CVE-2024-42493 (GCVE-0-2024-42493)

Vulnerability from cvelistv5 – Published: 2024-08-08 17:23 – Updated: 2024-08-09 15:04
VLAI?
Title
Dorsett Controls InfoScan Exposure of Sensitive Information To An Unauthorized Actor
Summary
Dorsett Controls InfoScan is vulnerable due to a leak of possible sensitive information through the response headers and the rendered JavaScript prior to user login.
CWE
  • CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Assigner
Impacted products
Vendor Product Version
Dorsett Controls InfoScan Affected: v1.32
Affected: v1.33
Affected: v1.35
Create a notification for this product.
Credits
An anonymous researcher reported these vulnerabilities to CISA.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:dorsettcontrols:infoscan:1.32:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "infoscan",
            "vendor": "dorsettcontrols",
            "versions": [
              {
                "status": "affected",
                "version": "1.32"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:dorsettcontrols:infoscan:1.33:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "infoscan",
            "vendor": "dorsettcontrols",
            "versions": [
              {
                "status": "affected",
                "version": "1.33"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:dorsettcontrols:infoscan:1.35:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "infoscan",
            "vendor": "dorsettcontrols",
            "versions": [
              {
                "status": "affected",
                "version": "1.35"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-42493",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-09T15:04:14.769994Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-09T15:04:20.077Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "InfoScan",
          "vendor": "Dorsett Controls",
          "versions": [
            {
              "status": "affected",
              "version": "v1.32"
            },
            {
              "status": "affected",
              "version": "v1.33"
            },
            {
              "status": "affected",
              "version": "v1.35"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "An anonymous researcher reported these vulnerabilities to CISA."
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Dorsett Controls InfoScan is vulnerable due to a leak of possible \nsensitive information through the response headers and the rendered \nJavaScript prior to user login."
            }
          ],
          "value": "Dorsett Controls InfoScan is vulnerable due to a leak of possible \nsensitive information through the response headers and the rendered \nJavaScript prior to user login."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        },
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 6.9,
            "baseSeverity": "MEDIUM",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "NONE",
            "vulnConfidentialityImpact": "LOW",
            "vulnIntegrityImpact": "NONE",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-200",
              "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-08T17:23:04.770Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-221-01"
        },
        {
          "url": "https://portal.dtscada.com/#/security-bulletins?bulletin=1"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eDorsett Controls recommends users update their InfoScan system v1.38 or later.\u003c/p\u003e\n\u003cp\u003eTo install the new release, user administrators will need to:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003elogin to InfoScan and select \"System Prefs\" from the menu.\u003c/li\u003e\n\u003cli\u003eOnce the System Prefs application is open, select Maintenance.\u003c/li\u003e\n\u003cli\u003eClick the Install Now button in the Ready To Install section.\u003c/li\u003e\n\u003cli\u003eIf no internet access available, the update will need to be \ndownloaded from the Dorsett Controls Customer Portal by selecting the \nInfoScan Update tile. Download the update and following the instructions\n listed on the portal.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eFor more information, please refer to the \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://portal.dtscada.com/#/security-bulletins?bulletin=1\"\u003eDorsett Controls security bulletin\u003c/a\u003e for more information.\n\n\u003c/p\u003e"
            }
          ],
          "value": "Dorsett Controls recommends users update their InfoScan system v1.38 or later.\n\n\nTo install the new release, user administrators will need to:\n\n\n\n  *  login to InfoScan and select \"System Prefs\" from the menu.\n\n  *  Once the System Prefs application is open, select Maintenance.\n\n  *  Click the Install Now button in the Ready To Install section.\n\n  *  If no internet access available, the update will need to be \ndownloaded from the Dorsett Controls Customer Portal by selecting the \nInfoScan Update tile. Download the update and following the instructions\n listed on the portal.\n\n\n\n\nFor more information, please refer to the  Dorsett Controls security bulletin https://portal.dtscada.com/#/security-bulletins  for more information."
        }
      ],
      "source": {
        "advisory": "ICSA-24-221-01",
        "discovery": "EXTERNAL"
      },
      "title": "Dorsett Controls InfoScan Exposure of Sensitive Information To An Unauthorized Actor",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2024-42493",
    "datePublished": "2024-08-08T17:23:04.770Z",
    "dateReserved": "2024-08-05T16:34:29.396Z",
    "dateUpdated": "2024-08-09T15:04:20.077Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:dorsettcontrols:infoscan:1.32:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FF3B241-1366-47A3-BC0A-97E31842C45C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:dorsettcontrols:infoscan:1.33:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8E5DD992-67F9-49EF-BDFB-7D3A7A2664CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:dorsettcontrols:infoscan:1.35:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A2B7D5A-0830-47F8-9DD9-2F53B52FBCFF\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Dorsett Controls InfoScan is vulnerable due to a leak of possible \\nsensitive information through the response headers and the rendered \\nJavaScript prior to user login.\"}, {\"lang\": \"es\", \"value\": \"Dorsett Controls InfoScan es vulnerable debido a una filtraci\\u00f3n de posible informaci\\u00f3n confidencial a trav\\u00e9s de los encabezados de respuesta y el JavaScript renderizado antes del inicio de sesi\\u00f3n del usuario.\"}]",
      "id": "CVE-2024-42493",
      "lastModified": "2024-08-29T14:24:14.373",
      "metrics": "{\"cvssMetricV40\": [{\"source\": \"ics-cert@hq.dhs.gov\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"4.0\", \"vectorString\": \"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\", \"baseScore\": 6.9, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"vulnerableSystemConfidentiality\": \"LOW\", \"vulnerableSystemIntegrity\": \"NONE\", \"vulnerableSystemAvailability\": \"NONE\", \"subsequentSystemConfidentiality\": \"NONE\", \"subsequentSystemIntegrity\": \"NONE\", \"subsequentSystemAvailability\": \"NONE\", \"exploitMaturity\": \"NOT_DEFINED\", \"confidentialityRequirements\": \"NOT_DEFINED\", \"integrityRequirements\": \"NOT_DEFINED\", \"availabilityRequirements\": \"NOT_DEFINED\", \"modifiedAttackVector\": \"NOT_DEFINED\", \"modifiedAttackComplexity\": \"NOT_DEFINED\", \"modifiedAttackRequirements\": \"NOT_DEFINED\", \"modifiedPrivilegesRequired\": \"NOT_DEFINED\", \"modifiedUserInteraction\": \"NOT_DEFINED\", \"modifiedVulnerableSystemConfidentiality\": \"NOT_DEFINED\", \"modifiedVulnerableSystemIntegrity\": \"NOT_DEFINED\", \"modifiedVulnerableSystemAvailability\": \"NOT_DEFINED\", \"modifiedSubsequentSystemConfidentiality\": \"NOT_DEFINED\", \"modifiedSubsequentSystemIntegrity\": \"NOT_DEFINED\", \"modifiedSubsequentSystemAvailability\": \"NOT_DEFINED\", \"safety\": \"NOT_DEFINED\", \"automatable\": \"NOT_DEFINED\", \"recovery\": \"NOT_DEFINED\", \"valueDensity\": \"NOT_DEFINED\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\", \"providerUrgency\": \"NOT_DEFINED\"}}], \"cvssMetricV31\": [{\"source\": \"ics-cert@hq.dhs.gov\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 1.4}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 1.4}]}",
      "published": "2024-08-08T18:15:11.207",
      "references": "[{\"url\": \"https://portal.dtscada.com/#/security-bulletins?bulletin=1\", \"source\": \"ics-cert@hq.dhs.gov\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.cisa.gov/news-events/ics-advisories/icsa-24-221-01\", \"source\": \"ics-cert@hq.dhs.gov\", \"tags\": [\"Third Party Advisory\", \"US Government Resource\"]}]",
      "sourceIdentifier": "ics-cert@hq.dhs.gov",
      "vulnStatus": "Analyzed",
      "weaknesses": "[{\"source\": \"ics-cert@hq.dhs.gov\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-200\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-42493\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2024-08-08T18:15:11.207\",\"lastModified\":\"2024-08-29T14:24:14.373\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Dorsett Controls InfoScan is vulnerable due to a leak of possible \\nsensitive information through the response headers and the rendered \\nJavaScript prior to user login.\"},{\"lang\":\"es\",\"value\":\"Dorsett Controls InfoScan es vulnerable debido a una filtraci\u00f3n de posible informaci\u00f3n confidencial a trav\u00e9s de los encabezados de respuesta y el JavaScript renderizado antes del inicio de sesi\u00f3n del usuario.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":6.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"LOW\",\"vulnIntegrityImpact\":\"NONE\",\"vulnAvailabilityImpact\":\"NONE\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dorsettcontrols:infoscan:1.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FF3B241-1366-47A3-BC0A-97E31842C45C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dorsettcontrols:infoscan:1.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E5DD992-67F9-49EF-BDFB-7D3A7A2664CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:dorsettcontrols:infoscan:1.