Exposing Network Service through Loopback Interface: Security Risks
CVE-2024-2056
9.8CRITICAL
What is CVE-2024-2056?
The Artica Proxy exposes services running on the loopback interface, particularly the 'tailon' service, which runs with root privileges and listens on TCP port 7050. This configuration allows unauthorized access to sensitive data via the tailon service, enabling potential disclosure of file contents on the Artica Proxy. As such, administrators should take immediate steps to secure this service to prevent potential data breaches.
Affected Version(s)
Artica Proxy 4.50
References
EPSS Score
6% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Jim Becher of KoreLogic, Inc.
Jaggar Henry of KoreLogic, Inc.