Cyber Posture

CVE-2024-12087

MediumPublic PoC

Published: 14 January 2025

Published
14 January 2025
Modified
14 April 2026
KEV Added
Patch
CVSS Score 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
EPSS Score 0.0319 87.1th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-12087 is a medium-severity Path Traversal (CWE-22) vulnerability in Almalinux Almalinux. Its CVSS base score is 6.5 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Ingress Tool Transfer (T1105); ranked in the top 12.9% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Ingress Tool Transfer (T1105) and 1 other technique. AI-specific risk: MITRE ATLAS AI Supply Chain Compromise (AML.T0010) plus 1 more. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the path traversal vulnerability in rsync by applying vendor patches such as Red Hat errata RHBA-2025:6470 and related RHSA updates.

prevent

Requires validation of path and symlink inputs from the rsync server to ensure files are not written outside the intended client destination directory.

prevent

Enforces secure configuration settings for rsync, such as disabling or restricting the --inc-recursive option to mitigate the vulnerable behavior.

MITRE ATT&CK Enterprise TechniquesAI

T1105 Ingress Tool Transfer Command And Control
Adversaries may transfer tools or other files from an external system into a compromised environment.
T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

The path traversal and symlink handling vulnerabilities (CVE-2024-12087, CVE-2024-12088, CVE-2024-12747) in rsync allow a malicious server to write arbitrary files outside the intended client destination directory, facilitating ingress tool transfer (T1105) and exploitation of the rsync client application for potential execution of dropped malicious payloads (T1203).

MITRE ATLAS TechniquesAI

MITRE ATLAS techniques

AML.T0010: AI Supply Chain CompromiseAML.T0048: External Harms

NVD Description

A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using…

more

the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client's intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client.

Deeper analysisAI

CVE-2024-12087 is a path traversal vulnerability (CWE-22) in rsync, published on 2025-01-14. The issue arises from the --inc-recursive option, which is default-enabled for many client configurations and can be enabled by the server even if not explicitly requested by the client. When this option is in use, inadequate symlink verification combined with deduplication checks performed on a per-file-list basis allows a server to write files outside the client's intended destination directory to arbitrary locations named after valid client directories or paths.

A malicious rsync server can exploit this vulnerability against a client connecting to it, provided the --inc-recursive option is active. The attack requires no privileges (PR:N) and low complexity (AC:L) over the network (AV:N), but involves user interaction (UI:R), with a CVSS v3.1 base score of 6.5 (C:N/I:H/A:N/S:U). Successful exploitation enables the server to write malicious files to arbitrary locations on the client filesystem.

Red Hat has released multiple errata addressing this vulnerability, including RHBA-2025:6470, RHSA-2025:23154, RHSA-2025:23235, RHSA-2025:23407, and RHSA-2025:23415.

Details

CWE(s)

Affected Products

samba
rsync
≤ 3.3.0
almalinux
almalinux
10.0, 8.0, 9.0
archlinux
arch linux
all versions
gentoo
linux
all versions
nixos
nixos
≤ 24.11
suse
suse linux
all versions
tritondatacenter
smartos
≤ 20250123
redhat
enterprise linux
8.0, 9.0
redhat
enterprise linux eus
9.6
redhat
enterprise linux for arm 64
8.0_aarch64, 9.0_aarch64
+8 more product configuration(s) — see NVD for full list

CVEs Like This One

CVE-2024-12088Same product: Almalinux Almalinux
CVE-2024-12085Same product: Almalinux Almalinux
CVE-2024-12084Same product: Almalinux Almalinux
CVE-2026-22871Shared CWE-22
CVE-2026-27699Shared CWE-22
CVE-2026-30283Shared CWE-22
CVE-2026-20660Shared CWE-22
CVE-2026-4092Shared CWE-22
CVE-2026-23535Shared CWE-22
CVE-2025-67030Shared CWE-22

References