Weintek Weincloud v0.13.6



could allow an attacker to efficiently develop a brute force attack on credentials with authentication hints from error message responses.







Advisories
Source ID Title
EUVD EUVD EUVD-2023-36900 Weintek Weincloud v0.13.6 could allow an attacker to efficiently develop a brute force attack on credentials with authentication hints from error message responses.
Fixes

Solution

​Weintek has updated their account API to v0.13.8, which has fixed the issue. This fix does not require any action for users.


Workaround

​Additional mitigations are recommended to help reduce risk: * ​Log in on trusted computers if possible. Log out after usage on un-trusted ones. * ​On the HMIs, if the online services are not used, set to offline mode for EasyAccess 2.0 or Dashboard services using system reserved addresses. * ​Regularly change passwords to reduce risks. * ​Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible- only applicable devices and/or systems have access to the internet.

History

Mon, 28 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-10-28T14:20:52.959Z

Reserved: 2023-07-13T15:55:48.890Z

Link: CVE-2023-32657

cve-icon Vulnrichment

Updated: 2024-08-02T15:25:36.554Z

cve-icon NVD

Status : Modified

Published: 2023-07-19T22:15:10.743

Modified: 2024-11-21T08:03:47.350

Link: CVE-2023-32657

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.