CVE-2024-53553
Published: 16 January 2025
Summary
CVE-2024-53553 is a critical-severity Incorrect Authorization (CWE-863) vulnerability in Opexustech Foiaxpress Public Access Link. Its CVSS base score is 9.1 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 24.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SC-14 (Public Access Protections).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
AC-3 enforces approved authorizations for logical access to information and resources, directly countering the authentication bypass via crafted requests to restricted areas.
SC-14 provides protections for publicly accessible interfaces, tailored to mitigate unauthorized access through the FOIAXPRESS public access link component.
SI-10 validates system inputs, addressing exploitation via specially crafted web requests that bypass authentication.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE-2024-53553 enables authentication bypass via crafted web requests on a public-facing application (OPEXUS FOIAXPRESS PUBLIC ACCESS LINK), directly facilitating T1190: Exploit Public-Facing Application.
NVD Description
An issue in OPEXUS FOIAXPRESS PUBLIC ACCESS LINK v11.1.0 allows attackers to bypass authentication via crafted web requests.
Deeper analysisAI
CVE-2024-53553 is an authentication bypass vulnerability affecting OPEXUS FOIAXPRESS PUBLIC ACCESS LINK version 11.1.0. The flaw, classified under CWE-863 (Incorrect Authorization), allows attackers to circumvent authentication mechanisms through specially crafted web requests. It has been assigned a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N), indicating critical severity due to its network accessibility, low complexity, lack of required privileges or user interaction, and potential for high confidentiality and integrity impacts.
Remote attackers with network access to the affected system can exploit this vulnerability without authentication by sending crafted requests to the public access link component. Successful exploitation enables unauthorized access to restricted resources, potentially allowing attackers to view or modify sensitive information protected by the authentication controls.
Further technical details, including potential proof-of-concept exploits, are documented in the referenced GitHub repository at https://github.com/Turbul3nce/Vulnerability.Research/tree/main/CVE-2024-53553. An additional article on related exploitation techniques is available at https://infosecwriteups.com/exploiting-execute-after-redirect-ear-vulnerability-in-htb-previse-92ea3f1dbf3d. No specific patch or mitigation guidance is detailed in the provided information.
Details
- CWE(s)