Successful exploitation of this vulnerability on Claroty Secure Remote Access (SRA) Site versions 3.0 through 3.2 allows an attacker with local command line interface access to gain the secret key, subsequently allowing them to generate valid session tokens for the web user interface (UI). With access to the web UI an attacker can access assets managed by the SRA installation and could compromise the installation.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.cisa.gov/uscert/ics/advisories/icsa-21-180-06 |
![]() ![]() |
History
Wed, 16 Apr 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-04-16T16:19:02.719Z
Reserved: 2021-05-13T00:00:00.000Z
Link: CVE-2021-32958

Updated: 2024-08-03T23:33:56.077Z

Status : Modified
Published: 2022-05-23T20:16:40.753
Modified: 2024-11-21T06:08:00.390
Link: CVE-2021-32958

No data.