CVE-2024-10094

9.1 CRITICAL

📋 TL;DR

CVE-2024-10094 is a code injection vulnerability in Pega Platform that allows attackers to execute arbitrary code on affected systems. This affects all Pega Platform deployments from version 6.x through Infinity 24.1.1. The vulnerability stems from improper input validation that enables code generation from untrusted sources.

💻 Affected Systems

Products:
  • Pega Platform
Versions: 6.x through Infinity 24.1.1
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments within the version range are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing remote code execution, data exfiltration, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Unauthorized code execution leading to data theft, application manipulation, and potential privilege escalation within the Pega environment.

🟢

If Mitigated

Limited impact with proper input validation, network segmentation, and least privilege controls in place.

🌐 Internet-Facing: HIGH - Internet-facing Pega applications are directly exploitable without authentication.
🏢 Internal Only: HIGH - Internal systems remain vulnerable to authenticated users or compromised internal accounts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows unauthenticated exploitation with relatively simple payloads based on the CWE-94 pattern.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Infinity 24.1.2 and later

Vendor Advisory: https://support.pega.com/support-doc/pega-security-advisory-d24-vulnerability-remediation-note

Restart Required: Yes

Instructions:

1. Download Pega Platform Infinity 24.1.2 or later from official Pega sources. 2. Backup current deployment. 3. Apply the update following Pega's upgrade documentation. 4. Restart all Pega services. 5. Verify functionality post-upgrade.

🔧 Temporary Workarounds

Input Validation Enhancement

all

Implement strict input validation for all user-controlled parameters that could trigger code generation.

Network Access Restriction

linux

Restrict network access to Pega Platform instances using firewall rules.

# Example: Restrict to specific IP ranges
# iptables -A INPUT -p tcp --dport 8080 -s 10.0.0.0/8 -j ACCEPT
# iptables -A INPUT -p tcp --dport 8080 -j DROP

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block code injection patterns
  • Disable or restrict access to vulnerable Pega applications until patching is possible

🔍 How to Verify

Check if Vulnerable:

Check Pega Platform version via administrative console or by examining deployment files. Versions 6.x through Infinity 24.1.1 are vulnerable.

Check Version:

Check the PegaRULES log files or use the Pega Platform administrative interface to view version information.

Verify Fix Applied:

Confirm version is Infinity 24.1.2 or later and test that code injection attempts are properly blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual code generation patterns in Pega logs
  • Suspicious input containing executable code patterns
  • Unexpected system command execution

Network Indicators:

  • HTTP requests containing code injection payloads to Pega endpoints
  • Unusual outbound connections from Pega servers

SIEM Query:

source="pega_logs" AND ("code injection" OR "execution" OR "generation") AND status="error"

🔗 References

📤 Share & Export