Exposing Network Service through Loopback Interface: Security Risks
CVE-2024-2056

9.8CRITICAL

Key Information:

Vendor
CVE Published:
5 March 2024

What is CVE-2024-2056?

The Artica Proxy exposes services running on the loopback interface, particularly the 'tailon' service, which runs with root privileges and listens on TCP port 7050. This configuration allows unauthorized access to sensitive data via the tailon service, enabling potential disclosure of file contents on the Artica Proxy. As such, administrators should take immediate steps to secure this service to prevent potential data breaches.

Affected Version(s)

Artica Proxy 4.50

References

EPSS Score

6% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Jim Becher of KoreLogic, Inc.
Jaggar Henry of KoreLogic, Inc.
.
CVE-2024-2056 : Exposing Network Service through Loopback Interface: Security Risks