Transmitted data is logged between the device and the backend service. An attacker could use these logs to perform a replay attack to replicate calls.
Solution:
A capture-replay flaw exists when the design of the product makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes).
Link | Tags |
---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-24-165-19 | government resource |