No advisories yet.
Solution
Intrado developed and released a software update on March 2nd, 2026, that addresses this issue and has contacted customers to coordinate applying the patch. If you have questions, contact Intrado E911 Support: E911Support@intrado.com
Workaround
No workaround given by the vendor.
Mon, 04 May 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A path traversal condition in Intrado 911 Emergency Gateway could allow an attacker with existing network access the ability to access the EGW management interface without authentication. Successful exploitation of this vulnerability could allow a user to read, modify, or delete files. | Intrado 911 Emergency Gateway (EGW) 5.x, 6.x, and 7.x contain a path traversal vulnerability in the download_debuglog_file.php endpoint used for Debug Logs downloads. An unauthenticated attacker can manipulate the name parameter to read arbitrary files outside the intended directory |
Mon, 27 Apr 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Intrado
Intrado 911 Emergency Gateway |
|
| Vendors & Products |
Intrado
Intrado 911 Emergency Gateway |
Thu, 23 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 23 Apr 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A path traversal condition in Intrado 911 Emergency Gateway could allow an attacker with existing network access the ability to access the EGW management interface without authentication. Successful exploitation of this vulnerability could allow a user to read, modify, or delete files. | |
| Title | Path traversal: '.../...//' in Intrado 911 Emergency Gateway (EGW) | |
| Weaknesses | CWE-35 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2026-05-04T21:15:57.832Z
Reserved: 2026-04-10T14:14:22.543Z
Link: CVE-2026-6074
Updated: 2026-04-23T18:50:15.839Z
Status : Awaiting Analysis
Published: 2026-04-23T19:17:30.410
Modified: 2026-05-04T22:16:19.280
Link: CVE-2026-6074
No data.
OpenCVE Enrichment
Updated: 2026-05-04T23:00:11Z