The affected product allows attackers to obtain sensitive information from the WISE-PaaS dashboard. The system contains a hard-coded administrator username and password that can be used to query Grafana APIs. Authentication is not required for exploitation on the WISE-PaaS/RMM (versions prior to 9.0.1).
References
| Link | Resource |
|---|---|
| https://us-cert.cisa.gov/ics/advisories/icsa-21-124-01 | Third Party Advisory US Government Resource |
| https://us-cert.cisa.gov/ics/advisories/icsa-21-124-01 | Third Party Advisory US Government Resource |
Configurations
History
21 Nov 2024, 05:57
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://us-cert.cisa.gov/ics/advisories/icsa-21-124-01 - Third Party Advisory, US Government Resource |
19 May 2021, 18:59
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:advantech:wise-paas\/rmm:*:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : 6.4
v3 : 9.1 |
| References | (MISC) https://us-cert.cisa.gov/ics/advisories/icsa-21-124-01 - Third Party Advisory, US Government Resource |
Information
Published : 2021-05-07 15:15
Updated : 2024-11-21 05:57
NVD link : CVE-2021-27437
Mitre link : CVE-2021-27437
CVE.ORG link : CVE-2021-27437
JSON object : View
Products Affected
advantech
- wise-paas\/rmm
CWE
CWE-798
Use of Hard-coded Credentials
