mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
93 lines
4.3 KiB
JSON
93 lines
4.3 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2024-5434",
|
|
"ASSIGNER": "ics-cert@hq.dhs.gov",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "The Campbell Scientific CSI Web Server stores web authentication credentials in a file with a specific file name. Passwords within that file are stored in a weakly encoded format. There is no known way to remotely access the file unless it has been manually renamed. However, if an attacker were to gain access to the file, passwords could be decoded and reused to gain access."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-261 Weak Encoding for Password",
|
|
"cweId": "CWE-261"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Campbell Scientific",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "CSI Web Server and RTMC",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "CSI Web Server 1.6"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "RTMC 5.0"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-149-01",
|
|
"refsource": "MISC",
|
|
"name": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-149-01"
|
|
}
|
|
]
|
|
},
|
|
"generator": {
|
|
"engine": "Vulnogram 0.2.0"
|
|
},
|
|
"source": {
|
|
"discovery": "UNKNOWN"
|
|
},
|
|
"solution": [
|
|
{
|
|
"lang": "en",
|
|
"supportingMedia": [
|
|
{
|
|
"base64": false,
|
|
"type": "text/html",
|
|
"value": "<p>Campbell Scientific recommends users to update to the version.<br>For user of CSI Web Server update to the most recent <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.campbellsci.com/downloads/csi-web-server-patch\">CSI Web Server 1.x patch</a></p><p>For users of RTMC Pro 5 update to the most recent <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.campbellsci.com/downloads/rtmc-pro-5-patch\">RTMC Pro 5.x patch</a></p><p>For users of RTMC Pro 4 update to the most recent <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.campbellsci.com/downloads/rtmc-pro-patch\">RTMC Pro 4.x patch</a>.</p><p>Contact <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.campbellsci.com/contact\">Campbell Scientific</a> for more details.</p>"
|
|
}
|
|
],
|
|
"value": "Campbell Scientific recommends users to update to the version.\nFor user of CSI Web Server update to the most recent CSI Web Server 1.x patch https://www.campbellsci.com/downloads/csi-web-server-patch \n\nFor users of RTMC Pro 5 update to the most recent RTMC Pro 5.x patch https://www.campbellsci.com/downloads/rtmc-pro-5-patch \n\nFor users of RTMC Pro 4 update to the most recent RTMC Pro 4.x patch https://www.campbellsci.com/downloads/rtmc-pro-patch .\n\nContact Campbell Scientific https://www.campbellsci.com/contact \u00a0for more details."
|
|
}
|
|
],
|
|
"credits": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Patrick K. Sheehan, Grant Hume, and Donald Macary reported these vulnerabilities to CISA."
|
|
}
|
|
]
|
|
} |