Description
Intrado 911 Emergency Gateway (EGW) 5.x, 6.x, and 7.x contain a path traversal vulnerability in the download_debuglog_file.php endpoint used for Debug Logs downloads. An unauthenticated attacker can manipulate the name parameter to read arbitrary files outside the intended directory
Published: 2026-04-23
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Intrado 911 Emergency Gateway (EGW) 5.x, 6.x, and 7.x contain a path traversal flaw in the download_debuglog_file.php endpoint used for Debug Logs downloads. An unauthenticated attacker can manipulate the name parameter to read arbitrary files outside the intended directory. This allows an attacker to view sensitive files on the gateway, such as configuration or credential data, but does not provide write or delete capabilities.

Affected Systems

The affected product is Intrado’s 911 Emergency Gateway. All installations running the EGW firmware prior to the March 2 2026 update are vulnerable. The vendor has released a patch to correct the path handling logic and has communicated with customers to deploy the fix.

Risk and Exploitability

The high CVSS score indicates a severe security risk, but the EPSS score of less than 1 % suggests that exploitation is currently unlikely. The vulnerability is not listed in CISA’s KEV catalog, meaning there are no publicly known recent exploits. Attackers can directly access the download_debuglog_file.php endpoint without authentication, providing access to any readable file on the system. Based on the description, it is inferred that exploitation requires connectivity to the endpoint, which is likely exposed via the EGW management interface, but the exact exposure is not specified.

Generated by OpenCVE AI on May 4, 2026 at 22:52 UTC.

Remediation

Vendor Solution

Intrado developed and released a software update on March 2nd, 2026, that addresses this issue and has contacted customers to coordinate applying the patch.  If you have questions, contact Intrado E911 Support: E911Support@intrado.com


OpenCVE Recommended Actions

  • Apply the March 2 2026 patch released by Intrado that fixes the path traversal flaw.
  • Limit the EGW’s management interface to a secure network segment or VPN, preventing general network exposure.
  • Enable comprehensive logging on the EGW and regularly review logs for signs of unauthorized file access or traversal attempts.

Generated by OpenCVE AI on May 4, 2026 at 22:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 04 May 2026 21:30:00 +0000

Type Values Removed Values Added
Description A path traversal condition in Intrado 911 Emergency Gateway could allow an attacker with existing network access the ability to access the EGW management interface without authentication. Successful exploitation of this vulnerability could allow a user to read, modify, or delete files. Intrado 911 Emergency Gateway (EGW) 5.x, 6.x, and 7.x contain a path traversal vulnerability in the download_debuglog_file.php endpoint used for Debug Logs downloads. An unauthenticated attacker can manipulate the name parameter to read arbitrary files outside the intended directory

Mon, 27 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
First Time appeared Intrado
Intrado 911 Emergency Gateway
Vendors & Products Intrado
Intrado 911 Emergency Gateway

Thu, 23 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 23 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
Description A path traversal condition in Intrado 911 Emergency Gateway could allow an attacker with existing network access the ability to access the EGW management interface without authentication. Successful exploitation of this vulnerability could allow a user to read, modify, or delete files.
Title Path traversal: '.../...//' in Intrado 911 Emergency Gateway (EGW)
Weaknesses CWE-35
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Intrado 911 Emergency Gateway
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2026-05-04T21:15:57.832Z

Reserved: 2026-04-10T14:14:22.543Z

Link: CVE-2026-6074

cve-icon Vulnrichment

Updated: 2026-04-23T18:50:15.839Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-23T19:17:30.410

Modified: 2026-05-04T22:16:19.280

Link: CVE-2026-6074

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-04T23:00:11Z

Weaknesses