2 results (0.006 seconds)

CVSS: 6.5EPSS: 0%CPEs: 3EXPL: 0

CWE-552: Files or Directories Accessible to External Parties vulnerability exists which may prevent user to update the device firmware and prevent proper behavior of the webserver when specific files or directories are removed from the filesystem. CWE-552: Existe una vulnerabilidad de archivos o directorios accesibles a terceros que puede impedir que el usuario actualice el firmware del dispositivo e impedir el comportamiento adecuado del servidor web cuando se eliminan archivos o directorios específicos del sistema de archivos. • https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-163-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-163-01.pdf • CWE-552: Files or Directories Accessible to External Parties •

CVSS: 10.0EPSS: 4%CPEs: 22EXPL: 0

The Schneider Electric Quantum Ethernet Module, as used in the Quantum 140NOE771* and 140CPU65* modules, the Premium TSXETY* and TSXP57* modules, the M340 BMXNOE01* and BMXP3420* modules, and the STB DIO STBNIC2212 and STBNIP2* modules, uses hardcoded passwords for the (1) AUTCSE, (2) AUT_CSE, (3) fdrusers, (4) ftpuser, (5) loader, (6) nic2212, (7) nimrohs2212, (8) nip2212, (9) noe77111_v500, (10) ntpupdate, (11) pcfactory, (12) sysdiag, (13) target, (14) test, (15) USER, and (16) webserver accounts, which makes it easier for remote attackers to obtain access via the (a) TELNET, (b) Windriver Debug, or (c) FTP port. El módulo Schneider Electric Quantum Ethernet, tal como se utiliza en los módulos Quantum 140NOE771* y 140CPU65*, los módulos Premium TSXETY* y TSXP57*, los módulos M340 BMXNOE01* y BMXP3420*, y los módulos STB DIO STBNIC2212 y STBNIP2*, utiliza contraseñas estáticas para las cuentas (1) AUTCSE, (2) AUT_CSE, (3) fdrusers, (4) ftpuser, (5) loader, (6) nic2212, (7) nimrohs2212, (8) nip2212, (9) noe77111_v500, (10) ntpupdate, (11) pcfactory, (12) sysdiag, (13) target, (14) test, (15) USER, y (16) webserver, lo que facilita a atacantes remotos obtener acceso a través de (a) TELNET, (b) Windriver Debug, o (c) el puerto FTP. • http://reversemode.com/index.php?option=com_content&task=view&id=80&Itemid=1 http://secunia.com/advisories/47723 http://www.securityfocus.com/bid/51605 http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-346-01.pdf http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-12-020-03.pdf http://www.us-cert.gov/control_systems/pdf/ICSA-12-018-01.pdf https://exchange.xforce.ibmcloud.com/vulnerabilities/72587 •