External Control of File Name or Path Affecting ossec/ossec-hids package, versions [,3.8.0)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.26% (50th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-OSSECOSSECHIDS-10674173
  • published10 Jul 2025
  • disclosed11 Jun 2025
  • creditUnknown

Introduced: 11 Jun 2025

CVE-2024-1244  (opens in a new tab)
CWE-73  (opens in a new tab)

How to fix?

Upgrade ossec/ossec-hids to version 3.8.0 or higher.

Overview

Affected versions of this package are vulnerable to External Control of File Name or Path due to improper input validation. An attacker with control over the OSSEC server or in possession of the agent's key can configure the agent to connect to a malicious UNC path, resulting in the leakage of the machine account NetNTLMv2 hash. This hash can be relayed for unauthorized actions or used to escalate privileges to SYSTEM via AD CS certificate forging and other similar attacks.

CVSS Base Scores

version 4.0
version 3.1