CVE-2024-39341: n/a
CVE-2024-39341 is a medium severity vulnerability affecting Entrust Instant Financial Issuance (On Premise) Software versions 6. 8. x and earlier through 6. 10. 0. The software leaves behind a configuration file named WebAPI. cfg. xml after installation, which can be accessed without authentication over HTTP on port 80 by guessing the IIS webroot path. This file contains system configuration parameters, including sensitive values that are encrypted but still potentially exposed. The vulnerability does not require user interaction or privileges to exploit but does require local network access due to the low attack vector.
AI Analysis
Technical Summary
CVE-2024-39341 identifies a vulnerability in Entrust Instant Financial Issuance (On Premise) Software versions 6.8.x and earlier through 6.10.0. After installation, the software leaves a configuration file named WebAPI.cfg.xml accessible via HTTP on port 80 without requiring authentication. This file resides in the IIS webroot directory and can be accessed by guessing the correct path, exposing system configuration parameters. Although sensitive values within the file are encrypted, the exposure of configuration parameter names and encrypted values can provide attackers with valuable information about the system setup. The vulnerability is classified under CWE-290 (Authentication Bypass), as the file is accessible without authentication. The CVSS v3.1 base score is 5.9 (medium severity), reflecting a local attack vector with low complexity, no privileges required, and no user interaction needed. The impact includes potential confidentiality, integrity, and availability risks, as attackers could leverage the disclosed configuration data to plan further attacks or exploit other vulnerabilities. No patches or exploits are currently known, but the presence of this file on publicly accessible HTTP endpoints represents a significant security oversight. The vulnerability primarily affects organizations using Entrust Instant Financial Issuance software on-premise, particularly those exposing HTTP services without adequate access controls.
Potential Impact
The vulnerability exposes sensitive configuration data that, while encrypted, can aid attackers in understanding the system architecture and potentially decrypting or exploiting the information. This can lead to information disclosure, which may facilitate privilege escalation, unauthorized access, or disruption of financial issuance services. Since the software is used for financial card issuance, compromise could impact the integrity and availability of critical financial operations, potentially leading to financial fraud or service outages. The attack requires network access to the HTTP port, limiting remote exploitation but still posing a risk within internal networks or if the service is exposed externally. Organizations with inadequate network segmentation or firewall rules are at higher risk. The exposure of configuration files also increases the attack surface for threat actors aiming to map internal systems or identify weak points for further exploitation.
Mitigation Recommendations
Organizations should immediately verify whether the WebAPI.cfg.xml file exists in the IIS webroot directory and restrict access to it. This can be done by removing the file if it is not needed post-installation or moving it to a non-web-accessible location. Implement strict access controls on HTTP services, including network segmentation and firewall rules to limit access to trusted hosts only. Enforce HTTPS and disable HTTP where possible to prevent interception. Monitor web server logs for unauthorized access attempts to configuration files. Additionally, coordinate with Entrust to obtain any available patches or updated versions that address this issue. If patching is not immediately possible, consider deploying web application firewalls (WAFs) to block requests targeting the configuration file path. Regularly audit and harden IIS configurations to prevent directory traversal or path guessing attacks. Finally, educate system administrators about the risks of leaving sensitive files accessible and enforce secure installation and post-installation procedures.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, Singapore, Netherlands, Switzerland
CVE-2024-39341: n/a
Description
CVE-2024-39341 is a medium severity vulnerability affecting Entrust Instant Financial Issuance (On Premise) Software versions 6. 8. x and earlier through 6. 10. 0. The software leaves behind a configuration file named WebAPI. cfg. xml after installation, which can be accessed without authentication over HTTP on port 80 by guessing the IIS webroot path. This file contains system configuration parameters, including sensitive values that are encrypted but still potentially exposed. The vulnerability does not require user interaction or privileges to exploit but does require local network access due to the low attack vector.
AI-Powered Analysis
Technical Analysis
CVE-2024-39341 identifies a vulnerability in Entrust Instant Financial Issuance (On Premise) Software versions 6.8.x and earlier through 6.10.0. After installation, the software leaves a configuration file named WebAPI.cfg.xml accessible via HTTP on port 80 without requiring authentication. This file resides in the IIS webroot directory and can be accessed by guessing the correct path, exposing system configuration parameters. Although sensitive values within the file are encrypted, the exposure of configuration parameter names and encrypted values can provide attackers with valuable information about the system setup. The vulnerability is classified under CWE-290 (Authentication Bypass), as the file is accessible without authentication. The CVSS v3.1 base score is 5.9 (medium severity), reflecting a local attack vector with low complexity, no privileges required, and no user interaction needed. The impact includes potential confidentiality, integrity, and availability risks, as attackers could leverage the disclosed configuration data to plan further attacks or exploit other vulnerabilities. No patches or exploits are currently known, but the presence of this file on publicly accessible HTTP endpoints represents a significant security oversight. The vulnerability primarily affects organizations using Entrust Instant Financial Issuance software on-premise, particularly those exposing HTTP services without adequate access controls.
Potential Impact
The vulnerability exposes sensitive configuration data that, while encrypted, can aid attackers in understanding the system architecture and potentially decrypting or exploiting the information. This can lead to information disclosure, which may facilitate privilege escalation, unauthorized access, or disruption of financial issuance services. Since the software is used for financial card issuance, compromise could impact the integrity and availability of critical financial operations, potentially leading to financial fraud or service outages. The attack requires network access to the HTTP port, limiting remote exploitation but still posing a risk within internal networks or if the service is exposed externally. Organizations with inadequate network segmentation or firewall rules are at higher risk. The exposure of configuration files also increases the attack surface for threat actors aiming to map internal systems or identify weak points for further exploitation.
Mitigation Recommendations
Organizations should immediately verify whether the WebAPI.cfg.xml file exists in the IIS webroot directory and restrict access to it. This can be done by removing the file if it is not needed post-installation or moving it to a non-web-accessible location. Implement strict access controls on HTTP services, including network segmentation and firewall rules to limit access to trusted hosts only. Enforce HTTPS and disable HTTP where possible to prevent interception. Monitor web server logs for unauthorized access attempts to configuration files. Additionally, coordinate with Entrust to obtain any available patches or updated versions that address this issue. If patching is not immediately possible, consider deploying web application firewalls (WAFs) to block requests targeting the configuration file path. Regularly audit and harden IIS configurations to prevent directory traversal or path guessing attacks. Finally, educate system administrators about the risks of leaving sensitive files accessible and enforce secure installation and post-installation procedures.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-06-24T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c87b7ef31ef0b565e77
Added to database: 2/25/2026, 9:41:27 PM
Last enriched: 2/26/2026, 5:54:08 AM
Last updated: 2/26/2026, 6:14:52 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.