CVE-2024-53553
Published: 16 January 2025
Description
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Security Summary
CVE-2024-53553 is an authentication bypass vulnerability affecting OPEXUS FOIAXPRESS PUBLIC ACCESS LINK version 11.1.0. The flaw, classified under CWE-863 (Incorrect Authorization), allows attackers to circumvent authentication mechanisms through specially crafted web requests. It has been assigned a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N), indicating critical severity due to its network accessibility, low complexity, lack of required privileges or user interaction, and potential for high confidentiality and integrity impacts.
Remote attackers with network access to the affected system can exploit this vulnerability without authentication by sending crafted requests to the public access link component. Successful exploitation enables unauthorized access to restricted resources, potentially allowing attackers to view or modify sensitive information protected by the authentication controls.
Further technical details, including potential proof-of-concept exploits, are documented in the referenced GitHub repository at https://github.com/Turbul3nce/Vulnerability.Research/tree/main/CVE-2024-53553. An additional article on related exploitation techniques is available at https://infosecwriteups.com/exploiting-execute-after-redirect-ear-vulnerability-in-htb-previse-92ea3f1dbf3d. No specific patch or mitigation guidance is detailed in the provided information.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise Techniques
Why these techniques?
CVE-2024-53553 enables authentication bypass via crafted web requests on a public-facing application (OPEXUS FOIAXPRESS PUBLIC ACCESS LINK), directly facilitating T1190: Exploit Public-Facing Application.