mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
113 lines
5.6 KiB
JSON
113 lines
5.6 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2025-4384",
|
|
"ASSIGNER": "secure@arcinfo.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "The MQTT add-on of PcVue fails to verify that a remote device\u2019s certificate has not already expired or has not yet become valid. This allows malicious devices to present certificates that are not rejected properly.\n\nThe use of a client certificate reduces the risk for random devices to take advantage of this flaw."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-298 Improper Validation of Certificate Expiration",
|
|
"cweId": "CWE-298"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "arcinfo",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "PcVue",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_name": "16.0",
|
|
"version_value": "16.3.0"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "15.0"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://www.pcvue.com/security/#SB2025-3",
|
|
"refsource": "MISC",
|
|
"name": "https://www.pcvue.com/security/#SB2025-3"
|
|
}
|
|
]
|
|
},
|
|
"generator": {
|
|
"engine": "Vulnogram 0.2.0"
|
|
},
|
|
"source": {
|
|
"advisory": "SB2025-3",
|
|
"discovery": "INTERNAL"
|
|
},
|
|
"exploit": [
|
|
{
|
|
"lang": "en",
|
|
"supportingMedia": [
|
|
{
|
|
"base64": false,
|
|
"type": "text/html",
|
|
"value": "No POC available."
|
|
}
|
|
],
|
|
"value": "No POC available."
|
|
},
|
|
{
|
|
"lang": "en",
|
|
"supportingMedia": [
|
|
{
|
|
"base64": false,
|
|
"type": "text/html",
|
|
"value": "Not known to be exploited."
|
|
}
|
|
],
|
|
"value": "Not known to be exploited."
|
|
}
|
|
],
|
|
"solution": [
|
|
{
|
|
"lang": "en",
|
|
"supportingMedia": [
|
|
{
|
|
"base64": false,
|
|
"type": "text/html",
|
|
"value": "<b><u>Harden the configuration</u></b><br>Who should apply this recommendation: All users<br>The system operators are highly recommended to take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:<br><ul><li>Use client certificate when configuring the MQTT add-on.</li><li>Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the Internet unless required.</li><li>Locate control system networks and remote devices behind firewalls and isolate them from business networks.</li><li>When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as its connected devices.</li></ul><br><b><u>Update PcVue</u></b><br>Who should apply this recommendation: All users using the affected component<br>Apply the patch by installing a fixed PcVue version.<br><br><br><u><b>Available patches:</b></u><br>Fixed in:<br><ul><li>PcVue 16.3.0</li></ul>Planned in:<br><ul><li>PcVue 16.2.5</li><li>PcVue 15.2.12</li></ul><br>"
|
|
}
|
|
],
|
|
"value": "Harden the configuration\nWho should apply this recommendation: All users\nThe system operators are highly recommended to take defensive measures to minimize the risk of exploitation of this vulnerability. Specifically, users should:\n * Use client certificate when configuring the MQTT add-on.\n * Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the Internet unless required.\n * Locate control system networks and remote devices behind firewalls and isolate them from business networks.\n * When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as its connected devices.\n\n\n\nUpdate PcVue\nWho should apply this recommendation: All users using the affected component\nApply the patch by installing a fixed PcVue version.\n\n\nAvailable patches:\nFixed in:\n * PcVue 16.3.0\n\n\nPlanned in:\n * PcVue 16.2.5\n * PcVue 15.2.12"
|
|
}
|
|
]
|
|
} |