CVE-2024-12687

9.8 CRITICAL

📋 TL;DR

This CVE describes a deserialization vulnerability in PlexTrac's Runbooks modules that allows attackers to inject malicious objects and write arbitrary files. Systems running PlexTrac versions from 1.61.3 up to (but not including) 2.8.1 are affected. The high CVSS score of 9.8 indicates this is a critical vulnerability requiring immediate attention.

💻 Affected Systems

Products:
  • PlexTrac
Versions: from 1.61.3 before 2.8.1
Operating Systems: All platforms running PlexTrac
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects the Runbooks modules within PlexTrac. All deployments within the version range are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise leading to remote code execution, data exfiltration, and persistent backdoor installation.

🟠

Likely Case

Arbitrary file writes enabling web shell deployment, privilege escalation, and lateral movement within the network.

🟢

If Mitigated

Limited impact if network segmentation and strict access controls prevent exploitation attempts.

🌐 Internet-Facing: HIGH - Web applications with deserialization vulnerabilities are prime targets for automated attacks.
🏢 Internal Only: HIGH - Even internal systems are at risk from compromised accounts or insider threats.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Deserialization vulnerabilities typically have low exploitation complexity once the attack vector is understood. Authentication requirements are not specified in the CVE description.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.8.1 or later

Vendor Advisory: https://docs.plextrac.com/plextrac-documentation/master/security-advisories#release-2.11.0

Restart Required: Yes

Instructions:

1. Backup your PlexTrac instance and data. 2. Upgrade to version 2.8.1 or later following PlexTrac's official upgrade documentation. 3. Restart the PlexTrac service. 4. Verify the upgrade was successful.

🔧 Temporary Workarounds

Network Isolation

all

Restrict network access to PlexTrac to only trusted IP addresses and networks.

Disable Runbooks Module

all

Temporarily disable the vulnerable Runbooks modules if not essential for operations.

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit access to PlexTrac.
  • Deploy web application firewalls (WAF) with rules specifically targeting deserialization attacks.

🔍 How to Verify

Check if Vulnerable:

Check PlexTrac version via web interface or configuration files. If version is between 1.61.3 and 2.8.0 (inclusive), the system is vulnerable.

Check Version:

Check PlexTrac web interface admin panel or configuration files for version information.

Verify Fix Applied:

Confirm PlexTrac version is 2.8.1 or higher after patching.

📡 Detection & Monitoring

Log Indicators:

  • Unusual deserialization errors in application logs
  • Suspicious file write operations in system logs
  • Unexpected process execution from PlexTrac context

Network Indicators:

  • Unusual outbound connections from PlexTrac server
  • Suspicious HTTP requests to Runbooks endpoints

SIEM Query:

source="plextrac.logs" AND (error="deserialization" OR error="untrusted data")

🔗 References

📤 Share & Export