Weintek Weincloud v0.13.6
could allow an attacker to efficiently develop a brute force attack on credentials with authentication hints from error message responses.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-36900 | Weintek Weincloud v0.13.6 could allow an attacker to efficiently develop a brute force attack on credentials with authentication hints from error message responses. |
Solution
Weintek has updated their account API to v0.13.8, which has fixed the issue. This fix does not require any action for users.
Workaround
Additional mitigations are recommended to help reduce risk: * Log in on trusted computers if possible. Log out after usage on un-trusted ones. * On the HMIs, if the online services are not used, set to offline mode for EasyAccess 2.0 or Dashboard services using system reserved addresses. * Regularly change passwords to reduce risks. * Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible- only applicable devices and/or systems have access to the internet.
Mon, 28 Oct 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-10-28T14:20:52.959Z
Reserved: 2023-07-13T15:55:48.890Z
Link: CVE-2023-32657
Updated: 2024-08-02T15:25:36.554Z
Status : Modified
Published: 2023-07-19T22:15:10.743
Modified: 2024-11-21T08:03:47.350
Link: CVE-2023-32657
No data.
OpenCVE Enrichment
No data.
EUVD