6.2
CVE-2024-21869
- EPSS 0.03%
- Veröffentlicht 02.02.2024 00:15:55
- Zuletzt bearbeitet 21.11.2024 08:55:09
- Quelle ics-cert@hq.dhs.gov
- CVE-Watchlists
- Unerledigt
In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, the affected product stores plaintext credentials in various places. This may allow an attacker with local access to see them.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Rapidscada ≫ Rapid Scada Version <= 5.8.4
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.068 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.5 | 1.8 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
|
| ics-cert@hq.dhs.gov | 6.2 | 2.5 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
CWE-256 Plaintext Storage of a Password
Storing a password in plaintext may result in a system compromise.
CWE-522 Insufficiently Protected Credentials
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.