Session fixation vulnerability in TCP/IP function included in the firmware of MELSEC iQ-R series (RJ71EIP91 EtherNet/IP Network Interface Module First 2 digits of serial number are 02 or before, RJ71PN92 PROFINET IO Controller Module First 2 digits of serial number are 01 or before, RD81DL96 High Speed Data Logger Module First 2 digits of serial number are 08 or before, RD81MES96N MES Interface Module First 2 digits of serial number are 04 or before, and RD81OPC96 OPC UA Server Module First 2 digits of serial number are 04 or before) allows a remote unauthenticated attacker to stop the network functions of the products via a specially crafted packet.
Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Melsec_iq-rj71eip91_firmware | Mitsubishielectric | - (including) | - (including) |
Such a scenario is commonly observed when: