Successful exploitation of this vulnerability on Claroty Secure Remote Access (SRA) Site versions 3.0 through 3.2 allows an attacker with local command line interface access to gain the secret key, subsequently allowing them to generate valid session tokens for the web user interface (UI). With access to the web UI an attacker can access assets managed by the SRA installation and could compromise the installation.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://www.cisa.gov/uscert/ics/advisories/icsa-21-180-06 |
|
History
Wed, 16 Apr 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: icscert
Published: 2022-05-23T19:34:55.000Z
Updated: 2025-04-16T16:19:02.719Z
Reserved: 2021-05-13T00:00:00.000Z
Link: CVE-2021-32958
Updated: 2024-08-03T23:33:56.077Z
Status : Modified
Published: 2022-05-23T20:16:40.753
Modified: 2024-11-21T06:08:00.390
Link: CVE-2021-32958
No data.