{"id":44243,"date":"2025-05-25T09:34:55","date_gmt":"2025-05-25T09:34:55","guid":{"rendered":""},"modified":"2025-06-03T11:21:48","modified_gmt":"2025-06-03T17:21:48","slug":"cve-2024-55063-critical-code-injection-vulnerabilities-in-easyvirt-dc-netscope","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2024-55063-critical-code-injection-vulnerabilities-in-easyvirt-dc-netscope\/","title":{"rendered":"<strong>CVE-2024-55063: Critical Code Injection Vulnerabilities in EasyVirt DC NetScope<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>The focus of this blog post is CVE-2024-55063, a severe vulnerability pertaining to multiple code injection points in EasyVirt DC NetScope that allows authenticated remote attackers to execute arbitrary code. This vulnerability affects all versions of EasyVirt DC NetScope up to and including 8.7.0. Given the widespread usage of EasyVirt DC NetScope, this <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-4648-integrity-check-vulnerability-in-centreon-web-leading-to-potential-xss-injection\/\"  data-wpil-monitor-id=\"49876\">vulnerability could potentially<\/a> impact a large number of users and systems. It is <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-4809-critical-vulnerability-in-tenda-ac7-router-leads-to-system-compromise\/\"  data-wpil-monitor-id=\"50601\">critical due to its potential to compromise systems<\/a> and leak sensitive data, emphasizing the need for immediate mitigation.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2024-55063<br \/>\nSeverity: Critical, CVSS score 8.8<br \/>\nAttack Vector: Network<br \/>\nPrivileges Required: Low<br \/>\nUser Interaction: Required<br \/>\nImpact: <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-39401-unrestricted-file-upload-leading-to-potential-system-compromise-in-mojoomla-wpams\/\"  data-wpil-monitor-id=\"52109\">System compromise<\/a>, potential data leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-220947380\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p>EasyVirt DC NetScope | <= 8.7.0\n\n<strong>How the Exploit Works<\/strong><\/p>\n<p>The <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-47577-severe-unrestricted-file-upload-vulnerability-in-ti-woocommerce-wishlist\/\"  data-wpil-monitor-id=\"52108\">vulnerability arises from improper input sanitization in several<\/a> parameters of the EasyVirt DC NetScope. Four parameters-&#8216;lang&#8217;, &#8216;keyboard_layout&#8217;, &#8216;keyboard_variant&#8217;, and &#8216;timezone&#8217;-in three different settings pages are susceptible to <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-46724-critical-code-injection-vulnerability-in-langroid-python-framework\/\"  data-wpil-monitor-id=\"52608\">code injection<\/a> attacks. An authenticated attacker can insert malicious code into the input fields of these parameters, which the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2024-51360-remote-code-execution-vulnerability-in-hospital-management-system-in-php-v4-0\/\"  data-wpil-monitor-id=\"54350\">system will then execute<\/a>. This could <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-4759-incorrect-behavior-order-in-lockfile-lint-api-package-potentially-leading-to-system-compromise\/\"  data-wpil-monitor-id=\"51166\">potentially lead to a system<\/a> compromise or data leakage.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p>\n<p>Here&#8217;s a conceptual example of how the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-47708-cross-site-request-forgery-vulnerability-in-drupal-enterprise-mfa-tfa\/\"  data-wpil-monitor-id=\"49810\">vulnerability might be exploited using a malicious HTTP request:<\/a><\/p><div id=\"ameeb-4202180408\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<pre><code class=\"\" data-line=\"\">POST \/international\/keyboard\/options HTTP\/1.1\nHost: target.example.com\nContent-Type: application\/json\n{ &quot;lang&quot;: &quot;&lt;script&gt;malicious_code_here&lt;\/script&gt;&quot; }<\/code><\/pre>\n<p>In this example, the attacker sends a <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-4827-critical-buffer-overflow-vulnerability-in-totolink-http-post-request-handler\/\"  data-wpil-monitor-id=\"51167\">POST request<\/a> to the &#8216;\/international\/keyboard\/options&#8217; endpoint with a malicious script embedded in the &#8216;lang&#8217; parameter. If the system is vulnerable, it will <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-24022-critical-server-code-execution-vulnerability-in-itop-it-service-management-tool\/\"  data-wpil-monitor-id=\"49833\">execute the malicious code<\/a>, potentially leading to system compromise or data leakage.<\/p>\n<p><strong>Mitigation Guidance<\/strong><\/p>\n<p>To mitigate this vulnerability, users are advised to apply the vendor-provided patch as soon as possible. In the meantime, using a Web Application Firewall (WAF) or Intrusion Detection System (IDS) can provide temporary mitigation. It\u2019s crucial to keep in mind that WAF\/IDS are just temporary solutions and cannot replace the need for patching the system.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview The focus of this blog post is CVE-2024-55063, a severe vulnerability pertaining to multiple code injection points in EasyVirt DC NetScope that allows authenticated remote attackers to execute arbitrary code. This vulnerability affects all versions of EasyVirt DC NetScope up to and including 8.7.0. Given the widespread usage of EasyVirt DC NetScope, this vulnerability [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[],"product":[],"attack_vector":[78],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-44243","post","type-post","status-publish","format-standard","hentry","category-uncategorized","attack_vector-injection"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/44243","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=44243"}],"version-history":[{"count":8,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/44243\/revisions"}],"predecessor-version":[{"id":48551,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/44243\/revisions\/48551"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=44243"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=44243"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=44243"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=44243"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=44243"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=44243"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=44243"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=44243"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=44243"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}