Schneider Electric ClearSCADA CVE-2014-5413 Weak Hashing Algorithm Remote Security Weakness
BID:69842
Info
Schneider Electric ClearSCADA CVE-2014-5413 Weak Hashing Algorithm Remote Security Weakness
| Bugtraq ID: | 69842 |
| Class: | Design Error |
| CVE: |
CVE-2014-5413 |
| Remote: | Yes |
| Local: | No |
| Published: | Sep 16 2014 12:00AM |
| Updated: | Oct 08 2014 07:00AM |
| Credit: | Aditya Sood |
| Vulnerable: | |
| Not Vulnerable: | |
Discussion
Schneider Electric ClearSCADA CVE-2014-5413 Weak Hashing Algorithm Remote Security Weakness
Schneider Electric ClearSCADA is prone to a remote security weakness that may allow attackers to obtain sensitive information.
A remote attacker may leverage this issue to gain access to the sensitive information. Information obtained may lead to further attacks.
Schneider Electric ClearSCADA is prone to a remote security weakness that may allow attackers to obtain sensitive information.
A remote attacker may leverage this issue to gain access to the sensitive information. Information obtained may lead to further attacks.
Exploit / POC
Schneider Electric ClearSCADA CVE-2014-5413 Weak Hashing Algorithm Remote Security Weakness
Currently, we are not aware of any exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Currently, we are not aware of any exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution / Fix
Schneider Electric ClearSCADA CVE-2014-5413 Weak Hashing Algorithm Remote Security Weakness
Solution:
Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution:
Currently, we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
References
Schneider Electric ClearSCADA CVE-2014-5413 Weak Hashing Algorithm Remote Security Weakness
References:
References: