CVE-2024-11022
Dec. 6, 2024, 1:15 p.m.
5.6
Medium
Description
The authentication process to the web server uses a challenge response procedure which
inludes the nonce and additional information. This challenge can be used several times for login and is
therefore vulnerable for a replay attack.
Product(s) Impacted
Product | Versions |
---|---|
UNKNOWN |
|
Weaknesses
CWE-323
Reusing a Nonce, Key Pair in Encryption
Nonces should be used for the present occasion and only once.
References
Tags
CVSS Score
CVSS Data
- Attack Vector: NETWORK
- Attack Complexity: HIGH
- Privileges Required: NONE
- Scope: UNCHANGED
- Confidentiality Impact: LOW
- Integrity Impact: LOW
- Availability Impact: LOW
View Vector String
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
Date
- Published: Dec. 6, 2024, 1:15 p.m.
- Last Modified: Dec. 6, 2024, 1:15 p.m.
Status : Awaiting Analysis
CVE has been recently published to the CVE List and has been received by the NVD.
More infoSource
psirt@sick.de
*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.