In a recent alert, the Cybersecurity and Infrastructure Security Agency (CISA) and the FBI underscored the ongoing risks associated with directory traversal vulnerabilities in software. Despite two decades of documented strategies for safeguarding against these types of breaches, developers continue to release products that are susceptible to exploitation.
"Malicious cyber actors use directory traversal to compromise systems," stated the alert, revealing the severity of the situation. CISA's emphasis on the significance of this issue stems from recent campaigns that have leveraged directory traversal vulnerabilities—specifically citing incidents tied to known vulnerabilities such as CVE-2024-1708 and CVE-2024-20345. "These vulnerabilities have impacted critical infrastructure sectors, including the Healthcare and Public Health Sector," the alert said, highlighting the dangers posed to essential services.
"Malicious cyber actors use directory traversal to compromise systems,"
Currently, CISA has identified 55 directory traversal vulnerabilities in its Known Exploited Vulnerabilities (KEV) catalog. The ongoing exploitation of these defects has prompted concern for the operations of vital services ranging from healthcare facilities to educational institutions. CISA and the FBI are advocating for proactive measures from software manufacturers, urging them to conduct formal testing to ascertain their products' susceptibility.

"We encourage software manufacturers to require their organizations to conduct formal testing in line with OWASP guidance," said CISA officials. This testing is critical to identifying and mitigating any potential weaknesses. Furthermore, they recommend that users inquire about manufacturers' testing practices, pressing for accountability in software security.
"We encourage software manufacturers to require their organizations to conduct formal testing in line with OWASP guidance,"
The alert reflects the principles of 'Secure by Design,' which emphasizes that manufacturers should incorporate security measures during the product design phase to prevent vulnerabilities from manifesting later on. "Secure by Design means that manufacturers design and build their products in a way that reasonably protects against malicious cyber actors," reiterated the alert, stressing the importance of embedding security in the development process.
"Secure by Design means that manufacturers design and build their products in a way that reasonably protects against malicious cyber actors,"
Even as industry knowledge on eliminating directory traversal vulnerabilities exists, exploitation persists. As one insider reflected, "Despite understanding these risks, we still witness directory traversal vulnerabilities considered 'unforgivable' in our products."
Vulnerabilities such as CWE-22, a type of directory traversal flaw, remain prevalent and troubling. This particular weakness appears in both the top 25 lists for "most dangerous" and "stubborn" software vulnerabilities for 2023, indicating a critical need for ongoing attention and action. The original identification of directory traversal vulnerabilities as 'unforgivable' dates back to 2007, yet the cyber threat landscape shows minimal improvement since that time, as these vulnerabilities continue to be among the most exploited.
"most dangerous"

CISA and the FBI are adamant that software developers must prioritize the elimination of directory traversal vulnerabilities. "Building security into products from the beginning can eliminate directory traversal vulnerabilities," warned the alert, pushing a clear message that proactive measures are not just beneficial but essential.
"Building security into products from the beginning can eliminate directory traversal vulnerabilities,"
As organizations across various sectors prepare to adapt to an increasingly complex digital frontier, the eyes of the cybersecurity community remain fixed on the steps manufacturers will take to address these longstanding weaknesses. The alert serves not only as a reminder of the persistent threats within software but also as a call to action for manufacturers and users alike to prioritize software security and uphold their responsibilities.
In conclusion, as we move forward, the mantra of 'Secure by Design' must be at the forefront of development strategies, particularly in light of the growing sophistication of cyber threats. The costs of inaction are steep, and with the operation of critical services at stake, it is incumbent upon all stakeholders to take the necessary steps to ensure robust cybersecurity measures are in place.

