SAGA1-L8B with any firmware versions prior to A0.10 are vulnerable to a replay attack and command forgery.
A capture-replay flaw exists when the design of the product makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes).
Link | Tags |
---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-18-296-02 | third party advisory us government resource |
http://www.securityfocus.com/bid/105729 | third party advisory vdb entry |