CVE-2024-51954

8.5 HIGH

📋 TL;DR

An improper access control vulnerability in ArcGIS Server versions 11.3 and below allows authenticated attackers with low privileges to access secure services they shouldn't have permission to view. This affects standalone (unfederated) ArcGIS Server instances on Windows and Linux. Successful exploitation results in unauthorized access to protected services, constituting a scope change.

💻 Affected Systems

Products:
  • ArcGIS Server
Versions: 11.3 and below
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects standalone (unfederated) ArcGIS Server instances. Federated servers with ArcGIS Enterprise are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Low-privileged authenticated users gain access to all secure services on the standalone ArcGIS Server instance, potentially exposing sensitive geospatial data and configurations.

🟠

Likely Case

Authenticated users with some privileges escalate their access to view services outside their authorized scope, potentially accessing sensitive geospatial data they shouldn't see.

🟢

If Mitigated

With proper access controls and network segmentation, impact is limited to authorized users accessing only services within their permission boundaries.

🌐 Internet-Facing: HIGH - Internet-facing ArcGIS Server instances are directly accessible to attackers who can obtain low-privilege credentials.
🏢 Internal Only: MEDIUM - Internal-only instances still face risk from insider threats or compromised internal accounts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with any privilege level. The vulnerability allows privilege escalation within the authorization system.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply ArcGIS Server Security 2025 Update 1 Patch

Vendor Advisory: https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/

Restart Required: Yes

Instructions:

1. Download the ArcGIS Server Security 2025 Update 1 patch from Esri's support site
2. Stop all ArcGIS Server services
3. Apply the patch according to Esri's installation instructions
4. Restart ArcGIS Server services
5. Verify the patch was successfully applied

🔧 Temporary Workarounds

Implement Network Segmentation

all

Restrict access to ArcGIS Server to only trusted networks and users

Enforce Least Privilege Access

all

Review and minimize user permissions to reduce attack surface

🧯 If You Can't Patch

  • Migrate to federated ArcGIS Server with ArcGIS Enterprise configuration
  • Implement strict network access controls and monitor for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check ArcGIS Server version via Administrator Directory at https://<server>:6443/arcgis/admin or using the version REST endpoint

Check Version:

curl -k https://<server>:6443/arcgis/admin/status | grep version

Verify Fix Applied:

Verify patch installation by checking version information in ArcGIS Server Administrator Directory and confirming Security 2025 Update 1 is applied

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to secure services
  • Users accessing services outside their typical authorization patterns
  • Failed authorization attempts followed by successful access

Network Indicators:

  • Increased traffic to secure service endpoints from low-privilege user accounts
  • Unusual REST API calls to service endpoints

SIEM Query:

source="arcgis-server" AND (event_type="access" OR event_type="authorization") AND (user_privilege="low" OR user_role="user") AND service_category="secure"

🔗 References

📤 Share & Export