First published: Mon Jul 22 2024(Updated: )
Use of hard-coded MSSQL credentials in PerkinElmer ProcessPlus on Windows allows an attacker to login remove on all prone installations.This issue affects ProcessPlus: through 1.11.6507.0.
Credit: office@cyberdanube.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
PerkinElmer ProcessPlus | <=1.11.6507.0 | |
Microsoft Windows Operating System |
Install the patched version 2.0.0.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6912 is classified as a high severity vulnerability due to hard-coded MSSQL credentials allowing unauthorized access.
To fix CVE-2024-6912, update PerkinElmer ProcessPlus to version 1.11.6508.0 or later.
CVE-2024-6912 affects all installations of PerkinElmer ProcessPlus up to version 1.11.6507.0 running on Microsoft Windows.
CVE-2024-6912 allows attackers to log in and potentially manipulate or remove data from vulnerable installations.
Yes, CVE-2024-6912 can be exploited remotely due to the use of hard-coded MSSQL credentials.