Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-28812: n/a

0
High
VulnerabilityCVE-2024-28812cvecve-2024-28812
Published: Mon Sep 30 2024 (09/30/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Infinera hiT 7300 5.60.50. A hidden SSH service (on the local management network interface) with hardcoded credentials allows attackers to access the appliance operating system (with highest privileges) via an SSH connection.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 11:30:08 UTC

Technical Analysis

CVE-2024-28812 is a critical vulnerability discovered in the Infinera hiT 7300 optical transport appliance, specifically version 5.60.50. The issue arises from a hidden SSH service that listens on the local management network interface and uses hardcoded credentials embedded in the device's firmware or software. These credentials cannot be changed or disabled by administrators, creating a backdoor that attackers can exploit to gain unauthorized access. Because the SSH service grants highest privilege access to the underlying operating system, an attacker who connects via SSH can fully control the device, potentially altering configurations, intercepting or disrupting network traffic, or deploying persistent malware. The vulnerability is remotely exploitable without any authentication or user interaction, provided the attacker has access to the management network segment. The CVSS v3.1 base score is 8.8, reflecting the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no privileges required. The vulnerability is categorized under CWE-798 (Use of Hard-coded Credentials), a well-known security weakness that often leads to severe compromises. No patches or mitigations have been officially released at the time of publication, and no exploits have been observed in the wild, but the risk remains significant due to the nature of the flaw and the critical role of the affected device in telecommunications and data networks.

Potential Impact

The impact of CVE-2024-28812 is substantial for organizations that deploy Infinera hiT 7300 appliances, which are commonly used in telecommunications infrastructure and large-scale optical networks. Successful exploitation allows attackers to gain full administrative control over the device, enabling them to manipulate network traffic, disrupt communications, exfiltrate sensitive data, or create persistent backdoors. This can lead to widespread network outages, data breaches, and compromise of critical infrastructure. Because the device operates at a high level in network topology, the consequences extend beyond the single appliance to potentially affect entire network segments or service provider operations. The vulnerability undermines trust in network security and can facilitate advanced persistent threats (APTs) targeting telecommunications providers, government agencies, and enterprises relying on these devices for critical connectivity. The lack of authentication and the use of hardcoded credentials significantly lower the barrier for attackers, increasing the likelihood of exploitation if the management network is accessible.

Mitigation Recommendations

To mitigate CVE-2024-28812, organizations should immediately restrict access to the local management network interface of the Infinera hiT 7300 appliances to trusted personnel and systems only, using network segmentation and strict firewall rules. Disable or isolate the management network from untrusted networks, including the internet, to prevent unauthorized access. Monitor network traffic for unusual SSH connection attempts to the device. Since no official patch is currently available, contact Infinera support for guidance and inquire about any upcoming firmware updates or workarounds. Implement multi-factor authentication and strong access controls on all management interfaces where possible. Conduct regular audits of device configurations and logs to detect suspicious activity. Consider deploying intrusion detection/prevention systems (IDS/IPS) focused on management network traffic. Plan for rapid incident response in case of compromise, including device replacement or reimaging. Finally, maintain up-to-date asset inventories to identify all affected devices and prioritize remediation efforts accordingly.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d98b7ef31ef0b58924c

Added to database: 2/25/2026, 9:46:00 PM

Last enriched: 2/26/2026, 11:30:08 AM

Last updated: 4/12/2026, 7:54:45 AM

Views: 24

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses