Successful exploitation of this vulnerability on Claroty Secure Remote Access (SRA) Site versions 3.0 through 3.2 allows an attacker with local command line interface access to gain the secret key, subsequently allowing them to generate valid session tokens for the web user interface (UI). With access to the web UI an attacker can access assets managed by the SRA installation and could compromise the installation.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-21-180-06 |
History
No history.
MITRE
Status: PUBLISHED
Assigner: icscert
Published: 2022-05-23T19:34:55
Updated: 2024-08-03T23:33:56.077Z
Reserved: 2021-05-13T00:00:00
Link: CVE-2021-32958
Vulnrichment
No data.
NVD
Status : Modified
Published: 2022-05-23T20:16:40.753
Modified: 2024-11-21T06:08:00.390
Link: CVE-2021-32958
Redhat
No data.