First published: Tue Oct 05 2021(Updated: )
The affected product is vulnerable to directory traversal due to mishandling of provided backup folder structure.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Emerson Wireless 1410 Gateway Firmware | <4.7.94 | |
Emerson Wireless 1410 Gateway | ||
Emerson Wireless 1410d Gateway Firmware | <4.7.94 | |
Emerson Wireless 1410d Gateway | ||
Emerson Wireless 1420 Gateway Firmware | <4.7.94 | |
Emerson Wireless 1420 Gateway | ||
Emerson WirelessHART 1410 Gateway | <4.7.94 | 4.7.94 |
Emerson WirelessHART 1410D Gateway | <4.7.94 | 4.7.94 |
Emerson WirelessHART 1420 Gateway | <4.7.94 | 4.7.94 |
Emerson recommends upgrading to v4.7.105 to address these vulnerabilities. Users can visit the Emerson Gate Firmware site for and download instructions. If affected users do not yet have a free Guardian account, please see the updated Emerson Gateway Firmware download process by following the link above and viewing the download guide.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-42542 is high with a severity value of 8.8.
The affected products are Emerson Wireless 1410 Gateway Firmware (up to exclusive version 4.7.94) and Emerson Wireless 1410d Gateway Firmware (up to exclusive version 4.7.94).
The vulnerability in CVE-2021-42542 is directory traversal due to mishandling of provided backup folder structure.
Apply the latest firmware update from Emerson to fix CVE-2021-42542.
You can find more information about CVE-2021-42542 in the advisory provided by the US-CERT.