Date of Disclosure: 6/27/2024
Affected Product: TimeProvider® 4100 Grandmaster
Exploitation of the vulnerability allows the attacker to hijack a user session if they are able to obtain a pre-login cookie.
Upgrade TimeProvider® 4100 grandmaster to the latest firmware.
As of the firmware release 2.4.7, enhancements to the session management ensure that session tokens are securely handled, preventing attackers from hijacking user sessions by obtaining and using valid session tokens.
Reported by Armando Huesca Prida, Marco Negro, Antonio Carriero, Vito Pistillo, Davide Renna, Manuel Leone, Massimiliano Brolli and TIM Security Red Team Research.
It is strongly recommended that all customers upgrade TimeProvider® 4100 grandmaster to firmware version 2.4.7 or newer.
It is important to note that the web interface is only available on a physically separate management port and these vulnerabilities have no impact on the timing service ports. For added security, users have the option to disable the web interface, further protecting the device from potential web-based exploitations.