First published: Wed Nov 03 2021(Updated: )
Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to cross-site scripting because an authenticated attacker can inject arbitrary JavaScript code into the parameter comment of the API events, which may allow an attacker to remotely execute code.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Deltaww Dialink | <=1.2.4.0 | |
Delta Electronics DIALink | <=1.2.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-38488 is medium with a CVSS score of 4.8.
CVE-2021-38488 allows an authenticated attacker to inject arbitrary JavaScript code into the parameter comment of the API events, potentially leading to remote code execution.
An attacker can exploit CVE-2021-38488 by injecting malicious JavaScript code into the parameter comment of the API events, targeting vulnerable instances of Delta Electronics DIALink.
At the moment, there is no fix available for CVE-2021-38488. It is recommended to implement mitigations suggested by the vendor or follow the guidance provided by Delta Electronics.
You can find more information about CVE-2021-38488 on the official US-CERT website at the following URL: https://us-cert.cisa.gov/ics/advisories/icsa-21-294-02