Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-28521: n/a

0
High
VulnerabilityCVE-2024-28521cvecve-2024-28521
Published: Thu Mar 21 2024 (03/21/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

SQL Injection vulnerability in Netcome NS-ASG Application Security Gateway v.6.3.1 allows a local attacker to execute arbitrary code and obtain sensitive information via a crafted script to the loginid parameter of the /singlelogin.php component.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 18:42:44 UTC

Technical Analysis

CVE-2024-28521 is a SQL Injection vulnerability identified in Netcome NS-ASG Application Security Gateway version 6.3.1. The flaw exists in the /singlelogin.php component, specifically in the handling of the loginid parameter. An attacker with local access and low privileges can craft a malicious script to inject SQL commands, enabling arbitrary code execution and unauthorized access to sensitive data stored in the backend database. The vulnerability is classified under CWE-89, indicating improper neutralization of special elements used in an SQL command. The CVSS v3.1 base score is 7.8, reflecting high severity due to the potential for full system compromise without requiring user interaction. The attack vector is local, meaning the attacker must have some level of access to the system, but the attack complexity is low and privileges required are minimal. The vulnerability impacts confidentiality, integrity, and availability, as arbitrary code execution can lead to data theft, modification, or service disruption. No patches or known exploits in the wild have been reported as of the publication date, but the risk remains significant given the nature of the vulnerability and the critical role of the affected gateway in securing application traffic.

Potential Impact

The exploitation of CVE-2024-28521 can have severe consequences for organizations relying on Netcome NS-ASG Application Security Gateway. Successful attacks can lead to unauthorized disclosure of sensitive information, including authentication credentials and internal configuration data. Arbitrary code execution allows attackers to manipulate or disrupt gateway operations, potentially bypassing security controls and exposing internal networks to further compromise. This can result in data breaches, loss of service availability, and damage to organizational reputation. Given the gateway's role in securing application traffic, exploitation could also facilitate lateral movement within networks, increasing the scope of impact. Organizations in sectors with high security requirements, such as finance, healthcare, and government, face elevated risks due to the sensitive nature of the data and services protected by this gateway.

Mitigation Recommendations

To mitigate CVE-2024-28521, organizations should immediately restrict local access to the Netcome NS-ASG Application Security Gateway to trusted administrators only, minimizing the attack surface. Implement strict access controls and monitoring on systems hosting the gateway to detect and prevent unauthorized local activity. Employ input validation and sanitization on all user-supplied parameters, especially the loginid parameter in /singlelogin.php, to prevent SQL injection. Since no official patches are currently available, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting this component. Conduct thorough code reviews and penetration testing focused on SQL injection vectors within the gateway environment. Maintain up-to-date backups and have an incident response plan ready in case of compromise. Engage with the vendor for timely patch releases and apply updates as soon as they become available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-08T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d90b7ef31ef0b588aec

Added to database: 2/25/2026, 9:45:52 PM

Last enriched: 2/26/2026, 6:42:44 PM

Last updated: 4/12/2026, 3:47:14 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses