Cyber Posture

CVE-2024-53348

High

Published: 21 March 2025

Published
21 March 2025
Modified
01 April 2025
KEV Added
Patch
CVSS Score 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0010 27.2th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-53348 is a high-severity Improper Access Control (CWE-284) vulnerability in Loxilb Loxilb. Its CVSS base score is 7.4 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 27.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AC-6 (Least Privilege).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly counters the incorrect access control vulnerability in LoxiLB by enforcing approved authorizations for logical access, preventing unauthorized sensitive information disclosure and privilege escalation.

prevent

Mitigates the privilege escalation aspect of CVE-2024-53348 by restricting access to the least privileges required, limiting damage from unauthorized access in LoxiLB.

prevent

Requires timely identification, reporting, and correction of the specific access control flaw in LoxiLB v0.9.7 and prior, directly eliminating the vulnerability via patching.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Vulnerability in public-facing load balancer enables remote unauthorized access (T1190 Exploit Public-Facing Application) resulting in sensitive data disclosure and privilege escalation (T1068 Exploitation for Privilege Escalation).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

LoxiLB v.0.9.7 and before is vulnerable to Incorrect Access Control which allows attackers to obtain sensitive information and escalate privileges.

Deeper analysisAI

CVE-2024-53348 is an incorrect access control vulnerability (CWE-284) affecting LoxiLB versions 0.9.7 and earlier. LoxiLB is an open-source load balancer, and the flaw allows unauthorized access that exposes sensitive information and enables privilege escalation. The vulnerability received a CVSS v3.1 base score of 7.4 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N), indicating high severity due to its potential for remote exploitation with significant confidentiality and integrity impacts.

Remote network-based attackers require no prior privileges (PR:N) or user interaction (UI:N) to exploit the issue, though it demands high attack complexity (AC:H). Exploitation can disclose sensitive data within the LoxiLB environment and allow attackers to escalate their privileges, potentially compromising the load balancer's control plane or associated services.

For mitigation details, including patches or workarounds, refer to the advisory at https://gist.github.com/HouqiyuA/8c734c849c1a9b69ac96c46eba4acbcb and the LoxiLB GitHub repository at https://github.com/loxilb-io/loxilb, published on 2025-03-21.

Details

CWE(s)

Affected Products

loxilb
loxilb
≤ 0.9.7

CVEs Like This One

CVE-2025-53763Shared CWE-284
CVE-2026-20750Shared CWE-284
CVE-2026-22011Shared CWE-284
CVE-2025-55261Shared CWE-284
CVE-2025-25500Shared CWE-284
CVE-2025-70064Shared CWE-284
CVE-2025-55244Shared CWE-284
CVE-2025-24411Shared CWE-284
CVE-2026-24304Shared CWE-284
CVE-2026-34309Shared CWE-284

References