CVE-2024-42207
📋 TL;DR
HCL iAutomate has a session fixation vulnerability where an attacker can hijack a user's authenticated session by fixing their session ID. This allows unauthorized access to the victim's account and data. All users of affected HCL iAutomate versions are vulnerable.
💻 Affected Systems
- HCL iAutomate
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete account takeover leading to data theft, privilege escalation, or unauthorized administrative actions within iAutomate.
Likely Case
Unauthorized access to user accounts, potentially exposing sensitive business data and workflows managed through iAutomate.
If Mitigated
Limited impact with proper session management controls, but still presents authentication bypass risk.
🎯 Exploit Status
Exploitation requires the attacker to have some access to fix the session ID before victim authentication.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 11.1.0.1
Vendor Advisory: https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0118946
Restart Required: Yes
Instructions:
1. Download patch from HCL support portal. 2. Backup current installation. 3. Apply patch following HCL documentation. 4. Restart iAutomate services. 5. Verify successful update.
🔧 Temporary Workarounds
Session Regeneration
allForce session ID regeneration after successful authentication to prevent fixation
Configure iAutomate to generate new session IDs post-authentication
Session Timeout Reduction
allReduce session timeout values to limit window for exploitation
Set session timeout to minimum practical value in iAutomate configuration
🧯 If You Can't Patch
- Implement network segmentation to restrict access to iAutomate instances
- Enable multi-factor authentication for all iAutomate users
🔍 How to Verify
Check if Vulnerable:
Check iAutomate version against affected versions list. Review session management configuration.
Check Version:
Check iAutomate administration console or configuration files for version information
Verify Fix Applied:
Verify iAutomate version is 11.1.0.1 or later. Test that session IDs change after authentication.
📡 Detection & Monitoring
Log Indicators:
- Multiple sessions with same ID from different IPs
- Session ID reuse patterns
- Authentication anomalies
Network Indicators:
- Unusual session establishment patterns
- Session ID manipulation attempts
SIEM Query:
source="iAutomate" AND (event="session_fixation" OR session_id_reuse=true)