Successful exploitation of this vulnerability on Claroty Secure Remote Access (SRA) Site versions 3.0 through 3.2 allows an attacker with local command line interface access to gain the secret key, subsequently allowing them to generate valid session tokens for the web user interface (UI). With access to the web UI an attacker can access assets managed by the SRA installation and could compromise the installation.
References
Link | Resource |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-21-180-06 | Third Party Advisory US Government Resource |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: icscert
Published: 2022-05-23T19:34:55
Updated: 2022-05-23T19:34:55
Reserved: 2021-05-13T00:00:00
Link: CVE-2021-32958
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-05-23T20:16:40.753
Modified: 2022-06-07T02:49:01.707
Link: CVE-2021-32958
JSON object: View
Redhat Information
No data.