First published: Fri Sep 27 2024(Updated: )
Advantech ADAM-5630 shares user credentials plain text between the device and the user source device during the login process.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Advantech Adam-5630 Firmware | <2.5.2 | |
Advantech Adam-5630 Firmware |
Advantech recommends users upgrade their ADAM-5630 devices to version 2.5.2 https://www.advantech.com/zh-tw/support/details/firmware .
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-34542 is considered a high severity vulnerability due to the exposure of user credentials in plain text.
To fix CVE-2024-34542, update the Advantech ADAM-5630 firmware to the latest version beyond 2.5.2.
CVE-2024-34542 exposes user credentials, including usernames and passwords, in plain text during the login process.
CVE-2024-34542 affects users of the Advantech ADAM-5630 with versions of the firmware up to and including 2.5.2.
Yes, CVE-2024-34542 is an authentication vulnerability due to the insecure transmission of credentials.