3 results (0.001 seconds)

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

08 Oct 2024 — A vulnerability has been identified in SENTRON 7KM PAC3200 (All versions). Affected devices only provide a 4-digit PIN to protect from administrative access via Modbus TCP interface. Attackers with access to the Modbus TCP interface could easily bypass this protection by brute-force attacks or by sniffing the Modbus clear text communication. • https://cert-portal.siemens.com/productcert/html/ssa-850560.html • CWE-287: Improper Authentication •

CVSS: 8.2EPSS: 0%CPEs: 21EXPL: 0

11 Dec 2020 — An issue was discovered in uIP 1.0, as used in Contiki 3.0 and other products. When the Urgent flag is set in a TCP packet, and the stack is configured to ignore the urgent data, the stack attempts to use the value of the Urgent pointer bytes to separate the Urgent data from the normal data, by calculating the offset at which the normal data should be present in the global buffer. However, the length of this offset is not checked; therefore, for large values of the Urgent pointer bytes, the data pointer can... • https://cert-portal.siemens.com/productcert/pdf/ssa-541018.pdf • CWE-787: Out-of-bounds Write •

CVSS: 7.5EPSS: 0%CPEs: 11EXPL: 0

11 Dec 2020 — An issue was discovered in Contiki through 3.0. An Out-of-Bounds Read vulnerability exists in the uIP TCP/IP Stack component when calculating the checksums for IP packets in upper_layer_chksum in net/ipv4/uip.c. Se detectó un problema en Contiki versiones hasta 3.0. Se presenta una vulnerabilidad de Lectura Fuera de Límites en el componente uIP TCP/IP Stack cuando se calculan las sumas de comprobación para paquetes IP en la función upper_layer_chksum en el archivo net/ipv4/uip.c Jos Wetzels, Stanislav ... • https://cert-portal.siemens.com/productcert/pdf/ssa-541018.pdf • CWE-125: Out-of-bounds Read •