CVE-2024-6445

7.5 HIGH

📋 TL;DR

This path traversal vulnerability in DataFlowX Technology's DataDiodeX allows attackers to access files outside the intended directory by manipulating file paths. It affects DataDiodeX installations from version 3.0.0 up to (but not including) version 3.1.7. Organizations using vulnerable versions could have sensitive files exposed.

💻 Affected Systems

Products:
  • DataFlowX Technology DataDiodeX
Versions: v3.0.0 to v3.1.6 inclusive
Operating Systems: All supported OS for DataDiodeX
Default Config Vulnerable: ⚠️ Yes
Notes: All installations within the affected version range are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through reading sensitive configuration files, password files, or writing malicious files to execute arbitrary code.

🟠

Likely Case

Unauthorized access to sensitive files containing configuration data, credentials, or proprietary information.

🟢

If Mitigated

Limited file access within the application's intended directory scope with proper input validation.

🌐 Internet-Facing: HIGH - If the vulnerable component is exposed to the internet, attackers can exploit it remotely without authentication.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this to escalate privileges or access sensitive data.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Path traversal vulnerabilities typically have low exploitation complexity, especially when unauthenticated. No public exploit code has been identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v3.1.7

Vendor Advisory: https://www.usom.gov.tr/bildirim/tr-24-1409

Restart Required: Yes

Instructions:

1. Download DataDiodeX v3.1.7 from official vendor sources. 2. Backup current configuration and data. 3. Stop DataDiodeX service. 4. Install v3.1.7 following vendor installation guide. 5. Restart DataDiodeX service. 6. Verify functionality.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement web application firewall or input validation to block path traversal sequences like ../, ..\, and absolute paths.

# WAF rule example: SecRule ARGS "\.\./" "deny,status:403,id:1001"

Access Restriction

linux

Restrict network access to DataDiodeX to only necessary IP addresses and users.

# Example firewall rule: iptables -A INPUT -p tcp --dport [DataDiodeX-port] -s [trusted-IP] -j ACCEPT

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate DataDiodeX from untrusted networks.
  • Deploy file integrity monitoring to detect unauthorized file access attempts.

🔍 How to Verify

Check if Vulnerable:

Check DataDiodeX version via admin interface or configuration files. If version is between 3.0.0 and 3.1.6 inclusive, system is vulnerable.

Check Version:

# Check version in DataDiodeX admin interface or config files

Verify Fix Applied:

Confirm version is 3.1.7 or higher and test path traversal attempts return proper error responses.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed file access attempts with ../ patterns
  • Access to unusual file paths outside normal application directories

Network Indicators:

  • Unusual file path patterns in HTTP requests to DataDiodeX endpoints

SIEM Query:

source="DataDiodeX" AND ("../" OR "..\\" OR "/etc/" OR "/windows/")

🔗 References

📤 Share & Export