BC Security Empire before 5.9.3 is vulnerable to a path traversal issue that can lead to remote code execution. A remote, unauthenticated attacker can exploit this vulnerability over HTTP by acting as a normal agent, completing all cryptographic handshakes, and then triggering an upload of payload data containing a malicious path.
                
            References
                    Configurations
                    No configuration.
History
                    25 Sep 2025, 19:15
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | CWE-434 | 
21 Nov 2024, 09:49
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | |
| References | () https://aceresponder.com/blog/exploiting-empire-c2-framework - | |
| References | () https://github.com/ACE-Responder/Empire-C2-RCE-PoC - | |
| References | () https://github.com/BC-SECURITY/Empire/blob/8283bbc77250232eb493bf1f9104fdd0d468962a/CHANGELOG.md?plain=1#L102 - | |
| References | () https://vulncheck.com/advisories/empire-unauth-rce - | 
27 Jun 2024, 20:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-06-27 20:15
Updated : 2025-09-25 19:15
NVD link : CVE-2024-6127
Mitre link : CVE-2024-6127
CVE.ORG link : CVE-2024-6127
JSON object : View
Products Affected
                No product.
