CVE-2024-12687
📋 TL;DR
This CVE describes a deserialization vulnerability in PlexTrac's Runbooks modules that allows attackers to inject malicious objects and write arbitrary files. Systems running PlexTrac versions from 1.61.3 up to (but not including) 2.8.1 are affected. The high CVSS score of 9.8 indicates this is a critical vulnerability requiring immediate attention.
💻 Affected Systems
- PlexTrac
📦 What is this software?
Plextrac by Plextrac
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise leading to remote code execution, data exfiltration, and persistent backdoor installation.
Likely Case
Arbitrary file writes enabling web shell deployment, privilege escalation, and lateral movement within the network.
If Mitigated
Limited impact if network segmentation and strict access controls prevent exploitation attempts.
🎯 Exploit Status
Deserialization vulnerabilities typically have low exploitation complexity once the attack vector is understood. Authentication requirements are not specified in the CVE description.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.8.1 or later
Vendor Advisory: https://docs.plextrac.com/plextrac-documentation/master/security-advisories#release-2.11.0
Restart Required: Yes
Instructions:
1. Backup your PlexTrac instance and data. 2. Upgrade to version 2.8.1 or later following PlexTrac's official upgrade documentation. 3. Restart the PlexTrac service. 4. Verify the upgrade was successful.
🔧 Temporary Workarounds
Network Isolation
allRestrict network access to PlexTrac to only trusted IP addresses and networks.
Disable Runbooks Module
allTemporarily disable the vulnerable Runbooks modules if not essential for operations.
🧯 If You Can't Patch
- Implement strict network segmentation and firewall rules to limit access to PlexTrac.
- Deploy web application firewalls (WAF) with rules specifically targeting deserialization attacks.
🔍 How to Verify
Check if Vulnerable:
Check PlexTrac version via web interface or configuration files. If version is between 1.61.3 and 2.8.0 (inclusive), the system is vulnerable.
Check Version:
Check PlexTrac web interface admin panel or configuration files for version information.
Verify Fix Applied:
Confirm PlexTrac version is 2.8.1 or higher after patching.
📡 Detection & Monitoring
Log Indicators:
- Unusual deserialization errors in application logs
- Suspicious file write operations in system logs
- Unexpected process execution from PlexTrac context
Network Indicators:
- Unusual outbound connections from PlexTrac server
- Suspicious HTTP requests to Runbooks endpoints
SIEM Query:
source="plextrac.logs" AND (error="deserialization" OR error="untrusted data")