First published: Fri Oct 22 2021(Updated: )
The affected product is vulnerable to improper input validation in the restore file. This enables an attacker to provide malicious config files to replace any file on disk.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Emerson Wireless 1410 Gateway Firmware | <4.7.94 | |
Emerson Wireless 1410 Gateway | ||
Emerson Wireless 1410d Gateway Firmware | <4.7.94 | |
Emerson Wireless 1410d Gateway | ||
Emerson Wireless 1420 Gateway Firmware | <4.7.94 | |
Emerson Wireless 1420 Gateway | ||
Emerson WirelessHART 1410 Gateway | <4.7.94 | 4.7.94 |
Emerson WirelessHART 1410D Gateway | <4.7.94 | 4.7.94 |
Emerson WirelessHART 1420 Gateway | <4.7.94 | 4.7.94 |
Emerson recommends upgrading to v4.7.105 to address these vulnerabilities. Users can visit the Emerson Gate Firmware site for and download instructions. If affected users do not yet have a free Guardian account, please see the updated Emerson Gateway Firmware download process by following the link above and viewing the download guide.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-38485.
The severity of CVE-2021-38485 is high, with a severity value of 8.8.
The affected software versions are Emerson Wireless 1410 Gateway Firmware up to version 4.7.94 and Emerson Wireless 1410d Gateway Firmware up to version 4.7.94.
CVE-2021-38485 allows an attacker to provide malicious config files to replace any file on disk.
Yes, you can find more information about CVE-2021-38485 at https://us-cert.cisa.gov/ics/advisories/icsa-21-278-02.