Logs storing credentials are insufficiently protected and can be decoded through the use of open source tools.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2024-37246 | Logs storing credentials are insufficiently protected and can be decoded through the use of open source tools. |
Fixes
Solution
Motorola Solutions recommends the following for each identified vulnerability: CVE-2024-38285: * Delete the log files. Motorola Solutions has already remediated this vulnerability for all vulnerable systems. No further actions are required by customers.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-08-02T04:04:25.101Z
Reserved: 2024-06-12T16:16:09.649Z
Link: CVE-2024-38285

Updated: 2024-06-17T19:38:31.535Z

Status : Awaiting Analysis
Published: 2024-06-13T18:15:11.547
Modified: 2024-11-21T09:25:17.307
Link: CVE-2024-38285

No data.

No data.