Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13980: CWE-502 Deserialization of Untrusted Data in H3C Group Intelligent Management Center (iMC)

0
Critical
VulnerabilityCVE-2024-13980cvecve-2024-13980cwe-502
Published: Wed Aug 27 2025 (08/27/2025, 21:25:05 UTC)
Source: CVE Database V5
Vendor/Project: H3C Group
Product: Intelligent Management Center (iMC)

Description

H3C Intelligent Management Center (IMC) versions up to and including E0632H07 contains a remote command execution vulnerability in the /byod/index.xhtml endpoint. Improper handling of JSF ViewState allows unauthenticated attackers to craft POST requests with forged javax.faces.ViewState parameters, potentially leading to arbitrary command execution. This flaw does not require authentication and may be exploited without session cookies. An affected version range is undefined. Exploitation evidence was first observed by the Shadowserver Foundation on 2024-08-28 UTC.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 00:24:55 UTC

Technical Analysis

CVE-2024-13980 is a critical deserialization vulnerability in H3C Group's Intelligent Management Center (iMC), a widely used network management platform. The vulnerability exists in the /byod/index.xhtml endpoint due to improper handling of JavaServer Faces (JSF) ViewState parameters. Specifically, the application fails to securely deserialize the javax.faces.ViewState parameter, allowing attackers to craft malicious POST requests that inject arbitrary serialized objects. This leads to remote command execution (RCE) without requiring any authentication or session cookies, significantly lowering the barrier to exploitation. The flaw is categorized as CWE-502, which involves deserialization of untrusted data, a common vector for remote code execution attacks. The affected version range is broad, with all versions up to E0632H07 considered vulnerable. The vulnerability was publicly disclosed with a CVSS 4.0 score of 10.0, reflecting its critical nature and ease of exploitation. Although no official patches or updates have been linked yet, the Shadowserver Foundation observed exploitation attempts shortly after disclosure, indicating active interest from threat actors. This vulnerability threatens the confidentiality, integrity, and availability of affected systems by enabling attackers to execute arbitrary commands remotely, potentially leading to full system compromise.

Potential Impact

The impact of CVE-2024-13980 is severe for organizations worldwide using H3C Intelligent Management Center. Successful exploitation allows unauthenticated remote attackers to execute arbitrary commands on the management server, potentially leading to full system compromise. This can result in unauthorized access to sensitive network management data, disruption of network operations, and lateral movement within enterprise environments. Given that iMC is often deployed in large-scale enterprise and service provider networks, the vulnerability could be leveraged to disrupt critical infrastructure, exfiltrate confidential information, or deploy ransomware and other malware. The lack of authentication requirement and ease of exploitation increase the risk of widespread attacks. Organizations relying on H3C iMC for network management face risks including operational downtime, data breaches, and reputational damage. The vulnerability also poses a threat to supply chain security where managed networks depend on iMC for device and policy management.

Mitigation Recommendations

1. Immediately isolate and restrict access to the /byod/index.xhtml endpoint to trusted internal networks only, using network segmentation and firewall rules. 2. Monitor network traffic for suspicious POST requests containing unusual or malformed javax.faces.ViewState parameters. 3. Implement Web Application Firewall (WAF) rules to detect and block exploitation attempts targeting JSF ViewState deserialization. 4. Engage with H3C support or official channels to obtain patches or security advisories as they become available; prioritize patching once released. 5. If patching is not immediately possible, consider disabling the affected endpoint or related JSF functionality temporarily to mitigate risk. 6. Conduct thorough security audits and penetration testing focused on deserialization vulnerabilities in the iMC environment. 7. Employ endpoint detection and response (EDR) solutions to identify and respond to suspicious command execution activities on management servers. 8. Educate network and security teams about this vulnerability to ensure rapid detection and response to potential exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-08-25T18:56:50.272Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a979570e5bba37cad8c287

Added to database: 3/5/2026, 12:38:47 PM

Last enriched: 3/24/2026, 12:24:55 AM

Last updated: 4/19/2026, 2:39:32 PM

Views: 75

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses