Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-28141: CWE-352 Cross-Site Request Forgery (CSRF) in Image Access GmbH Scan2Net

0
Medium
VulnerabilityCVE-2024-28141cvecve-2024-28141cwe-352
Published: Wed Dec 11 2024 (12/11/2024, 15:54:38 UTC)
Source: CVE Database V5
Vendor/Project: Image Access GmbH
Product: Scan2Net

Description

The web application is not protected against cross-site request forgery attacks. Therefore, an attacker can trick users into performing actions on the application when they visit an attacker-controlled website or click on a malicious link. E.g. an attacker can forge malicious links to reset the admin password or create new users.

AI-Powered Analysis

AILast updated: 11/03/2025, 23:57:31 UTC

Technical Analysis

CVE-2024-28141 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Scan2Net web application developed by Image Access GmbH. CSRF vulnerabilities occur when a web application fails to verify that requests made to it originate from legitimate users, allowing attackers to trick authenticated users into submitting unauthorized commands. In this case, the Scan2Net application does not implement adequate CSRF protections, such as anti-CSRF tokens or origin checks. An attacker can exploit this by crafting malicious links or web pages that, when visited by an authenticated user, cause the user’s browser to send unauthorized requests to the Scan2Net application. Potential malicious actions include resetting the administrator password or creating new user accounts, which could lead to privilege escalation or unauthorized access. The vulnerability has a CVSS v3.1 base score of 6.3 (medium severity), reflecting its network attack vector, low attack complexity, no required privileges, but requiring user interaction. The impact includes limited confidentiality loss, integrity compromise, and availability disruption. No public exploits have been reported yet, but the vulnerability poses a significant risk if exploited. The affected product version is indicated as '0', which likely means all current versions or an unspecified version set are vulnerable. The vulnerability was published on December 11, 2024, and assigned by SEC-VLab.

Potential Impact

For European organizations using Scan2Net, this vulnerability could allow attackers to perform unauthorized administrative actions by leveraging authenticated users’ sessions. This can lead to unauthorized user creation, password resets, and potentially full administrative control over the scanning infrastructure. Such control could disrupt document workflows, leak sensitive scanned data, or enable further lateral movement within the network. The impact on confidentiality is moderate due to potential data exposure; integrity is affected by unauthorized changes to user accounts and settings; availability could be impacted if attackers disrupt scanning services. Since Scan2Net is used in professional and industrial environments, disruption could affect business operations and compliance with data protection regulations such as GDPR. The requirement for user interaction limits mass exploitation but targeted phishing campaigns could be effective. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate it.

Mitigation Recommendations

To mitigate CVE-2024-28141, organizations should implement several specific measures: 1) Apply any available vendor patches or updates as soon as they are released. 2) If patches are not yet available, deploy web application firewalls (WAFs) with rules to detect and block CSRF attack patterns and suspicious HTTP requests targeting Scan2Net. 3) Configure Scan2Net or its hosting environment to enforce strict SameSite cookie attributes to reduce CSRF risk. 4) Implement network segmentation to isolate Scan2Net devices from general user networks, limiting exposure. 5) Educate users about phishing and social engineering risks to reduce the likelihood of clicking malicious links. 6) Monitor logs for unusual administrative actions or account creations. 7) Consider additional authentication factors for administrative actions to reduce risk from forged requests. 8) Review and harden web server and application configurations to enforce origin and referer header checks where possible. These steps go beyond generic advice by focusing on compensating controls and user awareness tailored to this vulnerability’s exploitation vector.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
SEC-VLab
Date Reserved
2024-03-05T09:15:40.202Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69092621fe7723195e0b46f0

Added to database: 11/3/2025, 10:01:05 PM

Last enriched: 11/3/2025, 11:57:31 PM

Last updated: 11/5/2025, 1:58:44 PM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats