In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, the affected product stores plaintext credentials in various places. This may allow an attacker with local access to see them.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-19480 | In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, the affected product stores plaintext credentials in various places. This may allow an attacker with local access to see them. |
Fixes
Solution
No solution given by the vendor.
Workaround
Rapid Software did not respond to CISA's attempts at coordination. Users of Rapid SCADA are encouraged to contact Rapid Software and keep their systems up to date.
References
History
Thu, 15 May 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-05-15T19:51:07.596Z
Reserved: 2024-01-05T21:39:05.431Z
Link: CVE-2024-21869
Updated: 2024-08-01T22:27:36.268Z
Status : Modified
Published: 2024-02-02T00:15:55.340
Modified: 2024-11-21T08:55:09.050
Link: CVE-2024-21869
No data.
OpenCVE Enrichment
No data.
EUVD