Cyber Posture

CVE-2024-8262

Critical

Published: 03 March 2025

Published
03 March 2025
Modified
12 September 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0046 64.2th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2024-8262 is an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability, classified under CWE-22, in Proliz Software OBS. It affects versions of OBS prior to 24.0927. The vulnerability has a CVSS v3.1 base score of 9.8 (Critical), reflecting network accessibility (AV:N), low attack complexity (AC:L), no required privileges (PR:N), no user interaction (UI:N), and high impacts on confidentiality (C:H), integrity (I:H), and availability (A:H).

Remote attackers require no authentication or privileges to exploit this path traversal flaw over the network. Successful exploitation allows arbitrary file read, write, or execution on the targeted system by manipulating pathnames to escape restricted directories, potentially leading to full system compromise.

Mitigation details are available in the advisory published by the Turkish National Cyber Incident Response Center (USOM) at https://www.usom.gov.tr/bildirim/tr-25-0049. Users should upgrade to OBS version 24.0927 or later to address the issue.

Details

CWE(s)
CWE-22

Affected Products

prolizyazilim
student affairs information system
≤ 24.0927

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The path traversal vulnerability (CWE-22) in a publicly accessible application allows remote unauthenticated attackers to read, write, or execute arbitrary files, directly mapping to exploitation of public-facing applications for initial access and full system compromise.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References