mySCADA myPRO Manager
stores credentials in cleartext, which could allow an attacker to obtain sensitive information.
References
Link | Resource |
---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-16 | US Government Resource Third Party Advisory |
https://www.myscada.org/contacts/ | Product |
https://www.myscada.org/downloads/mySCADAPROManager/ | Product |
Configurations
History
04 Mar 2025, 20:59
Type | Values Removed | Values Added |
---|---|---|
First Time |
Myscada mypro
Myscada |
|
CPE | cpe:2.3:a:myscada:mypro:*:*:*:*:*:*:*:* | |
Summary |
|
|
References | () https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-16 - US Government Resource, Third Party Advisory | |
References | () https://www.myscada.org/contacts/ - Product | |
References | () https://www.myscada.org/downloads/mySCADAPROManager/ - Product |
13 Feb 2025, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-13 22:15
Updated : 2025-03-04 20:59
NVD link : CVE-2025-22896
Mitre link : CVE-2025-22896
CVE.ORG link : CVE-2025-22896
JSON object : View
Products Affected
myscada
- mypro
CWE
CWE-312
Cleartext Storage of Sensitive Information