Cyber Posture

CVE-2024-44598

High

Published: 15 December 2025

Published
15 December 2025
Modified
23 December 2025
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0012 30.7th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-44598 is a high-severity Unrestricted Upload of File with Dangerous Type (CWE-434) vulnerability in Fntsoftware Fnt Command. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation of Remote Services (T1210); ranked at the 30.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation of Remote Services (T1210) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the code execution vulnerability by requiring timely identification, reporting, and correction of flaws in FNT Command's C Base Module.

prevent

Prevents exploitation of the CWE-434 unrestricted upload leading to code execution by enforcing validation of all inputs to the C Base Module.

prevent

Limits the impact of low-privilege (PR:L) exploitation by ensuring accounts have only necessary privileges, reducing potential damage from arbitrary code execution.

MITRE ATT&CK Enterprise TechniquesAI

T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

CVE-2024-44598 enables remote code execution over the network with low privileges (PR:L), directly facilitating Exploitation of Remote Services (T1210) for lateral movement and Exploitation for Privilege Escalation (T1068) due to high-impact confidentiality, integrity, and availability effects.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

FNT Command 13.4.0 is vulnerable to Code Execution via the C Base Module.

Deeper analysisAI

CVE-2024-44598 is a code execution vulnerability in FNT Command version 13.4.0, specifically via the C Base Module. Published on 2025-12-15, it carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and is linked to CWE-434.

The vulnerability can be exploited by an attacker with low privileges over the network, requiring low attack complexity and no user interaction. Successful exploitation grants high-impact access to confidentiality, integrity, and availability, enabling arbitrary code execution on the affected system.

Advisories and further details are available from the vendor at http://fnt.com and a technical analysis gist by ZeroBreach-GmbH at https://gist.github.com/ZeroBreach-GmbH/e957dc32e72b366894565b7ff03659a4.

Details

CWE(s)

Affected Products

fntsoftware
fnt command
≤ 13.4.1

CVEs Like This One

CVE-2025-46068Shared CWE-434
CVE-2025-63601Shared CWE-434
CVE-2025-60947Shared CWE-434
CVE-2025-12153Shared CWE-434
CVE-2025-34329Shared CWE-434
CVE-2025-10907Shared CWE-434
CVE-2025-13066Shared CWE-434
CVE-2025-34195Shared CWE-434
CVE-2025-20354Shared CWE-434
CVE-2025-13536Shared CWE-434

References