Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-46603: n/a

0
High
VulnerabilityCVE-2024-46603cvecve-2024-46603
Published: Tue Jan 07 2025 (01/07/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An XML External Entity (XXE) vulnerability in Elspec Engineering G5 Digital Fault Recorder Firmware v1.2.1.12 allows attackers to cause a Denial of Service (DoS) via a crafted XML payload.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 07:26:40 UTC

Technical Analysis

CVE-2024-46603 identifies a high-severity XML External Entity (XXE) vulnerability in the firmware version 1.2.1.12 of the Elspec Engineering G5 Digital Fault Recorder, a device used primarily in electrical grid monitoring and fault analysis. The vulnerability arises from the device's XML parser improperly handling external entity references in incoming XML data. An attacker can exploit this by sending a specially crafted XML payload containing malicious external entity definitions. This leads to a Denial of Service (DoS) condition by causing the device to crash, hang, or otherwise become unresponsive, thereby disrupting its fault recording and monitoring capabilities. The vulnerability requires no authentication or user interaction and can be triggered remotely over the network, increasing its risk profile. The CVSS 3.1 base score of 7.5 reflects the ease of exploitation (low attack complexity), lack of required privileges, and the significant impact on availability. Although no public exploits have been reported yet, the presence of this flaw in critical infrastructure devices makes it a serious concern. The CWE-611 classification confirms the root cause as improper restriction of XML external entity references. The absence of patches at the time of publication necessitates immediate compensating controls to mitigate risk.

Potential Impact

The primary impact of CVE-2024-46603 is the disruption of availability of Elspec Engineering G5 Digital Fault Recorders, which are integral to monitoring and diagnosing faults in electrical power systems. A successful attack can cause these devices to crash or become unresponsive, potentially delaying fault detection and response, leading to extended outages or damage to electrical infrastructure. This can affect grid stability and reliability, with cascading effects on industrial, commercial, and residential power consumers. Since the vulnerability can be exploited remotely without authentication, attackers can launch DoS attacks from anywhere on the network, increasing the threat surface. The inability to record faults accurately during an attack may also hinder forensic investigations and maintenance activities. Organizations operating critical infrastructure, utilities, and industrial control systems that depend on these devices face operational risks, financial losses, and reputational damage. The lack of known exploits currently reduces immediate risk but does not eliminate the potential for future attacks.

Mitigation Recommendations

To mitigate CVE-2024-46603 effectively, organizations should implement the following specific measures: 1) Immediately restrict network access to the affected Elspec G5 Digital Fault Recorders by placing them behind firewalls or network segmentation to limit exposure to untrusted networks. 2) Monitor network traffic for unusual or malformed XML payloads targeting these devices, employing intrusion detection systems (IDS) or anomaly detection tools capable of inspecting XML content. 3) Disable or restrict XML external entity processing in the device configuration if such an option is available, reducing the attack surface. 4) Engage with Elspec Engineering support to obtain firmware updates or patches as soon as they are released and plan for timely deployment. 5) Conduct regular security assessments and penetration tests focusing on XML input handling in these devices. 6) Implement robust incident response plans that include procedures for rapid isolation and recovery of affected devices. 7) Maintain up-to-date asset inventories to quickly identify and prioritize vulnerable devices. These targeted actions go beyond generic advice by focusing on network-level controls, monitoring, and vendor engagement specific to this vulnerability and device type.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-09-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d02b7ef31ef0b56d2d6

Added to database: 2/25/2026, 9:43:30 PM

Last enriched: 2/28/2026, 7:26:40 AM

Last updated: 4/12/2026, 3:38:05 PM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses