Cyber Posture

CVE-2024-57784

Medium

Published: 16 January 2025

Published
16 January 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N
EPSS Score 0.1425 94.4th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-57784 is a medium-severity Path Traversal (CWE-22) vulnerability. Its CVSS base score is 5.5 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Data from Local System (T1005); ranked in the top 5.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Data from Local System (T1005) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the directory traversal flaw in /php/script_uploads.php through timely patching or code fixes.

prevent

Validates and sanitizes user-supplied file paths in the upload script to block directory traversal sequences like ../

prevent

Enforces strict access controls on file system operations within the upload component to restrict reads outside the intended directory.

MITRE ATT&CK Enterprise TechniquesAI

T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
T1083 File and Directory Discovery Discovery
Adversaries may enumerate files and directories or may search in specific locations of a host or network share for certain information within a file system.
Why these techniques?

Directory traversal enables arbitrary local file reads (T1005) and supports file/directory enumeration (T1083) via the web app component.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

An issue in the component /php/script_uploads.php of Zenitel AlphaWeb XE v11.2.3.10 allows attackers to execute a directory traversal.

Deeper analysisAI

CVE-2024-57784 is a directory traversal vulnerability (CWE-22) in the /php/script_uploads.php component of Zenitel AlphaWeb XE version 11.2.3.10. Published on 2025-01-16, it has a CVSS v3.1 base score of 5.5 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N), rated as medium severity. The flaw enables attackers to traverse directories, potentially accessing sensitive files outside the intended upload path.

Exploitation requires network access and high privileges (PR:H), such as an authenticated administrative user, with low attack complexity and no user interaction needed. Successful exploitation allows high confidentiality impact by reading arbitrary files, limited integrity impact, and no availability disruption, making it a targeted risk for privileged insiders or compromised accounts.

A reference advisory is available at https://gist.github.com/s4fv4n/8cc4e4cb6fd028e803898837b73aa342 for details on the vulnerability, including potential mitigation guidance.

Details

CWE(s)

CVEs Like This One

CVE-2025-1335Shared CWE-22
CVE-2025-68953Shared CWE-22
CVE-2026-3051Shared CWE-22
CVE-2026-30914Shared CWE-22
CVE-2025-60946Shared CWE-22
CVE-2024-57549Shared CWE-22
CVE-2025-8729Shared CWE-22
CVE-2025-2264Shared CWE-22
CVE-2026-6024Shared CWE-22
CVE-2025-67160Shared CWE-22

References