Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-7395: CWE-287 Improper Authentication in Korenix JetPort 5601v3

0
Critical
VulnerabilityCVE-2024-7395cvecve-2024-7395cwe-287
Published: Mon Aug 05 2024 (08/05/2024, 13:16:05 UTC)
Source: CVE Database V5
Vendor/Project: Korenix
Product: JetPort 5601v3

Description

An authentication bypass vulnerability in Korenix JetPort 5601v3 allows an attacker to access functionality on the device without specifying a password.This issue affects JetPort 5601v3: through 1.2.

AI-Powered Analysis

AILast updated: 11/04/2025, 16:52:00 UTC

Technical Analysis

CVE-2024-7395 identifies an improper authentication vulnerability (CWE-287) in the Korenix JetPort 5601v3 device, specifically in firmware versions through 1.2. This flaw allows an unauthenticated attacker to bypass authentication mechanisms entirely, granting access to device functionality without needing to supply any password or credentials. The vulnerability is remotely exploitable over the network (Attack Vector: Network) and requires no privileges or user interaction, making it highly accessible to attackers. The vulnerability impacts confidentiality, integrity, and availability at a high level, as unauthorized access could lead to configuration changes, data exposure, or disruption of device operations. The CVSS 4.0 score of 9.3 reflects the critical nature of this issue, with high impact on all security properties and no mitigating factors such as authentication or user interaction. Korenix JetPort 5601v3 devices are typically used in industrial networking environments, including automation and critical infrastructure sectors, where secure device management is essential. Although no exploits have been reported in the wild yet, the vulnerability's characteristics suggest it could be weaponized quickly. The lack of available patches at the time of disclosure necessitates immediate risk mitigation through network controls and monitoring. This vulnerability underscores the importance of robust authentication controls in embedded and industrial network devices.

Potential Impact

For European organizations, the impact of CVE-2024-7395 is significant, especially those operating in industrial automation, manufacturing, transportation, and critical infrastructure sectors where Korenix JetPort 5601v3 devices are deployed. Unauthorized access to these devices can lead to unauthorized configuration changes, data leakage, or disruption of network communications, potentially causing operational downtime or safety hazards. The compromise of such devices could serve as a foothold for lateral movement within industrial control networks, increasing the risk of broader attacks on critical infrastructure. Confidentiality breaches could expose sensitive operational data, while integrity violations might alter device configurations or firmware, leading to malfunction or sabotage. Availability could also be impacted if attackers disrupt device operations. The critical severity and ease of exploitation mean that European organizations must prioritize addressing this vulnerability to prevent potential espionage, sabotage, or service interruptions.

Mitigation Recommendations

1. Immediately identify all Korenix JetPort 5601v3 devices within the network and inventory their firmware versions. 2. Monitor Korenix vendor communications for official patches or firmware updates addressing CVE-2024-7395 and apply them promptly once available. 3. Until patches are available, restrict network access to management interfaces of affected devices by implementing strict network segmentation and firewall rules limiting access to trusted administrative networks only. 4. Employ network intrusion detection/prevention systems (IDS/IPS) to monitor for anomalous access attempts or suspicious traffic targeting JetPort 5601v3 devices. 5. Disable any unnecessary services or remote management features on the devices to reduce the attack surface. 6. Enforce strong physical security controls to prevent unauthorized local access to devices. 7. Conduct regular security audits and penetration tests focusing on industrial network devices to identify and remediate similar vulnerabilities proactively. 8. Educate operational technology (OT) and IT personnel about this vulnerability and the importance of secure device management practices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
CyberDanube
Date Reserved
2024-08-01T21:46:34.268Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 690a2dfef0ba78a050538c86

Added to database: 11/4/2025, 4:46:54 PM

Last enriched: 11/4/2025, 4:52:00 PM

Last updated: 11/5/2025, 2:00:49 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats