First published: Thu Dec 05 2024(Updated: )
Session Fixation vulnerabilities allow an attacker to fix a users session identifier before login providing an opportunity for session takeover on a product. Affected products: ABB ASPECT - Enterprise v3.08.02; NEXUS Series v3.08.02; MATRIX Series v3.08.02
Credit: cybersecurity@ch.abb.com
Affected Software | Affected Version | How to fix |
---|---|---|
ABB ASPECT-Enterprise | ||
Cisco Nexus Series | ||
MATRIX MATRIX Series |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-11317 is considered high due to the potential for session takeover.
To fix CVE-2024-11317, implement proper session management that regenerates session IDs upon user login.
CVE-2024-11317 affects ABB ASPECT - Enterprise v3.08.02, NEXUS Series v3.08.02, and MATRIX Series v3.08.02.
A session fixation vulnerability allows an attacker to set a user's session ID before they log in, facilitating session hijacking.
Yes, you can mitigate risks by ensuring session IDs are regenerated after authentication and implementing secure session management practices.