Page 2 of 7 results (0.015 seconds)

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

A vulnerability has been identified in TIM 1531 IRC (All version < V2.0). The devices was missing proper authentication on port 102/tcp, although configured. Successful exploitation requires an attacker to be able to send packets to port 102/tcp of the affected device. No user interaction and no user privileges are required to exploit the vulnerability. At the time of advisory publication no public exploitation of this vulnerability was known. • http://www.securityfocus.com/bid/106194 https://cert-portal.siemens.com/productcert/pdf/ssa-982399.pdf • CWE-284: Improper Access Control CWE-287: Improper Authentication •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

A vulnerability has been identified in TIM 1531 IRC (All versions < V1.1). A remote attacker with network access to port 80/tcp or port 443/tcp could perform administrative operations on the device without prior authentication. Successful exploitation could allow to cause a denial-of-service, or read and manipulate data as well as configuration settings of the affected device. At the stage of publishing this security advisory no public exploitation is known. Siemens provides mitigations to resolve it. • http://www.securityfocus.com/bid/103576 https://cert-portal.siemens.com/productcert/pdf/ssa-110922.pdf • CWE-287: Improper Authentication CWE-303: Incorrect Implementation of Authentication Algorithm •