Cyber Posture

CVE-2024-47552

CriticalRCE

Published: 20 March 2025

Published
20 March 2025
Modified
30 March 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0019 40.5th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-47552 is a critical-severity Deserialization of Untrusted Data (CWE-502) vulnerability in Apache Seata. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation of Remote Services (T1210); ranked at the 40.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and CM-6 (Configuration Settings).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation of Remote Services (T1210) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely identification, reporting, and remediation of flaws like the deserialization vulnerability in Apache Seata by patching to version 2.2.0.

prevent

Mandates validation of information inputs to prevent processing untrusted data during deserialization in Seata's Raft cluster mode.

prevent

Enforces configuration settings to deploy only approved, patched versions of Seata (2.2.0+), avoiding vulnerable releases.

MITRE ATT&CK Enterprise TechniquesAI

T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
Why these techniques?

Deserialization vulnerability enables exploitation of the internal remote Seata service for RCE (T1210) which facilitates arbitrary command execution via interpreters (T1059).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v19.0

NVD Description

Deserialization of Untrusted Data vulnerability in Apache Seata (incubating). This issue affects Apache Seata (incubating): from 2.0.0 before 2.2.0. Severity Justification: The Apache Seata security team assesses the severity of this vulnerability as "Low" due to stringent real-world mitigating factors.…

more

First, the vulnerability is strictly isolated to the Raft cluster mode, an optional and non-default feature introduced in v2.0.0, while most users rely on the unaffected traditional architecture. Second, Seata is an internal middleware; communication between TC and RM/TM occurs entirely within trusted internal networks. An attacker would require prior, unauthorized access to the Intranet to exploit this, making external exploitation highly improbable. Users are recommended to upgrade to version 2.2.0, which fixes the issue.

Deeper analysisAI

CVE-2024-47552 is a Deserialization of Untrusted Data vulnerability (CWE-502) in Apache Seata (incubating), affecting versions from 2.0.0 before 2.2.0. This flaw arises in the handling of untrusted data during deserialization processes within the software, which is an open-source distributed transaction solution used for coordinating transactions across microservices.

The vulnerability is exploitable only in the optional Raft cluster mode, a non-default feature introduced in version 2.0.0, and requires an attacker to have prior unauthorized access to the internal network where Seata operates as middleware between Transaction Coordinator (TC) and Resource Manager/Transaction Manager (RM/TM) nodes. Although the CVSS v3.1 base score is 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating potential for remote exploitation without authentication leading to high impacts on confidentiality, integrity, and availability, real-world exploitation is highly improbable due to Seata's internal deployment model within trusted intranet environments.

Apache Seata advisories recommend upgrading to version 2.2.0, which resolves the issue, as detailed in the security announcement and corresponding GitHub commit. The Apache Seata security team rates the severity as "Low" owing to the strict isolation to Raft mode and the need for intranet access, with notifications posted to Apache mailing lists and oss-security.

No evidence of real-world exploitation has been reported for this vulnerability.

Details

CWE(s)

Affected Products

apache
seata
2.0.0 — 2.2.0

CVEs Like This One

CVE-2025-53606Same product: Apache Seata
CVE-2025-26866Same vendor: Apache
CVE-2026-35337Same vendor: Apache
CVE-2025-66524Same vendor: Apache
CVE-2026-27172Same vendor: Apache
CVE-2026-42778Same vendor: Apache
CVE-2026-40858Same vendor: Apache
CVE-2025-54920Same vendor: Apache
CVE-2025-61622Same vendor: Apache
CVE-2024-52577Same vendor: Apache

References