CVE-2024-5434 (GCVE-0-2024-5434)

Vulnerability from cvelistv5 – Published: 2024-05-28 18:43 – Updated: 2024-08-01 21:11
VLAI?
Title
Weak Encoding for Password vulnerability in Campbell Scientific CSI Web Server and RTMC
Summary
The Campbell Scientific CSI Web Server stores web authentication credentials in a file with a specific file name. Passwords within that file are stored in a weakly encoded format. There is no known way to remotely access the file unless it has been manually renamed. However, if an attacker were to gain access to the file, passwords could be decoded and reused to gain access.
CWE
  • CWE-261 - Weak Encoding for Password
Assigner
References
Impacted products
Vendor Product Version
Campbell Scientific CSI Web Server and RTMC Affected: CSI Web Server 1.6
Affected: RTMC 5.0
Create a notification for this product.
Credits
Patrick K. Sheehan, Grant Hume, and Donald Macary reported these vulnerabilities to CISA.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:campbellsci:csi_web_server:1.6:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "csi_web_server",
            "vendor": "campbellsci",
            "versions": [
              {
                "status": "affected",
                "version": "1.6"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:campbellsci:rtmc:5.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "rtmc",
            "vendor": "campbellsci",
            "versions": [
              {
                "status": "affected",
                "version": "5.0"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-5434",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-05-28T20:02:29.975410Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T18:02:06.311Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:11:12.752Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "government-resource",
              "x_transferred"
            ],
            "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-149-01"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "CSI Web Server and RTMC",
          "vendor": "Campbell Scientific",
          "versions": [
            {
              "status": "affected",
              "version": "CSI Web Server 1.6"
            },
            {
              "status": "affected",
              "version": "RTMC 5.0"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Patrick K. Sheehan, Grant Hume, and Donald Macary reported these vulnerabilities to CISA."
        }
      ],
      "datePublic": "2024-05-28T18:19:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe Campbell Scientific CSI Web Server stores web authentication credentials in a file with a specific file name. Passwords within that file are stored in a weakly encoded format. There is no known way to remotely access the file unless it has been manually renamed. However, if an attacker were to gain access to the file, passwords could be decoded and reused to gain access.\u003c/span\u003e"
            }
          ],
          "value": "The Campbell Scientific CSI Web Server stores web authentication credentials in a file with a specific file name. Passwords within that file are stored in a weakly encoded format. There is no known way to remotely access the file unless it has been manually renamed. However, if an attacker were to gain access to the file, passwords could be decoded and reused to gain access."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "ADJACENT",
            "baseScore": 6.9,
            "baseSeverity": "MEDIUM",
            "privilegesRequired": "LOW",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "NONE",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "NONE",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-261",
              "description": "CWE-261 Weak Encoding for Password",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-05-28T18:43:07.150Z",
        "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
        "shortName": "icscert"
      },
      "references": [
        {
          "tags": [
            "government-resource"
          ],
          "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-149-01"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eCampbell Scientific recommends users to update to the version.\u003cbr\u003eFor user of CSI Web Server update to the most recent \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.campbellsci.com/downloads/csi-web-server-patch\"\u003eCSI Web Server 1.x patch\u003c/a\u003e\u003c/p\u003e\u003cp\u003eFor users of RTMC Pro 5 update to the most recent \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.campbellsci.com/downloads/rtmc-pro-5-patch\"\u003eRTMC Pro 5.x patch\u003c/a\u003e\u003c/p\u003e\u003cp\u003eFor users of RTMC Pro 4 update to the most recent \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.campbellsci.com/downloads/rtmc-pro-patch\"\u003eRTMC Pro 4.x patch\u003c/a\u003e.\u003c/p\u003e\u003cp\u003eContact \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.campbellsci.com/contact\"\u003eCampbell Scientific\u003c/a\u003e\u0026nbsp;for more details.\u003c/p\u003e"
            }
          ],
          "value": "Campbell Scientific recommends users to update to the version.\nFor user of CSI Web Server update to the most recent  CSI Web Server 1.x patch https://www.campbellsci.com/downloads/csi-web-server-patch \n\nFor users of RTMC Pro 5 update to the most recent  RTMC Pro 5.x patch https://www.campbellsci.com/downloads/rtmc-pro-5-patch \n\nFor users of RTMC Pro 4 update to the most recent  RTMC Pro 4.x patch https://www.campbellsci.com/downloads/rtmc-pro-patch .\n\nContact  Campbell Scientific https://www.campbellsci.com/contact \u00a0for more details."
