CVE-2024-57785
Published: 16 January 2025
Summary
CVE-2024-57785 is a medium-severity Use of Incorrectly-Resolved Name or Reference (CWE-706) vulnerability. Its CVSS base score is 4.9 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 5.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and AC-3 (Access Enforcement).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents local file inclusion by requiring validation of user-supplied file paths in the amc_uploads.php component to block path traversal attacks.
Enforces access control policies to restrict high-privilege users from reading sensitive local files even if inclusion is attempted.
Limits the assignment of high privileges required for exploitation, reducing the attack surface for this PR:H vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
LFI in public-facing web app directly enables T1190 exploitation and arbitrary local file reads for T1005 data collection.
NVD Description
Zenitel AlphaWeb XE v11.2.3.10 was discovered to contain a local file inclusion vulnerability via the component amc_uploads.php.
Deeper analysisAI
Zenitel AlphaWeb XE version 11.2.3.10 is affected by a local file inclusion vulnerability via the amc_uploads.php component, as tracked under CVE-2024-57785 and published on 2025-01-16. This flaw corresponds to CWE-706 and carries a CVSS v3.1 base score of 4.9 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N), indicating a moderate severity issue primarily impacting confidentiality.
The vulnerability can be exploited over the network with low complexity by an attacker possessing high privileges (PR:H), requiring no user interaction. Successful exploitation allows the attacker to achieve high-impact confidentiality violations, such as reading sensitive local files, without affecting integrity or availability.
Mitigation details are available in the referenced advisory at https://gist.github.com/s4fv4n/56c326450dcb3ab808b5ce8242a11e30.
Details
- CWE(s)