Cyber Posture

CVE-2024-51961

High

Published: 03 March 2025

Published
03 March 2025
Modified
10 April 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0020 42.3th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-51961 is a high-severity External Control of File Name or Path (CWE-73) vulnerability in Esri Arcgis Server. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 42.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the LFI vulnerability by applying the Esri ArcGIS Server Security 2025 Update 1 patch.

prevent

Validates URL parameters to prevent path traversal and unauthorized local file reads in ArcGIS Server.

prevent

Enforces access control policies to restrict unauthenticated remote access to sensitive internal configuration files.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

LFI in public-facing ArcGIS Server enables remote unauthenticated file reads for config data, directly mapping to T1190 (exploiting public-facing apps) and T1005 (collecting data from local system files).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

There is a local file inclusion vulnerability in ArcGIS Server 11.3 and below that may allow a remote, unauthenticated attacker to craft a URL that could potentially disclose sensitive configuration information by reading internal files from the remote server. Due…

more

to the nature of the files accessible in this vulnerability the impact to confidentiality is High there is no impact to both integrity or availability.

Deeper analysisAI

CVE-2024-51961 is a local file inclusion vulnerability in ArcGIS Server 11.3 and earlier versions. It enables a remote, unauthenticated attacker to craft a URL that could disclose sensitive configuration information by reading internal files from the server. The vulnerability carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), reflecting high impact to confidentiality with no impact to integrity or availability, and is linked to CWE-73 and CWE-610.

A remote attacker can exploit this vulnerability over the network with low complexity, requiring no privileges or user interaction. By sending a specially crafted URL to the affected ArcGIS Server, the attacker can read internal files, potentially exposing sensitive configuration data.

The Esri advisory provides details on mitigation through the ArcGIS Server Security 2025 Update 1 patch, available at https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/.

Details

CWE(s)

Affected Products

esri
arcgis server
10.9.1 — 11.3

CVEs Like This One

CVE-2024-51962Same product: Esri Arcgis Server
CVE-2025-0111Shared CWE-610, CWE-73
CVE-2025-2538Same vendor: Esri
CVE-2024-51954Same product: Esri Arcgis Server
CVE-2025-1068Same vendor: Esri
CVE-2026-5210Shared CWE-73
CVE-2026-33354Shared CWE-73
CVE-2025-1067Same vendor: Esri
CVE-2026-29611Shared CWE-73
CVE-2026-3404Shared CWE-610

References