CVE-2024-12917
Published: 24 February 2025
Summary
CVE-2024-12917 is a high-severity Files or Directories Accessible to External Parties (CWE-552) vulnerability in Gov (inferred from references). Its CVSS base score is 8.3 (High).
Operationally, ranked at the 35.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and CM-6 (Configuration Settings).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces approved authorizations for logical access to files and directories, directly preventing unauthorized external access due to misconfigured access controls.
Establishes secure configuration settings for access controls, mitigating exploitation of incorrectly configured security levels in Health4All.
Restricts low-privilege users (PR:L) to minimal necessary access, limiting the impact of authentication abuse and unauthorized file exposure.
NVD Description
Files or Directories Accessible to External Parties vulnerability in Agito Computer Health4All allows Exploiting Incorrectly Configured Access Control Security Levels, Authentication Abuse.This issue affects Health4All: before 10.01.2025.
Deeper analysisAI
CVE-2024-12917 is a Files or Directories Accessible to External Parties vulnerability (CWE-552) in Agito Computer Health4All software. It enables exploitation of incorrectly configured access control security levels and authentication abuse, affecting Health4All versions prior to 10.01.2025. The vulnerability has a CVSS v3.1 base score of 8.3 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L), indicating high severity due to network accessibility, low complexity, and significant impacts on confidentiality and integrity.
An attacker with low privileges (PR:L) can exploit this vulnerability over the network without user interaction. Successful exploitation allows external access to sensitive files or directories, potentially leading to high confidentiality loss through data exposure, high integrity compromise via unauthorized modifications, and low availability disruption.
The USOM advisory at https://www.usom.gov.tr/bildirim/tr-25-0042 provides details on this issue. Mitigation involves upgrading Health4All to version 10.01.2025 or later, as the vulnerability affects only prior releases. Security practitioners should review access controls and authentication mechanisms in affected environments.
Details
- CWE(s)