CVE-2024-25699

8.5 HIGH

📋 TL;DR

An improper authentication vulnerability in Esri Portal for ArcGIS and ArcGIS Enterprise allows authenticated low-privileged attackers to bypass authorization boundaries and gain unauthorized access. This affects users of Portal for ArcGIS 11.2 and below on Windows/Linux, and ArcGIS Enterprise 11.1 and below on Kubernetes. Successful exploitation could compromise confidentiality, integrity, and availability of the system.

💻 Affected Systems

Products:
  • Portal for ArcGIS
  • ArcGIS Enterprise
Versions: Portal for ArcGIS 11.2 and below, ArcGIS Enterprise 11.1 and below
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Kubernetes deployments of ArcGIS Enterprise 11.1 and below are also affected. Requires authenticated access to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote authenticated attacker gains administrative privileges, leading to complete system compromise, data theft, and service disruption.

🟠

Likely Case

Low-privileged user escalates privileges to access sensitive data or modify configurations beyond their authorized scope.

🟢

If Mitigated

Attack is prevented through proper network segmentation, least privilege access, and timely patching.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: HIGH

Exploitation requires specific circumstances and authenticated access, making it difficult to exploit according to the description.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Portal for ArcGIS 11.2 Update 1 or later, ArcGIS Enterprise 11.1 Update 1 or later

Vendor Advisory: https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-1/

Restart Required: Yes

Instructions:

1. Download the security update from Esri's official portal. 2. Apply the patch following Esri's deployment documentation. 3. Restart the affected services. 4. Verify the update was successful.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict access to the Home application to only trusted networks and users.

Least Privilege Enforcement

all

Review and minimize user privileges to reduce potential impact if exploited.

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure to authenticated users only.
  • Monitor authentication and authorization logs for unusual privilege escalation attempts.

🔍 How to Verify

Check if Vulnerable:

Check the installed version of Portal for ArcGIS or ArcGIS Enterprise against affected versions.

Check Version:

Check the version in the ArcGIS Administrator or via the web interface under Settings > About.

Verify Fix Applied:

Verify the version is updated to Portal for ArcGIS 11.2 Update 1 or later, or ArcGIS Enterprise 11.1 Update 1 or later.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication events
  • Privilege escalation attempts
  • Access to unauthorized resources

Network Indicators:

  • Unexpected requests to authentication endpoints
  • Traffic from low-privileged users accessing high-privilege resources

SIEM Query:

source="arcgis" AND (event_type="authentication" OR event_type="authorization") AND result="failure"

🔗 References

📤 Share & Export