First published: Tue Aug 27 2024(Updated: )
An attacker with local access to machine where MicroSCADA X SYS600 is installed, could enable the session logging supporting the product and try to exploit a session hijacking of an already established session. By default, the session logging level is not enabled and only users with administrator rights can enable it.
Credit: cybersecurity@hitachienergy.com
Affected Software | Affected Version | How to fix |
---|---|---|
Hitachi Energy Microscada X Sys600 | >=10.0<10.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3982 is rated as a medium severity vulnerability, as it requires local access to exploit the session hijacking potential.
To fix CVE-2024-3982, ensure that session logging is not enabled unless necessary and limit user access to administrator only.
CVE-2024-3982 impacts users of the Hitachienergy MicroSCADA X SYS600 application versions from 10.0 to 10.6.
An attacker with local access can exploit CVE-2024-3982 to hijack an established session by enabling session logging.
Exploiting CVE-2024-3982 requires local access to the machine where MicroSCADA X SYS600 is installed.