We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-4708

mySCADA myPRO Use of Hard-coded Password



Assignericscert
Reserved2024-05-09
Published2024-07-02
Updated2024-08-01

Description

mySCADA myPRO uses a hard-coded password which could allow an attacker to remotely execute code on the affected device.



CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-259 Use of Hard-coded Password

Product status

Default status
unaffected

Any version before 8.31.0
affected

Credits

Nassim Asrir working with Trend Micro Zero Day Initiative reported this vulnerability to CISA. 0x400153a630

References

https://www.cisa.gov/news-events/ics-advisories/icsa-24-184-02

https://www.myscada.org/mypro/

cve.org CVE-2024-4708

nvd.nist.gov CVE-2024-4708

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.