in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface
could allow a remote unauthenticated attacker to conduct a man-in-the-middle (MitM) attack.
See SEL Service Bulletin dated 2022-11-15 for more details.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-35467 | An Improper Certificate Validation vulnerability in the Schweitzer Engineering Laboratories Real-Time Automation Controller (SEL RTAC) Web Interface could allow a remote unauthenticated attacker to conduct a man-in-the-middle (MitM) attack. See SEL Service Bulletin dated 2022-11-15 for more details. |
Fri, 24 Jan 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Status: PUBLISHED
Assigner: SEL
Published:
Updated: 2025-01-24T19:04:04.464Z
Reserved: 2023-04-24T23:19:04.957Z
Link: CVE-2023-31151
Updated: 2024-08-02T14:45:25.853Z
Status : Modified
Published: 2023-05-10T20:15:10.147
Modified: 2024-11-21T08:01:30.033
Link: CVE-2023-31151
No data.
OpenCVE Enrichment
No data.
EUVD