Home Tacquito CVE-2024-49400
Back to Tacquito

CVE-2024-49400

Tacquito - Authorization Service

Tacquito CVSS 9.8 Updated April 6, 2026

Executive Risk Summary

"A vulnerability in Tacquito prior to commit 07b49d1358e6ec0b5aa482fcd284f509191119e2 allows unauthorized commands to be executed due to improper regex matches on authorized commands and arguments. This could potentially lead to system compromise and unauthorized access."

Anticipated Attack Path

  1. 1. Initial Exploitation: Attacker sends malicious input to exploit regex vulnerability
  2. 2. Privilege Escalation: Attacker gains unauthorized access to system commands
  3. 3. Lateral Movement: Attacker potentially moves laterally within the system

Am I Vulnerable?

  • Verify Tacquito version and commit hash
  • Review system logs for suspicious command execution
  • Validate regex patterns for authorized commands and arguments

Operational Audit Arsenal

Target Type Service
Target Asset Tacquito Service
Standard Path /etc/tacquito/tacquito.conf

Manual Verification Required

This is a non-Windows asset (Tacquito). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.

Patch Impact Forecast

Reboot Required Unlikely

Minimal, service restart required

Internal Work Notes

CVE-2024-49400: Tacquito regex vulnerability allows unauthorized command execution, patch and verify system configuration ASAP

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.