Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 14 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Mon, 13 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:sleuthkit:the_sleuth_kit:*:*:*:*:*:*:*:* |
Thu, 09 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 09 Apr 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sleuthkit
Sleuthkit the Sleuth Kit |
|
| Vendors & Products |
Sleuthkit
Sleuthkit the Sleuth Kit |
Wed, 08 Apr 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Sleuth Kit through 4.14.0 contains a path traversal vulnerability in tsk_recover that allows an attacker to write files to arbitrary locations outside the intended recovery directory via crafted filenames or directory paths with path traversal sequences in a filesystem image. An attacker can craft a malicious filesystem image with embedded /../ sequences in filenames that, when processed by tsk_recover, writes files outside the output directory, potentially achieving code execution by overwriting shell configuration or cron entries. | |
| Title | Sleuth Kit tsk_recover Path Traversal | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-09T18:13:37.338Z
Reserved: 2026-04-08T13:35:50.657Z
Link: CVE-2026-40024
Updated: 2026-04-09T18:13:20.720Z
Status : Analyzed
Published: 2026-04-08T22:16:22.430
Modified: 2026-04-15T20:52:44.537
Link: CVE-2026-40024
OpenCVE Enrichment
Updated: 2026-04-14T16:37:03Z