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Weak Encoding for Password vulnerability in Campbell Scientific CSI Web Server and RTMC",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
    "assignerShortName": "icscert",
    "cveId": "CVE-2024-5434",
    "datePublished": "2024-05-28T18:43:07.150Z",
    "dateReserved": "2024-05-28T13:59:14.696Z",
    "dateUpdated": "2024-08-01T21:11:12.752Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-5434\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2024-05-28T19:15:11.623\",\"lastModified\":\"2024-11-21T09:47:40.653\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Campbell Scientific CSI Web Server stores web authentication credentials in a file with a specific file name. Passwords within that file are stored in a weakly encoded format. There is no known way to remotely access the file unless it has been manually renamed. However, if an attacker were to gain access to the file, passwords could be decoded and reused to gain access.\"},{\"lang\":\"es\",\"value\":\"El servidor web Campbell Scientific CSI almacena las credenciales de autenticaci\u00f3n web en un archivo con un nombre de archivo espec\u00edfico. Las contrase\u00f1as dentro de ese archivo se almacenan en un formato d\u00e9bilmente codificado. No existe ninguna forma conocida de acceder de forma remota al archivo a menos que se le haya cambiado el nombre manualmente. Sin embargo, si un atacante obtuviera acceso al archivo, las contrase\u00f1as podr\u00edan decodificarse y reutilizarse para obtener acceso.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":6.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"ADJACENT\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"HIGH\",\"vulnIntegrityImpact\":\"NONE\",\"vulnAvailabilityImpact\":\"NONE\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}]},\"weaknesses\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-261\"}]}],\"references\":[{\"url\":\"https://www.cisa.gov/news-events/ics-advisories/icsa-24-149-01\",\"source\":\"ics-cert@hq.dhs.gov\"},{\"url\":\"https://www.cisa.gov/news-events/ics-advisories/icsa-24-149-01\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
    "vulnrichment": {
      "containers": "{\"cna\": {\"affected\": [{\"defaultStatus\": \"unaffected\", \"product\": \"CSI Web Server and RTMC\", \"vendor\": \"Campbell Scientific\", \"versions\": [{\"status\": \"affected\", \"version\": \"CSI Web Server 1.6\"}, {\"status\": \"affected\", \"version\": \"RTMC 5.0\"}]}], \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Patrick K. Sheehan, Grant Hume, and Donald Macary reported these vulnerabilities to CISA.\"}], \"datePublic\": \"2024-05-28T18:19:00.000Z\", \"descriptions\": [{\"lang\": \"en\", \"supportingMedia\": [{\"base64\": false, \"type\": \"text/html\", \"value\": \"\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eThe Campbell Scientific CSI Web Server stores web authentication credentials in a file with a specific file name. Passwords within that file are stored in a weakly encoded format. There is no known way to remotely access the file unless it has been manually renamed. However, if an attacker were to gain access to the file, passwords could be decoded and reused to gain access.\u003c/span\u003e\"}], \"value\": \"The Campbell Scientific CSI Web Server stores web authentication credentials in a file with a specific file name. Passwords within that file are stored in a weakly encoded format. There is no known way to remotely access the file unless it has been manually renamed. However, if an attacker were to gain access to the file, passwords could be decoded and reused to gain access.