INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global malware Financial Services CRITICAL 37m Global general Software/Technology LOW 42m Global malware Energy CRITICAL 57m Global spyware Software/Technology HIGH 1h Global malware Telecommunications and ISP HIGH 1h Global supply_chain Software Development and Supply Chain HIGH 1h Global vulnerability Software and Web Browsers HIGH 1h Global malware Energy and Utilities CRITICAL 2h Global apt Financial Services HIGH 2h Global data_breach Technology and Social Networks CRITICAL 2h Global malware Financial Services CRITICAL 37m Global general Software/Technology LOW 42m Global malware Energy CRITICAL 57m Global spyware Software/Technology HIGH 1h Global malware Telecommunications and ISP HIGH 1h Global supply_chain Software Development and Supply Chain HIGH 1h Global vulnerability Software and Web Browsers HIGH 1h Global malware Energy and Utilities CRITICAL 2h Global apt Financial Services HIGH 2h Global data_breach Technology and Social Networks CRITICAL 2h Global malware Financial Services CRITICAL 37m Global general Software/Technology LOW 42m Global malware Energy CRITICAL 57m Global spyware Software/Technology HIGH 1h Global malware Telecommunications and ISP HIGH 1h Global supply_chain Software Development and Supply Chain HIGH 1h Global vulnerability Software and Web Browsers HIGH 1h Global malware Energy and Utilities CRITICAL 2h Global apt Financial Services HIGH 2h Global data_breach Technology and Social Networks CRITICAL 2h
Vulnerabilities

CVE-2022-50975

High
An unauthenticated remote attacker is able to use an existing session id of a logged in user and gain full access to the device if configuration via ethernet is enabled.
CWE-346 — Weakness Type
Published: Feb 2, 2026  ·  Modified: Feb 28, 2026  ·  Source: NVD
CVSS v3
8.8
🔗 NVD Official
📄 Description (English)

An unauthenticated remote attacker is able to use an existing session id of a logged in user and gain full access to the device if configuration via ethernet is enabled.

🤖 AI Executive Summary

CVE-2022-50975 is a critical session hijacking vulnerability (CVSS 8.8) affecting devices with ethernet configuration enabled. An unauthenticated attacker can reuse existing session IDs to gain full device access without credentials. This poses significant risk to Saudi organizations relying on networked devices, particularly in banking, government, and critical infrastructure sectors where session management is essential for security.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 22, 2026 01:58
🇸🇦 Saudi Arabia Impact Assessment
High impact on Saudi banking sector (SAMA-regulated institutions) where session management is critical for transaction security. Government agencies (NCA oversight) face risks to administrative access and data confidentiality. Healthcare sector (MOH) vulnerable if devices use ethernet configuration. Energy sector (ARAMCO, SEC) at risk for critical infrastructure compromise. Telecom operators (STC, Mobily) exposed if network equipment affected. Manufacturing and industrial control systems using affected devices face operational disruption.
🏢 Affected Saudi Sectors
Banking and Financial Services Government and Public Administration Healthcare Energy and Utilities Telecommunications Manufacturing Critical Infrastructure
⚖️ Saudi Risk Score (AI)
8.5
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Identify all devices in your environment with ethernet configuration enabled
2. Disable ethernet configuration on non-essential devices immediately
3. Implement network segmentation to isolate affected devices
4. Monitor for suspicious session activity and unauthorized access attempts
5. Force logout all active sessions and require re-authentication

PATCHING:
1. Apply available patches immediately to all affected devices
2. Prioritize critical infrastructure and customer-facing systems
3. Test patches in non-production environment first
4. Document patch deployment timeline and verification

COMPENSATING CONTROLS:
1. Implement strict network access controls (MAC filtering, IP whitelisting)
2. Deploy intrusion detection systems (IDS) to monitor for session hijacking patterns
3. Enable comprehensive session logging and audit trails
4. Implement VPN/encrypted tunnels for remote device access
5. Use multi-factor authentication where supported
6. Monitor for CWE-346 indicators: unauthorized session reuse, access from unexpected IPs

DETECTION:
1. Alert on session IDs used from multiple IP addresses simultaneously
2. Monitor for ethernet configuration changes
3. Track failed authentication followed by successful access
4. Log all session creation and termination events
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تحديد جميع الأجهزة في بيئتك مع تفعيل التكوين عبر الإيثرنت
2. تعطيل التكوين عبر الإيثرنت على الأجهزة غير الأساسية فوراً
3. تنفيذ تقسيم الشبكة لعزل الأجهزة المتأثرة
4. مراقبة نشاط الجلسات المريبة ومحاولات الوصول غير المصرح به
5. فرض تسجيل الخروج من جميع الجلسات النشطة وطلب إعادة المصادقة

التصحيح:
1. تطبيق التصحيحات المتاحة فوراً على جميع الأجهزة المتأثرة
2. إعطاء الأولوية للبنية التحتية الحرجة والأنظمة الموجهة للعملاء
3. اختبار التصحيحات في بيئة غير الإنتاج أولاً
4. توثيق جدول نشر التصحيحات والتحقق

الضوابط البديلة:
1. تنفيذ ضوابط وصول الشبكة الصارمة (تصفية MAC، قائمة IP البيضاء)
2. نشر أنظمة كشف التسلل (IDS) لمراقبة أنماط اختطاف الجلسات
3. تفعيل تسجيل الجلسات الشامل ومسارات التدقيق
4. تنفيذ VPN/الأنفاق المشفرة للوصول عن بعد
5. استخدام المصادقة متعددة العوامل حيث يكون مدعوماً
6. مراقبة مؤشرات CWE-346: إعادة استخدام الجلسات غير المصرح به، الوصول من عناوين IP غير متوقعة
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
5.1.1 - Access Control Policy 5.2.1 - User Registration and Access Rights Management 5.2.2 - Privilege Management 5.3.1 - Password Management 5.4.1 - Review of User Access Rights 6.2.1 - Event Logging 6.2.2 - Protection of Log Information 7.1.1 - Information Security Incident Procedures
🔵 SAMA CSF
ID.AM-1 - Physical devices and software assets PR.AC-1 - Processes and procedures for access management PR.AC-2 - Physical access management DE.CM-1 - Network monitoring DE.CM-3 - Personnel activity monitoring RS.MI-1 - Incident response procedures
🟡 ISO 27001:2022
A.5.1.1 - Policies for information security A.6.1.1 - Information security roles and responsibilities A.8.1.1 - Screening A.9.1.1 - Access control policy A.9.2.1 - User registration and de-registration A.9.2.2 - User access provisioning A.9.2.4 - Access rights review A.9.4.3 - Password management A.12.4.1 - Event logging A.12.4.3 - Administrator and operator logs
🟣 PCI DSS v4.0
Requirement 2 - Default passwords and security parameters Requirement 6 - Secure development and vulnerability management Requirement 8 - User identification and authentication Requirement 10 - Logging and monitoring
📊 CVSS Score
8.8
/ 10.0 — High
📊 CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack VectorN — None / Network
Attack ComplexityL — Low / Local
Privileges RequiredN — None / Network
User InteractionR — Required
ScopeU — Unchanged
ConfidentialityH — High
IntegrityH — High
AvailabilityH — High
📋 Quick Facts
Severity High
CVSS Score8.8
CWECWE-346
EPSS0.02%
Exploit No
Patch ✓ Yes
Published 2026-02-02
Source Feed nvd
Views 2
🇸🇦 Saudi Risk Score
8.5
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
CWE-346
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.