Just a sample of the Echomail archive
Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.
|    MOSCOWTIMES    |    News from the land of vodka and Tetris    |    2,977 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 109 of 2,977    |
|    Sean Rima to All    |
|    Schneider Electric Wiser Home Controller    |
|    22 Apr 25 17:30:14    |
      MSGID: 2:263/1.0 5b6f45fb       TZUTC: 0100       CHRS: CP850 2       Schneider Electric Wiser Home Controller WHC-5918A              
2. RISK EVALUATION       Successful exploitation of this vulnerability could allow an attacker to       disclose sensitive credentials.        3. TECHNICAL DETAILS       3.1 AFFECTED PRODUCTS       Schneider Electric reports the following products are affected:        
3.2 VULNERABILITY OVERVIEW       3.2.1 EXPOSURE OF SENSITIVE INFORMATION TO AN       UNAUTHORIZED ACTOR CWE-200       An information exposure vulnerability exists that could cause disclosure of       credentials when a specially crafted message is sent to the device.        CVE-2024-6407 has been assigned to this vulnerability. A       CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H       ).        A CVSS v4 score has also been calculated for CVE-2024-6407. A base score of 9.3 has been calculated;       the CVSS vector string is (CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N       ).        3.3 BACKGROUND       
3.4 RESEARCHER       Schneider Electric reported this vulnerability to CISA.        4. MITIGATIONS       Schneider Electric reports the Wiser Home Controller WHC-5918A product has       been discontinued and is out of support. Users should consider upgrading to       the latest product offering, C-Bus, Home Controller, SpaceLogic IP, Free       Standing, 24V DC, 5200WHC2, or removing the Wiser Home Controller WHC-5918A       from service.        CISA recommends users take defensive measures to minimize the risk of       exploitation of this vulnerability, such as:        
CISA reminds organizations to perform proper impact analysis and risk       assessment prior to deploying defensive measures.        CISA also provides a section for control systems       security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense       best practices are available for reading and download, including Improving Industrial       Control Systems Cybersecurity with Defense-in-Depth Strategies.        CISA encourages organizations to implement recommended cybersecurity       strategies for proactive defense of ICS assets.        Additional mitigation guidance and recommended practices are publicly       available on the ICS webpage at cisa.gov in the technical information       paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and       Mitigation Strategies.        Organizations observing suspected malicious activity should follow       established internal procedures and report findings to CISA for tracking and       correlation against other incidents.        CISA also recommends users take the following measures to protect themselves       from social engineering attacks:        
No known public exploitation specifically targeting this vulnerability has       been reported to CISA at this time.        5. UPDATE HISTORY       
|
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca