Lyrie
active-exploitation
ACTIVELY EXPLOITED3 sources verified·4 min read
By Lyrie Threat Intelligence·3/10/2025

What happened

CISA added CVE-2024-57968 (Advantive VeraCore) to the Known Exploited Vulnerabilities (KEV) catalog on 2025-03-10, signaling observed exploitation in the wild CISA KEV. The entry states VeraCore has an unrestricted file upload flaw enabling a remote, unauthenticated attacker to upload files to unintended folders via the upload.apsx endpoint CISA KEV. The vulnerability maps to CWE-434 (Unrestricted Upload of File with Dangerous Type), per the CVE record NVD CVE-2024-57968. A corresponding record exists in MITRE’s CVE corpus for tracking and coordination MITRE CVE-2024-57968.

CISA’s KEV entry sets a remediation due date of 2025-03-31 for federal civilian agencies and directs teams to apply vendor mitigations, follow BOD 22-01 guidance for cloud services, or discontinue use if mitigations are unavailable CISA KEV.

Why it matters

Being listed in KEV means there is evidence of exploitation, not theoretical risk—this is actively abused territory CISA KEV. Unauthenticated upload avenues are high-velocity entry points because they require no credentials, making them ideal for automated probing and mass exploitation CISA KEV. CWE-434 issues allow adversaries to place files the application should never accept, a class recognized in the CVE’s mapping NVD CVE-2024-57968. For organizations running VeraCore, exposure equals a direct path for arbitrary content landing in server-controlled storage via upload.apsx, per the KEV description CISA KEV.

Technical detail

Per CISA, the flaw is an unrestricted file upload reachable by remote, unauthenticated users, and its effect is the ability to upload files into unintended folders through upload.apsx CISA KEV. Unrestricted file upload vulnerabilities (CWE-434) occur when the application fails to enforce type, content, or destination controls that prevent dangerous uploads, as reflected by the CVE’s CWE mapping NVD CVE-2024-57968. The CVE is registered and trackable via MITRE’s public record, which aligns metadata across vendors and databases for coordination MITRE CVE-2024-57968.

The KEV record provides the authoritative operational timeline: date added 2025-03-10 and due date 2025-03-31, guiding urgent remediation windows for impacted environments CISA KEV. While the KEV synopsis does not enumerate version specifics, the affected product scope is Advantive VeraCore, with exploitation via upload.apsx explicitly called out in the entry CISA KEV. The presence of CWE-434 on NVD also anchors the vulnerability class for defenders aligning controls to that pattern NVD CVE-2024-57968.

Defense

  • Prioritize remediation per CISA: apply vendor mitigations, follow BOD 22-01 for cloud, or discontinue use if mitigations aren’t available; federal due date is 2025-03-31 CISA KEV.
  • Reduce exposure while awaiting fixes: restrict or gate access to upload.apsx so only authenticated, authorized workflows can reach it, in line with the CVE’s unauthenticated upload vector CISA KEV.
  • Enforce strict allow-lists for file types and validate server-side, aligning controls to the CWE-434 class indicated on NVD for this CVE NVD CVE-2024-57968.
  • Constrain upload destinations to intended, non-executable storage paths and verify path handling, consistent with the “unintended folders” risk in the KEV synopsis CISA KEV.
  • Monitor and alert for unauthenticated POSTs or anomalous volumes targeting upload.apsx, correlating with the exploitation vector described by CISA CISA KEV.
  • Validate inventory: enumerate any externally reachable VeraCore upload surfaces and cross-check against the CVE entry to scope exposure MITRE CVE-2024-57968.

CISA flags ransomware usage as unknown for this CVE, but KEV inclusion alone raises the priority for immediate action CISA KEV.

Lyrie Verdict

Unrestricted, unauthenticated upload is fuel for automated adversaries. Our stance: treat upload.apsx as a machine-speed choke point. Lyrie instruments autonomous detection for unsolicited uploads to upload.apsx, watching for unauthenticated POSTs, mismatched MIME/extension pairs, and bursts of binary content into VeraCore storage paths aligned to the CVE’s vector CISA KEV. We correlate cross-tenant patterns and auto-quarantine hosts that begin accepting uploads consistent with CWE-434 abuse tied to CVE-2024-57968 NVD CVE-2024-57968. Net: Lyrie blocks the upload pipeline before files land where they don’t belong—autonomous, not waiting on human response—because KEV-listed paths like upload.apsx are exactly where rogue automation hunts CISA KEV.

Lyrie Verdict

Lyrie will autonomously detect and block unauthenticated uploads to upload.apsx—correlating MIME/extension anomalies and bursty POSTs—cutting off CWE-434 abuse for CVE-2024-57968 at machine speed.