Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CWE-294 (使用捕获-重放进行的认证绕过) — Vulnerability Class 86

86 vulnerabilities classified as CWE-294 (使用捕获-重放进行的认证绕过). AI Chinese analysis included.

CWE-294 represents a critical authentication weakness where attackers bypass security controls by intercepting and retransmitting valid network traffic. This flaw typically arises when systems fail to implement robust session management or cryptographic protections, allowing malicious users to sniff communication channels and capture authentication tokens or credentials. By replaying these captured data packets to the server, attackers can impersonate legitimate users without needing to crack passwords or exploit complex vulnerabilities. To mitigate this risk, developers must employ strong cryptographic measures such as Transport Layer Security (TLS) to encrypt data in transit. Additionally, implementing unique session identifiers, nonces, and strict timestamp validation ensures that each request is distinct and time-bound, effectively neutralizing the threat of replayed packets and maintaining the integrity of the authentication process.

MITRE CWE Description
A capture-replay flaw exists when the design of the product makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes). Capture-replay attacks are common and can be difficult to defeat without cryptography. They are a subset of network injection attacks that rely on observing previously-sent valid commands, then changing them slightly if necessary and resending the same commands to the server.
Common Consequences (1)
Access ControlGain Privileges or Assume Identity
Messages sent with a capture-relay attack allow access to resources which are not otherwise accessible without proper authentication.
Mitigations (2)
Architecture and DesignUtilize some sequence or time stamping functionality along with a checksum which takes this into account in order to ensure that messages can be parsed only once.
Architecture and DesignSince any attacker who can listen to traffic can see sequence numbers, it is necessary to sign messages with some kind of cryptography to ensure that sequence numbers are not simply doctored along with content.
CVE IDTitleCVSSSeverityPublished
CVE-2022-29878 Siemens SICAM 安全漏洞 — SICAM T 7.5 High2022-05-10
CVE-2021-38296 Apache Spark Key Negotiation Vulnerability — Apache Spark 7.5 -2022-03-10
CVE-2022-22806 Schneider Electric 多款产品授权问题漏洞 — SmartConnect 9.8 -2022-03-09
CVE-2021-38459 AUVESY Versiondog — Versiondog 8.1 High2021-10-22
CVE-2021-25480 Samsung SMR 安全漏洞 — Samsung Mobile Devices 4.4 Medium2021-10-06
CVE-2021-27662 KT-1 Capture-replay — KT-1 8.6 High2021-09-15
CVE-2020-27269 多款Sooil产品授权问题漏洞 — SOOIL Developments Co., Ltd Diabecare RS, AnyDana-i and AnyDana-A 8.1 -2021-01-19
CVE-2020-14302 Red Hat Keycloak 安全漏洞 — keycloak 6.5 -2020-12-15
CVE-2020-25660 Red Hat Ceph 安全漏洞 — ceph 7.5 -2020-11-23
CVE-2018-17932 SHUN HU JUUKO Industrial Radio Remote Control 安全漏洞 — JUUKO K-800 9.8 -2020-11-02
CVE-2018-19025 SHUN HU JUUKO Industrial Radio Remote Control 安全漏洞 — JUUKO K-808 9.8 -2020-11-02
CVE-2020-10045 Siemens SICAM MMU、SGU和T 访问控制错误漏洞 — SICAM MMU 9.8 -2020-07-14
CVE-2020-4042 Authentication bypass in Bareos — bareos 6.8 Medium2020-07-10
CVE-2020-5300 Disallow replay of `private_key_jwt` by blacklisting JTIs in Hydra — hydra 5.8 Medium2020-04-06
CVE-2020-5261 Missing Token Replay Detection — Saml2 8.2 High2020-03-25
CVE-2020-6972 Honeywell Notifier Web Server 安全漏洞 — Notifier Web Server (NWS) Version 3.50 and earlier 7.4 -2020-03-24
CVE-2019-13533 Omron PLC CJ series和Omron PLC CS series 安全漏洞 — Omron PLC CJ and CS Series 8.9 -2019-12-16
CVE-2019-18226 Honeywell equIP系列、Performance系列IP摄像头和Recorders 安全漏洞 — Honeywell equIP series cameras, Honeywell Performance series IP cameras, Honeywell recorders 9.8 -2019-10-31
CVE-2018-19023 多款Hetronic产品授权问题漏洞 — Hetronic Nova-M 8.8 -2019-01-25
CVE-2018-17903 GAIN SAGA1-L Series产品输入验证错误漏洞 — SAGA1-L8B 9.8 -2018-10-24
CVE-2018-17935 Telecrane F25 Series 安全特征问题漏洞 — F25 Series 8.1 -2018-10-24
CVE-2018-14781 Medtronic MiniMed MMT-500/MMT-503 Remote Controllers Authentication Bypass by Capture-replay — MMT- 508 - MiniMed pump 5.3 Medium2018-08-13
CVE-2018-1128 Red Hat Ceph 授权问题漏洞 — ceph 6.8 -2018-07-10
CVE-2017-5251 INSTEON Hub 安全漏洞 — Insteon Hub Firmware 7.4 -2018-02-22
CVE-2017-3191 D-Link DIR-130和DIR-330 安全漏洞 — DIR-130 9.8 -2017-12-15
CVE-2017-6034 Schneider Electric Modicon Modbus Protocol 安全漏洞 — Schneider Electric Modicon Modbus Protocol 9.8 -2017-06-30

Vulnerabilities classified as CWE-294 (使用捕获-重放进行的认证绕过) represent 86 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.