CVE-2024-2056

Services that are running and bound to the loopback interface on the Artica Proxy are accessible through the proxy service. In particular, the "tailon" service is running, running as the root user, is bound to the loopback interface, and is listening on TCP port 7050. Security issues associated with exposing this network service are documented at gvalkov's 'tailon' GitHub repo. Using the tailon service, the contents of any file on the Artica Proxy can be viewed.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:articatech:artica_proxy:4.50.000000:-:*:*:*:*:*:*

History

12 Jan 2026, 15:44

Type Values Removed Values Added
First Time Articatech
Articatech artica Proxy
CPE cpe:2.3:a:articatech:artica_proxy:4.50.000000:-:*:*:*:*:*:*
References () http://seclists.org/fulldisclosure/2024/Mar/14 - () http://seclists.org/fulldisclosure/2024/Mar/14 - Exploit, Mailing List, Third Party Advisory
References () https://github.com/gvalkov/tailon#security - () https://github.com/gvalkov/tailon#security - Not Applicable
References () https://korelogic.com/Resources/Advisories/KL-001-2024-004.txt - () https://korelogic.com/Resources/Advisories/KL-001-2024-004.txt - Exploit, Third Party Advisory

21 Nov 2024, 09:08

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2024/Mar/14 - () http://seclists.org/fulldisclosure/2024/Mar/14 -
References () https://github.com/gvalkov/tailon#security - () https://github.com/gvalkov/tailon#security -
References () https://korelogic.com/Resources/Advisories/KL-001-2024-004.txt - () https://korelogic.com/Resources/Advisories/KL-001-2024-004.txt -

23 Aug 2024, 21:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

05 Mar 2024, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-05 20:16

Updated : 2026-01-12 15:44


NVD link : CVE-2024-2056

Mitre link : CVE-2024-2056

CVE.ORG link : CVE-2024-2056


JSON object : View

Products Affected

articatech

  • artica_proxy
CWE
CWE-288

Authentication Bypass Using an Alternate Path or Channel

CWE-552

Files or Directories Accessible to External Parties