Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2024-39287", "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "state": "PUBLISHED", "assignerShortName": "icscert", "dateReserved": "2024-08-05T16:34:29.408Z", "datePublished": "2024-08-08T17:25:04.027Z", "dateUpdated": "2024-08-08T18:08:03.552Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "product": "InfoScan", "vendor": "Dorsett Controls", "versions": [{"status": "affected", "version": "v1.32"}, {"status": "affected", "version": "v1.33"}, {"status": "affected", "version": "v1.35"}]}], "credits": [{"lang": "en", "type": "finder", "value": "An anonymous researcher reported these vulnerabilities to CISA."}], "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "Dorsett Controls Central Server update server has potential information \nleaks with an unprotected file that contains passwords and API keys."}], "value": "Dorsett Controls Central Server update server has potential information \nleaks with an unprotected file that contains passwords and API keys."}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}, {"cvssV4_0": {"Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 6.9, "baseSeverity": "MEDIUM", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "problemTypes": [{"descriptions": [{"cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert", "dateUpdated": "2024-08-08T17:25:04.027Z"}, "references": [{"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-221-01"}, {"url": "https://portal.dtscada.com/#/security-bulletins?bulletin=1"}], "solutions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "<p>Dorsett Controls recommends users update their InfoScan system v1.38 or later.</p>\n<p>To install the new release, user administrators will need to:</p>\n<ul>\n<li>login to InfoScan and select \"System Prefs\" from the menu.</li>\n<li>Once the System Prefs application is open, select Maintenance.</li>\n<li>Click the Install Now button in the Ready To Install section.</li>\n<li>If no internet access available, the update will need to be \ndownloaded from the Dorsett Controls Customer Portal by selecting the \nInfoScan Update tile. Download the update and following the instructions\n listed on the portal.</li>\n</ul>\n<p>For more information, please refer to the <a target=\"_blank\" rel=\"nofollow\" href=\"https://portal.dtscada.com/#/security-bulletins?bulletin=1\">Dorsett Controls security bulletin</a> for more information.\n\n</p>"}], "value": "Dorsett Controls recommends users update their InfoScan system v1.38 or later.\n\n\nTo install the new release, user administrators will need to:\n\n\n\n * login to InfoScan and select \"System Prefs\" from the menu.\n\n * Once the System Prefs application is open, select Maintenance.\n\n * Click the Install Now button in the Ready To Install section.\n\n * If no internet access available, the update will need to be \ndownloaded from the Dorsett Controls Customer Portal by selecting the \nInfoScan Update tile. Download the update and following the instructions\n listed on the portal.\n\n\n\n\nFor more information, please refer to the Dorsett Controls security bulletin https://portal.dtscada.com/#/security-bulletins for more information."}], "source": {"advisory": "ICSA-24-221-01", "discovery": "EXTERNAL"}, "title": "Dorsett Controls InfoScan Exposure of Sensitive Information To An Unauthorized Actor", "x_generator": {"engine": "Vulnogram 0.2.0"}}, "adp": [{"affected": [{"vendor": "dorsettcontrols", "product": "infoscan", "cpes": ["cpe:2.3:a:dorsettcontrols:infoscan:1.32:*:*:*:*:*:*:*"], "defaultStatus": "unaffected", "versions": [{"version": "1.32", "status": "affected"}]}, {"vendor": "dorsettcontrols", "product": "infoscan", "cpes": ["cpe:2.3:a:dorsettcontrols:infoscan:1.33:*:*:*:*:*:*:*"], "defaultStatus": "unaffected", "versions": [{"version": "1.33", "status": "affected"}]}, {"vendor": "dorsettcontrols", "product": "infoscan", "cpes": ["cpe:2.3:a:dorsettcontrols:infoscan:1.35:*:*:*:*:*:*:*"], "defaultStatus": "unaffected", "versions": [{"version": "1.35", "status": "affected"}]}], "metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-08-08T18:01:41.408257Z", "id": "CVE-2024-39287", "options": [{"Exploitation": "none"}, {"Automatable": "yes"}, {"Technical Impact": "partial"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-08-08T18:08:03.552Z"}}]}}