Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-46602: n/a

0
High
VulnerabilityCVE-2024-46602cvecve-2024-46602
Published: Tue Jan 07 2025 (01/07/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in Elspec G5 digital fault recorder version 1.2.1.12 and earlier. An XML External Entity (XXE) vulnerability may allow an attacker to cause a Denial of Service (DoS) via a crafted XML payload.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 07:26:24 UTC

Technical Analysis

CVE-2024-46602 identifies an XML External Entity (XXE) vulnerability in the Elspec G5 digital fault recorder, specifically in versions 1.2.1.12 and earlier. XXE vulnerabilities occur when XML parsers process external entity references within XML input without proper validation or disabling of external entity resolution. In this case, an attacker can craft malicious XML payloads containing external entity definitions that cause the system to consume excessive resources or crash, leading to Denial of Service (DoS). The vulnerability does not compromise confidentiality or integrity but severely impacts availability by causing the device to become unresponsive or crash. Exploitation requires no authentication or user interaction and can be performed remotely over the network, increasing the attack surface. The Elspec G5 device is used in power grid environments to record and analyze electrical faults, making it a critical component in industrial control systems (ICS). The CVSS 3.1 score of 7.5 reflects the ease of exploitation and high impact on availability. No patches or exploits are currently publicly available, but the vulnerability is assigned CWE-611, which relates to improper restriction of XML external entity references. Given the specialized nature of the device, exploitation could disrupt grid monitoring and fault response capabilities, potentially affecting power reliability.

Potential Impact

The primary impact of CVE-2024-46602 is a Denial of Service condition on Elspec G5 digital fault recorders, which are integral to electrical grid fault detection and analysis. Disruption of these devices can delay fault identification and response, potentially leading to prolonged outages or grid instability. Organizations operating critical infrastructure, such as utilities and grid operators, face operational risks including reduced situational awareness and slower incident response. The vulnerability does not expose sensitive data or allow unauthorized control, but the loss of availability in a critical monitoring device can have cascading effects on power system reliability and safety. Since exploitation requires no authentication and can be performed remotely, attackers can easily target vulnerable devices exposed to untrusted networks. The lack of known exploits in the wild suggests limited current exploitation, but the high CVSS score indicates a significant threat if weaponized. The impact is especially severe in regions with widespread deployment of Elspec devices or similar grid monitoring equipment, where power infrastructure is a strategic asset.

Mitigation Recommendations

1. Monitor Elspec communications and vendor channels for official patches or firmware updates addressing CVE-2024-46602 and apply them promptly once available. 2. Implement network segmentation to isolate Elspec G5 devices from untrusted or public networks, limiting exposure to remote attackers. 3. Deploy Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) capable of detecting and blocking malicious XML payloads containing external entity references. 4. Configure XML parsers on affected devices or intermediary systems to disable external entity processing if configurable. 5. Conduct regular security assessments and penetration testing focused on industrial control system components to identify similar XML parsing weaknesses. 6. Establish strict input validation and filtering for XML data received by the devices to prevent malicious payloads from reaching the parser. 7. Maintain comprehensive logging and monitoring of device behavior to detect anomalous crashes or resource exhaustion indicative of exploitation attempts. 8. Develop incident response plans specific to industrial control system disruptions to minimize downtime and coordinate rapid recovery.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-09-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d02b7ef31ef0b56d2d3

Added to database: 2/25/2026, 9:43:30 PM

Last enriched: 2/28/2026, 7:26:24 AM

Last updated: 4/11/2026, 5:57:29 PM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses