A path traversal condition in Intrado 911 Emergency Gateway could allow an attacker with existing network access the ability to access the EGW management interface without authentication. Successful exploitation of this vulnerability could allow a user to read, modify, or delete files.
Advisories

No advisories yet.

Fixes

Solution

Intrado developed and released a software update on March 2nd, 2026, that addresses this issue and has contacted customers to coordinate applying the patch. If you have questions, contact Intrado E911 Support: E911Support@intrado.com


Workaround

No workaround given by the vendor.

History

Thu, 23 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 23 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
Description A path traversal condition in Intrado 911 Emergency Gateway could allow an attacker with existing network access the ability to access the EGW management interface without authentication. Successful exploitation of this vulnerability could allow a user to read, modify, or delete files.
Title Path traversal: '.../...//' in Intrado 911 Emergency Gateway (EGW)
Weaknesses CWE-35
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2026-04-23T18:50:20.955Z

Reserved: 2026-04-10T14:14:22.543Z

Link: CVE-2026-6074

cve-icon Vulnrichment

Updated: 2026-04-23T18:50:15.839Z

cve-icon NVD

Status : Received

Published: 2026-04-23T19:17:30.410

Modified: 2026-04-23T19:17:30.410

Link: CVE-2026-6074

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses