Description
Use of hard-coded MSSQL credentials in PerkinElmer ProcessPlus on Windows allows an attacker to login remove on all prone installations.This issue affects ProcessPlus: through 1.11.6507.0.
Published: 2024-07-22
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

Vendor Solution

Install the patched version 2.0.0.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-47900 Use of hard-coded MSSQL credentials in PerkinElmer ProcessPlus on Windows allows an attacker to login remove on all prone installations.This issue affects ProcessPlus: through 1.11.6507.0.
History

Thu, 13 Feb 2025 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Perkin Elmer
Perkin Elmer process Plus
CPEs cpe:2.3:a:perkin_elmer:process_plus:*:*:*:*:*:*:*:*
Vendors & Products Perkin Elmer
Perkin Elmer process Plus
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 11 Sep 2024 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft
Microsoft windows
Perkinelmer
Perkinelmer processplus
CPEs cpe:2.3:a:perkinelmer:processplus:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft windows
Perkinelmer
Perkinelmer processplus
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Microsoft Windows
Perkin Elmer Process Plus
Perkinelmer Processplus
cve-icon MITRE

Status: PUBLISHED

Assigner: CyberDanube

Published:

Updated: 2025-02-13T17:58:01.436Z

Reserved: 2024-07-19T08:59:59.939Z

Link: CVE-2024-6912

cve-icon Vulnrichment

Updated: 2024-08-01T21:45:38.344Z

cve-icon NVD

Status : Modified

Published: 2024-07-22T21:15:05.453

Modified: 2024-11-21T09:50:31.730

Link: CVE-2024-6912

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses