// For flags

CVE-2024-2056

Artica Proxy Loopback Services Remotely Accessible Unauthenticated

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

Services that are running and bound to the loopback interface on the Artica Proxy are accessible through the proxy service. In particular, the "tailon" service is running, running as the root user, is bound to the loopback interface, and is listening on TCP port 7050. Security issues associated with exposing this network service are documented at gvalkov's 'tailon' GitHub repo. Using the tailon service, the contents of any file on the Artica Proxy can be viewed.

Los servicios que se están ejecutando y vinculados a la interfaz de bucle invertido en Artica Proxy son accesibles a través del servicio de proxy. En particular, el servicio "tailon" se está ejecutando, ejecutándose como usuario root, está vinculado a la interfaz loopback y está escuchando en el puerto TCP 7050. Los problemas de seguridad asociados con la exposición de este servicio de red están documentados en el repositorio de GitHub "tailon" de gvalkov. Utilizando el servicio Tailon, se puede ver el contenido de cualquier archivo en Artica Proxy.

Services that are running and bound to the loopback interface on the Artica Proxy version 4.50 are accessible through the proxy service. In particular, the tailon service is running as the root user, is bound to the loopback interface, and is listening on TCP port 7050. Using the tailon service, the contents of any file on the Artica Proxy can be viewed.

*Credits: Jim Becher of KoreLogic, Inc., Jaggar Henry of KoreLogic, Inc.
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
Poc
Automatable
Yes
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2024-03-01 CVE Reserved
  • 2024-03-05 CVE Published
  • 2024-03-06 EPSS Updated
  • 2024-08-23 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-288: Authentication Bypass Using an Alternate Path or Channel
  • CWE-552: Files or Directories Accessible to External Parties
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Artica Tech
Search vendor "Artica Tech"
Artica Proxy
Search vendor "Artica Tech" for product "Artica Proxy"
4.50
Search vendor "Artica Tech" for product "Artica Proxy" and version "4.50"
en
Affected