VYPR
Medium severity6.5NVD Advisory· Published Sep 10, 2024· Updated Apr 15, 2026

CVE-2024-45504

CVE-2024-45504

Description

Cross-site request forgery (CSRF) vulnerability in multiple Alps System Integration products and the OEM products allow a remote unauthenticated attacker to hijack the authentication of the user and to perform unintended operations if the user views a malicious page while logged in.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Cross-site request forgery in multiple Alps System Integration and OEM products allows attackers to perform unintended operations on logged-in users.

Vulnerability

Overview CVE-2024-45504 is a cross-site request forgery (CSRF) vulnerability affecting multiple Alps System Integration products and their OEM counterparts [1]. The flaw, classified as CWE-352, allows an attacker to hijack the authentication of a logged-in user and perform unintended operations [1][3].

Exploitation

The vulnerability can be exploited remotely by an unauthenticated attacker who tricks a user already logged into the affected product's management console into visiting a malicious page [1][2]. No authentication is required for the attacker, but the victim must have an active session [3]. The CVSS vector (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N) indicates low attack complexity and no privileges required, but user interaction is necessary [2][4].

Impact

Successful exploitation results in high integrity impact, as the attacker can perform arbitrary operations on the management console with the victim's privileges [2][4]. Confidentiality is not affected, and the overall severity is rated Medium (CVSS 6.5) [1][2].

Mitigation

Patches have been released for several products, including InterSafe GatewayConnection, CATS, MobileSecurity, MJS WebFiltering, AssetView F, and LANSCOPE EndpointManager WebFiltering [1][4]. Trend Micro's InterScan WebManager has patches for versions 9.0 and 9.1 [2]. Users are advised to update to the latest versions or apply workarounds as specified by vendors [1][2].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.