CVE-2024-42207

5.5 MEDIUM

📋 TL;DR

HCL iAutomate has a session fixation vulnerability where an attacker can hijack a user's authenticated session by fixing their session ID. This allows unauthorized access to the victim's account and data. All users of affected HCL iAutomate versions are vulnerable.

💻 Affected Systems

Products:
  • HCL iAutomate
Versions: All versions prior to 11.1.0.1
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments using default session management are vulnerable. Custom configurations may also be affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete account takeover leading to data theft, privilege escalation, or unauthorized administrative actions within iAutomate.

🟠

Likely Case

Unauthorized access to user accounts, potentially exposing sensitive business data and workflows managed through iAutomate.

🟢

If Mitigated

Limited impact with proper session management controls, but still presents authentication bypass risk.

🌐 Internet-Facing: HIGH - Internet-facing instances are directly accessible to attackers who can exploit this without network access.
🏢 Internal Only: MEDIUM - Internal instances still vulnerable to insider threats or compromised internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires the attacker to have some access to fix the session ID before victim authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.1.0.1

Vendor Advisory: https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0118946

Restart Required: Yes

Instructions:

1. Download patch from HCL support portal. 2. Backup current installation. 3. Apply patch following HCL documentation. 4. Restart iAutomate services. 5. Verify successful update.

🔧 Temporary Workarounds

Session Regeneration

all

Force session ID regeneration after successful authentication to prevent fixation

Configure iAutomate to generate new session IDs post-authentication

Session Timeout Reduction

all

Reduce session timeout values to limit window for exploitation

Set session timeout to minimum practical value in iAutomate configuration

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to iAutomate instances
  • Enable multi-factor authentication for all iAutomate users

🔍 How to Verify

Check if Vulnerable:

Check iAutomate version against affected versions list. Review session management configuration.

Check Version:

Check iAutomate administration console or configuration files for version information

Verify Fix Applied:

Verify iAutomate version is 11.1.0.1 or later. Test that session IDs change after authentication.

📡 Detection & Monitoring

Log Indicators:

  • Multiple sessions with same ID from different IPs
  • Session ID reuse patterns
  • Authentication anomalies

Network Indicators:

  • Unusual session establishment patterns
  • Session ID manipulation attempts

SIEM Query:

source="iAutomate" AND (event="session_fixation" OR session_id_reuse=true)

🔗 References

📤 Share & Export