Description
mySCADA myPRO
uses a hard-coded password which could allow an attacker to remotely execute code on the affected device.
uses a hard-coded password which could allow an attacker to remotely execute code on the affected device.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
Vendor Solution
mySCADA recommends updating myPRO to v8.31.0 https://www.myscada.org/mypro/ .
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-44305 | mySCADA myPRO uses a hard-coded password which could allow an attacker to remotely execute code on the affected device. |
References
History
Thu, 29 Aug 2024 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Myscada
Myscada mypro |
|
| Weaknesses | CWE-798 | |
| CPEs | cpe:2.3:a:myscada:mypro:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Myscada
Myscada mypro |
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-08-01T20:47:41.657Z
Reserved: 2024-05-09T20:45:17.755Z
Link: CVE-2024-4708
Updated: 2024-08-01T20:47:41.657Z
Status : Modified
Published: 2024-07-02T23:15:10.860
Modified: 2024-11-21T09:43:25.340
Link: CVE-2024-4708
No data.
OpenCVE Enrichment
No data.
EUVD