Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://github.com/chiranjib2001/ScadaBR/blob/main/README.md |
|
Tue, 07 Apr 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:scadabr:scadabr:1.12.4:*:*:*:*:*:*:* |
Tue, 10 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-384 | |
| Metrics |
cvssV3_1
|
Tue, 10 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Scadabr
Scadabr scadabr |
|
| Vendors & Products |
Scadabr
Scadabr scadabr |
Mon, 09 Mar 2026 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ScadaBR 1.12.4 is vulnerable to Session Fixation. The application assigns a JSESSIONID session cookie to unauthenticated users and does not regenerate the session identifier after successful authentication. As a result, a session created prior to login becomes authenticated once the victim logs in, allowing an attacker who knows the session ID to hijack an authenticated session. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-03-10T16:28:53.373Z
Reserved: 2026-01-09T00:00:00.000Z
Link: CVE-2025-70973
Updated: 2026-03-10T16:28:36.104Z
Status : Analyzed
Published: 2026-03-09T21:16:12.727
Modified: 2026-04-07T16:04:45.323
Link: CVE-2025-70973
No data.
OpenCVE Enrichment
Updated: 2026-03-10T14:10:39Z