### [CVE-2024-11022](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11022) ![](https://img.shields.io/static/v1?label=Product&message=SICK%20InspectorP61x&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=SICK%20InspectorP62x&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=all%20versions%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-323%20Reusing%20a%20Nonce%2C%20Key%20Pair%20in%20Encryption&color=brightgreen) ### Description The authentication process to the web server uses a challenge response procedure whichinludes the nonce and additional information. This challenge can be used several times for login and istherefore vulnerable for a replay attack. ### POC #### Reference - https://www.first.org/cvss/calculator/3.1 #### Github No PoCs found on GitHub currently.