Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2024-29104 | A “CWE-201: Insertion of Sensitive Information Into Sent Data” affecting the administrative account allows an attacker with physical access to the machine to retrieve the password in cleartext when an administrative session is open in the browser. |
Solution
No official patch available from vendor. Implement strict access controls for the temperature monitoring infrastructure. This includes preventing regular clients from accessing the web configuration interface, thereby limiting potential points of exploitation. Conduct regular and thorough reviews of logs and user accounts on systems running the Thermoscan IP software. This will help identify and address any suspicious activities early, ensuring that any potential security breaches are caught and remediated swiftly.
Workaround
No workaround given by the vendor.
Mon, 12 Aug 2024 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Proges
Proges sensor Net Connect Firmware V2 Proges sensor Net Connect V2 |
|
Weaknesses | NVD-CWE-Other | |
CPEs | cpe:2.3:h:proges:sensor_net_connect_v2:-:*:*:*:*:*:*:* cpe:2.3:o:proges:sensor_net_connect_firmware_v2:2.24:*:*:*:*:*:*:* |
|
Vendors & Products |
Proges
Proges sensor Net Connect Firmware V2 Proges sensor Net Connect V2 |

Status: PUBLISHED
Assigner: Nozomi
Published:
Updated: 2024-07-31T14:21:55.581Z
Reserved: 2024-03-29T08:32:14.699Z
Link: CVE-2024-31200

Updated: 2024-07-31T14:21:50.973Z

Status : Analyzed
Published: 2024-07-31T14:15:03.823
Modified: 2024-08-12T18:25:44.547
Link: CVE-2024-31200

No data.

No data.