Lucene search

K
vulnrichmentCyberDanubeVULNRICHMENT:CVE-2024-6912
HistoryJul 22, 2024 - 8:51 p.m.

CVE-2024-6912 Hardcoded MSSQL Credentials

2024-07-2220:51:15
CWE-798
CyberDanube
github.com
4
cve-2024-6912; hardcoded mssql credentials; perkinelmer processplus; windows; security issue; installation vulnerability; login removal; 1.11.6507.0

CVSS4

9.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/SC:N/VI:H/SI:N/VA:H/SA:N

AI Score

7

Confidence

High

EPSS

0.001

Percentile

50.3%

SSVC

Exploitation

poc

Automatable

yes

Technical Impact

total

Use of hard-coded MSSQL credentials in PerkinElmer ProcessPlus on Windows allows an attacker to login remove on all prone installations.This issue affects ProcessPlus: through 1.11.6507.0.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:perkin_elmer:process_plus:*:*:*:*:*:*:*:*"
    ],
    "vendor": "perkin_elmer",
    "product": "process_plus",
    "versions": [
      {
        "status": "affected",
        "version": "0",
        "versionType": "custom",
        "lessThanOrEqual": "1.11.6507.0"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS4

9.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/SC:N/VI:H/SI:N/VA:H/SA:N

AI Score

7

Confidence

High

EPSS

0.001

Percentile

50.3%

SSVC

Exploitation

poc

Automatable

yes

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-6912