Description
Insufficient session expiration vulnerability in Turkiye Electricity Transmission Corporation (TEİAŞ) Mobile Application allows Session Hijacking.

This issue affects Mobile Application: from 1.6.2 before 1.13.
Published: 2026-05-21
Score: 5.7 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A weakness in the TEİAŞ Mobile Application allows an attacker to hijack a user's session by exploiting insufficient session expiration controls. This flaw enables the attacker to impersonate a valid user and potentially gain unauthorized access to the application’s functions, compromising confidentiality and integrity of user data. The identified weakness aligns with CWE-613, which describes authentication and session management flaws.

Affected Systems

Turkiye Electricity Transmission Corporation’s Mobile Application, versions prior to 1.13, including 1.6.2 and all intervening releases, is impacted.

Risk and Exploitability

The CVSS score of 5.7 indicates a medium severity vulnerability. No EPSS score is available, so the likelihood of exploitation is uncertain but potentially higher in environments where the application is widely used. The issue is not listed in CISA’s KEV catalog. The attack vector is inferred to be remote, exploiting the application layer where session tokens are transmitted or stored. An attacker who can capture a session token—through network interception or social engineering—could maintain unauthorized access until the session expires.

Generated by OpenCVE AI on May 21, 2026 at 15:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the TEİAŞ Mobile Application to version 1.13 or later where session expiration is properly enforced.
  • Configure short session timeouts and enforce re-authentication for sensitive operations.
  • Remove or encrypt stored session tokens on the device and implement device-bound session identifiers to mitigate interception attacks.

Generated by OpenCVE AI on May 21, 2026 at 15:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 21 May 2026 16:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 21 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description Insufficient session expiration vulnerability in Turkiye Electricity Transmission Corporation (TEİAŞ) Mobile Application allows Session Hijacking. This issue affects Mobile Application: from 1.6.2 before 1.13.
Title Session Hijacking in TEİAŞ's Mobile Application
Weaknesses CWE-613
References
Metrics cvssV3_1

{'score': 5.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: TR-CERT

Published:

Updated: 2026-05-21T14:38:08.702Z

Reserved: 2026-02-03T14:06:49.089Z

Link: CVE-2026-1815

cve-icon Vulnrichment

Updated: 2026-05-21T14:38:04.345Z

cve-icon NVD

Status : Deferred

Published: 2026-05-21T15:16:22.413

Modified: 2026-05-21T15:24:41.890

Link: CVE-2026-1815

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-21T15:30:13Z

Weaknesses