CVE-2024-55926
Published: 23 January 2025
Summary
CVE-2024-55926 is a high-severity Path Traversal (CWE-22) vulnerability in Xerox Workplace Suite. Its CVSS base score is 7.6 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 32.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates improper header validation by requiring validation mechanisms at input points to block path traversal and unrestricted file uploads/deletions.
Requires timely flaw remediation including patching the specific vulnerability in Xerox Workplace Suite as outlined in Security Bulletin XRX25-002.
Enforces access control policies on system resources like files to limit unauthorized reads, uploads, and deletions even if header manipulation occurs.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct path traversal + unrestricted file upload enables public app exploitation (T1190), local file read/collection (T1005), tool ingress (T1105), and arbitrary deletion (T1070.004).
NVD Description
A vulnerability found in Xerox Workplace Suite allows arbitrary file read, upload, and deletion on the server through crafted header manipulation. By exploiting improper validation of headers, attackers can gain unauthorized access to data
Deeper analysisAI
CVE-2024-55926 is a vulnerability in Xerox Workplace Suite that enables arbitrary file read, upload, and deletion on the server through crafted header manipulation. The issue stems from improper validation of headers, allowing attackers to gain unauthorized access to data. It is associated with CWE-22 (Path Traversal) and CWE-434 (Unrestricted Upload of File with Dangerous Type), and carries a CVSS v3.1 base score of 7.6 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H), indicating high availability impact with low confidentiality and integrity effects.
Attackers with low-privileged network access (PR:L) can exploit this vulnerability without user interaction. By sending specially crafted headers, they can read sensitive files, upload malicious ones, or delete arbitrary server files, potentially leading to data exfiltration, persistence, or disruption of services on affected Xerox Workplace Suite instances.
Xerox has issued Security Bulletin XRX25-002, available at https://securitydocs.business.xerox.com/wp-content/uploads/2025/01/Xerox-Security-Bulletin-XRX25-002-for-Xerox%C2%AE-WorkplaceSuite%C2%AE.pdf, which provides details on mitigation and patching for Xerox Workplace Suite. Security practitioners should review this advisory for specific remediation steps tailored to their deployments.
Details
- CWE(s)