The vulnerability could expose cleartext credentials from AVEVA InTouch Runtime 2020 R2 and all prior versions (WindowViewer) if an authorized, privileged user creates a diagnostic memory dump of the process and saves it to a non-protected location.
References
Link | Resource |
---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-21-159-03 | Patch Third Party Advisory US Government Resource |
https://www.aveva.com/en/support/cyber-security-updates/ | Patch Vendor Advisory |
https://us-cert.cisa.gov/ics/advisories/icsa-21-159-03 | Patch Third Party Advisory US Government Resource |
https://www.aveva.com/en/support/cyber-security-updates/ | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:07
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 2.1
v3 : 6.6 |
References | () https://us-cert.cisa.gov/ics/advisories/icsa-21-159-03 - Patch, Third Party Advisory, US Government Resource | |
References | () https://www.aveva.com/en/support/cyber-security-updates/ - Patch, Vendor Advisory |
Information
Published : 2021-06-09 17:15
Updated : 2024-11-21 06:07
NVD link : CVE-2021-32942
Mitre link : CVE-2021-32942
CVE.ORG link : CVE-2021-32942
JSON object : View
Products Affected
aveva
- intouch_2017
- intouch_2020