CVE-2024-36814

4.9 MEDIUM

📋 TL;DR

This vulnerability allows authenticated attackers to read arbitrary files on the underlying operating system with root privileges. It affects Adguard Home installations before version 0.107.52. Attackers can exploit this by placing a specially crafted file in a readable directory.

💻 Affected Systems

Products:
  • Adguard Home
Versions: All versions before v0.107.52
Operating Systems: Linux, Windows, macOS, BSD
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the Adguard Home web interface. The vulnerability exists in the file filtering functionality.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via reading sensitive files like /etc/shadow, SSH keys, or configuration files containing credentials, potentially leading to privilege escalation or lateral movement.

🟠

Likely Case

Unauthorized access to sensitive configuration files, logs, or application data stored on the server, potentially exposing credentials or other confidential information.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent authenticated attackers from reaching vulnerable instances.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access and knowledge of file paths. Public proof-of-concept details are available in the referenced blog posts.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v0.107.52

Vendor Advisory: https://github.com/AdguardTeam/AdGuardHome/releases/tag/v0.107.52

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download v0.107.52 or later from GitHub releases. 3. Stop Adguard Home service. 4. Replace binary with new version. 5. Restart service.

🔧 Temporary Workarounds

Restrict Web Interface Access

linux

Limit access to Adguard Home web interface to trusted IP addresses only using firewall rules.

iptables -A INPUT -p tcp --dport 3000 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 3000 -j DROP

Use Strong Authentication

all

Ensure Adguard Home uses strong, unique passwords and consider enabling 2FA if supported.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Adguard Home instances from sensitive systems.
  • Monitor file access patterns and audit logs for unusual read operations from the Adguard Home process.

🔍 How to Verify

Check if Vulnerable:

Check Adguard Home version via web interface (Settings → About) or command: ./AdGuardHome --version

Check Version:

./AdGuardHome --version

Verify Fix Applied:

Confirm version is v0.107.52 or higher and test that file read attempts outside allowed directories are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in Adguard Home logs
  • Multiple failed authentication attempts followed by file read requests

Network Indicators:

  • HTTP requests to Adguard Home endpoints with file path traversal patterns

SIEM Query:

source="adguard.log" AND ("file read" OR "path traversal" OR "../")

🔗 References

📤 Share & Export