Medtronic Valleylab Exchange Client version 3.4 and below, Valleylab FT10 Energy Platform (VLFT10GEN) software version 4.0.0 and below, and Valleylab FX8 Energy Platform (VLFX8GEN) software version 1.1.0 and below use the descrypt algorithm for OS password hashing. While interactive, network-based logons are disabled, and attackers can use the other vulnerabilities within this report to obtain local shell access and access these hashes.
References
Link | Resource |
---|---|
https://www.us-cert.gov/ics/advisories/icsma-19-311-02 | Third Party Advisory US Government Resource |
https://www.us-cert.gov/ics/advisories/icsma-19-311-02 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
21 Nov 2024, 04:25
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.us-cert.gov/ics/advisories/icsma-19-311-02 - Third Party Advisory, US Government Resource |
Information
Published : 2019-11-08 20:15
Updated : 2024-11-21 04:25
NVD link : CVE-2019-13539
Mitre link : CVE-2019-13539
CVE.ORG link : CVE-2019-13539
JSON object : View
Products Affected
medtronic
- valleylab_fx8_energy_platform
- valleylab_ft10_energy_platform
- valleylab_exchange_client
- valleylab_ft10_energy_platform_firmware
- valleylab_fx8_energy_platform_firmware