Never-Expire Sessions in SINEC Traffic Analyzer v<1.2 Unauth Access
CVE-2024-35206 Published on June 11, 2024
A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V1.2). The affected application does not expire the session. This could allow an attacker to get unauthorized access.
Weakness Type
Insufficient Session Expiration
According to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization."
Products Associated with CVE-2024-35206
Want to know whenever a new CVE is published for Siemens Sinec Traffic Analyzer? stack.watch will email you.
Affected Versions
Siemens SINEC Traffic Analyzer:- Before V1.2 is affected.
- Before 1.2 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.