Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13416: CWE-532: Insertion of Sensitive Information into Log File in 2N 2N OS

0
Medium
VulnerabilityCVE-2024-13416cvecve-2024-13416cwe-532
Published: Thu Feb 06 2025 (02/06/2025, 19:09:06 UTC)
Source: CVE Database V5
Vendor/Project: 2N
Product: 2N OS

Description

Using API in the 2N OS device, authorized user can enable logging, which discloses valid authentication tokens in system log. 2N has released an updated version 2.46 of 2N OS, where this vulnerability is mitigated. It is recommended that all customers update their devices to the latest 2N OS.

AI-Powered Analysis

AILast updated: 01/09/2026, 14:15:09 UTC

Technical Analysis

CVE-2024-13416 is a vulnerability classified under CWE-532, which involves the insertion of sensitive information into log files. Specifically, in 2N OS devices running version 2.45 or earlier, an authorized user can enable a logging feature via the device's API that causes valid authentication tokens to be recorded in system logs. These tokens, if accessed by unauthorized parties, could be used to impersonate legitimate users or gain unauthorized access to the system. The vulnerability requires that the attacker already have authorized user privileges to enable logging, but no user interaction is needed beyond that. The CVSS v3.1 score is 4.3 (medium), reflecting the network attack vector, low complexity, and the requirement for privileges but no user interaction. The vulnerability affects confidentiality only, with no impact on integrity or availability. 2N has addressed this issue in version 2.46 of 2N OS by modifying the logging behavior to prevent sensitive token disclosure. No public exploits have been reported, but the presence of sensitive tokens in logs represents a significant risk if logs are improperly accessed or retained. Organizations using 2N OS devices should update promptly and review log management policies to limit exposure.

Potential Impact

For European organizations, the exposure of valid authentication tokens in logs could lead to unauthorized access if logs are accessed by malicious insiders or external attackers who gain access through other means. This risk is particularly acute in sectors where 2N OS devices are deployed for physical access control, telecommunications, or security systems, as token compromise could allow bypassing authentication controls. Confidentiality breaches could result in unauthorized entry, data leakage, or lateral movement within networks. While the vulnerability requires authorized user privileges to enable logging, insider threats or compromised credentials could be leveraged to exploit this issue. The impact on availability and integrity is minimal, but the potential for privilege escalation and unauthorized access makes this a significant concern. European organizations with strict data protection regulations (e.g., GDPR) must also consider the compliance implications of sensitive token exposure.

Mitigation Recommendations

The primary mitigation is to upgrade all affected 2N OS devices to version 2.46 or later, where the vulnerability has been fixed. Additionally, organizations should audit and restrict access to system logs to minimize the risk of token exposure. Implement strict role-based access controls (RBAC) to limit who can enable logging features and access logs. Regularly review and sanitize logs to remove sensitive information where possible. Employ network segmentation to isolate 2N OS devices and their logs from broader network access. Monitor for unusual logging activity or unauthorized changes to logging configurations. Finally, enforce strong authentication and credential management policies to reduce the risk of authorized user accounts being compromised.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Axis
Date Reserved
2025-01-15T18:22:25.502Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696109bd7a8fb5c58f6e7c2b

Added to database: 1/9/2026, 1:59:25 PM

Last enriched: 1/9/2026, 2:15:09 PM

Last updated: 1/10/2026, 10:16:03 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats