could allow an attacker to abuse the registration functionality to login with testing credentials to the official website.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-41265 | Weintek Weincloud v0.13.6 could allow an attacker to abuse the registration functionality to login with testing credentials to the official website. |
Solution
Weintek has updated their account API to v0.13.8, which has fixed the issue. This fix does not require any action for users.
Workaround
Additional mitigations are recommended to help reduce risk: * Log in on trusted computers if possible. Log out after usage on un-trusted ones. * On the HMIs, if the online services are not used, set to offline mode for EasyAccess 2.0 or Dashboard services using system reserved addresses. * Regularly change passwords to reduce risks. * Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible- only applicable devices and/or systems have access to the internet.
Thu, 06 Mar 2025 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-287 |
Thu, 06 Mar 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Weintek Weincloud v0.13.6 could allow an attacker to abuse the registration functionality to login with testing credentials to the official website. | Weintek Weincloud v0.13.6 could allow an attacker to abuse the registration functionality to login with testing credentials to the official website. |
| Weaknesses | CWE-522 |
Mon, 28 Oct 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-03-06T15:04:53.644Z
Reserved: 2023-07-13T15:55:48.885Z
Link: CVE-2023-37362
Updated: 2024-08-02T17:09:34.107Z
Status : Modified
Published: 2023-07-19T22:15:11.380
Modified: 2025-03-06T15:15:14.640
Link: CVE-2023-37362
No data.
OpenCVE Enrichment
No data.
EUVD