CVE-2024-55028
Published: 25 March 2025
Summary
CVE-2024-55028 is a critical-severity Code Injection (CWE-94) vulnerability in Nasa Fprime. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 33.2% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the template injection vulnerability in Fprime v3.4.3 dashboard by identifying, reporting, and correcting the specific flaw enabling arbitrary code execution.
Validates the content of uploaded Vue files to block crafted inputs that trigger template injection and arbitrary code execution.
Enforces approved authorizations to require authentication for dashboard file uploads, preventing unauthenticated remote exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated RCE via template injection and crafted file upload in a web dashboard component directly enables exploitation of public-facing applications (T1190) and arbitrary code execution through command/scripting interpreters (T1059).
NVD Description
A template injection vulnerability in the Dashboard of NASA Fprime v3.4.3 allows attackers to execute arbitrary code via uploading a crafted Vue file.
Deeper analysisAI
CVE-2024-55028 is a template injection vulnerability in the Dashboard component of NASA Fprime version 3.4.3. The issue, classified under CWE-94 (Code Injection), enables attackers to execute arbitrary code by uploading a specially crafted Vue file. It carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), marking it as critical due to its potential for severe impact.
The vulnerability can be exploited by remote, unauthenticated attackers with low complexity and no user interaction required. Successful exploitation grants attackers the ability to execute arbitrary code on the affected system, compromising confidentiality, integrity, and availability to a high degree.
Advisories are available at https://visionspace.com/remote-code-execution-and-critical-vulnerabilities-in-nasa-fprime-v3-4-3/, which details this remote code execution flaw alongside other critical vulnerabilities in NASA Fprime v3.4.3.
Details
- CWE(s)