Skip to content

Commit 458d086

Browse files
author
jenkins-metasploit
committed
automatic module_metadata_base.json update
1 parent 576ff2f commit 458d086

File tree

1 file changed

+61
-0
lines changed

1 file changed

+61
-0
lines changed

db/modules_metadata_base.json

Lines changed: 61 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10357,6 +10357,67 @@
1035710357

1035810358
]
1035910359
},
10360+
"auxiliary_admin/scada/mypro_mgr_creds": {
10361+
"name": "mySCADA myPRO Manager Credential Harvester (CVE-2025-24865 and CVE-2025-22896)",
10362+
"fullname": "auxiliary/admin/scada/mypro_mgr_creds",
10363+
"aliases": [
10364+
10365+
],
10366+
"rank": 300,
10367+
"disclosure_date": "2025-02-13",
10368+
"type": "auxiliary",
10369+
"author": [
10370+
"Michael Heinzl"
10371+
],
10372+
"description": "Credential Harvester in MyPRO Manager <= v1.3 from mySCADA.\n The product suffers from a broken authentication vulnerability (CVE-2025-24865) for certain functions. One of them is the configuration page for notifications, which returns the cleartext credentials (CVE-2025-22896) before correctly veryfing that the associated request is coming from an authenticated and authorized entity.",
10373+
"references": [
10374+
"URL-https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-16",
10375+
"CVE-2025-24865",
10376+
"CVE-2025-22896"
10377+
],
10378+
"platform": "Windows",
10379+
"arch": "cmd",
10380+
"rport": 34022,
10381+
"autofilter_ports": [
10382+
80,
10383+
8080,
10384+
443,
10385+
8000,
10386+
8888,
10387+
8880,
10388+
8008,
10389+
3000,
10390+
8443
10391+
],
10392+
"autofilter_services": [
10393+
"http",
10394+
"https"
10395+
],
10396+
"targets": null,
10397+
"mod_time": "2025-02-20 15:40:05 +0000",
10398+
"path": "/modules/auxiliary/admin/scada/mypro_mgr_creds.rb",
10399+
"is_install_path": true,
10400+
"ref_name": "admin/scada/mypro_mgr_creds",
10401+
"check": true,
10402+
"post_auth": false,
10403+
"default_credential": false,
10404+
"notes": {
10405+
"Stability": [
10406+
"crash-safe"
10407+
],
10408+
"Reliability": [
10409+
"repeatable-session"
10410+
],
10411+
"SideEffects": [
10412+
"ioc-in-logs"
10413+
]
10414+
},
10415+
"session_types": false,
10416+
"needs_cleanup": false,
10417+
"actions": [
10418+
10419+
]
10420+
},
1036010421
"auxiliary_admin/scada/pcom_command": {
1036110422
"name": "Unitronics PCOM remote START/STOP/RESET command",
1036210423
"fullname": "auxiliary/admin/scada/pcom_command",

0 commit comments

Comments
 (0)