cve/2024/CVE-2024-11022.md
2025-09-29 21:09:30 +02:00

19 lines
879 B
Markdown

### [CVE-2024-11022](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11022)
![](https://img.shields.io/static/v1?label=Product&message=SICK%20InspectorP61x&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=SICK%20InspectorP62x&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=all%20versions%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-323%20Reusing%20a%20Nonce%2C%20Key%20Pair%20in%20Encryption&color=brightgreen)
### Description
The authentication process to the web server uses a challenge response procedure whichinludes the nonce and additional information. This challenge can be used several times for login and istherefore vulnerable for a replay attack.
### POC
#### Reference
- https://www.first.org/cvss/calculator/3.1
#### Github
No PoCs found on GitHub currently.