CVE-2024-55062
Published: 31 January 2025
Summary
CVE-2024-55062 is a critical-severity Command Injection (CWE-77) vulnerability in Easyvirt Co2Scope. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 10.3% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires validation of inputs at the /api/license/sendlicense/ endpoint to block malicious code injection payloads.
Mandates timely identification, reporting, and correction of the specific code injection flaw in EasyVirt DCScope and CO2Scope.
Enforces authentication and authorization for access to the vulnerable /api/license/sendlicense/ endpoint, blocking unauthenticated remote exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The CVE describes a code injection vulnerability in a public-facing API endpoint (/api/license/sendlicense/) that allows remote unauthenticated arbitrary code execution, directly enabling exploitation of public-facing applications.
NVD Description
Code Injection vulnerability in EasyVirt DCScope <= 8.6.0 and CO2Scope <= 1.3.0 allows remote unauthenticated attackers to execute arbitrary code to /api/license/sendlicense/.
Deeper analysisAI
CVE-2024-55062 is a code injection vulnerability (CWE-77) affecting EasyVirt DCScope versions up to and including 8.6.0 and CO2Scope versions up to and including 1.3.0. The flaw resides in the /api/license/sendlicense/ endpoint, where insufficient input validation enables malicious payloads to be processed.
Remote unauthenticated attackers can exploit this vulnerability over the network with low complexity and no user interaction required, as indicated by its CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Successful exploitation allows attackers to execute arbitrary code on the targeted system, potentially leading to full compromise with high impacts on confidentiality, integrity, and availability.
Further details, including potential mitigation guidance, are documented in advisories available at https://github.com/Elymaro/CVE/blob/main/EasyVirt/CVE-2024-55062.md.
Details
- CWE(s)