Skip to main content

Proof-of-Concept Exploits Released for RSync Vulnerabilities

Vulnerabilities in RSync could allow an attacker to execute arbitrary code or perform path traversal

Report a cyber attack: call 0300 303 5222 or email [email protected]

Summary

Vulnerabilities in RSync could allow an attacker to execute arbitrary code or perform path traversal


Affected platforms

The following platforms are known to be affected:

Threat details

Proof-of-Concept exploit released

A proof-of-concept (PoC) exploit has been released for 

  • CVE-2024-12084
  • CVE-2024-12085
  • CVE-2024-12086
  • CVE-2024-12087
  • CVE-2024-12088

Exploitation is considered more likely.


Introduction

Five vulnerabilities have been discovered within the RSync utility. RSync is a popular tool for transferring and synchronising files between different systems. RSync is commonly used in Unix-like operating systems.


Vulnerability details

  • CVE-2024-12084 is a 'heap-based buffer overflow' vulnerability, with a CVSSv3 score of 9.8. When used alongside CVE-2024-12085, attackers could gain remote code execution (RCE). 
  • CVE-2024-12085 is an 'improper restriction of operations within the bounds of a memory buffer' vulnerability, with a CVSSv3 score of 7.5. When used alongside CVE-2024-12084, attackers could gain RCE.
  • CVE-2024-12086 is a 'detection of error condition without action' vulnerability with a CVSSv3 score of 6.1. The exploitation of the vulnerability could allow an attacker to access and reconstruct sensitive data from the client's files.
  • CVE-2024-12087 is a 'path traversal' vulnerability, with a CVSSv3 score of 6.5. Successful exploitation of this vulnerability could allow an attacker to write malicious files to an arbitrary location on a user's system. 
  • CVE-2024-12088 is a  'path traversal' vulnerability, with a CVSSv3 score of 6.5. An attacker could exploit this vulnerability to write files outside of the intended directory, potentially placing malicious files on the user's system.

Remediation advice

Affected organisations are encouraged to upgrade RSync to version 3.4.0 or later as soon as practicable. 


Definitive source of threat updates


CVE Vulnerabilities

Last edited: 26 February 2025 5:35 pm