No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://github.com/chiranjib2001/ScadaBR/blob/main/README.md |
|
Tue, 10 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-384 | |
| Metrics |
cvssV3_1
|
Tue, 10 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Scadabr
Scadabr scadabr |
|
| Vendors & Products |
Scadabr
Scadabr scadabr |
Mon, 09 Mar 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ScadaBR 1.12.4 is vulnerable to Session Fixation. The application assigns a JSESSIONID session cookie to unauthenticated users and does not regenerate the session identifier after successful authentication. As a result, a session created prior to login becomes authenticated once the victim logs in, allowing an attacker who knows the session ID to hijack an authenticated session. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-03-10T16:28:53.373Z
Reserved: 2026-01-09T00:00:00.000Z
Link: CVE-2025-70973
Updated: 2026-03-10T16:28:36.104Z
Status : Awaiting Analysis
Published: 2026-03-09T21:16:12.727
Modified: 2026-03-11T13:53:47.157
Link: CVE-2025-70973
No data.
OpenCVE Enrichment
Updated: 2026-03-10T14:10:39Z