Vulnerability Description
The session hijacking attack targets the application layer's control mechanism, which manages authenticated sessions between a host PC and a PLC. During such sessions, a session key is utilized to maintain security. However, if an attacker captures this session key, they can inject traffic into an ongoing authenticated session. To successfully achieve this, the attacker also needs to spoof both the IP address and MAC address of the originating host which is typical of a session-based attack.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
FAQ
What is CVE-2024-43099?
CVE-2024-43099 is a vulnerability with a CVSS score of 8.8 (HIGH). The session hijacking attack targets the application layer's control mechanism, which manages authenticated sessions between a host PC and a PLC. During such sessions, a session key is utilized to mai...
How severe is CVE-2024-43099?
CVE-2024-43099 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-43099?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.