A vulnerability has been identified in Desigo DXR2 (All versions < V01.21.142.5-22), Desigo PXC3 (All versions < V01.21.142.4-18), Desigo PXC4 (All versions < V02.20.142.10-10884), Desigo PXC5 (All versions < V02.20.142.10-10884). The application, after a successful login, sets the session cookie on the browser via client-side JavaScript code, without applying any security attributes (such as “Secure”, “HttpOnly”, or “SameSite”). Any attempts to browse the application via unencrypted HTTP protocol would lead to the transmission of all his/her session cookies in plaintext through the network. An attacker could then be able to sniff the network and capture sensitive information.
References
Link | Resource |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-626968.pdf | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: siemens
Published: 2022-05-10T09:46:56
Updated: 2022-06-14T09:21:35
Reserved: 2022-01-27T00:00:00
Link: CVE-2022-24045
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-05-20T13:15:14.600
Modified: 2023-06-23T19:48:54.647
Link: CVE-2022-24045
JSON object: View
Redhat Information
No data.