ScadaBR 1.12.4 is vulnerable to Session Fixation. The application assigns a JSESSIONID session cookie to unauthenticated users and does not regenerate the session identifier after successful authentication. As a result, a session created prior to login becomes authenticated once the victim logs in, allowing an attacker who knows the session ID to hijack an authenticated session.
History

Tue, 10 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-384
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Scadabr
Scadabr scadabr
Vendors & Products Scadabr
Scadabr scadabr

Mon, 09 Mar 2026 21:00:00 +0000

Type Values Removed Values Added
Description ScadaBR 1.12.4 is vulnerable to Session Fixation. The application assigns a JSESSIONID session cookie to unauthenticated users and does not regenerate the session identifier after successful authentication. As a result, a session created prior to login becomes authenticated once the victim logs in, allowing an attacker who knows the session ID to hijack an authenticated session.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2026-03-09T00:00:00.000Z

Updated: 2026-03-10T16:28:53.373Z

Reserved: 2026-01-09T00:00:00.000Z

Link: CVE-2025-70973

cve-icon Vulnrichment

Updated: 2026-03-10T16:28:36.104Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-09T21:16:12.727

Modified: 2026-03-11T13:53:47.157

Link: CVE-2025-70973

cve-icon Redhat

No data.