CVE-2024-51962
Published: 03 March 2025
Summary
CVE-2024-51962 is a high-severity SQL Injection (CWE-89) vulnerability in Esri Arcgis Server. Its CVSS base score is 8.7 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 10.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the SQL injection vulnerability by requiring timely application of the Esri ArcGIS Server Security 2025 Update 1 Patch.
Prevents SQL injection by enforcing validation of inputs during the EDIT operation that modifies column properties.
Limits exploitation by ensuring only necessary users have the elevated non-administrative privileges required for the vulnerable EDIT operation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The SQL injection vulnerability in the public-facing ArcGIS Server directly enables T1190: Exploit Public-Facing Application, allowing a remote authenticated attacker with elevated privileges to compromise data confidentiality and integrity via the EDIT operation.
NVD Description
A SQL injection vulnerability in ArcGIS Server allows an EDIT operation to modify column properties in a manner that could lead to SQL injection when performed by a remote authenticated user requiring elevated, non‑administrative privileges. Exploitation is restricted to users…
more
with advanced application‑specific permissions, indicating high privileges are required. Successful exploitation would have a high impact on integrity and confidentiality, with no impact on availability.
Deeper analysisAI
CVE-2024-51962, published on 2025-03-03, is a SQL injection vulnerability (CWE-89) in ArcGIS Server. The flaw enables an EDIT operation to modify column properties in a manner that could lead to SQL injection when performed by a remote authenticated user. It has a CVSS v3.1 base score of 8.7 (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N), reflecting high impacts on confidentiality and integrity with no availability impact.
Exploitation requires elevated, non-administrative privileges, restricted to users with advanced application-specific permissions, indicating high privileges are needed. A remote authenticated attacker could leverage this to achieve significant compromise of data integrity and confidentiality through SQL injection.
Esri addresses this vulnerability in its ArcGIS Server Security 2025 Update 1 Patch, detailed in the advisory at https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/arcgis-server-security-2025-update-1-patch/. Security practitioners should apply this patch to mitigate the risk.
Details
- CWE(s)