Home[1] Files[2] News[3] &[SERVICES_TAB] Contact[4] Add New[5]
- Texas Instruments Fusion Digital Power Designer 7.10.1 Credential Disclosure[6]
- Authored by Gionathan Armando Reale[7]
-
Texas Instruments Fusion Digital Power Designer version 7.10.1 allows a local attacker to obtain sensitive information via the plaintext storage of credentials.
- advisories | CVE-2024-41629[8]
- SHA-256 |
7d2282798e3247a2123a5993d7d6d2cb77a3755e9e0270c916b57856fbfaf0ef
- Download[9] | Favorite[10] | View[11]
Change Mirror[12] Download[13]
Insufficiently Protected Credentials in Texas Instruments Fusion Digital Power Designer v.7.10.1
Credit: Gionathan Armando Reale
//////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
# Product: Fusion Digital Power Designer - Version 7.10.1
# Vendor: Texas Instruments
# CVE ID: CVE-2024-41629
# Vulnerability Title: Insufficiently Protected Credentials
# Severity: Medium
# Author(s): Gionathan Armando Reale
# Date: 2024-08-15
#
#############################################################
Introduction:
An issue in Texas Instruments Fusion Digital Power Designer v.7.10.1 allows a local attacker to obtain sensitive information via the plaintext storage of credentials.
Vulnerability PoC:
1. Create a connection within the application that requires credentials.
2. Access the file "C:/Program Files (x86)/Texas Instruments/Fusion Digial Power Designer/data/prefs-shared.xml"
3. Notice the credentials stored as plaintext.
/////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
File Tags
- ActiveX[19] (933)
- Advisory[20] (86,625)
- Arbitrary[21] (17,028)
- BBS[22] (2,859)
- Bypass[23] (1,898)
- CGI[24] (1,047)
- Code Execution[25] (7,868)
- Conference[26] (692)
- Cracker[27] (844)
- CSRF[28] (3,420)
- DoS[29] (25,190)
- Encryption[30] (2,389)
- Exploit[31] (54,101)
- File Inclusion[32] (4,271)
- File Upload[33] (1,007)
- Firewall[34] (822)
- Info Disclosure[35] (2,911)
- Intrusion Detection[36] (916)
- Java[37] (3,155)
- JavaScript[38] (907)
- Kernel[39] (7,252)
- Local[40] (14,836)
- Magazine[41] (587)
- Overflow[42] (13,205)
- Perl[43] (1,435)
- PHP[44] (5,253)
- Proof of Concept[45] (2,399)
- Protocol[46] (3,745)
- Python[47] (1,652)
- Remote[48] (31,810)
- Root[49] (3,668)
- Rootkit[50] (529)
- Ruby[51] (640)
- Scanner[52] (1,657)
- Security Tool[53] (8,035)
- Shell[54] (3,295)
- Shellcode[55] (1,219)
- Sniffer[56] (904)
- Spoof[57] (2,291)
- SQL Injection[58] (16,693)
- TCP[59] (2,462)
- Trojan[60] (690)
- UDP[61] (919)
- Virus[62] (671)
- Vulnerability[63] (33,048)
- Web[64] (10,128)
- Whitepaper[65] (3,783)
- x86[66] (969)
- XSS[67] (18,278)
- Other[68]
File Archives
- September 2024[69]
- August 2024[70]
- July 2024[71]
- June 2024[72]
- May 2024[73]
- April 2024[74]
- March 2024[75]
- February 2024[76]
- January 2024[77]
- December 2023[78]
- November 2023[79]
- October 2023[80]
- Older[81]
Systems
- AIX[82] (429)
- Apple[83] (2,104)
- BSD[84] (378)
- CentOS[85] (61)
- Cisco[86] (1,954)
- Debian[87] (7,114)
- Fedora[88] (1,693)
- FreeBSD[89] (1,247)
- Gentoo[90] (4,567)
- HPUX[91] (880)
- iOS[92] (387)
- iPhone[93] (108)
- IRIX[94] (220)
- Juniper[95] (71)
- Linux[96] (51,006)
- Mac OS X[97] (696)
- Mandriva[98] (3,105)
- NetBSD[99] (256)
- OpenBSD[100] (489)
- RedHat[101] (16,685)
- Slackware[102] (941)
- Solaris[103] (1,614)
- SUSE[104] (1,444)
- Ubuntu[105] (9,797)
- UNIX[106] (9,443)
- UnixWare[107] (187)
- Windows[108] (6,757)
- Other[109]
- Services
- Security Services[120]
- Hosting By
- Rokasec[121]
