (this may lead to remote code execution across the enterprise because PhysicalDiscovery has cleartext credentials).
Source
cve@mitre.org
NVD status
Analyzed

Risk scores

CVSS 3.1

Type
Primary
Base score
8.6
Impact score
4
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Severity
HIGH

Known exploits

Data from CISA

Vulnerability name
NAKIVO Backup and Replication Absolute Path Traversal Vulnerability
Exploit added on
Mar 19, 2025
Exploit action due
Apr 9, 2025
Required action
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Weaknesses

cve@mitre.org
CWE-36
nvd@nist.gov
NVD-CWE-Other

Social media

Hype score
Not currently trending
  1. CISA has warned U.S. federal agencies about active exploitation of a high-severity vulnerability (CVE-2024-48248) in NAKIVO’s Backup & Replication software. This path traversal flaw allows unauthenticated attackers to read arbitrary files. . #CISA #CyberSecurity #NAKIVO https

    @AvmConsulting

    1 Apr 2025

    56 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  2. 🚨 Critical Vulnerability Alert! 🚨 CISA has added CVE-2024-48248 to its Known Exploited Vulnerabilities list as of March 19, 2025. This critical path traversal flaw in Nakivo Backup & Replication allows unauthenticated attackers to access sensitive files, steal credentials,

    @CipherGuardians

    25 Mar 2025

    24 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  3. NAKIVO Backup & Replication vulnerability exploited by attackers (CVE-2024-48248) - Help Net Security https://t.co/snkVaBjoAm

    @PVynckier

    23 Mar 2025

    130 Impressions

    1 Retweet

    4 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  4. 💀 CISA just flagged this backup flaw as actively exploited! CVE-2024-48248 | Unauthenticated file read in NAKIVO Backup & Replication exposes sensitive data & credentials. 🔹 Exploit already public 🔹 Update before it’s too late https://t.co/ku4z7Ep1So

    @achi_tech

    21 Mar 2025

    24 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  5. CISA has added CVE-2024-48248, a high-severity absolute path traversal vulnerability in NAKIVO Backup & Replication (CVSS 8.6), to its KEV catalog due to active exploitation. https://t.co/lRFTw7rPHn

    @securityRSS

    21 Mar 2025

    25 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  6. CISAがNAKIVOバックアップの脆弱性を攻撃で活発に悪用されているとしてタグ付け(CVE-2024-48248) https://t.co/R7nOmMDBN6 #Security #セキュリティ #ニュース

    @SecureShield_

    21 Mar 2025

    33 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  7. #NAKIVO #Backup & Replication #vulnerability exploited by attackers (CVE-2024-48248) https://t.co/fJqOh4vR4L

    @ScyScan

    21 Mar 2025

    34 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  8. 🚨 Attention IT and cybersecurity professionals! A new high-severity vulnerability (CVE-2024-48248) has been identified in NAKIVO Backup & Replication software.

    @fynn_JourX

    21 Mar 2025

    18 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  9. 💀 CISA acaba de marcar esta vulnerabilidad en copias de seguridad como explotada activamente. CVE-2024-48248: Lectura de archivos sin autenticación en "NAKIVO Backup & Replication" expone datos sensibles y credenciales. 🔹 El exploit ya es público Más detalles:

    @Cyph3R_CyberSec

    20 Mar 2025

    32 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  10. CISA warned U.S. agencies to secure networks against CVE-2024-48248, a critical NAKIVO vulnerability. Attackers can exploit it to read files; NAKIVO issued a patch. Check logs for unauthorized access. #Security https://t.co/yCmCunhl3O

    @Strivehawk

    20 Mar 2025

    32 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  11. 🚨 Backup Security Risk! NAKIVO Backup & Replication is vulnerable to an absolute path traversal attack (CVE-2024-48248). Hackers can access system files & credentials. PoC exploit available! Patch now! Your guide to the darkweb: https://t.co/ZF7G3lwjoe https://t.co/YTkQb

    @godeepweb

    20 Mar 2025

    48 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  12. 💀 CISA just flagged this backup flaw as actively exploited! CVE-2024-48248 | Unauthenticated file read in NAKIVO Backup & Replication exposes sensitive data & credentials. 🔹 Exploit already public 🔹 Update before it’s too late Details: https://t.co/96n9uDIXFP

