CVE-2024-12086

MEDIUM
2025-01-14 [email protected]
6.1
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
None
Availability
None

Lifecycle Timeline

4
CVE Published
Jan 14, 2025 – 18:15 nvd
MEDIUM 6.1
PoC Detected
Nov 03, 2025 – 22:16 vuln.today
Public exploit code
Analysis Generated
Mar 28, 2026 – 18:03 vuln.today
Patch Released
Apr 02, 2026 – 14:30 nvd
Patch available

Description

A flaw was found in rsync. It could allow a server to enumerate the contents of an arbitrary file from the client's machine. This issue occurs when files are being copied from a client to a server. During this process, the rsync server will send checksums of local data to the client to compare with in order to determine what data needs to be sent to the server. By sending specially constructed checksum values for arbitrary files, an attacker may be able to reconstruct the data of those files byte-by-byte based on the responses from the client.

Analysis

A flaw was found in rsync. Rated medium severity (CVSS 6.1), this vulnerability is remotely exploitable, no authentication required. Public exploit code available and no vendor patch available.

Technical Context

This vulnerability is classified under CWE-390. A flaw was found in rsync. It could allow a server to enumerate the contents of an arbitrary file from the client's machine. This issue occurs when files are being copied from a client to a server. During this process, the rsync server will send checksums of local data to the client to compare with in order to determine what data needs to be sent to the server. By sending specially constructed checksum values for arbitrary files, an attacker may be able to reconstruct the data of those files byte-by-byte based on the responses from the client. Affected products include: Samba Rsync, Redhat Openshift Container Platform, Redhat Enterprise Linux, Almalinux, Archlinux Arch Linux.

Affected Products

Samba Rsync, Redhat Openshift Container Platform, Redhat Enterprise Linux, Almalinux, Archlinux Arch Linux.

Remediation

No vendor patch is available at time of analysis. Monitor vendor advisories for updates. Apply vendor patches when available. Implement network segmentation and monitoring as interim mitigations.

Priority Score

51
Low Medium High Critical
KEV: 0
EPSS: +0.6
CVSS: +30
POC: +20

Vendor Status

Share

CVE-2024-12086 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy