In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, the affected product stores plaintext credentials in various places. This may allow an attacker with local access to see them.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2024-19480 | In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, the affected product stores plaintext credentials in various places. This may allow an attacker with local access to see them. |
Fixes
Solution
No solution given by the vendor.
Workaround
Rapid Software did not respond to CISA's attempts at coordination. Users of Rapid SCADA are encouraged to contact Rapid Software and keep their systems up to date.
References
History
Thu, 15 May 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-05-15T19:51:07.596Z
Reserved: 2024-01-05T21:39:05.431Z
Link: CVE-2024-21869

Updated: 2024-08-01T22:27:36.268Z

Status : Modified
Published: 2024-02-02T00:15:55.340
Modified: 2024-11-21T08:55:09.050
Link: CVE-2024-21869

No data.

No data.