ScadaBR 1.12.4 is vulnerable to Session Fixation. The application assigns a JSESSIONID session cookie to unauthenticated users and does not regenerate the session identifier after successful authentication. As a result, a session created prior to login becomes authenticated once the victim logs in, allowing an attacker who knows the session ID to hijack an authenticated session.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://github.com/chiranjib2001/ScadaBR/blob/main/README.md |
|
History
Mon, 09 Mar 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ScadaBR 1.12.4 is vulnerable to Session Fixation. The application assigns a JSESSIONID session cookie to unauthenticated users and does not regenerate the session identifier after successful authentication. As a result, a session created prior to login becomes authenticated once the victim logs in, allowing an attacker who knows the session ID to hijack an authenticated session. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2026-03-09T00:00:00.000Z
Updated: 2026-03-09T20:47:16.314Z
Reserved: 2026-01-09T00:00:00.000Z
Link: CVE-2025-70973
No data.
Status : Received
Published: 2026-03-09T21:16:12.727
Modified: 2026-03-09T21:16:12.727
Link: CVE-2025-70973
No data.
ReportizFlow