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A2B7D5A-0830-47F8-9DD9-2F53B52FBCFF\"}]}]}],\"references\":[{\"url\":\"https://portal.dtscada.com/#/security-bulletins?bulletin=1\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.cisa.gov/news-events/ics-advisories/icsa-24-221-01\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-42493\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-08-09T15:04:14.769994Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:dorsettcontrols:infoscan:1.32:*:*:*:*:*:*:*\"], \"vendor\": \"dorsettcontrols\", \"product\": \"infoscan\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.32\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:a:dorsettcontrols:infoscan:1.33:*:*:*:*:*:*:*\"], \"vendor\": \"dorsettcontrols\", \"product\": \"infoscan\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.33\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:a:dorsettcontrols:infoscan:1.35:*:*:*:*:*:*:*\"], \"vendor\": \"dorsettcontrols\", \"product\": \"infoscan\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.35\"}], \"defaultStatus\": \"unaffected\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-08-09T15:04:12.878Z\"}}], \"cna\": {\"title\": \"Dorsett Controls InfoScan Exposure of Sensitive Information To An Unauthorized Actor\", \"source\": {\"advisory\": \"ICSA-24-221-01\", \"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"An anonymous researcher reported these vulnerabilities to CISA.\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}, {\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"NOT_DEFINED\", \"baseScore\": 6.9, \"Automatable\": \"NOT_DEFINED\", \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"valueDensity\": \"NOT_DEFINED\", \"vectorString\": \"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N\", \"providerUrgency\": \"NOT_DEFINED\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"NONE\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"NONE\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"NONE\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"LOW\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Dorsett Controls\", \"product\": \"InfoScan\", \"versions\": [{\"status\": \"affected\", \"version\": \"v1.32\"}, {\"status\": \"affected\", \"version\": \"v1.33\"}, {\"status\": \"affected\", \"version\": \"v1.35\"}], \"defaultStatus\": \"unaffected\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"Dorsett Controls recommends users update their InfoScan system v1.38 or later.\\n\\n\\nTo install the new release, user administrators will need to:\\n\\n\\n\\n  *  login to InfoScan and select \\\"System Prefs\\\" from the menu.\\n\\n  *  Once the System Prefs application is open, select Maintenance.\\n\\n  *  Click the Install Now button in the Ready To Install section.\\n\\n  *  If no internet access available, the update will need to be \\ndownloaded from the Dorsett Controls Customer Portal by selecting the \\nInfoScan Update tile. Download the update and following the instructions\\n listed on the portal.\\n\\n\\n\\n\\nFor more information, please refer to the  Dorsett Controls security bulletin https://portal.dtscada.com/#/security-bulletins  for more information.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eDorsett Controls recommends users update their InfoScan system v1.38 or later.\u003c/p\u003e\\n\u003cp\u003eTo install the new release, user administrators will need to:\u003c/p\u003e\\n\u003cul\u003e\\n\u003cli\u003elogin to InfoScan and select \\\"System Prefs\\\" from the menu.\u003c/li\u003e\\n\u003cli\u003eOnce the System Prefs application is open, select Maintenance.\u003c/li\u003e\\n\u003cli\u003eClick the Install Now button in the Ready To Install section.\u003c/li\u003e\\n\u003cli\u003eIf no internet access available, the update will need to be \\ndownloaded from the Dorsett Controls Customer Portal by selecting the \\nInfoScan Update tile. Download the update and following the instructions\\n listed on the portal.\u003c/li\u003e\\n\u003c/ul\u003e\\n\u003cp\u003eFor more information, please refer to the \u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://portal.dtscada.com/#/security-bulletins?bulletin=1\\\"\u003eDorsett Controls security bulletin\u003c/a\u003e for more information.\\n\\n\u003c/p\u003e\", \"base64\": false}]}], \"references\": [{\"url\": \"https://www.cisa.gov/news-events/ics-advisories/icsa-24-221-01\"}, {\"url\": \"https://portal.dtscada.com/#/security-bulletins?bulletin=1\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Dorsett Controls InfoScan is vulnerable due to a leak of possible \\nsensitive information through the response headers and the rendered \\nJavaScript prior to user login.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Dorsett Controls InfoScan is vulnerable due to a leak of possible \\nsensitive information through the response headers and the rendered \\nJavaScript prior to user login.\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-200\", \"description\": \"CWE-200 Exposure of Sensitive Information to an Unauthorized Actor\"}]}], \"providerMetadata\": {\"orgId\": \"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6\", \"shortName\": \"icscert\", \"dateUpdated\": \"2024-08-08T17:23:04.770Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-42493\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-09T15:04:20.077Z\", \"dateReserved\": \"2024-08-05T16:34:29.396Z\", \"assignerOrgId\": \"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6\", \"datePublished\": \"2024-08-08T17:23:04.770Z\", \"assignerShortName\": \"icscert\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…