Elcomplus SmartPTT is vulnerable when an attacker injects JavaScript code into a specific parameter that can executed upon accessing the dashboard or the main page.
Metrics
Affected Vendors & Products
Fixes
Solution
Elcomplus has released an update to fix these vulnerabilities and recommends users upgrade to Version 2.3.4 or later. For more information, please contact Elcomplus support.
Workaround
No workaround given by the vendor.
References
Link | Providers |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-109-04 |
![]() ![]() |
History
Wed, 16 Apr 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-04-16T17:55:04.470Z
Reserved: 2021-11-16T00:00:00.000Z
Link: CVE-2021-43932

Updated: 2024-08-04T04:10:16.306Z

Status : Modified
Published: 2022-04-28T15:15:09.200
Modified: 2024-11-21T06:30:01.583
Link: CVE-2021-43932

No data.

No data.