Password autocomplete vulnerability in the web application password field of Hitachi ABB Power Grids eSOMS allows attacker to gain access to user credentials that are stored by the browser. This issue affects: Hitachi ABB Power Grids eSOMS version 6.3 and prior versions.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-22163 Password autocomplete vulnerability in the web application password field of Hitachi ABB Power Grids eSOMS allows attacker to gain access to user credentials that are stored by the browser. This issue affects: Hitachi ABB Power Grids eSOMS version 6.3 and prior versions.
Fixes

Solution

The problem is remediated in eSOMS version 6.3.1.


Workaround

Recommended security best practices and firewall configurations can help protect a process control net-work from attacks that originate from outside the network. Such practices include ensuring critical applica-tions and systems are physically protected from direct access by unauthorized personnel, have no direct connections to the Internet, and are separated from other networks by means of a firewall. Firewalls should be configured to have the minimum number of ports exposed and open ports should be justified and docu-mented. Critical systems should not be used for Internet surfing, instant messaging, or receiving e-mails. Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system. It is important to implement robust security awareness training to ensure users are able to identify common attacks or content such as phishing E-Mails or malicious web pages.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: Hitachi Energy

Published:

Updated: 2024-09-16T23:01:49.707Z

Reserved: 2021-06-28T00:00:00

Link: CVE-2021-35527

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-07-14T14:15:08.937

Modified: 2024-11-21T06:12:26.853

Link: CVE-2021-35527

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.