Search criteria
9 vulnerabilities found for infoscan by dorsettcontrols
FKIE_CVE-2024-42493
Vulnerability from fkie_nvd - Published: 2024-08-08 18:15 - Updated: 2024-08-29 14:24
Severity ?
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Summary
Dorsett Controls InfoScan is vulnerable due to a leak of possible
sensitive information through the response headers and the rendered
JavaScript prior to user login.
References
| URL | Tags | ||
|---|---|---|---|
| ics-cert@hq.dhs.gov | https://portal.dtscada.com/#/security-bulletins?bulletin=1 | Vendor Advisory | |
| ics-cert@hq.dhs.gov | https://www.cisa.gov/news-events/ics-advisories/icsa-24-221-01 | Third Party Advisory, US Government Resource |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| dorsettcontrols | infoscan | 1.32 | |
| dorsettcontrols | infoscan | 1.33 | |
| dorsettcontrols | infoscan | 1.35 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dorsettcontrols:infoscan:1.32:*:*:*:*:*:*:*",
"matchCriteriaId": "4FF3B241-1366-47A3-BC0A-97E31842C45C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dorsettcontrols:infoscan:1.33:*:*:*:*:*:*:*",
"matchCriteriaId": "8E5DD992-67F9-49EF-BDFB-7D3A7A2664CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dorsettcontrols:infoscan:1.35:*:*:*:*:*:*:*",
"matchCriteriaId": "9A2B7D5A-0830-47F8-9DD9-2F53B52FBCFF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dorsett Controls InfoScan is vulnerable due to a leak of possible \nsensitive information through the response headers and the rendered \nJavaScript prior to user login."
},
{
"lang": "es",
"value": "Dorsett Controls InfoScan es vulnerable debido a una filtraci\u00f3n de posible informaci\u00f3n confidencial a trav\u00e9s de los encabezados de respuesta y el JavaScript renderizado antes del inicio de sesi\u00f3n del usuario."
}
],
"id": "CVE-2024-42493",
"lastModified": "2024-08-29T14:24:14.373",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary"
}
]
},
"published": "2024-08-08T18:15:11.207",
"references": [
{
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Vendor Advisory"
],
"url": "https://portal.dtscada.com/#/security-bulletins?bulletin=1"
},
{
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-221-01"
}
],
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2024-42408
Vulnerability from fkie_nvd - Published: 2024-08-08 18:15 - Updated: 2024-08-29 14:22
Severity ?
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
3.7 (Low) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
3.7 (Low) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Summary
The InfoScan client download page can be intercepted with a proxy, to
expose filenames located on the system, which could lead to additional
information exposure.
References
| URL | Tags | ||
|---|---|---|---|
| ics-cert@hq.dhs.gov | https://portal.dtscada.com/#/security-bulletins?bulletin=1 | Vendor Advisory | |
| ics-cert@hq.dhs.gov | https://www.cisa.gov/news-events/ics-advisories/icsa-24-221-01 | Third Party Advisory, US Government Resource |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| dorsettcontrols | infoscan | 1.32 | |
| dorsettcontrols | infoscan | 1.33 | |
| dorsettcontrols | infoscan | 1.35 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dorsettcontrols:infoscan:1.32:*:*:*:*:*:*:*",
"matchCriteriaId": "4FF3B241-1366-47A3-BC0A-97E31842C45C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dorsettcontrols:infoscan:1.33:*:*:*:*:*:*:*",
"matchCriteriaId": "8E5DD992-67F9-49EF-BDFB-7D3A7A2664CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dorsettcontrols:infoscan:1.35:*:*:*:*:*:*:*",
"matchCriteriaId": "9A2B7D5A-0830-47F8-9DD9-2F53B52FBCFF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The InfoScan client download page can be intercepted with a proxy, to \nexpose filenames located on the system, which could lead to additional \ninformation exposure."
},
{
"lang": "es",
"value": "La p\u00e1gina de descarga del cliente InfoScan se puede interceptar con un proxy para exponer los nombres de archivos ubicados en el sistema, lo que podr\u00eda provocar la exposici\u00f3n de informaci\u00f3n adicional."
}
],
"id": "CVE-2024-42408",
"lastModified": "2024-08-29T14:22:45.603",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary"
}
]
},
"published": "2024-08-08T18:15:10.953",
"references": [
{
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Vendor Advisory"
],
"url": "https://portal.dtscada.com/#/security-bulletins?bulletin=1"
},
{
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-221-01"
}
],
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
],
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary"
}
]
}
FKIE_CVE-2024-39287
Vulnerability from fkie_nvd - Published: 2024-08-08 18:15 - Updated: 2024-08-29 14:23
Severity ?
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
Dorsett Controls Central Server update server has potential information
leaks with an unprotected file that contains passwords and API keys.
References
| URL | Tags | ||
|---|---|---|---|
| ics-cert@hq.dhs.gov | https://portal.dtscada.com/#/security-bulletins?bulletin=1 | Vendor Advisory | |
| ics-cert@hq.dhs.gov | https://www.cisa.gov/news-events/ics-advisories/icsa-24-221-01 | Third Party Advisory, US Government Resource |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| dorsettcontrols | infoscan | 1.32 | |
| dorsettcontrols | infoscan | 1.33 | |
| dorsettcontrols | infoscan | 1.35 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dorsettcontrols:infoscan:1.32:*:*:*:*:*:*:*",
"matchCriteriaId": "4FF3B241-1366-47A3-BC0A-97E31842C45C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dorsettcontrols:infoscan:1.33:*:*:*:*:*:*:*",
"matchCriteriaId": "8E5DD992-67F9-49EF-BDFB-7D3A7A2664CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:dorsettcontrols:infoscan:1.35:*:*:*:*:*:*:*",
"matchCriteriaId": "9A2B7D5A-0830-47F8-9DD9-2F53B52FBCFF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dorsett Controls Central Server update server has potential information \nleaks with an unprotected file that contains passwords and API keys."
},
{
"lang": "es",
"value": "El servidor de actualizaci\u00f3n de Dorsett Controls Central Server tiene posibles fugas de informaci\u00f3n con un archivo desprotegido que contiene contrase\u00f1as y claves API."
}
],
"id": "CVE-2024-39287",
"lastModified": "2024-08-29T14:23:31.807",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary"
}
]
},
"published": "2024-08-08T18:15:10.380",
"references": [
{
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Vendor Advisory"
],
"url": "https://portal.dtscada.com/#/security-bulletins?bulletin=1"
},
{
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-221-01"
}
],
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2024-42408 (GCVE-0-2024-42408)
Vulnerability from cvelistv5 – Published: 2024-08-08 17:27 – Updated: 2024-08-09 15:02
VLAI?
Title
Dorsett Controls InfoScan Path Traversal
Summary
The InfoScan client download page can be intercepted with a proxy, to
expose filenames located on the system, which could lead to additional
information exposure.
Severity ?
5.3 (Medium)
CWE
- CWE-22 - Path Traversal
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dorsett Controls | InfoScan |
Affected:
v1.32
Affected: v1.33 Affected: v1.35 |
Credits
An anonymous researcher reported these vulnerabilities to CISA.
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:dorsettcontrols:infoscan:1.32:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "infoscan",
"vendor": "dorsettcontrols",
"versions": [
{
"status": "affected",
"version": "1.32"
}
]
},
{
"cpes": [
"cpe:2.3:a:dorsettcontrols:infoscan:1.33:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "infoscan",
"vendor": "dorsettcontrols",
"versions": [
{
"status": "affected",
"version": "1.33"
}
]
},
{
"cpes": [
"cpe:2.3:a:dorsettcontrols:infoscan:1.35:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "infoscan",
"vendor": "dorsettcontrols",
"versions": [
{
"status": "affected",
"version": "1.35"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-42408",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-09T15:00:55.707040Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-09T15:02:38.084Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "InfoScan",
"vendor": "Dorsett Controls",
"versions": [
{
"status": "affected",
"version": "v1.32"
},
{
"status": "affected",
"version": "v1.33"
},
{
"status": "affected",
"version": "v1.35"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "An anonymous researcher reported these vulnerabilities to CISA."
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "The InfoScan client download page can be intercepted with a proxy, to \nexpose filenames located on the system, which could lead to additional \ninformation exposure."
}
],
"value": "The InfoScan client download page can be intercepted with a proxy, to \nexpose filenames located on the system, which could lead to additional \ninformation exposure."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-22",
"description": "CWE-22 Path Traversal",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-08T17:27:17.383Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-221-01"
},
{
"url": "https://portal.dtscada.com/#/security-bulletins?bulletin=1"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eDorsett Controls recommends users update their InfoScan system v1.38 or later.\u003c/p\u003e\n\u003cp\u003eTo install the new release, user administrators will need to:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003elogin to InfoScan and select \"System Prefs\" from the menu.\u003c/li\u003e\n\u003cli\u003eOnce the System Prefs application is open, select Maintenance.\u003c/li\u003e\n\u003cli\u003eClick the Install Now button in the Ready To Install section.\u003c/li\u003e\n\u003cli\u003eIf no internet access available, the update will need to be \ndownloaded from the Dorsett Controls Customer Portal by selecting the \nInfoScan Update tile. Download the update and following the instructions\n listed on the portal.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eFor more information, please refer to the \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://portal.dtscada.com/#/security-bulletins?bulletin=1\"\u003eDorsett Controls security bulletin\u003c/a\u003e for more information.\n\n\u003c/p\u003e"
}
],
"value": "Dorsett Controls recommends users update their InfoScan system v1.38 or later.\n\n\nTo install the new release, user administrators will need to:\n\n\n\n * login to InfoScan and select \"System Prefs\" from the menu.\n\n * Once the System Prefs application is open, select Maintenance.\n\n * Click the Install Now button in the Ready To Install section.\n\n * If no internet access available, the update will need to be \ndownloaded from the Dorsett Controls Customer Portal by selecting the \nInfoScan Update tile. Download the update and following the instructions\n listed on the portal.\n\n\n\n\nFor more information, please refer to the Dorsett Controls security bulletin https://portal.dtscada.com/#/security-bulletins for more information."
}
],
"source": {
"advisory": "ICSA-24-221-01",
"discovery": "EXTERNAL"
},
"title": "Dorsett Controls InfoScan Path Traversal",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2024-42408",
"datePublished": "2024-08-08T17:27:17.383Z",
"dateReserved": "2024-08-05T16:34:29.403Z",
"dateUpdated": "2024-08-09T15:02:38.084Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-39287 (GCVE-0-2024-39287)
Vulnerability from cvelistv5 – Published: 2024-08-08 17:25 – Updated: 2024-08-08 18:08
VLAI?
Title
Dorsett Controls InfoScan Exposure of Sensitive Information To An Unauthorized Actor
Summary
Dorsett Controls Central Server update server has potential information
leaks with an unprotected file that contains passwords and API keys.
Severity ?
5.3 (Medium)
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dorsett Controls | InfoScan |
Affected:
v1.32
Affected: v1.33 Affected: v1.35 |
Credits
An anonymous researcher reported these vulnerabilities to CISA.
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:dorsettcontrols:infoscan:1.32:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "infoscan",
"vendor": "dorsettcontrols",
"versions": [
{
"status": "affected",
"version": "1.32"
}
]
},
{
"cpes": [
"cpe:2.3:a:dorsettcontrols:infoscan:1.33:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "infoscan",
"vendor": "dorsettcontrols",
"versions": [
{
"status": "affected",
"version": "1.33"
}
]
},
{
"cpes": [
"cpe:2.3:a:dorsettcontrols:infoscan:1.35:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "infoscan",
"vendor": "dorsettcontrols",
"versions": [
{
"status": "affected",
"version": "1.35"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-39287",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-08T18:01:41.408257Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-08T18:08:03.552Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "InfoScan",
"vendor": "Dorsett Controls",
"versions": [
{
"status": "affected",
"version": "v1.32"
},
{
"status": "affected",
"version": "v1.33"
},
{
"status": "affected",
"version": "v1.35"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "An anonymous researcher reported these vulnerabilities to CISA."
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dorsett Controls Central Server update server has potential information \nleaks with an unprotected file that contains passwords and API keys."
}
],
"value": "Dorsett Controls Central Server update server has potential information \nleaks with an unprotected file that contains passwords and API keys."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-200",
"description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-08T17:25:04.027Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-221-01"
},
{
"url": "https://portal.dtscada.com/#/security-bulletins?bulletin=1"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eDorsett Controls recommends users update their InfoScan system v1.38 or later.\u003c/p\u003e\n\u003cp\u003eTo install the new release, user administrators will need to:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003elogin to InfoScan and select \"System Prefs\" from the menu.\u003c/li\u003e\n\u003cli\u003eOnce the System Prefs application is open, select Maintenance.\u003c/li\u003e\n\u003cli\u003eClick the Install Now button in the Ready To Install section.\u003c/li\u003e\n\u003cli\u003eIf no internet access available, the update will need to be \ndownloaded from the Dorsett Controls Customer Portal by selecting the \nInfoScan Update tile. Download the update and following the instructions\n listed on the portal.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eFor more information, please refer to the \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://portal.dtscada.com/#/security-bulletins?bulletin=1\"\u003eDorsett Controls security bulletin\u003c/a\u003e for more information.\n\n\u003c/p\u003e"
}
],
"value": "Dorsett Controls recommends users update their InfoScan system v1.38 or later.\n\n\nTo install the new release, user administrators will need to:\n\n\n\n * login to InfoScan and select \"System Prefs\" from the menu.\n\n * Once the System Prefs application is open, select Maintenance.\n\n * Click the Install Now button in the Ready To Install section.\n\n * If no internet access available, the update will need to be \ndownloaded from the Dorsett Controls Customer Portal by selecting the \nInfoScan Update tile. Download the update and following the instructions\n listed on the portal.\n\n\n\n\nFor more information, please refer to the Dorsett Controls security bulletin https://portal.dtscada.com/#/security-bulletins for more information."
}
],
"source": {
"advisory": "ICSA-24-221-01",
"discovery": "EXTERNAL"
},
"title": "Dorsett Controls InfoScan Exposure of Sensitive Information To An Unauthorized Actor",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2024-39287",
"datePublished": "2024-08-08T17:25:04.027Z",
"dateReserved": "2024-08-05T16:34:29.408Z",
"dateUpdated": "2024-08-08T18:08:03.552Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-42493 (GCVE-0-2024-42493)
Vulnerability from cvelistv5 – Published: 2024-08-08 17:23 – Updated: 2024-08-09 15:04
VLAI?
Title
Dorsett Controls InfoScan Exposure of Sensitive Information To An Unauthorized Actor
Summary
Dorsett Controls InfoScan is vulnerable due to a leak of possible
sensitive information through the response headers and the rendered
JavaScript prior to user login.
Severity ?
5.3 (Medium)
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dorsett Controls | InfoScan |
Affected:
v1.32
Affected: v1.33 Affected: v1.35 |
Credits
An anonymous researcher reported these vulnerabilities to CISA.
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:dorsettcontrols:infoscan:1.32:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "infoscan",
"vendor": "dorsettcontrols",
"versions": [
{
"status": "affected",
"version": "1.32"
}
]
},
{
"cpes": [
"cpe:2.3:a:dorsettcontrols:infoscan:1.33:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "infoscan",
"vendor": "dorsettcontrols",
"versions": [
{
"status": "affected",
"version": "1.33"
}
]
},
{
"cpes": [
"cpe:2.3:a:dorsettcontrols:infoscan:1.35:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "infoscan",
"vendor": "dorsettcontrols",
"versions": [
{
"status": "affected",
"version": "1.35"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-42493",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-09T15:04:14.769994Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-09T15:04:20.077Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "InfoScan",
"vendor": "Dorsett Controls",
"versions": [
{
"status": "affected",
"version": "v1.32"
},
{
"status": "affected",
"version": "v1.33"
},
{
"status": "affected",
"version": "v1.35"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "An anonymous researcher reported these vulnerabilities to CISA."
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dorsett Controls InfoScan is vulnerable due to a leak of possible \nsensitive information through the response headers and the rendered \nJavaScript prior to user login."
}
],
"value": "Dorsett Controls InfoScan is vulnerable due to a leak of possible \nsensitive information through the response headers and the rendered \nJavaScript prior to user login."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-200",
"description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-08T17:23:04.770Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-221-01"
},
{
"url": "https://portal.dtscada.com/#/security-bulletins?bulletin=1"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eDorsett Controls recommends users update their InfoScan system v1.38 or later.\u003c/p\u003e\n\u003cp\u003eTo install the new release, user administrators will need to:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003elogin to InfoScan and select \"System Prefs\" from the menu.\u003c/li\u003e\n\u003cli\u003eOnce the System Prefs application is open, select Maintenance.\u003c/li\u003e\n\u003cli\u003eClick the Install Now button in the Ready To Install section.\u003c/li\u003e\n\u003cli\u003eIf no internet access available, the update will need to be \ndownloaded from the Dorsett Controls Customer Portal by selecting the \nInfoScan Update tile. Download the update and following the instructions\n listed on the portal.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eFor more information, please refer to the \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://portal.dtscada.com/#/security-bulletins?bulletin=1\"\u003eDorsett Controls security bulletin\u003c/a\u003e for more information.\n\n\u003c/p\u003e"
}
],
"value": "Dorsett Controls recommends users update their InfoScan system v1.38 or later.\n\n\nTo install the new release, user administrators will need to:\n\n\n\n * login to InfoScan and select \"System Prefs\" from the menu.\n\n * Once the System Prefs application is open, select Maintenance.\n\n * Click the Install Now button in the Ready To Install section.\n\n * If no internet access available, the update will need to be \ndownloaded from the Dorsett Controls Customer Portal by selecting the \nInfoScan Update tile. Download the update and following the instructions\n listed on the portal.\n\n\n\n\nFor more information, please refer to the Dorsett Controls security bulletin https://portal.dtscada.com/#/security-bulletins for more information."
}
],
"source": {
"advisory": "ICSA-24-221-01",
"discovery": "EXTERNAL"
},
"title": "Dorsett Controls InfoScan Exposure of Sensitive Information To An Unauthorized Actor",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2024-42493",
"datePublished": "2024-08-08T17:23:04.770Z",
"dateReserved": "2024-08-05T16:34:29.396Z",
"dateUpdated": "2024-08-09T15:04:20.077Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-42408 (GCVE-0-2024-42408)
Vulnerability from nvd – Published: 2024-08-08 17:27 – Updated: 2024-08-09 15:02
VLAI?
Title
Dorsett Controls InfoScan Path Traversal
Summary
The InfoScan client download page can be intercepted with a proxy, to
expose filenames located on the system, which could lead to additional
information exposure.
Severity ?
5.3 (Medium)
CWE
- CWE-22 - Path Traversal
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dorsett Controls | InfoScan |
Affected:
v1.32
Affected: v1.33 Affected: v1.35 |
Credits
An anonymous researcher reported these vulnerabilities to CISA.
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:dorsettcontrols:infoscan:1.32:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "infoscan",
"vendor": "dorsettcontrols",
"versions": [
{
"status": "affected",
"version": "1.32"
}
]
},
{
"cpes": [
"cpe:2.3:a:dorsettcontrols:infoscan:1.33:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "infoscan",
"vendor": "dorsettcontrols",
"versions": [
{
"status": "affected",
"version": "1.33"
}
]
},
{
"cpes": [
"cpe:2.3:a:dorsettcontrols:infoscan:1.35:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "infoscan",
"vendor": "dorsettcontrols",
"versions": [
{
"status": "affected",
"version": "1.35"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-42408",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-09T15:00:55.707040Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-09T15:02:38.084Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "InfoScan",
"vendor": "Dorsett Controls",
"versions": [
{
"status": "affected",
"version": "v1.32"
},
{
"status": "affected",
"version": "v1.33"
},
{
"status": "affected",
"version": "v1.35"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "An anonymous researcher reported these vulnerabilities to CISA."
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "The InfoScan client download page can be intercepted with a proxy, to \nexpose filenames located on the system, which could lead to additional \ninformation exposure."
}
],
"value": "The InfoScan client download page can be intercepted with a proxy, to \nexpose filenames located on the system, which could lead to additional \ninformation exposure."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-22",
"description": "CWE-22 Path Traversal",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-08T17:27:17.383Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-221-01"
},
{
"url": "https://portal.dtscada.com/#/security-bulletins?bulletin=1"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eDorsett Controls recommends users update their InfoScan system v1.38 or later.\u003c/p\u003e\n\u003cp\u003eTo install the new release, user administrators will need to:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003elogin to InfoScan and select \"System Prefs\" from the menu.\u003c/li\u003e\n\u003cli\u003eOnce the System Prefs application is open, select Maintenance.\u003c/li\u003e\n\u003cli\u003eClick the Install Now button in the Ready To Install section.\u003c/li\u003e\n\u003cli\u003eIf no internet access available, the update will need to be \ndownloaded from the Dorsett Controls Customer Portal by selecting the \nInfoScan Update tile. Download the update and following the instructions\n listed on the portal.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eFor more information, please refer to the \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://portal.dtscada.com/#/security-bulletins?bulletin=1\"\u003eDorsett Controls security bulletin\u003c/a\u003e for more information.\n\n\u003c/p\u003e"
}
],
"value": "Dorsett Controls recommends users update their InfoScan system v1.38 or later.\n\n\nTo install the new release, user administrators will need to:\n\n\n\n * login to InfoScan and select \"System Prefs\" from the menu.\n\n * Once the System Prefs application is open, select Maintenance.\n\n * Click the Install Now button in the Ready To Install section.\n\n * If no internet access available, the update will need to be \ndownloaded from the Dorsett Controls Customer Portal by selecting the \nInfoScan Update tile. Download the update and following the instructions\n listed on the portal.\n\n\n\n\nFor more information, please refer to the Dorsett Controls security bulletin https://portal.dtscada.com/#/security-bulletins for more information."
}
],
"source": {
"advisory": "ICSA-24-221-01",
"discovery": "EXTERNAL"
},
"title": "Dorsett Controls InfoScan Path Traversal",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2024-42408",
"datePublished": "2024-08-08T17:27:17.383Z",
"dateReserved": "2024-08-05T16:34:29.403Z",
"dateUpdated": "2024-08-09T15:02:38.084Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-39287 (GCVE-0-2024-39287)
Vulnerability from nvd – Published: 2024-08-08 17:25 – Updated: 2024-08-08 18:08
VLAI?
Title
Dorsett Controls InfoScan Exposure of Sensitive Information To An Unauthorized Actor
Summary
Dorsett Controls Central Server update server has potential information
leaks with an unprotected file that contains passwords and API keys.
Severity ?
5.3 (Medium)
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dorsett Controls | InfoScan |
Affected:
v1.32
Affected: v1.33 Affected: v1.35 |
Credits
An anonymous researcher reported these vulnerabilities to CISA.
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:dorsettcontrols:infoscan:1.32:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "infoscan",
"vendor": "dorsettcontrols",
"versions": [
{
"status": "affected",
"version": "1.32"
}
]
},
{
"cpes": [
"cpe:2.3:a:dorsettcontrols:infoscan:1.33:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "infoscan",
"vendor": "dorsettcontrols",
"versions": [
{
"status": "affected",
"version": "1.33"
}
]
},
{
"cpes": [
"cpe:2.3:a:dorsettcontrols:infoscan:1.35:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "infoscan",
"vendor": "dorsettcontrols",
"versions": [
{
"status": "affected",
"version": "1.35"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-39287",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-08T18:01:41.408257Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-08T18:08:03.552Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "InfoScan",
"vendor": "Dorsett Controls",
"versions": [
{
"status": "affected",
"version": "v1.32"
},
{
"status": "affected",
"version": "v1.33"
},
{
"status": "affected",
"version": "v1.35"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "An anonymous researcher reported these vulnerabilities to CISA."
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dorsett Controls Central Server update server has potential information \nleaks with an unprotected file that contains passwords and API keys."
}
],
"value": "Dorsett Controls Central Server update server has potential information \nleaks with an unprotected file that contains passwords and API keys."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-200",
"description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-08T17:25:04.027Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-221-01"
},
{
"url": "https://portal.dtscada.com/#/security-bulletins?bulletin=1"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eDorsett Controls recommends users update their InfoScan system v1.38 or later.\u003c/p\u003e\n\u003cp\u003eTo install the new release, user administrators will need to:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003elogin to InfoScan and select \"System Prefs\" from the menu.\u003c/li\u003e\n\u003cli\u003eOnce the System Prefs application is open, select Maintenance.\u003c/li\u003e\n\u003cli\u003eClick the Install Now button in the Ready To Install section.\u003c/li\u003e\n\u003cli\u003eIf no internet access available, the update will need to be \ndownloaded from the Dorsett Controls Customer Portal by selecting the \nInfoScan Update tile. Download the update and following the instructions\n listed on the portal.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eFor more information, please refer to the \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://portal.dtscada.com/#/security-bulletins?bulletin=1\"\u003eDorsett Controls security bulletin\u003c/a\u003e for more information.\n\n\u003c/p\u003e"
}
],
"value": "Dorsett Controls recommends users update their InfoScan system v1.38 or later.\n\n\nTo install the new release, user administrators will need to:\n\n\n\n * login to InfoScan and select \"System Prefs\" from the menu.\n\n * Once the System Prefs application is open, select Maintenance.\n\n * Click the Install Now button in the Ready To Install section.\n\n * If no internet access available, the update will need to be \ndownloaded from the Dorsett Controls Customer Portal by selecting the \nInfoScan Update tile. Download the update and following the instructions\n listed on the portal.\n\n\n\n\nFor more information, please refer to the Dorsett Controls security bulletin https://portal.dtscada.com/#/security-bulletins for more information."
}
],
"source": {
"advisory": "ICSA-24-221-01",
"discovery": "EXTERNAL"
},
"title": "Dorsett Controls InfoScan Exposure of Sensitive Information To An Unauthorized Actor",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2024-39287",
"datePublished": "2024-08-08T17:25:04.027Z",
"dateReserved": "2024-08-05T16:34:29.408Z",
"dateUpdated": "2024-08-08T18:08:03.552Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-42493 (GCVE-0-2024-42493)
Vulnerability from nvd – Published: 2024-08-08 17:23 – Updated: 2024-08-09 15:04
VLAI?
Title
Dorsett Controls InfoScan Exposure of Sensitive Information To An Unauthorized Actor
Summary
Dorsett Controls InfoScan is vulnerable due to a leak of possible
sensitive information through the response headers and the rendered
JavaScript prior to user login.
Severity ?
5.3 (Medium)
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Dorsett Controls | InfoScan |
Affected:
v1.32
Affected: v1.33 Affected: v1.35 |
Credits
An anonymous researcher reported these vulnerabilities to CISA.
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:dorsettcontrols:infoscan:1.32:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "infoscan",
"vendor": "dorsettcontrols",
"versions": [
{
"status": "affected",
"version": "1.32"
}
]
},
{
"cpes": [
"cpe:2.3:a:dorsettcontrols:infoscan:1.33:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "infoscan",
"vendor": "dorsettcontrols",
"versions": [
{
"status": "affected",
"version": "1.33"
}
]
},
{
"cpes": [
"cpe:2.3:a:dorsettcontrols:infoscan:1.35:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "infoscan",
"vendor": "dorsettcontrols",
"versions": [
{
"status": "affected",
"version": "1.35"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-42493",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-09T15:04:14.769994Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-09T15:04:20.077Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "InfoScan",
"vendor": "Dorsett Controls",
"versions": [
{
"status": "affected",
"version": "v1.32"
},
{
"status": "affected",
"version": "v1.33"
},
{
"status": "affected",
"version": "v1.35"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "An anonymous researcher reported these vulnerabilities to CISA."
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Dorsett Controls InfoScan is vulnerable due to a leak of possible \nsensitive information through the response headers and the rendered \nJavaScript prior to user login."
}
],
"value": "Dorsett Controls InfoScan is vulnerable due to a leak of possible \nsensitive information through the response headers and the rendered \nJavaScript prior to user login."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-200",
"description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-08T17:23:04.770Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-221-01"
},
{
"url": "https://portal.dtscada.com/#/security-bulletins?bulletin=1"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eDorsett Controls recommends users update their InfoScan system v1.38 or later.\u003c/p\u003e\n\u003cp\u003eTo install the new release, user administrators will need to:\u003c/p\u003e\n\u003cul\u003e\n\u003cli\u003elogin to InfoScan and select \"System Prefs\" from the menu.\u003c/li\u003e\n\u003cli\u003eOnce the System Prefs application is open, select Maintenance.\u003c/li\u003e\n\u003cli\u003eClick the Install Now button in the Ready To Install section.\u003c/li\u003e\n\u003cli\u003eIf no internet access available, the update will need to be \ndownloaded from the Dorsett Controls Customer Portal by selecting the \nInfoScan Update tile. Download the update and following the instructions\n listed on the portal.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eFor more information, please refer to the \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://portal.dtscada.com/#/security-bulletins?bulletin=1\"\u003eDorsett Controls security bulletin\u003c/a\u003e for more information.\n\n\u003c/p\u003e"
}
],
"value": "Dorsett Controls recommends users update their InfoScan system v1.38 or later.\n\n\nTo install the new release, user administrators will need to:\n\n\n\n * login to InfoScan and select \"System Prefs\" from the menu.\n\n * Once the System Prefs application is open, select Maintenance.\n\n * Click the Install Now button in the Ready To Install section.\n\n * If no internet access available, the update will need to be \ndownloaded from the Dorsett Controls Customer Portal by selecting the \nInfoScan Update tile. Download the update and following the instructions\n listed on the portal.\n\n\n\n\nFor more information, please refer to the Dorsett Controls security bulletin https://portal.dtscada.com/#/security-bulletins for more information."
}
],
"source": {
"advisory": "ICSA-24-221-01",
"discovery": "EXTERNAL"
},
"title": "Dorsett Controls InfoScan Exposure of Sensitive Information To An Unauthorized Actor",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2024-42493",
"datePublished": "2024-08-08T17:23:04.770Z",
"dateReserved": "2024-08-05T16:34:29.396Z",
"dateUpdated": "2024-08-09T15:04:20.077Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}