The session hijacking attack targets the application layer's control mechanism, which manages authenticated sessions between a host PC and a PLC. During such sessions, a session key is utilized to maintain security. However, if an attacker captures this session key, they can inject traffic into an ongoing authenticated session. To successfully achieve this, the attacker also needs to spoof both the IP address and MAC address of the originating host which is typical of a session-based attack.
Metrics
Affected Vendors & Products
References
History
Fri, 13 Sep 2024 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Automationdirect
Automationdirect h2-dm1e Firmware |
|
CPEs | cpe:2.3:o:automationdirect:h2-dm1e_firmware:*:*:*:*:*:*:*:* | |
Vendors & Products |
Automationdirect
Automationdirect h2-dm1e Firmware |
|
Metrics |
ssvc
|
Fri, 13 Sep 2024 16:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The session hijacking attack targets the application layer's control mechanism, which manages authenticated sessions between a host PC and a PLC. During such sessions, a session key is utilized to maintain security. However, if an attacker captures this session key, they can inject traffic into an ongoing authenticated session. To successfully achieve this, the attacker also needs to spoof both the IP address and MAC address of the originating host which is typical of a session-based attack. | |
Title | AutomationDirect DirectLogic H2-DM1E Authentication Bypass by Capture-replay | |
Weaknesses | CWE-294 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: icscert
Published: 2024-09-13T16:33:02.575Z
Updated: 2024-09-13T17:43:05.159Z
Reserved: 2024-09-05T16:57:26.882Z
Link: CVE-2024-43099
Vulnrichment
Updated: 2024-09-13T17:43:00.896Z
NVD
Status : Awaiting Analysis
Published: 2024-09-13T17:15:12.527
Modified: 2024-09-14T11:47:14.677
Link: CVE-2024-43099
Redhat
No data.