CVE-2024-48123
Published: 15 January 2025
Summary
CVE-2024-48123 is a high-severity Untrusted Search Path (CWE-426) vulnerability in Diva Portal (inferred from references). Its CVSS base score is 8.4 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Replication Through Removable Media (T1091); ranked at the 20.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 MP-7 (Media Use) and PE-3 (Physical Access Control).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly restricts and controls access to USB ports and I/O devices, preventing attackers from inserting malicious USB drives that trigger autorun execution.
Restricts the use of USB media on the system, prohibiting the autorun of untrusted scripts from external storage devices.
Enforces physical access controls to the device, blocking unauthorized insertion of USB drives required for exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Directly enables arbitrary code execution via malicious autorun script on inserted USB (T1091) or hardware addition (T1200).
NVD Description
An issue in the USB Autorun function of HI-SCAN 6040i Hitrax HX-03-19-I allows attackers to execute arbitrary code via uploading a crafted script from a USB device.
Deeper analysisAI
CVE-2024-48123 is a vulnerability in the USB Autorun function of the HI-SCAN 6040i Hitrax HX-03-19-I device. It enables attackers to execute arbitrary code by uploading a crafted script from a USB device. The issue has a CVSS v3.1 base score of 8.4 (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N) and maps to CWE-426 (Untrusted Search Path). It was published on 2025-01-15.
Exploitation requires local physical access to the device, low privileges, and low attack complexity, with no user interaction needed. A threat actor, such as an insider or someone with brief physical access, can insert a USB drive containing a malicious script that autoruns and executes arbitrary code. This achieves high confidentiality and integrity impacts due to the changed scope, potentially allowing data exfiltration, modification, or privilege escalation on the affected system.
Further details, including potential mitigations, are available in the referenced research document at https://kth.diva-portal.org/smash/get/diva2:1876534/FULLTEXT01.pdf.
Details
- CWE(s)