CVE-2024-45368 – AutomationDirect DirectLogic H2-DM1E Session Fixation
https://notcve.org/view.php?id=CVE-2024-45368
The H2-DM1E PLC's authentication protocol appears to utilize either a custom encoding scheme or a challenge-response protocol. However, there's an observed anomaly in the H2-DM1E PLC's protocol execution, namely its acceptance of multiple distinct packets as valid authentication responses. This behavior deviates from standard security practices where a single, specific response or encoding pattern is expected for successful authentication. • https://www.cisa.gov/news-events/ics-advisories/icsa-24-256-17 • CWE-384: Session Fixation •
CVE-2024-43099 – AutomationDirect DirectLogic H2-DM1E Authentication Bypass by Capture-replay
https://notcve.org/view.php?id=CVE-2024-43099
The session hijacking attack targets the application layer's control mechanism, which manages authenticated sessions between a host PC and a PLC. During such sessions, a session key is utilized to maintain security. However, if an attacker captures this session key, they can inject traffic into an ongoing authenticated session. To successfully achieve this, the attacker also needs to spoof both the IP address and MAC address of the originating host which is typical of a session-based attack. • https://www.cisa.gov/news-events/ics-advisories/icsa-24-256-17 • CWE-294: Authentication Bypass by Capture-replay •