Elcomplus SmartPTT is vulnerable when an attacker injects JavaScript code into a specific parameter that can executed upon accessing the dashboard or the main page.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-30794 | Elcomplus SmartPTT is vulnerable when an attacker injects JavaScript code into a specific parameter that can executed upon accessing the dashboard or the main page. |
Fixes
Solution
Elcomplus has released an update to fix these vulnerabilities and recommends users upgrade to Version 2.3.4 or later. For more information, please contact Elcomplus support.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://www.cisa.gov/uscert/ics/advisories/icsa-22-109-04 |
|
History
Wed, 16 Apr 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-04-16T17:55:04.470Z
Reserved: 2021-11-16T00:00:00.000Z
Link: CVE-2021-43932
Updated: 2024-08-04T04:10:16.306Z
Status : Modified
Published: 2022-04-28T15:15:09.200
Modified: 2024-11-21T06:30:01.583
Link: CVE-2021-43932
No data.
OpenCVE Enrichment
No data.
EUVD