CVE Vulnerabilities

CVE-2024-2056

Authentication Bypass Using an Alternate Path or Channel

Published: Mar 05, 2024 | Modified: Jan 12, 2026
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

Services that are running and bound to the loopback interface on the Artica Proxy are accessible through the proxy service. In particular, the tailon service is running, running as the root user, is bound to the loopback interface, and is listening on TCP port 7050. Security issues associated with exposing this network service are documented at gvalkovs tailon GitHub repo. Using the tailon service, the contents of any file on the Artica Proxy can be viewed.

Weakness

The product requires authentication, but the product has an alternate path or channel that does not require authentication.

Affected Software

NameVendorStart VersionEnd Version
Artica_proxyArticatech4.50.000000 (including)4.50.000000 (including)

Potential Mitigations

References