Initiatives pour
En tant qu'autorité nationale en matière de cybersécurité, le CCB a développé plusieurs initiatives destinées à des publics spécifiques, qui sont présentées ici.
Reference:
Advisory #2025-51
Version:
1.0
Affected software:
NAKIVO Backup and Replication (before v11.0)
Type:
Arbitrary File Read vulnerability
CVE/CVSS:
CVE-2024-48248: CVSS 8.6 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N)
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-48248
CVE-2024-48248: NAKIVO Backup & Replication (Unauthenticated Arbitrary File Read)
The vulnerability allows absolute path traversal for reading files via getImageByPath to /c/router (this may lead to remote code execution across the enterprise). Attackers can exploit this by sending crafted HTTP requests. This vulnerability is critical as it potentially enables attackers to exfiltrate sensitive data, leading to unauthorized access to backup data and other critical information.
The Centre for Cybersecurity Belgium strongly recommends installing updates for vulnerable devices with the highest priority, after thorough testing. Please install v11.0.0.88174 or above, where the vulnerability has been patched.
Ensure that backup solutions are isolated from general network access and only accessible by authorized personnel. Avoid exposing your backup instances to the public internet. Implement VPNs to provide secure remote access for authorized users with MFA enabled.
The CCB recommends organizations upscale monitoring and detection capabilities to identify any related suspicious activity, ensuring a swift response in case of an intrusion.
In case of an intrusion, you can report an incident via: https://ccb.belgium.be/cert/report-incident.
While patching appliances or software to the newest version may provide safety from future exploitation, it does not remediate historic compromise.