First published: Tue Aug 27 2024(Updated: )
An HTTP parameter may contain a URL value and could cause the web application to redirect the request to the specified URL. By modifying the URL value to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials.
Credit: cybersecurity@hitachienergy.com
Affected Software | Affected Version | How to fix |
---|---|---|
Hitachi Energy Microscada X Sys600 | =10.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-7941 has been rated as a high-severity vulnerability due to its potential for leading to phishing attacks.
To mitigate CVE-2024-7941, it is essential to validate and sanitize URL parameters to prevent untrusted redirects.
CVE-2024-7941 can facilitate phishing attacks that trick users into providing sensitive credentials.
CVE-2024-7941 specifically affects Hitachi Energy's Microscada X Sys600 version 10.5.
A potential workaround for CVE-2024-7941 is to disable any features that allow external URL redirects until a patch is available.