Vulnerability Details CVE-2024-3982
An attacker with local access to machine where MicroSCADA X
SYS600 is installed, could enable the session logging supporting the product and try to exploit a session hijacking of an already established session. By default, the session logging level
is not enabled and only users with administrator rights can enable it.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 6.1%
CVSS Severity
CVSS v3 Score 8.2
Products affected by CVE-2024-3982
-
cpe:2.3:a:hitachienergy:microscada_x_sys600:10.0
-
cpe:2.3:a:hitachienergy:microscada_x_sys600:10.1
-
cpe:2.3:a:hitachienergy:microscada_x_sys600:10.1.1
-
cpe:2.3:a:hitachienergy:microscada_x_sys600:10.2
-
cpe:2.3:a:hitachienergy:microscada_x_sys600:10.2.1
-
cpe:2.3:a:hitachienergy:microscada_x_sys600:10.3
-
cpe:2.3:a:hitachienergy:microscada_x_sys600:10.3.1
-
cpe:2.3:a:hitachienergy:microscada_x_sys600:10.4
-
cpe:2.3:a:hitachienergy:microscada_x_sys600:10.5