{"vulnerability": "CVE-2024-12137", "sightings": [{"uuid": "972bc308-506a-4d83-83a8-2be0259105a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12137", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkpysb6jwf2e", "content": "", "creation_timestamp": "2025-03-19T10:43:19.112385Z"}, {"uuid": "044fdf6f-2eb2-4543-9fa3-b580e526e201", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12137", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/19698", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12137\n\ud83d\udd25 CVSS Score: 7.6 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H)\n\ud83d\udd39 Description: Authentication Bypass by Capture-replay vulnerability in Elfatek Elektronics ANKA JPD-00028 allows Session Hijacking.This issue affects ANKA JPD-00028: before V.01.01.\n\ud83d\udccf Published: 2025-03-19T08:32:38.226Z\n\ud83d\udccf Modified: 2025-06-27T11:30:10.384Z\n\ud83d\udd17 References:\n1. https://www.usom.gov.tr/bildirim/tr-25-0071", "creation_timestamp": "2025-06-27T11:50:14.000000Z"}, {"uuid": "48bedb56-6012-4aa2-ba0f-81680a10b70d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12137", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8035", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12137\n\ud83d\udd25 CVSS Score: 7.6 (cvssV3_1, Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H)\n\ud83d\udd39 Description: Authentication Bypass by Capture-replay vulnerability in Elfatek Elektronics ANKA JPD-00028 allows Session Hijacking.This issue affects ANKA JPD-00028: through 19.03.2025.\n\n\nNOTE: The vendor did not inform about the completion of the fixing process within the specified time. The CVE will be updated when new information becomes available.\n\ud83d\udccf Published: 2025-03-19T08:32:38.226Z\n\ud83d\udccf Modified: 2025-03-19T08:32:38.226Z\n\ud83d\udd17 References:\n1. https://www.usom.gov.tr/bildirim/tr-25-0071", "creation_timestamp": "2025-03-19T08:49:00.000000Z"}, {"uuid": "02493878-6fc0-4147-9b2e-28544a3dffd1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12137", "type": "seen", "source": "https://t.me/cvedetector/20629", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12137 - Elfatek Elektronics ANKA JPD-00028 Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-12137 \nPublished : March 19, 2025, 9:15 a.m. | 1\u00a0hour, 51\u00a0minutes ago \nDescription : Authentication Bypass by Capture-replay vulnerability in Elfatek Elektronics ANKA JPD-00028 allows Session Hijacking.This issue affects ANKA JPD-00028: through 19.03.2025.  \n  \n  \nNOTE: The vendor did not inform about the completion of the fixing process within the specified time. The CVE will be updated when new information becomes available. \nSeverity: 7.6 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-19T12:08:27.000000Z"}]}