Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-46645: n/a

0
High
VulnerabilityCVE-2024-46645cvecve-2024-46645
Published: Fri Sep 20 2024 (09/20/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

eNMS 4.0.0 is vulnerable to Directory Traversal via get_tree_files.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 07:29:01 UTC

Technical Analysis

CVE-2024-46645 is a directory traversal vulnerability identified in eNMS version 4.0.0, specifically within the get_tree_files functionality. Directory traversal (CWE-22) occurs when an application fails to properly sanitize user-supplied input that specifies file paths, allowing attackers to manipulate the path to access files outside the intended directory scope. In this case, the vulnerability enables remote, unauthenticated attackers to craft requests that traverse directories and read arbitrary files on the server hosting eNMS. The CVSS v3.1 base score of 7.5 reflects a high-severity issue due to the vulnerability's network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact is primarily on confidentiality (C:H), as attackers can access sensitive files, but there is no impact on integrity or availability. Although no public exploits are currently known, the vulnerability's characteristics make it a significant risk, especially for organizations that expose eNMS services to untrusted networks. eNMS is a network management system used to monitor and manage network devices, often deployed in telecommunications and enterprise environments, making the confidentiality breach potentially severe. The lack of available patches at the time of publication increases the urgency for defensive measures. Proper input validation and path normalization are critical to prevent exploitation. The vulnerability was reserved and published in September 2024, indicating recent discovery and disclosure.

Potential Impact

The primary impact of CVE-2024-46645 is unauthorized disclosure of sensitive information due to the ability to read arbitrary files on the affected system. This can lead to exposure of configuration files, credentials, logs, or other sensitive data that could facilitate further attacks or compromise. Since the vulnerability does not affect integrity or availability, it does not directly enable data modification or service disruption. However, the confidentiality breach can have cascading effects, such as enabling lateral movement, privilege escalation, or targeted attacks against the organization. Organizations relying on eNMS 4.0.0 for network management, especially in critical infrastructure sectors like telecommunications, finance, and government, face increased risk of data leakage and espionage. The ease of exploitation (no authentication or user interaction required) and network accessibility amplify the threat. Without mitigation, attackers can remotely exploit this vulnerability to gain sensitive insights into network configurations and operational details, potentially undermining organizational security posture.

Mitigation Recommendations

1. Immediately restrict network access to the eNMS management interface, limiting it to trusted internal networks or VPNs to reduce exposure. 2. Deploy Web Application Firewalls (WAFs) or Intrusion Prevention Systems (IPS) with rules specifically designed to detect and block directory traversal attempts targeting get_tree_files or similar endpoints. 3. Implement strict input validation and path normalization on the server side to sanitize and validate all file path parameters, ensuring they do not contain traversal sequences such as '../'. 4. Monitor logs for suspicious requests containing directory traversal patterns and respond promptly to any detected exploitation attempts. 5. Engage with the eNMS vendor or community to obtain patches or updates addressing this vulnerability as soon as they become available. 6. Conduct a thorough audit of exposed files and credentials that may have been accessed to assess potential data leakage and take remediation actions. 7. Educate network and security teams about this vulnerability to ensure rapid detection and response. 8. Consider deploying network segmentation to isolate critical management systems from general user networks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-09-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d04b7ef31ef0b56d3e1

Added to database: 2/25/2026, 9:43:32 PM

Last enriched: 2/28/2026, 7:29:01 AM

Last updated: 4/12/2026, 5:08:07 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses