Advantech ADAM-5630 Plain Text Credential Leak CVE-2024-34542
CVE-2024-34542 Published on September 27, 2024
Advantech ADAM-5630 Weak Encoding for Password
Advantech ADAM-5630 shares user credentials plain text between the device and the user source device during the login process.
Vulnerability Analysis
Weakness Type
Weak Encoding for Password
Obscuring a password with a trivial encoding does not protect the password. Password management issues occur when a password is stored in plaintext in an application's properties or configuration file. A programmer can attempt to remedy the password management problem by obscuring the password with an encoding function, such as base 64 encoding, but this effort does not adequately protect the password.
Products Associated with CVE-2024-34542
Want to know whenever a new CVE is published for Advantech Adam 5630 Firmware? stack.watch will email you.
Affected Versions
Advantech ADAM-5630:- Before v2.5.2 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.