- What is the severity of CVE-2021-42543?
- CVE-2021-42543 has been scored as a high severity vulnerability.
- How to fix CVE-2021-42543?
- As a workaround for remediating CVE-2021-42543: Users are discouraged from using documents from unknown/untrusted sources. Users are encouraged to store .ctl files in a folder only writeable by admin-level users. Users are encouraged to operate in “Safe Mode” when loading documents that have been out of their control. Users are encouraged to apply a document editing password to their documents. Users should avoid using the Real Time Web-Connect menu items and instead connect to DAQConnect using script.
- Is CVE-2021-42543 being actively exploited in the wild?
- As for now, there are no information to confirm that CVE-2021-42543 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
- What software or system is affected by CVE-2021-42543?
- CVE-2021-42543 affects AzeoTech DAQFactory.