Advantech ADAM-5630 Plain Text Credential Leak CVE-2024-34542
CVE-2024-34542 Published on September 27, 2024

Advantech ADAM-5630 Weak Encoding for Password
Advantech ADAM-5630 shares user credentials plain text between the device and the user source device during the login process.

NVD

Vulnerability Analysis

Attack Vector:
ADJACENT_NETWORK
Attack Complexity:
LOW
Privileges Required:
NONE
User Interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality Impact:
HIGH
Integrity Impact:
NONE
Availability Impact:
NONE

Weakness Type

Weak Encoding for Password

Obscuring a password with a trivial encoding does not protect the password. Password management issues occur when a password is stored in plaintext in an application's properties or configuration file. A programmer can attempt to remedy the password management problem by obscuring the password with an encoding function, such as base 64 encoding, but this effort does not adequately protect the password.


Products Associated with CVE-2024-34542

Want to know whenever a new CVE is published for Advantech Adam 5630 Firmware? stack.watch will email you.

 

Affected Versions

Advantech ADAM-5630:

Exploit Probability

EPSS
0.09%
Percentile
24.80%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.