Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-gjpw-wr3x-q236

Опубликовано: 06 авг. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 8.7

Описание

Tigo Energy's CCA device is vulnerable to insecure session ID generation in their remote API. The session IDs are generated using a predictable method based on the current timestamp, allowing attackers to recreate valid session IDs. When combined with the ability to circumvent session ID requirements for certain commands, this enables unauthorized access to sensitive device functions on connected solar optimization systems.

Tigo Energy's CCA device is vulnerable to insecure session ID generation in their remote API. The session IDs are generated using a predictable method based on the current timestamp, allowing attackers to recreate valid session IDs. When combined with the ability to circumvent session ID requirements for certain commands, this enables unauthorized access to sensitive device functions on connected solar optimization systems.

EPSS

Процентиль: 20%
0.00064
Низкий

8.7 High

CVSS4

Дефекты

CWE-337

Связанные уязвимости

nvd
около 1 месяца назад

Tigo Energy's CCA device is vulnerable to insecure session ID generation in their remote API. The session IDs are generated using a predictable method based on the current timestamp, allowing attackers to recreate valid session IDs. When combined with the ability to circumvent session ID requirements for certain commands, this enables unauthorized access to sensitive device functions on connected solar optimization systems.

CVSS3: 8.8
fstec
около 1 месяца назад

Уязвимость средства мониторинга и управления солнечными энергетическими системами Tigo Cloud Connect Advanced (CCA), связанная с некорректной генерацией идентификаторов сеансов, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 20%
0.00064
Низкий

8.7 High

CVSS4

Дефекты

CWE-337