Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-44571: n/a

0
High
VulnerabilityCVE-2024-44571cvecve-2024-44571
Published: Wed Sep 11 2024 (09/11/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

RELY-PCIe v22.2.1 to v23.1.0 was discovered to contain incorrect access control in the mService function at phpinf.php.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 07:56:10 UTC

Technical Analysis

CVE-2024-44571 is a vulnerability identified in the RELY-PCIe software suite, specifically affecting versions from 22.2.1 up to 23.1.0. The flaw resides in the mService function within the phpinf.php file, where improper access control mechanisms allow unauthorized users with low privileges (PR:L) to perform actions that should be restricted. The vulnerability does not require user interaction (UI:N) and can be exploited remotely over the network (AV:N), making it highly accessible to attackers. The scope of the vulnerability is unchanged (S:U), meaning the impact is confined to the vulnerable component but affects confidentiality, integrity, and availability at a high level (C:H/I:H/A:H). This indicates that an attacker could potentially read sensitive information, modify data, or disrupt service availability. The weakness is classified under CWE-284, which relates to improper enforcement of access control policies, a common and critical security issue. Although no public exploits have been reported yet, the high CVSS score of 8.8 reflects the severity and potential impact of this vulnerability. The absence of patches at the time of reporting necessitates immediate attention to mitigate risk. Organizations relying on RELY-PCIe should monitor vendor communications for updates and consider interim protective measures such as network segmentation and access restrictions to the vulnerable phpinf.php endpoint.

Potential Impact

The vulnerability in RELY-PCIe's mService function can lead to unauthorized access and control over critical system functions, severely compromising confidentiality, integrity, and availability. Attackers exploiting this flaw could gain access to sensitive data, alter system configurations or data, and potentially cause service disruptions or denial of service. Given the remote exploitability without user interaction and low privilege requirements, the threat can be rapidly leveraged to escalate attacks within affected environments. This can result in data breaches, operational downtime, and loss of trust. Organizations in sectors relying on RELY-PCIe for PCIe device management or embedded systems could face significant operational and financial impacts. The lack of known exploits currently provides a window for proactive defense, but the high severity demands urgent mitigation to prevent exploitation once public exploits emerge.

Mitigation Recommendations

1. Monitor RELY-PCIe vendor channels closely for official patches addressing CVE-2024-44571 and apply them immediately upon release. 2. Restrict network access to the phpinf.php endpoint by implementing firewall rules or network segmentation to limit exposure only to trusted management networks or hosts. 3. Employ strict access control policies and authentication mechanisms around the mService function to prevent unauthorized invocation. 4. Conduct thorough audits and monitoring of access logs for unusual or unauthorized access attempts targeting phpinf.php or related services. 5. If possible, disable or remove the mService function or phpinf.php file temporarily until a patch is available, provided this does not disrupt critical operations. 6. Implement intrusion detection/prevention systems (IDS/IPS) with signatures or anomaly detection tuned to detect exploitation attempts against this vulnerability. 7. Educate system administrators and security teams about the vulnerability specifics to ensure rapid response and containment in case of attempted exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-08-21T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6ce0b7ef31ef0b569ba8

Added to database: 2/25/2026, 9:42:56 PM

Last enriched: 2/26/2026, 7:56:10 AM

Last updated: 4/12/2026, 9:10:44 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses