Page 12 of 83 results (0.013 seconds)

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

Emerson DeltaV Smart Switch Command Center application, available in versions 11.3.x and 12.3.1, was unable to change the DeltaV Smart Switches’ management password upon commissioning. Emerson released patches for DeltaV workstations to address this issue, and the patches can be downloaded from Emerson’s Guardian Support Portal. Please refer to the DeltaV Security Notification DSN19003 (KBA NK-1900-0808) for more information about this issue. DeltaV versions 13.3 and higher use the Network Device Command Center application to manage DeltaV Smart Switches, and this newer application is not impacted by this issue. After patching the Smart Switch Command Center, users are required to either commission the DeltaV Smart Switches or change password using the tool. • http://www.emerson.com/documents/automation/deltav-smart-switches-en-179014.pdf http://www.securityfocus.com/bid/109110 https://www.us-cert.gov/ics/advisories/icsa-19-190-01 • CWE-798: Use of Hard-coded Credentials •

CVSS: 6.5EPSS: 0%CPEs: 6EXPL: 0

A specially crafted script could bypass the authentication of a maintenance port of Emerson DeltaV DCS Versions 11.3.1, 11.3.2, 12.3.1, 13.3.1, 14.3, R5.1, R6 and prior, which may allow an attacker to cause a denial of service. Un script especialmente manipulado podría omitir la autenticación de un puerto de mantenimiento de Emerson DeltaV DCS, en versiones 11.3.1, 11.3.2, 12.3.1, 13.3.1, 14.3, R5.1, R6 y anteriores, lo que podría permitir a un atacante provocar una denegación de servicio (DoS). • http://www.securityfocus.com/bid/106522 https://ics-cert.us-cert.gov/advisories/ICSA-19-010-01 • CWE-307: Improper Restriction of Excessive Authentication Attempts •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

Emerson AMS Device Manager v12.0 to v13.5. Non-administrative users are able to change executable and library files on the affected products. Emerson AMS Device Manager, de la versión v12.0 a la v13.5. Los usuarios no administradores pueden cambiar archivos ejecutables y de la biblioteca en los productos afectados. • http://www.securityfocus.com/bid/105406 https://ics-cert.us-cert.gov/advisories/ICSA-18-270-01 • CWE-269: Improper Privilege Management •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

Emerson AMS Device Manager v12.0 to v13.5. A specially crafted script may be run that allows arbitrary remote code execution. Emerson AMS Device Manager, de la versión v12.0 a la v13.5. Un script especialmente manipulado podría ejecutarse para permitir la ejecución remota de código. • http://www.securityfocus.com/bid/105406 https://ics-cert.us-cert.gov/advisories/ICSA-18-270-01 • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE-284: Improper Access Control •

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 0

Emerson DeltaV DCS versions 11.3.1, 12.3.1, 13.3.0, 13.3.1, R5 allow a specially crafted DLL file to be placed in the search path and loaded as an internal and valid DLL, which may allow arbitrary code execution. En Emerson DeltaV DCS en versiones 11.3.1, 12.3.1, 13.3.0, 13.3.1, R5 permite que se coloque un archivo DLL especialmente manipulado en la ruta de búsqueda y que se cargue como un DLL interno válido, lo que podría provocar la ejecución arbitraria de código. • http://www.securityfocus.com/bid/105105 https://ics-cert.us-cert.gov/advisories/ICSA-18-228-01 • CWE-427: Uncontrolled Search Path Element •