\"}], \"metrics\": [{\"cvssV4_0\": {\"Automatable\": \"NOT_DEFINED\", \"Recovery\": \"NOT_DEFINED\", \"Safety\": \"NOT_DEFINED\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"attackVector\": \"ADJACENT\", \"baseScore\": 6.9, \"baseSeverity\": \"MEDIUM\", \"privilegesRequired\": \"LOW\", \"providerUrgency\": \"NOT_DEFINED\", \"subAvailabilityImpact\": \"NONE\", \"subConfidentialityImpact\": \"NONE\", \"subIntegrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"valueDensity\": \"NOT_DEFINED\", \"vectorString\": \"CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N\", \"version\": \"4.0\", \"vulnAvailabilityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"HIGH\", \"vulnIntegrityImpact\": \"NONE\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\"}, \"format\": \"CVSS\", \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"problemTypes\": [{\"descriptions\": [{\"cweId\": \"CWE-261\", \"description\": \"CWE-261 Weak Encoding for Password\", \"lang\": \"en\", \"type\": \"CWE\"}]}], \"providerMetadata\": {\"orgId\": \"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6\", \"shortName\": \"icscert\", \"dateUpdated\": \"2024-05-28T18:43:07.150Z\"}, \"references\": [{\"tags\": [\"government-resource\"], \"url\": \"https://www.cisa.gov/news-events/ics-advisories/icsa-24-149-01\"}], \"solutions\": [{\"lang\": \"en\", \"supportingMedia\": [{\"base64\": false, \"type\": \"text/html\", \"value\": \"\u003cp\u003eCampbell Scientific recommends users to update to the version.\u003cbr\u003eFor user of CSI Web Server update to the most recent \u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://www.campbellsci.com/downloads/csi-web-server-patch\\\"\u003eCSI Web Server 1.x patch\u003c/a\u003e\u003c/p\u003e\u003cp\u003eFor users of RTMC Pro 5 update to the most recent \u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://www.campbellsci.com/downloads/rtmc-pro-5-patch\\\"\u003eRTMC Pro 5.x patch\u003c/a\u003e\u003c/p\u003e\u003cp\u003eFor users of RTMC Pro 4 update to the most recent \u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://www.campbellsci.com/downloads/rtmc-pro-patch\\\"\u003eRTMC Pro 4.x patch\u003c/a\u003e.\u003c/p\u003e\u003cp\u003eContact \u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://www.campbellsci.com/contact\\\"\u003eCampbell Scientific\u003c/a\u003e\u0026nbsp;for more details.\u003c/p\u003e\"}], \"value\": \"Campbell Scientific recommends users to update to the version.\\nFor user of CSI Web Server update to the most recent  CSI Web Server 1.x patch https://www.campbellsci.com/downloads/csi-web-server-patch \\n\\nFor users of RTMC Pro 5 update to the most recent  RTMC Pro 5.x patch https://www.campbellsci.com/downloads/rtmc-pro-5-patch \\n\\nFor users of RTMC Pro 4 update to the most recent  RTMC Pro 4.x patch https://www.campbellsci.com/downloads/rtmc-pro-patch .\\n\\nContact  Campbell Scientific https://www.campbellsci.com/contact \\u00a0for more details.\"}], \"source\": {\"discovery\": \"UNKNOWN\"}, \"title\": \"Weak Encoding for Password vulnerability in Campbell Scientific CSI Web Server and RTMC\", \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}}, \"adp\": [{\"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-5434\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-05-28T20:02:29.975410Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:campbellsci:csi_web_server:1.6:*:*:*:*:*:*:*\"], \"vendor\": \"campbellsci\", \"product\": \"csi_web_server\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.6\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:campbellsci:rtmc:5.0:*:*:*:*:*:*:*\"], \"vendor\": \"campbellsci\", \"product\": \"rtmc\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.0\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-05-28T20:08:28.963Z\"}, \"title\": \"CISA ADP Vulnrichment\"}]}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-5434\", \"assignerOrgId\": \"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6\", \"state\": \"PUBLISHED\", \"assignerShortName\": \"icscert\", \"dateReserved\": \"2024-05-28T13:59:14.696Z\", \"datePublished\": \"2024-05-28T18:43:07.150Z\", \"dateUpdated\": \"2024-06-04T18:02:06.311Z\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…