Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-28140: CWE-250 Execution with Unnecessary Privileges in Image Access GmbH Scan2Net

0
Medium
VulnerabilityCVE-2024-28140cvecve-2024-28140cwe-250
Published: Wed Dec 11 2024 (12/11/2024, 15:48:22 UTC)
Source: CVE Database V5
Vendor/Project: Image Access GmbH
Product: Scan2Net

Description

The scanner device boots into a kiosk mode by default and opens the Scan2Net interface in a browser window. This browser is run with the permissions of the root user. There are also several other applications running as root user. This can be confirmed by running "ps aux" as the root user and observing the output.

AI-Powered Analysis

AILast updated: 11/03/2025, 23:57:20 UTC

Technical Analysis

CVE-2024-28140 identifies a security weakness in Image Access GmbH's Scan2Net scanner devices, specifically related to execution with unnecessary privileges (CWE-250). The device boots into a kiosk mode by default, launching the Scan2Net interface within a browser that runs with root user permissions. Additionally, multiple other applications on the device also run as root. This elevated privilege level is confirmed by executing "ps aux" as root and observing the processes. The vulnerability allows an attacker who can interact with the device or its network interface to potentially execute arbitrary code or manipulate sensitive data with root-level access, severely compromising confidentiality and integrity. The CVSS 3.1 score of 6.1 reflects a medium severity, with a partial network attack vector (AV:P), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The scope is unchanged (S:U), but the impact on confidentiality and integrity is high (C:H/I:H), while availability is unaffected (A:N). No public exploits are known yet, and no patches have been released at the time of reporting. The root cause is the design choice to run the kiosk browser and other applications with excessive privileges, violating the principle of least privilege and increasing the attack surface. This vulnerability could be leveraged by attackers to gain full control over the device, access scanned documents, or pivot into connected networks.

Potential Impact

For European organizations, the impact of CVE-2024-28140 can be significant, especially for those relying on Scan2Net devices for document scanning and management. The high confidentiality impact means sensitive scanned documents or internal data could be exposed or altered by attackers. Integrity compromise could lead to falsified or tampered scanned outputs, undermining trust in document authenticity. Although availability is not directly affected, the breach of root privileges could enable attackers to implant persistent malware or backdoors, threatening broader network security. Organizations in sectors such as government, legal, healthcare, and finance that handle sensitive documents are particularly at risk. The partial network attack vector implies that attackers may exploit the vulnerability remotely if network access to the device is possible, increasing the threat surface in environments with insufficient network segmentation. The lack of required authentication and user interaction further lowers the barrier for exploitation. However, the medium severity and absence of known exploits suggest the threat is not yet widespread but should be addressed proactively.

Mitigation Recommendations

To mitigate CVE-2024-28140, organizations should implement the following specific measures: 1) Immediately audit all Scan2Net devices to verify the privilege levels of running applications and confirm if the kiosk browser runs as root. 2) Where possible, reconfigure or harden the device to run the browser and other applications with least privilege, avoiding root execution. 3) Isolate Scan2Net devices on dedicated network segments or VLANs with strict access controls to limit exposure to untrusted networks or users. 4) Monitor network traffic and device logs for unusual activity indicative of exploitation attempts. 5) Engage with Image Access GmbH to obtain timelines for patches or firmware updates addressing this vulnerability and apply them promptly once available. 6) Consider deploying host-based intrusion detection or endpoint protection solutions on devices if supported. 7) Educate staff about the risks of connecting scanning devices to unsecured networks. 8) If device reconfiguration is not feasible, consider replacing affected devices with more secure alternatives. These steps go beyond generic advice by focusing on privilege reduction, network isolation, and proactive vendor engagement.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
SEC-VLab
Date Reserved
2024-03-05T09:15:40.201Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092621fe7723195e0b46eb

Added to database: 11/3/2025, 10:01:05 PM

Last enriched: 11/3/2025, 11:57:20 PM

Last updated: 11/5/2025, 2:05:25 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats