Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-39341: n/a

0
Medium
VulnerabilityCVE-2024-39341cvecve-2024-39341
Published: Mon Sep 23 2024 (09/23/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-39341 is a medium severity vulnerability affecting Entrust Instant Financial Issuance (On Premise) Software versions 6. 8. x and earlier through 6. 10. 0. The software leaves behind a configuration file named WebAPI. cfg. xml after installation, which can be accessed without authentication over HTTP on port 80 by guessing the IIS webroot path. This file contains system configuration parameters, including sensitive values that are encrypted but still potentially exposed. The vulnerability does not require user interaction or privileges to exploit but does require local network access due to the low attack vector.

AI-Powered Analysis

AILast updated: 02/26/2026, 05:54:08 UTC

Technical Analysis

CVE-2024-39341 identifies a vulnerability in Entrust Instant Financial Issuance (On Premise) Software versions 6.8.x and earlier through 6.10.0. After installation, the software leaves a configuration file named WebAPI.cfg.xml accessible via HTTP on port 80 without requiring authentication. This file resides in the IIS webroot directory and can be accessed by guessing the correct path, exposing system configuration parameters. Although sensitive values within the file are encrypted, the exposure of configuration parameter names and encrypted values can provide attackers with valuable information about the system setup. The vulnerability is classified under CWE-290 (Authentication Bypass), as the file is accessible without authentication. The CVSS v3.1 base score is 5.9 (medium severity), reflecting a local attack vector with low complexity, no privileges required, and no user interaction needed. The impact includes potential confidentiality, integrity, and availability risks, as attackers could leverage the disclosed configuration data to plan further attacks or exploit other vulnerabilities. No patches or exploits are currently known, but the presence of this file on publicly accessible HTTP endpoints represents a significant security oversight. The vulnerability primarily affects organizations using Entrust Instant Financial Issuance software on-premise, particularly those exposing HTTP services without adequate access controls.

Potential Impact

The vulnerability exposes sensitive configuration data that, while encrypted, can aid attackers in understanding the system architecture and potentially decrypting or exploiting the information. This can lead to information disclosure, which may facilitate privilege escalation, unauthorized access, or disruption of financial issuance services. Since the software is used for financial card issuance, compromise could impact the integrity and availability of critical financial operations, potentially leading to financial fraud or service outages. The attack requires network access to the HTTP port, limiting remote exploitation but still posing a risk within internal networks or if the service is exposed externally. Organizations with inadequate network segmentation or firewall rules are at higher risk. The exposure of configuration files also increases the attack surface for threat actors aiming to map internal systems or identify weak points for further exploitation.

Mitigation Recommendations

Organizations should immediately verify whether the WebAPI.cfg.xml file exists in the IIS webroot directory and restrict access to it. This can be done by removing the file if it is not needed post-installation or moving it to a non-web-accessible location. Implement strict access controls on HTTP services, including network segmentation and firewall rules to limit access to trusted hosts only. Enforce HTTPS and disable HTTP where possible to prevent interception. Monitor web server logs for unauthorized access attempts to configuration files. Additionally, coordinate with Entrust to obtain any available patches or updated versions that address this issue. If patching is not immediately possible, consider deploying web application firewalls (WAFs) to block requests targeting the configuration file path. Regularly audit and harden IIS configurations to prevent directory traversal or path guessing attacks. Finally, educate system administrators about the risks of leaving sensitive files accessible and enforce secure installation and post-installation procedures.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-06-24T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c87b7ef31ef0b565e77

Added to database: 2/25/2026, 9:41:27 PM

Last enriched: 2/26/2026, 5:54:08 AM

Last updated: 2/26/2026, 6:14:52 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats