CVE-2024-9924

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated remote attackers to download arbitrary system files from OAKlouds software by Hgiga, potentially leading to data exposure and file deletion. It affects systems running vulnerable versions of OAKlouds where the previous patch for CVE-2024-26261 was incomplete.

💻 Affected Systems

Products:
  • OAKlouds by Hgiga
Versions: Versions with incomplete fix for CVE-2024-26261
Operating Systems: Not specified, likely multiple
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects OAKlouds installations where the previous CVE-2024-26261 patch was insufficient.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through sensitive file exfiltration (including credentials, configuration files) followed by file deletion causing service disruption.

🟠

Likely Case

Unauthenticated attackers download sensitive system files containing credentials or configuration data, potentially enabling further attacks.

🟢

If Mitigated

With proper network segmentation and access controls, impact limited to isolated systems with minimal sensitive data exposure.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation allows attackers to directly target exposed systems.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could exploit this, but requires network access to vulnerable systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Unauthenticated file download vulnerability with potential for file deletion. No public exploit code identified in references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in provided references

Vendor Advisory: https://www.twcert.org.tw/en/cp-139-8131-0b5e1-2.html

Restart Required: Yes

Instructions:

1. Contact Hgiga for updated patch addressing CVE-2024-9924. 2. Apply the complete fix for both CVE-2024-26261 and CVE-2024-9924. 3. Restart affected OAKlouds services.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to OAKlouds management interfaces to trusted IPs only

# Use firewall rules to restrict access
# Example: iptables -A INPUT -p tcp --dport [OAKlouds_port] -s [trusted_IP] -j ACCEPT
# iptables -A INPUT -p tcp --dport [OAKlouds_port] -j DROP

Web Application Firewall

all

Deploy WAF with rules to block arbitrary file download attempts

# Configure WAF to block patterns like ../, absolute paths, or specific file extensions

🧯 If You Can't Patch

  • Isolate vulnerable systems in separate network segments with strict access controls
  • Implement monitoring for unusual file access patterns and failed authentication attempts

🔍 How to Verify

Check if Vulnerable:

Check if OAKlouds version has incomplete CVE-2024-26261 fix. Test for unauthenticated file download via web interface.

Check Version:

Check OAKlouds administration interface or configuration files for version information

Verify Fix Applied:

Verify patch application and test that unauthenticated file download is no longer possible.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated requests to file download endpoints
  • Multiple failed authentication attempts followed by file access
  • Access to sensitive system file paths

Network Indicators:

  • Unusual outbound traffic patterns after file access
  • Requests with path traversal patterns (../, absolute paths)

SIEM Query:

source="oaklouds.log" AND (url="*download*" OR url="*file*" OR url="*../*") AND auth_status="failed"

🔗 References

📤 Share & Export