cve/2024/CVE-2024-26291.md

21 lines
1.4 KiB
Markdown
Raw Permalink Normal View History

2025-09-29 21:09:30 +02:00
### [CVE-2024-26291](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26291)
![](https://img.shields.io/static/v1?label=Product&message=Avid%20NEXIS%20E-series&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Avid%20NEXIS%20F-series&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Avid%20NEXIS%20PRO%2B&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=System%20Director%20Appliance%20(SDA%2B)&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-285%3A%20Improper%20Authorization&color=brightgreen)
### Description
An Unauthenticated Arbitrary File Read vulnerability affects theAgent when installed on a system. The parameter filename does not validate thepath thus allowing users to read arbitrary files. Asthe application runs with the highest privileges (root/NT_AUTHORITY SYSTEM)by default attackers are able to obtain sensitive information.This issue affects Avid NEXIS E-series: before 2025.5.1; Avid NEXIS F-series: before 2025.5.1; Avid NEXIS PRO+: before 2025.5.1; System Director Appliance (SDA+): before 2025.5.1.
### POC
#### Reference
- https://raeph123.github.io/BlogPosts/Avid_Nexis/Advisory_Avid_Nexus_Agent_Multiple_Vulnerabilities_en.html
#### Github
No PoCs found on GitHub currently.