CVE-2024-8603
Published: 15 January 2025
Summary
CVE-2024-8603 is a high-severity Use of a Broken or Risky Cryptographic Algorithm (CWE-327) vulnerability. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Adversary-in-the-Middle (T1557); ranked at the 18.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SC-12 (Cryptographic Key Establishment and Management) and SC-13 (Cryptographic Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SC-13 mandates the use of compliant cryptographic modules and protections, directly preventing the exploitation of broken or risky algorithms in the SSL/TLS component.
SC-12 requires NIST-approved cryptographic mechanisms for key establishment and management, mitigating impersonation risks from weak TLS key exchange algorithms.
SC-8 enforces transmission integrity protection using cryptographic mechanisms, countering masquerading attacks enabled by vulnerable SSL/TLS implementations.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Broken/risky TLS crypto (CWE-327) directly enables network attackers to perform impersonation/MitM by masquerading as legitimate services.
NVD Description
A “Use of a Broken or Risky Cryptographic Algorithm” vulnerability in the SSL/TLS component used in B&R Automation Runtime versions before 6.1 and B&R mapp View versions before 6.1 may be abused by unauthenticated network-based attackers to masquerade as services…
more
on impacted devices.
Deeper analysisAI
CVE-2024-8603 is a "Use of a Broken or Risky Cryptographic Algorithm" vulnerability (CWE-327) affecting the SSL/TLS component in B&R Automation Runtime versions before 6.1 and B&R mapp View versions before 6.1. Published on 2025-01-15, it carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N), indicating high severity due to its network accessibility, low complexity, and lack of required privileges or user interaction.
Unauthenticated network-based attackers can exploit this flaw to masquerade as services on impacted devices, enabling integrity violations such as impersonation without affecting confidentiality or availability.
B&R Automation's security advisory SA25P001, accessible at https://www.br-automation.com/fileadmin/SA25P001-c478fad6.pdf, describes the issue and recommends mitigation through upgrades to version 6.1 or later for the affected products.
Details
- CWE(s)