First published: Tue Jun 13 2023(Updated: )
A vulnerability has been identified in POWER METER SICAM Q100 (All versions < V2.60), POWER METER SICAM Q100 (All versions < V2.60), POWER METER SICAM Q100 (All versions < V2.60), POWER METER SICAM Q100 (All versions < V2.60). Affected devices are missing cookie protection flags when using the default settings. An attacker who gains access to a session token can use it to impersonate a legitimate application user.
Credit: productcert@siemens.com
Affected Software | Affected Version | How to fix |
---|---|---|
Siemens Q200 | <2.70 | |
Siemens Q200 Firmware | ||
All of | ||
Siemens Q200 | <2.70 | |
Siemens Q200 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-31238 is considered high due to the potential for session hijacking.
To fix CVE-2023-31238, update the POWER METER SICAM Q100 firmware to version 2.60 or higher.
POWER METER SICAM Q100 versions prior to 2.60 are affected by CVE-2023-31238.
CVE-2023-31238 is a vulnerability due to missing cookie protection flags that allows session token impersonation.
Yes, attackers can exploit CVE-2023-31238 remotely if they gain access to a session token.