THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-4708

mySCADA myPRO Use of Hard-coded Password

Assignericscert
Reserved2024-05-09
Published2024-07-02
Updated2024-07-23

Description

mySCADA myPRO uses a hard-coded password which could allow an attacker to remotely execute code on the affected device.



CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-259 Use of Hard-coded Password

Product status

Default status
unaffected

Any version before 8.31.0
affected

Credits

Nassim Asrir working with Trend Micro Zero Day Initiative reported this vulnerability to CISA. finder

References

https://www.cisa.gov/news-events/ics-advisories/icsa-24-184-02

https://www.myscada.org/mypro/

cve.org CVE-2024-4708

nvd.nist.gov CVE-2024-4708

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-4708
© Copyright 2024 THREATINT. Made in Cyprus with +