Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2024-31688 | A “CWE-256: Plaintext Storage of a Password” affecting the administrative account allows an attacker with physical access to the machine to retrieve the password in cleartext unless specific security measures at other layers (e.g., full-disk encryption) have been enabled. |
Solution
No official patch available from vendor. Implement strict access controls for the temperature monitoring infrastructure. This includes preventing regular clients from accessing the web configuration interface, thereby limiting potential points of exploitation. Conduct regular and thorough reviews of logs and user accounts on systems running the Thermoscan IP software. This will help identify and address any suspicious activities early, ensuring that any potential security breaches are caught and remediated swiftly.
Workaround
No workaround given by the vendor.
Mon, 30 Sep 2024 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A “CWE-256: Plaintext Storage of a Password” affecting the administrative account allows an attacker with physical access to the machine to retrieve the password in cleartext. | A “CWE-256: Plaintext Storage of a Password” affecting the administrative account allows an attacker with physical access to the machine to retrieve the password in cleartext unless specific security measures at other layers (e.g., full-disk encryption) have been enabled. |
Mon, 12 Aug 2024 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Proges sensor Net Connect Firmware V2
Proges sensor Net Connect V2 |
|
Weaknesses | CWE-522 | |
CPEs | cpe:2.3:h:proges:sensor_net_connect_v2:-:*:*:*:*:*:*:* cpe:2.3:o:proges:sensor_net_connect_firmware_v2:2.24:*:*:*:*:*:*:* |
|
Vendors & Products |
Proges sensor Net Connect Firmware V2
Proges sensor Net Connect V2 |

Status: PUBLISHED
Assigner: Nozomi
Published:
Updated: 2024-09-30T14:26:27.841Z
Reserved: 2024-03-29T08:32:16.293Z
Link: CVE-2024-3082

Updated: 2024-07-31T18:05:07.486Z

Status : Modified
Published: 2024-07-31T14:15:07.157
Modified: 2024-09-30T15:15:05.573
Link: CVE-2024-3082

No data.

No data.