5 results (0.003 seconds)

CVSS: 9.8EPSS: 0%CPEs: 134EXPL: 0

An Improper Restriction of Excessive Authentication Attempts issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. An improper restriction of excessive authentication vulnerability in the web interface has been identified, which may allow an attacker to brute force authentication. Se ha descubierto un problema de restricción inadecuada de intentos de autenticación excesivos en los switches Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS y OCTOPUS Classic Platform. Se ha identificado una vulnerabilidad de restricción indebida de autenticación excesiva en la interfaz web que podría permitir que un atacante se autentique mediante fuerza bruta. • http://www.securityfocus.com/bid/103340 https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01 • CWE-307: Improper Restriction of Excessive Authentication Attempts •

CVSS: 5.9EPSS: 0%CPEs: 134EXPL: 0

A Cleartext Transmission of Sensitive Information issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. A cleartext transmission of sensitive information vulnerability in the web interface has been identified, which may allow an attacker to obtain sensitive information through a successful man-in-the-middle attack. Se ha descubierto un problema de transmisión de información sensible en texto claro en los switches Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS y OCTOPUS Classic Platform. Se ha identificado una vulnerabilidad de transmisión de información sensible en texto claro en la interfaz web que podría permitir que un atacante obtenga información sensible mediante un ataque Man-in-the-Middle (MitM) exitoso. • http://www.securityfocus.com/bid/103340 https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01 • CWE-319: Cleartext Transmission of Sensitive Information •

CVSS: 8.8EPSS: 0%CPEs: 134EXPL: 0

A Session Fixation issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. A session fixation vulnerability in the web interface has been identified, which may allow an attacker to hijack web sessions. Se ha descubierto un problema de fijación de sesión en los switches Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS y OCTOPUS Classic Platform. Se ha identificado una vulnerabilidad de fijación de sesión en la interfaz web que podría permitir que un atacante secuestre sesiones web. • http://www.securityfocus.com/bid/103340 https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01 • CWE-384: Session Fixation •

CVSS: 6.5EPSS: 0%CPEs: 134EXPL: 0

An Information Exposure Through Query Strings in GET Request issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. An information exposure through query strings vulnerability in the web interface has been identified, which may allow an attacker to impersonate a legitimate user. Se ha descubierto un problema de exposición de información mediante cadenas de consulta en peticiones GET en los switches Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS y OCTOPUS Classic Platform. Se ha identificado una vulnerabilidad de exposición de información mediante cadenas de consulta en la interfaz web que podría permitir que un atacante suplante a un usuario legítimo. • http://www.securityfocus.com/bid/103340 https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-598: Use of GET Request Method With Sensitive Query Strings •

CVSS: 6.5EPSS: 0%CPEs: 134EXPL: 0

An Inadequate Encryption Strength issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. An inadequate encryption strength vulnerability in the web interface has been identified, which may allow an attacker to obtain sensitive information through a successful man-in-the-middle attack. Se ha descubierto un problema de fortaleza inadecuada de cifrado en los switches Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS y OCTOPUS Classic Platform. Se ha identificado una vulnerabilidad de fortaleza inadecuada de cifrado en la interfaz web que podría permitir que un atacante obtenga información sensible mediante un ataque Man-in-the-Middle (MitM) exitoso. • http://www.securityfocus.com/bid/103340 https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01 • CWE-326: Inadequate Encryption Strength •