Learn about CVE-2021-32942, a vulnerability in AVEVA InTouch that exposes cleartext credentials from InTouch Runtime 2020 R2 and earlier versions. Find out the impact, affected systems, and mitigation steps.
CVE-2021-32942, a vulnerability found in AVEVA InTouch, could lead to exposure of cleartext credentials from InTouch Runtime 2020 R2 and earlier versions. This article delves into the details of the CVE, its impact, technical aspects, and mitigation strategies.
Understanding CVE-2021-32942
This section provides insights into the nature and implications of the CVE-2021-32942 vulnerability.
What is CVE-2021-32942?
The vulnerability could potentially expose cleartext credentials from AVEVA InTouch Runtime 2020 R2 and all previous versions, also known as WindowViewer. This occurs when an authorized privileged user generates a diagnostic memory dump of the process and saves it to an unprotected location.
The Impact of CVE-2021-32942
With a base score of 6.6, classified as medium severity, the vulnerability poses a high risk to confidentiality and integrity. Users must take immediate action to secure affected systems.
Technical Details of CVE-2021-32942
This section delves into the specifics of the vulnerability, including its description, affected systems, versions, and exploitation mechanisms.
Vulnerability Description
The vulnerability arises due to cleartext storage of sensitive information in memory, as defined by CWE-316. This weakness exposes critical data to unauthorized access.
Affected Systems and Versions
InTouch, specifically version 2020 R2 and earlier, is susceptible to this vulnerability. Organizations using these versions are at risk and need to apply security updates promptly.
Exploitation Mechanism
The exploitation requires an authorized, privileged user to create a diagnostic memory dump of the process, leading to exposure of sensitive credentials.
Mitigation and Prevention
This section outlines the necessary steps to mitigate the risks posed by CVE-2021-32942 and prevent potential exploitation.
Immediate Steps to Take
Organizations must prioritize upgrading affected versions to the recommended patches to eliminate the vulnerability's exploitation risk.
Long-Term Security Practices
Implementing robust data protection policies, access controls, and regular security audits can enhance the overall security posture.
Patching and Updates
AVEVA recommends upgrading InTouch 2020 R2 to the latest patches, including updates like InTouch 2020 R2 P01 and other relevant security updates.