    @TheHackersNews

    20 Mar 2025

    10854 Impressions

    38 Retweets

    84 Likes

    12 Bookmarks

    2 Replies

    1 Quote

  13. 🛡️ We added Edimax, SAP, and NAKIVO vulnerabilities, CVE-2025-1316, CVE-2017-12637, & CVE-2024-48248 to our Known Exploited Vulnerabilities Catalog. Visit https://t.co/myxOwap1Tf & apply mitigations to protect your org from cyberattacks. #Cybersecurity #InfoSec https://t

    @CISACyber

    19 Mar 2025

    358 Impressions

    1 Retweet

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  14. Actively exploited CVE : CVE-2024-48248

    @transilienceai

    7 Mar 2025

    13 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  15. Actively exploited CVE : CVE-2024-48248

    @transilienceai

    5 Mar 2025

    16 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  16. CVE-2024-48248 NAKIVO Backup & Replication before 11.0.0.88174 allows absolute path traversal for reading files via getImageByPath to /c/router (this may lead to remote code executi… https://t.co/mpb5lBsNlS

    @CVEnew

    5 Mar 2025

    135 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  17. 🚨 CVE-2024-48248 🔴 HIGH (8.6) 🏢 NAKIVO - Backup & Replication Director 🏗️ 0 🔗 https://t.co/GnsnK1j3Se 🔗 https://t.co/kRb0NlNsBM #CyberCron #VulnAlert #InfoSec https://t.co/vDHjRJjfeC

    @cybercronai

    4 Mar 2025

    8 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  18. 🚨🔥 CVE-2024-48248: NAKIVO Expuesto! Hackers Pueden Leer Archivos Críticos https://t.co/rQPgX2vpRn

    @tpx_Security

    2 Mar 2025

    156 Impressions

    2 Retweets

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  19. CVE-2024-48248として識別された重大な脆弱性がNakivo Backup &… https://t.co/pCFQqIeCwD

    @yousukezan

    28 Feb 2025

    592 Impressions

    0 Retweets

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  20. Critical flaw in Nakivo Backup Tool (CVE-2024-48248)! Unauthenticated attackers can read sensitive files, risking full system compromise. Patched quietly in Nov 2024. Learn more: https://t.co/2MwGowG1sb

    @DCryptaris86649

    28 Feb 2025

    20 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  21. Data protection firm Nakivo has patched a critical vulnerability (CVE-2024-48248) that allowed hackers to access sensitive data. Major companies like Coca-Cola and Cisco could be affected.🔒 #Nakivo #DataBreach #USA link: https://t.co/o1UWJjpKXk https://t.co/1fwgC2yEcb

    @TweetThreatNews

    27 Feb 2025

    9 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  22. csirt_it: ‼ #NAKIVO: disponibile un #PoC per lo sfruttamento della CVE-2024-48248 relativa alla soluzione #BackupandReplication Rischio: 🟠 Tipologia: 🔸 Arbitrary File Read 🔗 https://t.co/BFZLHMB6WG ⚠ Importante mantenere aggiornati i sistemi https://t.co/p7eEzf8BeC

    @Vulcanux_

    27 Feb 2025

    41 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  23. The Best Security Is When We All Agree To Keep Everything Secret (Except The Secrets) - NAKIVO Backup & Replication (CVE-2024-48248) - watchTowr Labs https://t.co/VaFw9WiBIC https://t.co/xHgbEPF2Vb

    @secharvesterx

    26 Feb 2025

    100 Impressions

    0 Retweets

    1 Like

    1 Bookmark

    0 Replies

    0 Quotes

  24. Today, we’re diving into the abyss of NAKIVO’s Backup & Replication solution! Join the watchTowr Labs team on our discovery and exploitation journey into CVE-2024-48248. Enjoy! https://t.co/64cL1HfPG1

    @watchtowrcyber

    26 Feb 2025

    5607 Impressions

    32 Retweets

    84 Likes

    20 Bookmarks

    1 Reply

    1 Quote

Configurations