Cyber Posture

CVE-2024-47552

Critical

Published: 20 March 2025

Published
20 March 2025
Modified
30 March 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0019 40.5th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.

Security Summary

CVE-2024-47552 is a Deserialization of Untrusted Data vulnerability (CWE-502) in Apache Seata (incubating), affecting versions from 2.0.0 before 2.2.0. This flaw arises in the handling of untrusted data during deserialization processes within the software, which is an open-source distributed transaction solution used for coordinating transactions across microservices.

The vulnerability is exploitable only in the optional Raft cluster mode, a non-default feature introduced in version 2.0.0, and requires an attacker to have prior unauthorized access to the internal network where Seata operates as middleware between Transaction Coordinator (TC) and Resource Manager/Transaction Manager (RM/TM) nodes. Although the CVSS v3.1 base score is 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating potential for remote exploitation without authentication leading to high impacts on confidentiality, integrity, and availability, real-world exploitation is highly improbable due to Seata's internal deployment model within trusted intranet environments.

Apache Seata advisories recommend upgrading to version 2.2.0, which resolves the issue, as detailed in the security announcement and corresponding GitHub commit. The Apache Seata security team rates the severity as "Low" owing to the strict isolation to Raft mode and the need for intranet access, with notifications posted to Apache mailing lists and oss-security.

No evidence of real-world exploitation has been reported for this vulnerability.

Details

CWE(s)
CWE-502

Affected Products

apache
seata
2.0.0 — 2.2.0

MITRE ATT&CK Enterprise Techniques

T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
Why these techniques?

Deserialization vulnerability enables exploitation of the internal remote Seata service for RCE (T1210) which facilitates arbitrary command execution via interpreters (T1059).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v19.0

References