3 results (0.003 seconds)

CVSS: 6.8EPSS: 0%CPEs: 4EXPL: 0

A vulnerability has been identified in CP-8031 MASTER MODULE (All versions < CPCI85 V05), CP-8050 MASTER MODULE (All versions < CPCI85 V05). The affected devices contain an exposed UART console login interface. An attacker with direct physical access could try to bruteforce or crack the root password to login to the device. • http://packetstormsecurity.com/files/173370/Siemens-A8000-CP-8050-CP-8031-Code-Execution-Command-Injection.html http://seclists.org/fulldisclosure/2023/Jul/14 https://cert-portal.siemens.com/productcert/pdf/ssa-731916.pdf • CWE-749: Exposed Dangerous Method or Function •

CVSS: 6.8EPSS: 0%CPEs: 4EXPL: 0

A vulnerability has been identified in CP-8031 MASTER MODULE (All versions < CPCI85 V05), CP-8050 MASTER MODULE (All versions < CPCI85 V05). The affected devices contain the hash of the root password in a hard-coded form, which could be exploited for UART console login to the device. An attacker with direct physical access could exploit this vulnerability. • http://packetstormsecurity.com/files/173370/Siemens-A8000-CP-8050-CP-8031-Code-Execution-Command-Injection.html http://seclists.org/fulldisclosure/2023/Jul/14 https://cert-portal.siemens.com/productcert/pdf/ssa-731916.pdf • CWE-798: Use of Hard-coded Credentials •

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 0

A vulnerability has been identified in CP-8031 MASTER MODULE (All versions < CPCI85 V05), CP-8050 MASTER MODULE (All versions < CPCI85 V05). The web interface of affected devices is vulnerable to command injection due to missing server side input sanitation. This could allow an authenticated privileged remote attacker to execute arbitrary code with root privileges. • http://packetstormsecurity.com/files/173370/Siemens-A8000-CP-8050-CP-8031-Code-Execution-Command-Injection.html http://seclists.org/fulldisclosure/2023/Jul/14 http://seclists.org/fulldisclosure/2024/Jul/4 https://cert-portal.siemens.com/productcert/pdf/ssa-731916.pdf • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •