Successful exploitation of this vulnerability on Claroty Secure Remote Access (SRA) Site versions 3.0 through 3.2 allows an attacker with local command line interface access to gain the secret key, subsequently allowing them to generate valid session tokens for the web user interface (UI). With access to the web UI an attacker can access assets managed by the SRA installation and could compromise the installation.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-21-180-06 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: icscert
Published: 2022-05-23T19:34:55
Updated: 2024-08-03T23:33:56.077Z
Reserved: 2021-05-13T00:00:00
Link: CVE-2021-32958

No data.

Status : Modified
Published: 2022-05-23T20:16:40.753
Modified: 2024-11-21T06:08:00.390
Link: CVE-2021-32958

No data.