Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-46328: n/a

0
High
VulnerabilityCVE-2024-46328cvecve-2024-46328
Published: Thu Sep 26 2024 (09/26/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

VONETS VAP11G-300 v3.3.23.6.9 was discovered to contain hardcoded credentials for several different privileged accounts, including root.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 08:34:04 UTC

Technical Analysis

CVE-2024-46328 identifies a critical security vulnerability in the VONETS VAP11G-300 wireless access point firmware version 3.3.23.6.9. The issue stems from hardcoded credentials embedded within the device for several privileged accounts, including the root user. Hardcoded credentials are a well-known security weakness (CWE-259) that allow attackers to bypass authentication controls by using fixed usernames and passwords that cannot be changed by the end user. In this case, an attacker with network access to the device can authenticate as a privileged user without needing to guess or brute-force passwords, effectively gaining full administrative control. The CVSS v3.1 score of 8.0 reflects high severity due to the combination of remote attack vector (AV:A - adjacent network), low attack complexity (AC:L), and the ability to compromise confidentiality, integrity, and availability (C:H/I:H/A:H). No user interaction is required (UI:N), and the scope remains unchanged (S:U). Although no public exploits have been reported yet, the vulnerability poses a significant threat because it enables unauthorized access to network infrastructure, potentially allowing attackers to intercept traffic, modify configurations, or pivot to other internal systems. The lack of available patches at the time of disclosure increases the urgency for organizations to implement compensating controls. This vulnerability highlights the critical risk of embedding static credentials in network devices, which can be easily extracted or discovered by attackers.

Potential Impact

The impact of CVE-2024-46328 is substantial for organizations deploying VONETS VAP11G-300 devices. Successful exploitation grants attackers root-level access, enabling full control over the device’s configuration and network traffic. This can lead to unauthorized data interception, injection of malicious payloads, disruption of network services, and creation of persistent backdoors. The compromise of such network infrastructure devices can facilitate lateral movement within corporate or service provider networks, increasing the risk of broader network breaches. Confidential information passing through the device may be exposed or altered, undermining data integrity and privacy. Additionally, attackers could disable or degrade network availability, causing operational downtime. Given the device’s role as a wireless access point, the vulnerability could affect both enterprise and small business environments, especially those relying on VONETS hardware for network connectivity. The absence of known exploits in the wild currently limits immediate widespread damage, but the ease of exploitation and high privileges involved make this a critical risk that could be rapidly weaponized once exploit code becomes available.

Mitigation Recommendations

To mitigate CVE-2024-46328, organizations should first check for any firmware updates or patches released by VONETS addressing this vulnerability and apply them promptly. If no official patch is available, network administrators should isolate affected devices on segmented VLANs or restrict access to trusted management networks only. Disable remote management interfaces where possible and enforce strict access control lists (ACLs) to limit who can connect to these devices. Implement network monitoring and intrusion detection systems to identify anomalous authentication attempts or unusual device behavior indicative of exploitation attempts. Replace affected hardware with alternative devices that do not contain hardcoded credentials if feasible. Additionally, conduct regular audits of network devices to detect the presence of hardcoded or default credentials. Educate staff about the risks of embedded credentials and enforce policies that prohibit their use in new deployments. Finally, consider deploying network-level encryption and endpoint security controls to reduce the impact of potential device compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-09-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cfcb7ef31ef0b56ab3d

Added to database: 2/25/2026, 9:43:24 PM

Last enriched: 2/26/2026, 8:34:04 AM

Last updated: 4/12/2026, 3:35:18 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses