US government warns agencies to make sure their backups are safe from NAKIVO security issue

US government warns agencies to make sure their backups are safe from NAKIVO security issue

  • 21.03.2025 14:32
  • techradar.com
  • Keywords: NAKIVO, CISA

The US government has warned agencies about a critical NAKIVO security flaw (CVE-2024-48248), which allows remote code execution. The bug was patched in November 2024, but CISA added it to its Known Exploited Vulnerabilities list, giving agencies until April 9 to apply the patch or halt use of the product.

Microsoft Products

Estimated market influence

NAKIVO

Negativesentiment_dissatisfied
Analyst rating: N/A

The company's software has a high-severity vulnerability that is being exploited in the wild, leading to potential data breaches and security compromises. The US government has mandated agencies to patch this issue or stop using NAKIVO products.

CISA

Positivesentiment_satisfied
Analyst rating: N/A

CISA added the vulnerability to its KEV catalog, signaling in-the-wild abuse and giving a deadline for agencies to apply patches. This action highlights the importance of cybersecurity and proactive measures.

Context

Analysis of NAKIVO Security Vulnerability and Market Implications

Vulnerability Overview

  • CVE ID: CVE-2024-48248
  • Severity Score: 8.6/10 (High)
  • Type: Absolute path traversal vulnerability
  • Affected Versions: Backup & Replication software versions before 11.0.0.88174
  • Exploit Impact: Can lead to remote code execution, exposing sensitive data such as backups, credentials, and configuration files.

Business Impact

  • Patch Timeline:
    • Patched in November 2024.
    • CISA added the vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, mandating Federal Civilian Executive Branch (FCEB) agencies to patch by April 9, 2024, or cease using NAKIVO products.
  • Clientele:
    • Serves 25,000 customers across 183 countries.
    • Key clients include Honda, Cisco, Coca-Cola, and Siemens.
    • Used in industries like IT, hospitality, government, and education.

Market Implications

  • Regulatory Focus:
    • CISA’s directive underscores the importance of timely patching for federal agencies, setting a precedent for other organizations to follow.
    • Highlights the growing regulatory scrutiny on cybersecurity practices.
  • Customer Trust:
    • Active exploitation in the wild may harm NAKIVO’s reputation and lead to customer attrition if not managed effectively.
  • Market Competition:
    • Competitors like Veeam, Backupify, and others may see increased interest as enterprises reassess their backup solutions.

Competitive Dynamics

  • NAKIVO's Position:
    • A leading provider of backup, ransomware protection, and disaster recovery solutions.
    • Supports multiple platforms including VMware vSphere, Azure, AWS EC2, Microsoft 365, and various NAS devices.
  • Strategic Considerations:
    • Organizations using NAKIVO must prioritize patching to avoid potential data breaches and compliance issues.
    • The vulnerability may prompt a shift toward alternative solutions for enterprises with high security requirements.

Long-term Effects

  • Supply Chain Security:
    • Emphasizes the need for robust supply chain security practices in software development.
  • Industry-Wide Impact:
    • Serves as a reminder of the risks associated with unpatched vulnerabilities, particularly in backup systems, which are critical to business continuity.

Key Takeaways

  • Immediate Action: Organizations using NAKIVO Backup & Replication should prioritize patching or alternative solutions.
  • Regulatory Compliance: Federal agencies must adhere to CISA’s directive, while others are encouraged to follow suit.
  • Market Shifts: Potential long-term impacts on NAKIVO’s market share and increased focus on backup solution security.