Cyber Posture

CVE-2024-51962

High

Published: 03 March 2025

Published
03 March 2025
Modified
13 February 2026
KEV Added
Patch
CVSS Score 8.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N
EPSS Score 0.0003 10.3th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-51962 is a high-severity SQL Injection (CWE-89) vulnerability in Esri Arcgis Server. Its CVSS base score is 8.7 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 10.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the SQL injection vulnerability by requiring timely application of the Esri ArcGIS Server Security 2025 Update 1 Patch.

prevent

Prevents SQL injection by enforcing validation of inputs during the EDIT operation that modifies column properties.

prevent

Limits exploitation by ensuring only necessary users have the elevated non-administrative privileges required for the vulnerable EDIT operation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The SQL injection vulnerability in the public-facing ArcGIS Server directly enables T1190: Exploit Public-Facing Application, allowing a remote authenticated attacker with elevated privileges to compromise data confidentiality and integrity via the EDIT operation.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

A SQL injection vulnerability in ArcGIS Server allows an EDIT operation to modify column properties in a manner that could lead to SQL injection when performed by a remote authenticated user requiring elevated, non‑administrative privileges. Exploitation is restricted to users…

more

with advanced application‑specific permissions, indicating high privileges are required. Successful exploitation would have a high impact on integrity and confidentiality, with no impact on availability.

Deeper analysisAI

CVE-2024-51962, published on 2025-03-03, is a SQL injection vulnerability (CWE-89) in ArcGIS Server. The flaw enables an EDIT operation to modify column properties in a manner that could lead to SQL injection when performed by a remote authenticated user. It has a CVSS v3.1 base score of 8.7 (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N), reflecting high impacts on confidentiality and integrity with no availability impact.

Exploitation requires elevated, non-administrative privileges, restricted to users with advanced application-specific permissions, indicating high privileges are needed. A remote authenticated attacker could leverage this to achieve significant compromise of data integrity and confidentiality through SQL injection.

Esri addresses this vulnerability in its ArcGIS Server Security 2025 Update 1 Patch, detailed in the advisory at https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/. Security practitioners should apply this patch to mitigate the risk.

Details

CWE(s)

Affected Products

esri
arcgis server
10.9.1 — 11.3

CVEs Like This One

CVE-2024-51961Same product: Esri Arcgis Server
CVE-2025-57870Same product: Esri Arcgis Server
CVE-2024-51954Same product: Esri Arcgis Server
CVE-2026-3180Shared CWE-89
CVE-2025-1872Shared CWE-89
CVE-2026-32458Shared CWE-89
CVE-2026-24494Shared CWE-89
CVE-2025-26875Shared CWE-89
CVE-2026-26263Shared CWE-89
CVE-2026-30531Shared CWE-89

References