mySCADA myPRO Manager
stores credentials in cleartext, which could allow an attacker to obtain sensitive information.
References
| Link | Resource |
|---|---|
| https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-16 | US Government Resource Third Party Advisory |
| https://www.myscada.org/contacts/ | Product |
| https://www.myscada.org/downloads/mySCADAPROManager/ | Product |
Configurations
History
04 Mar 2025, 20:59
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-16 - US Government Resource, Third Party Advisory | |
| References | () https://www.myscada.org/contacts/ - Product | |
| References | () https://www.myscada.org/downloads/mySCADAPROManager/ - Product | |
| First Time |
Myscada mypro
Myscada |
|
| Summary |
|
|
| CPE | cpe:2.3:a:myscada:mypro:*:*:*:*:*:*:*:* |
13 Feb 2025, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-02-13 22:15
Updated : 2025-03-04 20:59
NVD link : CVE-2025-22896
Mitre link : CVE-2025-22896
CVE.ORG link : CVE-2025-22896
JSON object : View
Products Affected
myscada
- mypro
CWE
CWE-312
Cleartext Storage of Sensitive Information
