Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-46646: n/a

0
Medium
VulnerabilityCVE-2024-46646cvecve-2024-46646
Published: Fri Sep 20 2024 (09/20/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

eNMS up to 4.7.1 is vulnerable to Directory Traversal via /download/file.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 07:29:11 UTC

Technical Analysis

CVE-2024-46646 is a directory traversal vulnerability identified in eNMS, a network management system, affecting all versions up to 4.7.1. The vulnerability exists in the /download/file endpoint, where insufficient validation of file path parameters allows an authenticated user with low privileges to traverse directories and access files outside the intended directory scope. This is classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory). The vulnerability has a CVSS 3.1 base score of 6.5, indicating a medium severity level. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), and requires privileges (PR:L) but no user interaction (UI:N). The impact is high on confidentiality (C:H) but does not affect integrity (I:N) or availability (A:N). No patches or exploits are currently publicly available, but the vulnerability poses a risk of sensitive data exposure if exploited. The flaw could allow attackers to read configuration files, credentials, or other sensitive data stored on the server, potentially leading to further compromise if leveraged in a multi-stage attack. The vulnerability is limited by the need for authentication, which reduces the attack surface but does not eliminate risk, especially in environments with many users or weak credential management.

Potential Impact

The primary impact of CVE-2024-46646 is unauthorized disclosure of sensitive information due to directory traversal, which can compromise confidentiality. Attackers with low-level authenticated access can retrieve files outside the intended directory, potentially exposing configuration files, user data, or credentials. This can facilitate further attacks such as privilege escalation, lateral movement, or data exfiltration. Although integrity and availability are not directly affected, the exposure of sensitive information can undermine organizational security posture and trust. Organizations relying on eNMS for network management may face risks of operational disruption if sensitive network configurations or credentials are leaked. The lack of known exploits reduces immediate risk, but the vulnerability should be addressed promptly to prevent future exploitation, especially in environments with multiple users or weak access controls.

Mitigation Recommendations

To mitigate CVE-2024-46646, organizations should: 1) Apply vendor patches or updates as soon as they become available to fix the directory traversal flaw. 2) Implement strict input validation and sanitization on the /download/file endpoint to ensure file path parameters cannot traverse directories (e.g., disallow '..' sequences). 3) Enforce the principle of least privilege by limiting user permissions and restricting access to the download functionality only to trusted users. 4) Monitor access logs for unusual file access patterns or attempts to access unauthorized files. 5) Use web application firewalls (WAFs) with rules to detect and block directory traversal attempts. 6) Conduct regular security assessments and code reviews focusing on path traversal and input validation vulnerabilities. 7) Educate users about secure credential management to reduce the risk of compromised accounts being used to exploit this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-09-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d04b7ef31ef0b56d3e4

Added to database: 2/25/2026, 9:43:32 PM

Last enriched: 2/28/2026, 7:29:11 AM

Last updated: 4/12/2026, 10:32:05 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses