Exploit
CVE-2024-9537

Inclusion of Functionality from Untrusted Control Sphere (CWE-829)

Published: Oct 18, 2024 / Updated: 32d ago

010
CVSS 9.3EPSS 0.04%Critical
CVE info copied to clipboard

Summary

ScienceLogic SL1 (formerly EM7) is affected by an unspecified vulnerability involving an unspecified third-party component packaged with SL1. The vulnerability is addressed in SL1 versions 12.1.3+, 12.2.3+, and 12.3+. Remediations have been made available for all SL1 versions back to version lines 10.1.x, 10.2.x, 11.1.x, 11.2.x, and 11.3.x.

Impact

This vulnerability has a critical severity with a CVSS v3.1 base score of 9.8 and a CVSS v4.0 base score of 9.3. It can be exploited over the network without requiring user interaction or privileges. The vulnerability has high impact on confidentiality, integrity, and availability of the affected systems. Given the network attack vector and low attack complexity, this vulnerability could potentially lead to unauthorized access, data breaches, and system compromise. The vulnerability is actively being exploited in the wild and was added to the CISA Known Exploited Vulnerability list.

Exploitation

There is no evidence that a public proof-of-concept exists. The vulnerability is actively being exploited in the wild and was added to the CISA Known Exploited Vulnerability list. Its exploitation has been reported by various sources, including cisa.gov.

Patch

Patches are available. The vulnerability is addressed in SL1 versions 12.1.3+, 12.2.3+, and 12.3+. Additionally, remediations have been made available for all SL1 versions back to version lines 10.1.x, 10.2.x, 11.1.x, 11.2.x, and 11.3.x.

Mitigation

To mitigate this vulnerability, it is strongly recommended to upgrade ScienceLogic SL1 to the latest patched version appropriate for your current version line. For version 12.x, upgrade to at least 12.1.3, 12.2.3, or 12.3. For older versions (10.x and 11.x), apply the available remediations provided by ScienceLogic. Given the critical severity and network-based attack vector, prioritize this patching effort. If immediate patching is not possible, consider implementing network segmentation to limit access to the affected systems and monitor for any suspicious activities.

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:Red

Timeline

CVE Assignment

NVD published the first details for CVE-2024-9537

Oct 18, 2024 at 3:15 PM
CVSS

A CVSS base score of 9.8 has been assigned.

Oct 18, 2024 at 3:21 PM / nvd
First Article

Feedly found the first article mentioning CVE-2024-9537. See article

Oct 18, 2024 at 3:24 PM / National Vulnerability Database
CVSS Estimate

Feedly estimated the CVSS score as MEDIUM

Oct 18, 2024 at 3:24 PM
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Oct 18, 2024 at 3:30 PM
EPSS

EPSS Score was set to: 0.04% (Percentile: 13.9%)

Oct 19, 2024 at 9:48 AM
Exploitation in the Wild

Attacks in the wild have been reported by CISA Known Exploited Vulnerability.

Oct 21, 2024 at 2:10 PM / CISA Known Exploited Vulnerability
Exploitation in the Wild

Attacks in the wild have been reported by CISA - Known exploited vulnerabilities catalog. See article

Trending

This CVE started to trend in security discussions

Oct 22, 2024 at 10:07 AM
Static CVE Timeline Graph

Affected Systems

Sciencelogic/sl1
+null more

Proof Of Exploit

https://www.cisa.gov/known-exploited-vulnerabilities-catalog
+null more

Patches

community.sciencelogic.com
+null more

Links to Mitre Att&cks

T1055: Process Injection
+null more

Attack Patterns

CAPEC-175: Code Inclusion
+null more

References

Cybersecurity Vulnerability News: October 2024 CVE Roundup
A critical cybersecurity vulnerability (CVE-2024-9379) in Ivanti Cloud Services Appliance (CSA) allows attackers to execute arbitrary commands remotely, potentially leading to unauthorized system access and compromise of sensitive information. A critical cybersecurity vulnerability (CVE-2024-47575) in Fortinet FortiManager allows for unauthorized access, exposing systems to full remote control and potential compromise of network security configurations.
Cybersecurity Vulnerability News: October 2024 CVE Roundup
A critical cybersecurity vulnerability (CVE-2024-9379) in Ivanti Cloud Services Appliance (CSA) allows attackers to execute arbitrary commands remotely, potentially leading to unauthorized system access and compromise of sensitive information. A critical cybersecurity vulnerability (CVE-2024-47575) in Fortinet FortiManager allows for unauthorized access, exposing systems to full remote control and potential compromise of network security configurations.
Cybersecurity Vulnerability News: October 2024 CVE Roundup
A critical cybersecurity vulnerability (CVE-2024-9379) in Ivanti Cloud Services Appliance (CSA) allows attackers to execute arbitrary commands remotely, potentially leading to unauthorized system access and compromise of sensitive information. A critical cybersecurity vulnerability (CVE-2024-47575) in Fortinet FortiManager allows for unauthorized access, exposing systems to full remote control and potential compromise of network security configurations.
See 1 more references

News

CISA: CISA Adds One Known Exploited Vulnerability to Catalog
BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice.
CISA: CISA Adds One Known Exploited Vulnerability to Catalog
BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice.
CISA: CISA Adds One Known Exploited Vulnerability to Catalog
BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice.
CISA: CISA Adds One Known Exploited Vulnerability to Catalog
BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice.
CISA: CISA Adds One Known Exploited Vulnerability to Catalog
BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice.
See 94 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:None
User Interaction:None
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI