CISA Flags NAKIVO Backup Flaw

In March 2025, the Cybersecurity and Infrastructure Security Agency (CISA) added a critical vulnerability in NAKIVO’s Backup & Replication software to its Known Exploited Vulnerabilities (KEV) catalog. This flaw, identified as CVE-2024-48248, is an absolute path traversal vulnerability that enables unauthenticated attackers to read arbitrary files on affected systems, potentially exposing sensitive data such as configuration files, backups, and credentials. The vulnerability has a Common Vulnerability Scoring System (CVSS) score of 8.6, indicating its high severity.

Discovery and Disclosure

The vulnerability was discovered by cybersecurity firm watchTowr in September 2024. They reported the issue to NAKIVO, which subsequently patched it in November 2024 with the release of Backup & Replication v11.0.0.88174. However, NAKIVO did not publicly disclose the vulnerability or its patch at that time. In February 2025, watchTowr released a proof-of-concept exploit for CVE-2024-48248, highlighting the potential risks associated with the flaw.

Protect against loss and corruption with TrueNASs unbeatable data safeguards.

Active Exploitation

Following the public disclosure, CISA added the vulnerability to its KEV catalog, citing evidence of active exploitation. The agency emphasized the significant risks posed by such vulnerabilities, noting that they are frequent attack vectors for malicious cyber actors and can lead to data breaches or further security compromises. CISA has mandated that Federal Civilian Executive Branch (FCEB) agencies apply the necessary mitigations by April 9, 2025, in accordance with Binding Operational Directive (BOD) 22-01.

Implications for Organizations

Organizations using NAKIVO’s Backup & Replication software are strongly advised to upgrade to version 11.0.0.88174 or newer to mitigate the risks associated with this vulnerability. Additionally, it’s recommended to review system logs for signs of unauthorized access attempts and to enhance network security through measures such as segmentation and robust firewalling.

References

5 Comments

  1. Absolute path traversal? Sounds like someone left the keys under the mat! Makes you wonder what else is lurking in those backups – maybe a company’s secret recipe for world domination? Time to update, folks!

    • That’s a great analogy! It’s definitely worth considering what sensitive information might be unintentionally exposed in backups. Proactive security measures like regular audits and principle of least privilege are essential to minimizing those risks. Thanks for highlighting that!

      Editor: StorageTech.News

      Thank you to our Sponsor Esdebe

  2. Yikes, absolute path traversal? So, if I understand correctly, it’s less “backup” and more “open invitation to snoop around”? Guess it’s time to add “check for actively exploited vulnerabilities” to the Monday morning to-do list, right after coffee!

    • That’s a great way to put it! The “open invitation to snoop around” analogy really highlights the potential impact. Prioritizing vulnerability checks alongside that crucial morning coffee seems like an excellent strategy for a secure week! What tools are you considering adding to your Monday routine?

      Editor: StorageTech.News

      Thank you to our Sponsor Esdebe

  3. Given the vulnerability wasn’t publicly disclosed until February 2025, what implications does this delayed transparency have for organizations that were affected between November 2024 and February 2025?

Leave a Reply to Luke Little Cancel reply

Your email address will not be published.


*