CVE-2024-28803

6.1 MEDIUM

📋 TL;DR

This cross-site scripting (XSS) vulnerability in Italtel's i-MCS NFV software allows unauthenticated remote attackers to inject malicious scripts or HTML via HTTP/POST parameters. This affects organizations using Italtel's NFV solution version 12.1.0-20211215, potentially compromising user sessions and data.

💻 Affected Systems

Products:
  • Italtel i-MCS NFV
Versions: v.12.1.0-20211215
Operating Systems: Not specified, likely various
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web management interface of the NFV solution. Specific vulnerable endpoints not detailed in references.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator credentials, hijack user sessions, deface the web interface, or redirect users to malicious sites, potentially leading to full system compromise.

🟠

Likely Case

Attackers would typically steal session cookies or credentials to gain unauthorized access to the NFV management interface, potentially modifying network configurations.

🟢

If Mitigated

With proper input validation and output encoding, the attack would be prevented, though the vulnerable endpoint remains exposed.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

XSS vulnerabilities typically have low exploitation complexity, especially with unauthenticated access. No public exploit code found in references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: https://www.gruppotim.it/it/footer/red-team.html

Restart Required: No

Instructions:

1. Contact Italtel support for patch information. 2. Check the vendor advisory for updates. 3. Apply any available patches following vendor instructions.

🔧 Temporary Workarounds

Web Application Firewall (WAF)

all

Deploy a WAF with XSS protection rules to filter malicious POST requests.

Input Validation

all

Implement server-side input validation to sanitize POST parameters.

🧯 If You Can't Patch

  • Isolate the i-MCS NFV management interface behind a VPN or internal network only.
  • Implement strict Content Security Policy (CSP) headers to mitigate script execution.

🔍 How to Verify

Check if Vulnerable:

Test POST parameters for XSS by injecting script payloads and observing if they execute in the browser.

Check Version:

Check the software version via the web interface or system documentation; specific command not provided.

Verify Fix Applied:

Verify that injected scripts no longer execute and that input is properly sanitized.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests with script tags or JavaScript in parameters
  • Multiple failed login attempts following suspicious POSTs

Network Indicators:

  • HTTP POST requests containing <script> tags or JavaScript code to the NFV management interface

SIEM Query:

source="web_logs" AND (method="POST" AND (url="*i-mcs*" OR url="*nfv*") AND (param="*<script>*" OR param="*javascript:*"))

🔗 References

📤 Share & Export