8 results (0.004 seconds)

CVSS: 8.2EPSS: 0%CPEs: 2EXPL: 0

15 Jan 2025 — A “Use of a Broken or Risky Cryptographic Algorithm” vulnerability in the SSL/TLS component used in B&R Automation Runtime versions before 6.1 and B&R mapp View versions before 6.1 may be abused by unauthenticated network-based attackers to masquerade as services on impacted devices. • https://www.br-automation.com/fileadmin/SA25P001-c478fad6.pdf • CWE-327: Use of a Broken or Risky Cryptographic Algorithm •

CVSS: 8.4EPSS: 0%CPEs: 4EXPL: 0

02 Dec 2024 — An “Authentication Bypass Using an Alternate Path or Channel” vulnerability in the OPC UA Server configuration required for B&R mapp Cockpit before 6.0, B&R mapp View before 6.0, B&R mapp Services before 6.0, B&R mapp Motion before 6.0 and B&R mapp Vision before 6.0 may be used by an unauthenticated network-based attacker to cause information disclosure, unintended change of data, or denial of service conditions. B&R mapp Services is only affected, when mpUserX or mpCodeBox are used in the Automation Studio... • https://www.br-automation.com/fileadmin/SA22P014-90c4aa35.pdf • CWE-288: Authentication Bypass Using an Alternate Path or Channel •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

29 Aug 2024 — An untrusted search path vulnerability in the AprolConfigureCCServices of B&R APROL <= R 4.2.-07P3 and <= R 4.4-00P3 may allow an authenticated local attacker to execute arbitrary code with elevated privileges. • https://www.br-automation.com/fileadmin/SA24P2014_Multiple_vulnerabilities_in_BR_APROL.pdf-367290ae.pdf • CWE-250: Execution with Unnecessary Privileges CWE-267: Privilege Defined With Unsafe Actions •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

10 Aug 2024 — Enabled IP Forwarding feature in B&R Automation Runtime versions before 6.0.2 may allow remote attack-ers to compromise network security by routing IP-based packets through the host, potentially by-passing firewall, router, or NAC filtering. • https://www.br-automation.com/fileadmin/SA24P011-d8aaf02f.pdf • CWE-653: Improper Isolation or Compartmentalization CWE-1188: Initialization of a Resource with an Insecure Default •

CVSS: 8.3EPSS: 0%CPEs: 1EXPL: 0

10 Aug 2024 — Diffie-Hellman groups with insufficient strength are used in the SSL/TLS stack of B&R Automation Runtime versions before 6.0.2, allowing a network attacker to decrypt the SSL/TLS communication. • https://www.br-automation.com/fileadmin/SA24P011-d8aaf02f.pdf • CWE-326: Inadequate Encryption Strength •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

14 May 2024 — Improper DLL loading algorithms in B&R Automation Studio versions >=4.0 and <4.12 may allow an authenticated local attacker to execute code in the context of the product. Los algoritmos de carga de DLL inadecuados en B&amp;R Automation Studio pueden permitir que un atacante local autenticado ejecute código con privilegios elevados. Este problema afecta a las versiones de Automation Studio anteriores a la 4.12. • https://www.br-automation.com/fileadmin/2021-10_DLL_Hijacking_Vulnerability_in_Automation_Studio-7dd34511.pdf • CWE-20: Improper Input Validation •

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 0

14 May 2024 — An Uncontrolled Search Path Element vulnerability in B&R Industrial Automation Scene Viewer, B&R Industrial Automation Automation Runtime, B&R Industrial Automation mapp Vision, B&R Industrial Automation mapp View, B&R Industrial Automation mapp Cockpit, B&R Industrial Automation mapp Safety, B&R Industrial Automation VC4 could allow an authenticated local attacker to execute malicious code by placing specially crafted files in the loading search path.This issue affects Scene Viewer: before 4.4.0; Automatio... • https://www.br-automation.com/fileadmin/SA24P005_Insecure_Loading_of_Code-c7d9e49c.pdf • CWE-427: Uncontrolled Search Path Element •

CVSS: 8.3EPSS: 0%CPEs: 2EXPL: 0

22 Feb 2024 — B&R Automation Studio Upgrade Service and B&R Technology Guarding use insufficient cryptography for communication to the upgrade and the licensing servers. A network-based attacker could exploit the vulnerability to execute arbitrary code on the products or sniff sensitive data. B&R Automation Studio Upgrade Service y B&R Technology Guarding utilizan criptografía insuficiente para la comunicación con la actualización y los servidores de licencias. Un atacante basado en la red podría aprovechar la vu... • https://www.br-automation.com/fileadmin/SA23P019_Automation_Studio_Upgrade_Service_uses_insufficient_encryption.pdf-1b3b181c.pdf • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE-311: Missing Encryption of Sensitive Data CWE-319: Cleartext Transmission of Sensitive Information CWE-326: Inadequate Encryption Strength CWE-1240: Use of a Cryptographic Primitive with a Risky Implementation •