First published: Mon Jul 25 2022(Updated: )
A vulnerability exists in the http web interface where the web interface does not validate data in an HTTP header. This causes a possible HTTP response splitting, which if exploited could lead an attacker to channel down harmful code into the user’s web browser, such as to steal the session cookies. Thus, an attacker who successfully makes an MSM user who has already established a session to MSM web interface clicks a forged link to the MSM web interface, e.g., the link is sent per E-Mail, could trick the user into downloading malicious software onto his computer. This issue affects: Hitachi Energy MSM V2.2 and prior versions.
Credit: cybersecurity@hitachienergy.com
Affected Software | Affected Version | How to fix |
---|---|---|
Hitachienergy Modular Switchgear Monitoring Firmware | <=2.2.0 | |
Hitachienergy Modular Switchgear Monitoring |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-40336.
The severity of CVE-2021-40336 is high.
The vulnerability affects version up to and inclusive of 2.2.0 of the Hitachienergy Modular Switchgear Monitoring Firmware.
HTTP response splitting is a vulnerability that allows an attacker to inject malicious HTTP responses.
An attacker can exploit CVE-2021-40336 by injecting harmful code into the user's web browser, such as to steal session cookies.