Vulnerability Description
There is a path traversal in Esri Portal for ArcGIS versions <= 11.2. Successful exploitation may allow a remote, authenticated attacker to traverse the file system to access files or execute code outside of the intended directory.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Esri | Portal For Arcgis | <= 11.2 |
| Linux | Linux Kernel | - |
| Microsoft | Windows | - |
Related Weaknesses (CWE)
References
- https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portaVendor Advisory
- https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portaVendor Advisory
FAQ
What is CVE-2024-25693?
CVE-2024-25693 is a vulnerability with a CVSS score of 9.9 (CRITICAL). There is a path traversal in Esri Portal for ArcGIS versions <= 11.2. Successful exploitation may allow a remote, authenticated attacker to traverse the file system to access files or execute code ou...
How severe is CVE-2024-25693?
CVE-2024-25693 has been rated CRITICAL with a CVSS base score of 9.9/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-25693?
Check the references section above for vendor advisories and patch information. Affected products include: Esri Portal For Arcgis, Linux Linux Kernel, Microsoft Windows.