Use of Password Hash with Insufficient Computational Effort vulnerability exists in ClearSCADA (all versions), EcoStruxure Geo SCADA Expert 2019 (all versions), and EcoStruxure Geo SCADA Expert 2020 (V83.7742.1 and prior), which could cause the revealing of account credentials when server database files are available. Exposure of these files to an attacker can make the system vulnerable to password decryption attacks. Note that “.sde” configuration export files do not contain user account password hashes.
References
Link | Resource |
---|---|
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-130-07 | Patch Vendor Advisory |
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-130-07 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:50
Type | Values Removed | Values Added |
---|---|---|
References | () https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-130-07 - Patch, Vendor Advisory |
Information
Published : 2021-05-26 20:15
Updated : 2024-11-21 05:50
NVD link : CVE-2021-22741
Mitre link : CVE-2021-22741
CVE.ORG link : CVE-2021-22741
JSON object : View
Products Affected
schneider-electric
- ecostruxure_geo_scada_expert_2019
- ecostruxure_geo_scada_expert_2020
- clearscada
CWE
CWE-916
Use of Password Hash With Insufficient Computational Effort