An issue was discovered in Rhinode Trading Paints through 2.0.36. TP Updater.exe uses cleartext HTTP to check, and request, updates. Thus, attackers can man-in-the-middle a victim to download a malicious binary in place of the real update, with no SSL errors or warnings.
References
Link | Resource |
---|---|
https://axelp.io/YWDAC | Exploit Third Party Advisory |
https://www.tradingpaints.com/page/Privacy | Vendor Advisory |
https://axelp.io/YWDAC | Exploit Third Party Advisory |
https://www.tradingpaints.com/page/Privacy | Vendor Advisory |
Configurations
History
21 Nov 2024, 06:24
Type | Values Removed | Values Added |
---|---|---|
References | () https://axelp.io/YWDAC - Exploit, Third Party Advisory | |
References | () https://www.tradingpaints.com/page/Privacy - Vendor Advisory |
Information
Published : 2022-03-04 22:15
Updated : 2024-11-21 06:24
NVD link : CVE-2021-40846
Mitre link : CVE-2021-40846
CVE.ORG link : CVE-2021-40846
JSON object : View
Products Affected
tradingpaints
- trading_paints
CWE
CWE-319
Cleartext Transmission of Sensitive Information