Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-28804: n/a

0
High
VulnerabilityCVE-2024-28804cvecve-2024-28804
Published: Mon Jul 29 2024 (07/29/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Italtel i-MCS NFV 12.1.0-20211215. Stored Cross-site scripting (XSS) can occur via POST.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 11:28:17 UTC

Technical Analysis

CVE-2024-28804 identifies a stored Cross-site Scripting (XSS) vulnerability in Italtel i-MCS NFV version 12.1.0-20211215. Stored XSS occurs when malicious input submitted via POST requests is improperly sanitized and stored by the application, later executed in the browsers of users accessing the affected interface. This vulnerability is classified under CWE-79, indicating a failure to properly neutralize input that is included in web pages. The attack vector is network-based (AV:N), requiring no privileges (PR:N), but does require user interaction (UI:R) such as clicking a crafted link or viewing a malicious page. The scope is changed (S:C), meaning the vulnerability affects components beyond the initially vulnerable component, potentially impacting other users or systems. The impact includes partial loss of confidentiality, integrity, and availability (C:L/I:L/A:L), as attackers can execute arbitrary scripts to hijack sessions, manipulate displayed content, or perform unauthorized actions on behalf of users. Although no known exploits have been reported in the wild, the vulnerability poses a significant risk due to the critical role of Italtel i-MCS NFV in network function virtualization for telecommunications providers. The absence of published patches necessitates immediate mitigation efforts by affected organizations.

Potential Impact

The vulnerability can lead to unauthorized script execution in the context of legitimate users, enabling attackers to steal sensitive information such as session cookies, credentials, or configuration data. It can also allow attackers to perform actions on behalf of users, potentially disrupting network management or service provisioning. Given that Italtel i-MCS NFV is used in telecommunications network function virtualization, exploitation could impact critical infrastructure, leading to service degradation or outages. The compromise of management interfaces could also facilitate further lateral movement or persistent access within affected networks. The high CVSS score reflects the ease of exploitation over the network and the broad impact on confidentiality, integrity, and availability. Organizations worldwide relying on this product for NFV orchestration and management face risks of data breaches, operational disruption, and reputational damage.

Mitigation Recommendations

1. Implement strict input validation and output encoding on all user-supplied data, especially data submitted via POST requests, to prevent malicious script injection. 2. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. 3. Limit user privileges and access to the management interfaces of Italtel i-MCS NFV to trusted personnel only. 4. Monitor logs and network traffic for unusual POST requests or suspicious activities indicative of attempted XSS exploitation. 5. If possible, deploy web application firewalls (WAFs) with rules targeting common XSS attack patterns to provide an additional layer of defense. 6. Engage with Italtel support channels to obtain patches or updates as they become available and apply them promptly. 7. Educate users and administrators about the risks of clicking on untrusted links or submitting unverified data to the system. 8. Conduct regular security assessments and penetration testing focusing on web interface vulnerabilities to detect similar issues proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d98b7ef31ef0b589237

Added to database: 2/25/2026, 9:46:00 PM

Last enriched: 2/26/2026, 11:28:17 AM

Last updated: 4/12/2026, 12:44:52 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses