Critical Flaw Found in Rapid SCADA Software – Update Now!

CVECVE-2024-21764
CVSScvssV3_1: 9.8
SourceCVE-2024-21764

Rapid Software LLC, the makers of Rapid SCADA supervisory control and data acquisition (SCADA) software, has disclosed a serious vulnerability in previous versions of their product.

The vulnerability, tracked as CVE-2024-21764, has been given a CVSS score of 9.8 out of 10 indicating its severity. According to Rapid Software, versions of Rapid SCADA prior to 5.8.4 use hardcoded credentials that could allow unauthorized access.

SCADA systems are used to control and monitor industrial processes and infrastructure. A flaw like this could enable a remote attacker to access sensitive systems and facilities if left unpatched. With hardcoded credentials, anyone who discovers the login details could gain full control.

Rapid Software recommends all Rapid SCADA users immediately update to version 5.8.4 or later to remove this vulnerability. Taking proactive steps like updating software helps protect against exploitation and ensures the continued smooth operation of critical infrastructure. Users should also consider changing passwords on their systems as an added precaution.

Staying on top of software updates is one of the best ways to bolster cybersecurity defenses. We encourage all Rapid SCADA customers to verify they are running the latest version to close this critical vulnerability as soon as possible.

References