No analysis available yet.
Vendor Solution
No update available.
Vendor Workaround
An external protective measure is required. * Minimize network exposure for affected products and ensure that they are not accessible via the Internet. * Isolate affected products from the corporate network. * If remote access is required, use secure methods such as virtual private networks (VPNs).
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-21210 | In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.9 a form contains a password field with autocomplete enabled. The stored credentials can be captured by an attacker who gains control over the user's computer. Therefore the user must have logged in at least once. |
| Link | Providers |
|---|---|
| https://cert.vde.com/en-us/advisories/vde-2021-027 |
|
No history.
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2024-09-16T23:00:54.389Z
Reserved: 2021-06-10T00:00:00.000Z
Link: CVE-2021-34560
No data.
Status : Modified
Published: 2021-08-31T11:15:07.407
Modified: 2024-11-21T06:10:41.383
Link: CVE-2021-34560
No data.
OpenCVE Enrichment
No data.
EUVD