Page 137 of 763 results (0.011 seconds)

CVSS: 9.8EPSS: 11%CPEs: 2EXPL: 1

Schneider Electric Modicon TM221CE16R 1.3.3.3 devices allow remote attackers to discover the application-protection password via a \x00\x01\x00\x00\x00\x05\x01\x5a\x00\x03\x00 request to the Modbus port (502/tcp). Subsequently the application may be arbitrarily downloaded, modified, and uploaded. Los dispositivos Schneider Electric Modicon TM221CE16R 1.3.3.3 permiten a atacantes remotos descubrir la contraseña de protección de la aplicación a través de una solicitud \x00\x01\x00\x00\x00\x05\x01\x5a\x00\x03\x00 al puerto Modbus (502/tcp). Posteriormente la aplicación puede descargarse, modificarse y cargarse arbitrariamente. • http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2017-097-02 http://www.securityfocus.com/bid/97523 https://os-s.net/advisories/OSS-2017-01.pdf • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.8EPSS: 0%CPEs: 3EXPL: 0

Schneider Electric SoMachine Basic 1.4 SP1 and Schneider Electric Modicon TM221CE16R 1.3.3.3 devices have a hardcoded-key vulnerability. The Project Protection feature is used to prevent unauthorized users from opening an XML protected project file, by prompting the user for a password. This XML file is AES-CBC encrypted; however, the key used for encryption (SoMachineBasicSoMachineBasicSoMa) cannot be changed. After decrypting the XML file with this key, the user password can be found in the decrypted data. After reading the user password, the project can be opened and modified with the Schneider product. • http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2017-097-01 http://www.securityfocus.com/bid/97518 https://os-s.net/advisories/OSS-2017-02.pdf • CWE-798: Use of Hard-coded Credentials •

CVSS: 10.0EPSS: 0%CPEs: 5EXPL: 0

An issue was discovered in Schneider Electric Tableau Server/Desktop Versions 7.0 to 10.1.3 in Wonderware Intelligence Versions 2014R3 and prior. These versions contain a system account that is installed by default. The default system account is difficult to configure with non-default credentials after installation, and changing the default credentials in the embedded Tableau Server is not documented. If Tableau Server is used with Windows integrated security (Active Directory), the software is not vulnerable. However, when Tableau Server is used with local authentication mode, the software is vulnerable. • http://software.schneider-electric.com/pdf/security-bulletin/lfsec00000119 http://www.securityfocus.com/bid/96721 https://ics-cert.us-cert.gov/advisories/ICSA-17-066-01 • CWE-1188: Initialization of a Resource with an Insecure Default •

CVSS: 7.8EPSS: 2%CPEs: 2EXPL: 1

An issue was discovered in Schneider Electric Conext ComBox, model 865-1058, all firmware versions prior to V3.03 BN 830. A series of rapid requests to the device may cause it to reboot. Se ha descubierto un problema en Schneider Electric Conext ComBox, modelo 865-1058, todas las versiones de firmware anteriores a V3.03 BN 830. Una serie de solicitudes rápidas al dispositivo puede hacer que reinicie. Conext ComBox 865-1058 suffers from a denial of service vulnerability. • https://www.exploit-db.com/exploits/41537 http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2017-052-01 http://www.securityfocus.com/bid/96543 https://ics-cert.us-cert.gov/advisories/ICSA-17-061-02 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 5.3EPSS: 0%CPEs: 16EXPL: 0

An issue was discovered in Schneider Electric Magelis HMI Magelis GTO Advanced Optimum Panels, all versions, Magelis GTU Universal Panel, all versions, Magelis STO5xx and STU Small panels, all versions, Magelis XBT GH Advanced Hand-held Panels, all versions, Magelis XBT GK Advanced Touchscreen Panels with Keyboard, all versions, Magelis XBT GT Advanced Touchscreen Panels, all versions, and Magelis XBT GTW Advanced Open Touchscreen Panels (Windows XPe). An attacker can open multiple connections to a targeted web server and keep connections open preventing new connections from being made, rendering the web server unavailable during an attack. Ha sido descubierto un problema en Schneider Electric Magelis HMI Magelis GTO Advanced Optimum Panels, todas las versiones, Magelis GTU Universal Panel, todas las versiones, Magelis STO5xx y STU Small panels, todas las versiones, Magelis XBT GH Advanced Hand-held Panels, todas las versiones, Magelis XBT GK Advanced Touchscreen Panels con Keyboard, todas las versiones, Magelis XBT GT Advanced Touchscreen Panels, todas las versiones y Magelis XBT GTW Advanced Open Touchscreen Panels (Windows XPe). Un atacante puede abrir múltiples conexiones en un servidor web objetivo y mantener las conexiones abiertas impidiendo que se hagan nuevas conexiones, dejando el servidor web inutilizable durante un ataque. • http://www.securityfocus.com/bid/94093 https://ics-cert.us-cert.gov/advisories/ICSA-16-308-02 • CWE-400: Uncontrolled Resource Consumption •