expose filenames located on the system, which could lead to additional
information exposure.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-39607 | The InfoScan client download page can be intercepted with a proxy, to expose filenames located on the system, which could lead to additional information exposure. |
Solution
Dorsett Controls recommends users update their InfoScan system v1.38 or later. To install the new release, user administrators will need to: * login to InfoScan and select "System Prefs" from the menu. * Once the System Prefs application is open, select Maintenance. * Click the Install Now button in the Ready To Install section. * If no internet access available, the update will need to be downloaded from the Dorsett Controls Customer Portal by selecting the InfoScan Update tile. Download the update and following the instructions listed on the portal. For more information, please refer to the Dorsett Controls security bulletin https://portal.dtscada.com/#/security-bulletins for more information.
Workaround
No workaround given by the vendor.
Fri, 09 Aug 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dorsettcontrols
Dorsettcontrols infoscan |
|
| CPEs | cpe:2.3:a:dorsettcontrols:infoscan:1.32:*:*:*:*:*:*:* cpe:2.3:a:dorsettcontrols:infoscan:1.33:*:*:*:*:*:*:* cpe:2.3:a:dorsettcontrols:infoscan:1.35:*:*:*:*:*:*:* |
|
| Vendors & Products |
Dorsettcontrols
Dorsettcontrols infoscan |
|
| Metrics |
ssvc
|
Thu, 08 Aug 2024 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The InfoScan client download page can be intercepted with a proxy, to expose filenames located on the system, which could lead to additional information exposure. | |
| Title | Dorsett Controls InfoScan Path Traversal | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-08-09T15:02:38.084Z
Reserved: 2024-08-05T16:34:29.403Z
Link: CVE-2024-42408
Updated: 2024-08-09T15:02:21.268Z
Status : Analyzed
Published: 2024-08-08T18:15:10.953
Modified: 2024-08-29T14:22:45.603
Link: CVE-2024-42408
No data.
OpenCVE Enrichment
No data.
EUVD