Cyber Posture

CVE-2024-8603

High

Published: 15 January 2025

Published
15 January 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
EPSS Score 0.0006 18.6th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-8603 is a high-severity Use of a Broken or Risky Cryptographic Algorithm (CWE-327) vulnerability. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Adversary-in-the-Middle (T1557); ranked at the 18.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SC-12 (Cryptographic Key Establishment and Management) and SC-13 (Cryptographic Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Adversary-in-the-Middle (T1557). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SC-13 mandates the use of compliant cryptographic modules and protections, directly preventing the exploitation of broken or risky algorithms in the SSL/TLS component.

prevent

SC-12 requires NIST-approved cryptographic mechanisms for key establishment and management, mitigating impersonation risks from weak TLS key exchange algorithms.

prevent

SC-8 enforces transmission integrity protection using cryptographic mechanisms, countering masquerading attacks enabled by vulnerable SSL/TLS implementations.

MITRE ATT&CK Enterprise TechniquesAI

T1557 Adversary-in-the-Middle Credential Access
Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique to support follow-on behaviors such as [Network Sniffing](https://attack.
Why these techniques?

Broken/risky TLS crypto (CWE-327) directly enables network attackers to perform impersonation/MitM by masquerading as legitimate services.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A “Use of a Broken or Risky Cryptographic Algorithm” vulnerability in the SSL/TLS component used in B&R Automation Runtime versions before 6.1 and B&R mapp View versions before 6.1 may be abused by unauthenticated network-based attackers to masquerade as services…

more

on impacted devices.

Deeper analysisAI

CVE-2024-8603 is a "Use of a Broken or Risky Cryptographic Algorithm" vulnerability (CWE-327) affecting the SSL/TLS component in B&R Automation Runtime versions before 6.1 and B&R mapp View versions before 6.1. Published on 2025-01-15, it carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N), indicating high severity due to its network accessibility, low complexity, and lack of required privileges or user interaction.

Unauthenticated network-based attackers can exploit this flaw to masquerade as services on impacted devices, enabling integrity violations such as impersonation without affecting confidentiality or availability.

B&R Automation's security advisory SA25P001, accessible at https://www.br-automation.com/fileadmin/SA25P001-c478fad6.pdf, describes the issue and recommends mitigation through upgrades to version 6.1 or later for the affected products.

Details

CWE(s)

Affected Products

Automation Runtime
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2025-66598Shared CWE-327
CVE-2026-1626Shared CWE-327
CVE-2025-62514Shared CWE-327
CVE-2026-1627Shared CWE-327
CVE-2026-24785Shared CWE-327
CVE-2024-31896Shared CWE-327
CVE-2026-26219Shared CWE-327
CVE-2025-14480Shared CWE-327
CVE-2024-41763Shared CWE-327
CVE-2024-27256Shared CWE-327

References