CVE-2024-28144: CWE-384 Session Fixation in Image Access GmbH Scan2Net
An attacker who can spoof the IP address and the User-Agent of a logged-in user can takeover the session because of flaws in the self-developed session management. If two users access the web interface from the same IP they are logged in as the other user.
AI Analysis
Technical Summary
CVE-2024-28144 identifies a session fixation vulnerability (CWE-384) in the Scan2Net product by Image Access GmbH. The root cause is a flawed, self-developed session management mechanism that ties user sessions to IP address and User-Agent strings but fails to properly isolate sessions when these parameters are spoofed or shared. An attacker capable of spoofing both the IP address and User-Agent of a legitimate logged-in user can hijack that user's session, effectively taking over their authenticated session without needing credentials. Furthermore, the vulnerability manifests in scenarios where multiple users access the web interface from the same IP address, resulting in session crossover and users being logged in as one another. This indicates a fundamental design flaw in session handling and user authentication logic. The vulnerability does not disclose sensitive data or allow modification of data (no confidentiality or integrity impact), but it causes availability issues by disrupting legitimate user sessions. Exploitation requires the attacker to have network-level capabilities to spoof IP addresses and User-Agent headers, which may limit the attack surface to local networks or environments where IP spoofing is feasible. The CVSS v3.1 score is 5.5, reflecting medium severity with low attack complexity but limited impact scope. No patches or known exploits are currently available, so mitigation relies on network controls and monitoring. The vulnerability was published on December 12, 2024, and affects all versions of Scan2Net as indicated.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to availability and operational continuity of Scan2Net devices, which are often used in document scanning and imaging workflows. An attacker exploiting this flaw could disrupt user sessions, causing denial of service or unauthorized session takeover, potentially halting critical document processing tasks. While confidentiality and integrity are not directly compromised, session hijacking could be leveraged as a stepping stone for further attacks if combined with other vulnerabilities or insider threats. Organizations in sectors relying heavily on Scan2Net devices—such as government agencies, legal firms, and large enterprises—may experience workflow interruptions and increased risk of insider impersonation. The requirement for IP and User-Agent spoofing limits remote exploitation but does not eliminate risk in environments with weak network segmentation or where attackers have insider access. The lack of patches means organizations must rely on compensating controls until a fix is released. This vulnerability also raises concerns about the security maturity of the vendor’s session management, potentially impacting trust in the product.
Mitigation Recommendations
1. Implement strict network segmentation and access controls to limit who can reach Scan2Net devices, reducing the risk of IP spoofing. 2. Deploy network-level anti-spoofing measures such as ingress and egress filtering on routers and switches to prevent attackers from spoofing IP addresses within the network. 3. Monitor web server logs for anomalies in User-Agent strings and IP address changes associated with user sessions to detect potential session hijacking attempts. 4. Enforce multi-factor authentication (MFA) on the Scan2Net web interface if supported, adding an additional layer of security beyond session tokens. 5. Restrict access to Scan2Net interfaces to trusted IP ranges or VPN connections to reduce exposure. 6. Engage with Image Access GmbH to request a security patch or updated firmware addressing the session management flaws. 7. Educate users about the risks of shared IP environments and encourage use of unique network segments or VPNs when accessing Scan2Net devices. 8. Consider deploying web application firewalls (WAFs) that can detect and block suspicious session fixation or spoofing attempts targeting the Scan2Net interface.
Affected Countries
Germany, France, United Kingdom, Netherlands, Belgium, Switzerland, Austria
CVE-2024-28144: CWE-384 Session Fixation in Image Access GmbH Scan2Net
Description
An attacker who can spoof the IP address and the User-Agent of a logged-in user can takeover the session because of flaws in the self-developed session management. If two users access the web interface from the same IP they are logged in as the other user.
AI-Powered Analysis
Technical Analysis
CVE-2024-28144 identifies a session fixation vulnerability (CWE-384) in the Scan2Net product by Image Access GmbH. The root cause is a flawed, self-developed session management mechanism that ties user sessions to IP address and User-Agent strings but fails to properly isolate sessions when these parameters are spoofed or shared. An attacker capable of spoofing both the IP address and User-Agent of a legitimate logged-in user can hijack that user's session, effectively taking over their authenticated session without needing credentials. Furthermore, the vulnerability manifests in scenarios where multiple users access the web interface from the same IP address, resulting in session crossover and users being logged in as one another. This indicates a fundamental design flaw in session handling and user authentication logic. The vulnerability does not disclose sensitive data or allow modification of data (no confidentiality or integrity impact), but it causes availability issues by disrupting legitimate user sessions. Exploitation requires the attacker to have network-level capabilities to spoof IP addresses and User-Agent headers, which may limit the attack surface to local networks or environments where IP spoofing is feasible. The CVSS v3.1 score is 5.5, reflecting medium severity with low attack complexity but limited impact scope. No patches or known exploits are currently available, so mitigation relies on network controls and monitoring. The vulnerability was published on December 12, 2024, and affects all versions of Scan2Net as indicated.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to availability and operational continuity of Scan2Net devices, which are often used in document scanning and imaging workflows. An attacker exploiting this flaw could disrupt user sessions, causing denial of service or unauthorized session takeover, potentially halting critical document processing tasks. While confidentiality and integrity are not directly compromised, session hijacking could be leveraged as a stepping stone for further attacks if combined with other vulnerabilities or insider threats. Organizations in sectors relying heavily on Scan2Net devices—such as government agencies, legal firms, and large enterprises—may experience workflow interruptions and increased risk of insider impersonation. The requirement for IP and User-Agent spoofing limits remote exploitation but does not eliminate risk in environments with weak network segmentation or where attackers have insider access. The lack of patches means organizations must rely on compensating controls until a fix is released. This vulnerability also raises concerns about the security maturity of the vendor’s session management, potentially impacting trust in the product.
Mitigation Recommendations
1. Implement strict network segmentation and access controls to limit who can reach Scan2Net devices, reducing the risk of IP spoofing. 2. Deploy network-level anti-spoofing measures such as ingress and egress filtering on routers and switches to prevent attackers from spoofing IP addresses within the network. 3. Monitor web server logs for anomalies in User-Agent strings and IP address changes associated with user sessions to detect potential session hijacking attempts. 4. Enforce multi-factor authentication (MFA) on the Scan2Net web interface if supported, adding an additional layer of security beyond session tokens. 5. Restrict access to Scan2Net interfaces to trusted IP ranges or VPN connections to reduce exposure. 6. Engage with Image Access GmbH to request a security patch or updated firmware addressing the session management flaws. 7. Educate users about the risks of shared IP environments and encourage use of unique network segments or VPNs when accessing Scan2Net devices. 8. Consider deploying web application firewalls (WAFs) that can detect and block suspicious session fixation or spoofing attempts targeting the Scan2Net interface.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- SEC-VLab
- Date Reserved
- 2024-03-05T09:15:40.202Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69092621fe7723195e0b46ff
Added to database: 11/3/2025, 10:01:05 PM
Last enriched: 11/3/2025, 11:58:14 PM
Last updated: 11/5/2025, 2:06:18 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
U.S. Sanctions 10 North Korean Entities for Laundering $12.7M in Crypto and IT Fraud
MediumMysterious 'SmudgedSerpent' Hackers Target U.S. Policy Experts Amid Iran–Israel Tensions
MediumCVE-2025-12497: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in averta Premium Portfolio Features for Phlox theme
HighCVE-2025-11745: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in spacetime Ad Inserter – Ad Manager & AdSense Ads
MediumNikkei Says 17,000 Impacted by Data Breach Stemming From Slack Account Hack
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.