CVE-2024-43099 Vulnerability Details

  /     /     /  

CVE-2024-43099 Metadata Quick Info

CVE Published: 13/09/2024 | CVE Updated: 13/09/2024 | CVE Year: 2024
Source: icscert | Vendor: AutomationDirect | Product: DirectLogic H2-DM1E
Status : PUBLISHED

CVE-2024-43099 Description

The session hijacking attack targets the application layer\'s control mechanism, which manages authenticated sessions between a host PC and a PLC. During such sessions, a session key is utilized to maintain security. However, if an attacker captures this session key, they can inject traffic into an ongoing authenticated session. To successfully achieve this, the attacker also needs to spoof both the IP address and MAC address of the originating host which is typical of a session-based attack.

Metrics

CVSS Version: 3.1 | Base Score: 8.8 HIGH
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

l➤ Exploitability Metrics:
    Attack Vector (AV)* ADJACENT_NETWORK
    Attack Complexity (AC)* LOW
    Privileges Required (PR)* NONE
    User Interaction (UI)* NONE
    Scope (S)* UNCHANGED

l➤ Impact Metrics:
    Confidentiality Impact (C)* HIGH
    Integrity Impact (I)* HIGH
    Availability Impact (A)* HIGH

Weakness Enumeration (CWE)

CWE-ID: CWE-294
CWE Name: CWE-294 Authentication Bypass by Capture-replay
Source: AutomationDirect

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID:
CAPEC Description:


Source: NVD (National Vulnerability Database).