Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-44573: n/a

0
Medium
VulnerabilityCVE-2024-44573cvecve-2024-44573
Published: Wed Sep 11 2024 (09/11/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-44573 is a stored cross-site scripting (XSS) vulnerability found in the VLAN configuration interface of RELY-PCIe devices versions v22. 2. 1 through v23. 1. 0. This vulnerability allows attackers to inject malicious web scripts or HTML via crafted payloads that are stored and later executed in the web interface. Exploitation requires user interaction, specifically a user visiting the affected web interface, but no authentication or privileges are needed to trigger the vulnerability. The CVSS score is 4. 7 (medium severity), reflecting limited impact on integrity without direct confidentiality or availability compromise. No known exploits are currently reported in the wild, and no patches have been published yet.

AI-Powered Analysis

AILast updated: 02/26/2026, 07:56:48 UTC

Technical Analysis

CVE-2024-44573 is a stored cross-site scripting (XSS) vulnerability identified in the VLAN configuration component of RELY-PCIe devices, specifically affecting firmware versions from v22.2.1 up to v23.1.0. Stored XSS occurs when malicious scripts injected by an attacker are permanently saved by the web application and executed when a user accesses the affected page. In this case, an attacker can craft a payload containing malicious JavaScript or HTML and inject it into the VLAN configuration interface. When an administrator or user accesses this interface, the malicious script executes in their browser context, potentially allowing session hijacking, unauthorized actions, or redirection to malicious sites. The vulnerability requires no authentication or privileges to inject the payload, but user interaction is necessary to trigger the script execution. The CVSS 3.1 base score of 4.7 reflects a medium severity, with network attack vector, low attack complexity, no privileges required, but user interaction needed. The scope is changed (S:C), indicating the vulnerability affects components beyond the vulnerable code itself, and the impact is limited to integrity (I:L) without confidentiality or availability impact. No known exploits have been reported in the wild, and no official patches have been released at the time of publication. The vulnerability is classified under CWE-79, which covers improper neutralization of input during web page generation. RELY-PCIe devices are typically used in network infrastructure, so exploitation could impact network management and security.

Potential Impact

The primary impact of CVE-2024-44573 is on the integrity of the web management interface of RELY-PCIe devices. Successful exploitation could allow attackers to execute arbitrary scripts in the context of an administrator’s browser session, potentially leading to session hijacking, unauthorized configuration changes, or redirection to malicious websites. Although confidentiality and availability are not directly affected, the compromise of device management interfaces can indirectly lead to broader network security risks. Organizations relying on RELY-PCIe hardware for VLAN management could face increased risk of targeted attacks, especially if the management interface is exposed to untrusted networks or insufficiently protected. The requirement for user interaction and the absence of known exploits reduce the immediacy of the threat, but the vulnerability remains a significant risk in environments with lax access controls. This could be particularly impactful in sectors where network segmentation and VLAN configurations are critical for security, such as telecommunications, finance, and critical infrastructure.

Mitigation Recommendations

1. Restrict access to the RELY-PCIe device management interface to trusted networks only, using network segmentation and firewall rules to prevent exposure to untrusted or public networks. 2. Implement strong authentication and session management controls to reduce the risk of session hijacking if XSS is exploited. 3. Monitor and audit VLAN configuration changes and web interface access logs for suspicious activity that could indicate exploitation attempts. 4. Employ web application firewalls (WAFs) or intrusion prevention systems (IPS) capable of detecting and blocking XSS payloads targeting the device’s web interface. 5. Until an official patch is released, consider disabling or limiting the VLAN configuration web interface if operationally feasible. 6. Educate administrators about the risks of clicking on untrusted links or opening suspicious content while logged into device management consoles. 7. Validate and sanitize all user inputs on the VLAN configuration interface in future firmware updates to prevent injection of malicious scripts. 8. Stay informed about vendor advisories and apply patches promptly once available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-08-21T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6ce0b7ef31ef0b569bb0

Added to database: 2/25/2026, 9:42:56 PM

Last enriched: 2/26/2026, 7:56:48 AM

Last updated: 2/26/2026, 9:10:54 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats