Services that are running and bound to the loopback interface on the Artica Proxy are accessible through the proxy service. In particular, the "tailon" service is running, running as the root user, is bound to the loopback interface, and is listening on TCP port 7050. Security issues associated with exposing this network service are documented at gvalkov's 'tailon' GitHub repo. Using the tailon service, the contents of any file on the Artica Proxy can be viewed.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-27021 | Services that are running and bound to the loopback interface on the Artica Proxy are accessible through the proxy service. In particular, the "tailon" service is running, running as the root user, is bound to the loopback interface, and is listening on TCP port 7050. Security issues associated with exposing this network service are documented at gvalkov's 'tailon' GitHub repo. Using the tailon service, the contents of any file on the Artica Proxy can be viewed. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 12 Jan 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Articatech
Articatech artica Proxy |
|
| CPEs | cpe:2.3:a:articatech:artica_proxy:4.50.000000:-:*:*:*:*:*:* | |
| Vendors & Products |
Articatech
Articatech artica Proxy |
Fri, 23 Aug 2024 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: AHA
Published:
Updated: 2025-02-13T17:32:34.912Z
Reserved: 2024-03-01T02:03:12.654Z
Link: CVE-2024-2056
Updated: 2024-08-01T19:03:38.787Z
Status : Analyzed
Published: 2024-03-05T20:16:01.703
Modified: 2026-01-12T15:44:02.657
Link: CVE-2024-2056
No data.
OpenCVE Enrichment
No data.
EUVD