Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CWE-78)
A critical vulnerability has been discovered in F-logic DataCube3 version 1.0, specifically in the HTTP POST Request Handler component of the file /admin/config_time_sync.php. This vulnerability allows for OS command injection through the manipulation of the 'ntp_server' argument. The attack can be launched remotely without user interaction, making it particularly dangerous.
This vulnerability enables remote attackers to execute arbitrary operating system commands on the affected system. Given its critical nature and the potential for remote exploitation without user interaction, the impact could be severe. Attackers could potentially gain unauthorized access, execute malicious code, modify or delete data, or disrupt system operations. The CVSS v3.1 base score of 9.8 (Critical) indicates an extremely high risk, with potential for high-level impacts on confidentiality, integrity, and availability of the system. The CVSS v4.0 base score is 6.9 (Medium), which also suggests significant risk.
One proof-of-concept exploit is available on shikangsi.com. Its exploitation has been reported by various sources, including t.me.
As of the current information, there is no mention of an available patch. The vulnerability affects F-logic DataCube3 version 1.0, but there's no indication of a fixed version or a patch release.
Given the critical nature of this vulnerability and the lack of a mentioned patch, immediate mitigation steps are crucial: 1. Implement strong input validation and sanitization for the 'ntp_server' parameter in the affected file (/admin/config_time_sync.php). 2. If possible, temporarily disable or restrict access to the vulnerable component until a patch is available. 3. Monitor system logs for any suspicious activities related to this vulnerability. 4. Implement network segmentation to limit potential lateral movement if the vulnerability is exploited. 5. Apply the principle of least privilege to minimize the impact of a potential exploit. 6. Keep monitoring for any vendor communications regarding patches or updates for F-logic DataCube3. 7. Consider implementing a Web Application Firewall (WAF) to help filter malicious requests targeting this vulnerability. 8. Be aware that an exploit has been disclosed to the public and may be used, increasing the urgency for mitigation.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Feedly found the first article mentioning CVE-2024-7066. See article
Feedly estimated the CVSS score as HIGH
NVD published the first details for CVE-2024-7066
A CVSS base score of 7.3 has been assigned.
This CVE started to trend in security discussions
Attacks in the wild have been reported by CTI Feeds - Cybercrime on Telegram. See article
EPSS Score was set to: 0.05% (Percentile: 16.8%)
This CVE stopped trending in security discussions
A CVSS base score of 9.8 has been assigned.