Cyber Posture

CVE-2024-50704

Critical

Published: 04 March 2025

Published
04 March 2025
Modified
28 May 2025
KEV Added
Patch
CVSS Score 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0449 89.2th percentile
Risk Priority 23 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2024-50704 is an unauthenticated remote code execution vulnerability (CWE-94) affecting Uniguest Tripleplay versions prior to 24.2.1. It enables remote attackers to execute arbitrary code through a specially crafted HTTP POST request. The vulnerability carries a maximum CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H), indicating critical severity due to its network accessibility, lack of prerequisites, and comprehensive impact on confidentiality, integrity, and availability with scope expansion.

Any remote attacker with network access to the affected Uniguest Tripleplay instance can exploit this vulnerability without authentication or user interaction. Successful exploitation allows arbitrary code execution on the target system, potentially leading to full compromise, including data theft, persistence, lateral movement, or disruption of services hosted by the Tripleplay platform.

Uniguest has published mitigation guidance in its CVE bulletins at https://uniguest.com/cve-bulletins/ and a dedicated vulnerability summary PDF at https://uniguest.com/wp-content/uploads/2025/02/CVE-2024-50704-Vulnerability-Summary.pdf. Security practitioners should consult these advisories for patching instructions, with upgrading to Tripleplay version 24.2.1 or later serving as the primary remediation to address the issue.

Details

CWE(s)
CWE-94

Affected Products

uniguest
tripleplay
24.2 · ≤ 24.1.2

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Unauthenticated RCE in public-facing application via crafted HTTP request directly maps to T1190 Exploit Public-Facing Application for initial access.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References