CVE-2024-43099

HIGH

Session Hijacking - Auth Bypass

Title source: llm
STIX 2.1

Description

The session hijacking attack targets the application layer's control mechanism, which manages authenticated sessions between a host PC and a PLC. During such sessions, a session key is utilized to maintain security. However, if an attacker captures this session key, they can inject traffic into an ongoing authenticated session. To successfully achieve this, the attacker also needs to spoof both the IP address and MAC address of the originating host which is typical of a session-based attack.

Scores

CVSS v3 8.8
EPSS 0.0013
EPSS Percentile 31.8%
Attack Vector ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-294
Status published
Products (1)
AutomationDirect/DirectLogic H2-DM1E < 2.8.0
Published Sep 13, 2024
Tracked Since Feb 18, 2026