Digital Alert Systems DASDEC
Digital Alert Systems DASDEC contains cross-site scripting and other vulnerabilities that could allow an attacker to craft malicious alerts. If exploited, the compromised DASDEC system would issue false emergency alerts to all connected broadcast and cable sites. CVE-2019-18265 is patched in Version 4.1 or later. CVE-2022-40204 is unfixed and the vendor has indicated a future patch will address it, but no timeline or version is specified. All versions prior to 4.1 lack the remediation for at least one of these vulnerabilities.
- Network access to DASDEC system (not internet-accessible if properly firewalled)
- User interaction may be required (CWE-79 suggests XSS, which typically requires a user to click a link or visit a malicious page)
- System must have broadcast or cable sites connected downstream
Patching may require device reboot — plan for process interruption
/api/v1/advisories/c0edda23-6957-4219-a034-822e24f9bb5cGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.