CVE-2024-28811: n/a
An issue was discovered in Infinera hiT 7300 5.60.50. A web application allows a remote privileged attacker to execute applications contained in a specific OS directory via HTTP invocations.
AI Analysis
Technical Summary
CVE-2024-28811 identifies a security vulnerability in the Infinera hiT 7300 optical transport platform, specifically version 5.60.50. The vulnerability arises from a web application component that allows a remote attacker with privileged access to execute arbitrary applications located in a designated operating system directory through crafted HTTP invocations. This implies that the web interface does not sufficiently restrict or validate execution commands, leading to potential unauthorized code execution. The vulnerability is classified under CWE-94, which pertains to improper control of code or script execution, often enabling attackers to run arbitrary code. The CVSS 3.1 base score is 3.3, reflecting a low severity level due to the requirement for high privileges (PR:H), no user interaction (UI:N), network attack vector (AV:N), and limited impact on confidentiality (C:L) and availability (A:L), with no impact on integrity (I:N). No public exploits or active exploitation have been reported to date. The lack of a patch link suggests that a fix may not yet be publicly available or disclosed. This vulnerability could be exploited by insiders or attackers who have already gained elevated privileges on the device, allowing them to execute unauthorized applications remotely via HTTP requests, potentially leading to limited disruption or information disclosure.
Potential Impact
The primary impact of CVE-2024-28811 is limited due to the requirement for an attacker to already possess high privileges on the affected Infinera hiT 7300 device. However, if exploited, it allows execution of arbitrary applications within a specific OS directory via HTTP, which could be leveraged to disrupt device operations or leak sensitive information. The impact on confidentiality is low, as is the impact on availability, with no integrity impact reported. Since the device is a critical component in optical transport networks, any disruption could affect network performance or availability, potentially impacting telecommunications providers and their customers. The scope is limited to the affected device and version, and exploitation requires network access to the management interface and elevated privileges, reducing the likelihood of widespread impact. Organizations relying on Infinera hiT 7300 for network infrastructure could face operational risks if this vulnerability is exploited, especially if combined with other vulnerabilities or insider threats.
Mitigation Recommendations
To mitigate CVE-2024-28811, organizations should first restrict network access to the Infinera hiT 7300 management interface to trusted administrators only, using network segmentation and firewall rules. Implement strict access controls and monitor for any unauthorized privileged access attempts. Since no patch is currently linked, coordinate with Infinera support for any available updates or workarounds. Regularly audit and review user privileges to ensure that only necessary personnel have high-level access. Employ intrusion detection systems to monitor HTTP traffic for suspicious invocation patterns targeting the vulnerable directory. Consider disabling or limiting the web application features that allow execution of OS-level applications if operationally feasible. Maintain comprehensive logging and alerting on the device to detect potential exploitation attempts. Finally, incorporate this vulnerability into incident response plans to ensure rapid containment if exploitation is detected.
Affected Countries
United States, Germany, Japan, South Korea, France, United Kingdom, China, India, Brazil, Australia
CVE-2024-28811: n/a
Description
An issue was discovered in Infinera hiT 7300 5.60.50. A web application allows a remote privileged attacker to execute applications contained in a specific OS directory via HTTP invocations.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-28811 identifies a security vulnerability in the Infinera hiT 7300 optical transport platform, specifically version 5.60.50. The vulnerability arises from a web application component that allows a remote attacker with privileged access to execute arbitrary applications located in a designated operating system directory through crafted HTTP invocations. This implies that the web interface does not sufficiently restrict or validate execution commands, leading to potential unauthorized code execution. The vulnerability is classified under CWE-94, which pertains to improper control of code or script execution, often enabling attackers to run arbitrary code. The CVSS 3.1 base score is 3.3, reflecting a low severity level due to the requirement for high privileges (PR:H), no user interaction (UI:N), network attack vector (AV:N), and limited impact on confidentiality (C:L) and availability (A:L), with no impact on integrity (I:N). No public exploits or active exploitation have been reported to date. The lack of a patch link suggests that a fix may not yet be publicly available or disclosed. This vulnerability could be exploited by insiders or attackers who have already gained elevated privileges on the device, allowing them to execute unauthorized applications remotely via HTTP requests, potentially leading to limited disruption or information disclosure.
Potential Impact
The primary impact of CVE-2024-28811 is limited due to the requirement for an attacker to already possess high privileges on the affected Infinera hiT 7300 device. However, if exploited, it allows execution of arbitrary applications within a specific OS directory via HTTP, which could be leveraged to disrupt device operations or leak sensitive information. The impact on confidentiality is low, as is the impact on availability, with no integrity impact reported. Since the device is a critical component in optical transport networks, any disruption could affect network performance or availability, potentially impacting telecommunications providers and their customers. The scope is limited to the affected device and version, and exploitation requires network access to the management interface and elevated privileges, reducing the likelihood of widespread impact. Organizations relying on Infinera hiT 7300 for network infrastructure could face operational risks if this vulnerability is exploited, especially if combined with other vulnerabilities or insider threats.
Mitigation Recommendations
To mitigate CVE-2024-28811, organizations should first restrict network access to the Infinera hiT 7300 management interface to trusted administrators only, using network segmentation and firewall rules. Implement strict access controls and monitor for any unauthorized privileged access attempts. Since no patch is currently linked, coordinate with Infinera support for any available updates or workarounds. Regularly audit and review user privileges to ensure that only necessary personnel have high-level access. Employ intrusion detection systems to monitor HTTP traffic for suspicious invocation patterns targeting the vulnerable directory. Consider disabling or limiting the web application features that allow execution of OS-level applications if operationally feasible. Maintain comprehensive logging and alerting on the device to detect potential exploitation attempts. Finally, incorporate this vulnerability into incident response plans to ensure rapid containment if exploitation is detected.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-03-11T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6d98b7ef31ef0b589249
Added to database: 2/25/2026, 9:46:00 PM
Last enriched: 2/26/2026, 11:29:50 AM
Last updated: 4/11/2026, 5:54:58 PM
Views: 23
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.