SINEC Traffic Analyzer <V1.2: Session Cookie lacks Secure/HttpOnly/SameSite
CVE-2024-35211 Published on June 11, 2024

A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V1.2). The affected web server, after a successful login, sets the session cookie on the browser, without applying any security attributes (such as Secure, HttpOnly, or SameSite).

NVD

Weakness Type

Sensitive Cookie in HTTPS Session Without 'Secure' Attribute

The Secure attribute for sensitive cookies in HTTPS sessions is not set, which could cause the user agent to send those cookies in plaintext over an HTTP session.


Products Associated with CVE-2024-35211

Want to know whenever a new CVE is published for Siemens Sinec Traffic Analyzer? stack.watch will email you.

 

Affected Versions

Siemens SINEC Traffic Analyzer:

Exploit Probability

EPSS
0.20%
Percentile
41.87%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.