Vulnerability Description
Use of hard-coded MSSQL credentials in PerkinElmer ProcessPlus on Windows allows an attacker to login remove on all prone installations.This issue affects ProcessPlus: through 1.11.6507.0.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Perkinelmer | Processplus | <= 1.11.6507.0 |
| Microsoft | Windows | - |
Related Weaknesses (CWE)
References
- http://seclists.org/fulldisclosure/2024/Jul/13ExploitMailing ListThird Party Advisory
- https://cyberdanube.com/en/en-multiple-vulnerabilities-in-perten-processplus/ExploitThird Party Advisory
- http://seclists.org/fulldisclosure/2024/Jul/13ExploitMailing ListThird Party Advisory
- https://cyberdanube.com/en/en-multiple-vulnerabilities-in-perten-processplus/ExploitThird Party Advisory
FAQ
What is CVE-2024-6912?
CVE-2024-6912 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Use of hard-coded MSSQL credentials in PerkinElmer ProcessPlus on Windows allows an attacker to login remove on all prone installations.This issue affects ProcessPlus: through 1.11.6507.0.
How severe is CVE-2024-6912?
CVE-2024-6912 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-6912?
Check the references section above for vendor advisories and patch information. Affected products include: Perkinelmer Processplus, Microsoft Windows.