Remote Code Execution Vulnerability in GFI Archiver Store Service
CVE-2024-11949

8.8HIGH

Key Information:

Vendor

Gfi

Status
Vendor
CVE Published:
12 December 2024

What is CVE-2024-11949?

CVE-2024-11949 is a vulnerability in the GFI Archiver Store Service, a vital component of GFI Archiver, which is used for email archiving and management within organizations. This vulnerability allows authenticated remote attackers to execute arbitrary code on compromised systems. The flaw resides in the Store Service, which operates by default on TCP port 8018 and suffers from inadequate validation of user-supplied data. If exploited, this vulnerability could lead to significant disruption and unauthorized control within an organization’s IT infrastructure.

Technical Details

The vulnerability occurs due to deserialization of untrusted data in the GFI Archiver Store Service. This service processes requests from clients but does not properly validate the incoming data, making it susceptible to remote code execution attacks. Authentication is required for an attacker to exploit this vulnerability, allowing them to send crafted requests that can lead to execution of malicious code with SYSTEM privileges on the affected system.

Potential Impact of CVE-2024-11949

  1. Remote Code Execution: This vulnerability enables an attacker to execute arbitrary code remotely. If successfully exploited, this can give the attacker fine-grained control over the system, potentially leading to further exploitation and data theft.

  2. Unauthorized Access: With the ability to execute code, attackers may gain unauthorized access to sensitive information processed by the GFI Archiver, which could be detrimental for organizations relying on this product for email management and compliance.

  3. System Compromise: The nature of the vulnerability could result in full system compromise, leading to service disruptions and potential lateral movement within the organization's network, increasing the risk of broader attacks or data breaches.

Affected Version(s)

Archiver 15.6

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

.