Description
The affected product is vulnerable to a parameter injection via passphrase, which enables the attacker to supply uncontrolled input.
Published: 2021-10-22
Score: 8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Emerson recommends upgrading to v4.7.105 to address these vulnerabilities. Users can visit the Emerson Gate Firmware site for and download instructions. If affected users do not yet have a free Guardian account, please see the updated Emerson Gateway Firmware download process by following the link above and viewing the download guide.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-29507 The affected product is vulnerable to a parameter injection via passphrase, which enables the attacker to supply uncontrolled input.
History

No history.

Subscriptions

Emerson Wireless 1410 Gateway Wireless 1410 Gateway Firmware Wireless 1410d Gateway Wireless 1410d Gateway Firmware Wireless 1420 Gateway Wireless 1420 Gateway Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-09-17T00:11:59.293Z

Reserved: 2021-10-15T00:00:00.000Z

Link: CVE-2021-42538

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-10-22T14:15:08.810

Modified: 2024-11-21T06:27:45.823

Link: CVE-2021-42538

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses