An unauthorized user is able to gain access to sensitive data, including credentials, by physically retrieving the hard disk of the product as the data is stored in clear text.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published: 2024-06-13T17:05:58.531Z

Updated: 2024-08-02T04:04:25.205Z

Reserved: 2024-06-12T16:16:09.648Z

Link: CVE-2024-38280

cve-icon Vulnrichment

Updated: 2024-07-05T20:35:43.342Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-06-13T17:15:51.477

Modified: 2024-06-13T18:35:19.777

Link: CVE-2024-38280

cve-icon Redhat

No data.