Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-28811: n/a

0
Low
VulnerabilityCVE-2024-28811cvecve-2024-28811
Published: Mon Sep 30 2024 (09/30/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Infinera hiT 7300 5.60.50. A web application allows a remote privileged attacker to execute applications contained in a specific OS directory via HTTP invocations.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 11:29:50 UTC

Technical Analysis

CVE-2024-28811 identifies a security vulnerability in the Infinera hiT 7300 optical transport platform, specifically version 5.60.50. The vulnerability arises from a web application component that allows a remote attacker with privileged access to execute arbitrary applications located in a designated operating system directory through crafted HTTP invocations. This implies that the web interface does not sufficiently restrict or validate execution commands, leading to potential unauthorized code execution. The vulnerability is classified under CWE-94, which pertains to improper control of code or script execution, often enabling attackers to run arbitrary code. The CVSS 3.1 base score is 3.3, reflecting a low severity level due to the requirement for high privileges (PR:H), no user interaction (UI:N), network attack vector (AV:N), and limited impact on confidentiality (C:L) and availability (A:L), with no impact on integrity (I:N). No public exploits or active exploitation have been reported to date. The lack of a patch link suggests that a fix may not yet be publicly available or disclosed. This vulnerability could be exploited by insiders or attackers who have already gained elevated privileges on the device, allowing them to execute unauthorized applications remotely via HTTP requests, potentially leading to limited disruption or information disclosure.

Potential Impact

The primary impact of CVE-2024-28811 is limited due to the requirement for an attacker to already possess high privileges on the affected Infinera hiT 7300 device. However, if exploited, it allows execution of arbitrary applications within a specific OS directory via HTTP, which could be leveraged to disrupt device operations or leak sensitive information. The impact on confidentiality is low, as is the impact on availability, with no integrity impact reported. Since the device is a critical component in optical transport networks, any disruption could affect network performance or availability, potentially impacting telecommunications providers and their customers. The scope is limited to the affected device and version, and exploitation requires network access to the management interface and elevated privileges, reducing the likelihood of widespread impact. Organizations relying on Infinera hiT 7300 for network infrastructure could face operational risks if this vulnerability is exploited, especially if combined with other vulnerabilities or insider threats.

Mitigation Recommendations

To mitigate CVE-2024-28811, organizations should first restrict network access to the Infinera hiT 7300 management interface to trusted administrators only, using network segmentation and firewall rules. Implement strict access controls and monitor for any unauthorized privileged access attempts. Since no patch is currently linked, coordinate with Infinera support for any available updates or workarounds. Regularly audit and review user privileges to ensure that only necessary personnel have high-level access. Employ intrusion detection systems to monitor HTTP traffic for suspicious invocation patterns targeting the vulnerable directory. Consider disabling or limiting the web application features that allow execution of OS-level applications if operationally feasible. Maintain comprehensive logging and alerting on the device to detect potential exploitation attempts. Finally, incorporate this vulnerability into incident response plans to ensure rapid containment if exploitation is detected.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d98b7ef31ef0b589249

Added to database: 2/25/2026, 9:46:00 PM

Last enriched: 2/26/2026, 11:29:50 AM

Last updated: 4/11/2026, 5:54:58 PM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses