Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-7396: CWE-311 Missing Encryption of Sensitive Data in Korenix JetPort 5601v3

0
High
VulnerabilityCVE-2024-7396cvecve-2024-7396cwe-311
Published: Mon Aug 05 2024 (08/05/2024, 13:20:57 UTC)
Source: CVE Database V5
Vendor/Project: Korenix
Product: JetPort 5601v3

Description

Missing encryption of sensitive data in Korenix JetPort 5601v3 allows Eavesdropping.This issue affects JetPort 5601v3: through 1.2.

AI-Powered Analysis

AILast updated: 11/04/2025, 16:51:48 UTC

Technical Analysis

CVE-2024-7396 identifies a vulnerability in the Korenix JetPort 5601v3, a device commonly used for industrial network connectivity. The vulnerability stems from CWE-311, which is the missing encryption of sensitive data during transmission. Specifically, the device fails to encrypt sensitive information, allowing an attacker with network access to eavesdrop on communications. The vulnerability affects firmware versions through 1.2. According to the CVSS 4.0 vector, the attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), but user interaction is necessary (UI:P). The impact is high on confidentiality (VC:H) but does not affect integrity or availability. This means attackers can intercept sensitive data but cannot modify or disrupt device operations. No known exploits have been reported in the wild, and no patches have been released yet. The lack of encryption could expose credentials, configuration data, or operational commands, which could be leveraged for further attacks or reconnaissance. The device is often deployed in industrial and critical infrastructure environments, increasing the potential impact. The vulnerability was published on August 5, 2024, and assigned by CyberDanube. The absence of a patch necessitates immediate compensating controls to mitigate risk.

Potential Impact

For European organizations, especially those in industrial automation, manufacturing, and critical infrastructure sectors, this vulnerability poses a significant risk to the confidentiality of sensitive operational data. Exposure of unencrypted data could lead to industrial espionage, unauthorized access to network configurations, or preparation for more advanced attacks. Since the JetPort 5601v3 is used to bridge or connect industrial networks, interception of data could reveal network topologies, credentials, or control commands. This could undermine trust in operational technology (OT) environments and potentially lead to regulatory non-compliance regarding data protection. The lack of integrity and availability impact limits immediate operational disruption, but the confidentiality breach alone can have severe long-term consequences. European organizations with interconnected IT and OT networks are particularly vulnerable, as attackers could pivot from intercepted data to broader network compromise.

Mitigation Recommendations

1. Immediately identify and inventory all Korenix JetPort 5601v3 devices in the network. 2. Segment these devices on isolated VLANs or physically separate networks to limit exposure. 3. Deploy encrypted tunnels such as IPsec VPNs or TLS-based VPNs around the device communications to compensate for missing native encryption. 4. Implement strict network monitoring and intrusion detection systems focused on unusual traffic patterns or unauthorized sniffing attempts near these devices. 5. Restrict network access to the JetPort devices to trusted hosts only, using firewall rules and access control lists. 6. Engage with Korenix for firmware updates or patches and plan for timely deployment once available. 7. Educate users about the risk of interacting with affected devices and enforce policies to minimize unnecessary user interaction that could facilitate exploitation. 8. Consider replacing devices with more secure alternatives if encryption cannot be assured in the short term.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
CyberDanube
Date Reserved
2024-08-01T21:46:35.555Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 690a2dfef0ba78a050538c8a

Added to database: 11/4/2025, 4:46:54 PM

Last enriched: 11/4/2025, 4:51:48 PM

Last updated: 12/16/2025, 5:07:25 AM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats