Page 2 of 13 results (0.003 seconds)

CVSS: 8.8EPSS: 9%CPEs: 2EXPL: 1

An exploitable Information Disclosure vulnerability exists in the ACEManager EmbeddedAceGet_Task.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. This binary does not have any restricted configuration settings, so once the MSCIID is discovered, any authenticated user can send configuration changes using the /cgi-bin/Embedded_Ace_Get_Task.cgi endpoint. Existe una vulnerabilidad explotable de divulgación de información en la funcionalidad de ACEManager EmbeddedAceGet_Task.cgi de Sierra Wireless AirLink ES450 FW 4.9.3. Este binario no tiene ninguna configuración restringida, por lo que una vez que se descubre el MSCIID, cualquier usuario autenticado puede enviar cambios de configuración utilizando el endpoint /cgi-bin/Embedded_Ace_Get_Task.cgi. • https://talosintelligence.com/vulnerability_reports/TALOS-2018-0755 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.3EPSS: 0%CPEs: 2EXPL: 0

An exploitable information disclosure vulnerability exists in the ACEManager functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A HTTP request can result in disclosure of the default configuration for the device. An attacker can send an unauthenticated HTTP request to trigger this vulnerability. Se presenta una vulnerabilidad de Divulgación de Información explotable en la funcionalidad ACEManager de Sierra Wireless AirLink ES450 FW versión 4.9.3. Una solicitud HTTP puede dar conllevar a la divulgación de la configuración por defecto para el dispositivo. • https://talosintelligence.com/vulnerability_reports/TALOS-2018-0753 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 8.8EPSS: 42%CPEs: 2EXPL: 1

An exploitable cross-site request forgery vulnerability exists in the ACEManager functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can cause an authenticated user to perform privileged requests unknowingly, resulting in unauthenticated requests being requested through an authenticated user. An attacker can get an authenticated user to request authenticated pages on the attacker's behalf to trigger this vulnerability. En la funcionalidad del ACEManager de Sierra Wireless AirLink ES450 FW 4.9.3 existe una vulnerabilidad explotable de CSRF. Una solicitud HTTP especialmente diseñada puede hacer que un usuario autenticado realice solicitudes privilegiadas sin saberlo, lo que provoca que se realicen solicitudes no autenticadas a través de un usuario autenticado. • http://packetstormsecurity.com/files/152651/Sierra-Wireless-AirLink-ES450-ACEManager-Cross-Site-Request-Forgery.html http://www.securityfocus.com/bid/108147 https://ics-cert.us-cert.gov/advisories/ICSA-19-122-03 https://talosintelligence.com/vulnerability_reports/TALOS-2018-0751 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 9.3EPSS: 1%CPEs: 2EXPL: 2

A hard-coded credentials vulnerability exists in the snmpd function of the Sierra Wireless AirLink ES450 FW 4.9.3. Activating snmpd outside of the WebUI can cause the activation of the hard-coded credentials, resulting in the exposure of a privileged user. An attacker can activate snmpd without any configuration changes to trigger this vulnerability. Existe una vulnerabilidad de credenciales embebidas en la función snmpd del Sierra Wireless AirLink ES450 FW 4.9.3. La activación de snmpd fuera de la interfaz WebUI puede causar la activación de las credenciales embebidas, que dará como resultado la exposición de un usuario privilegiado. • http://packetstormsecurity.com/files/152647/Sierra-Wireless-AirLink-ES450-SNMPD-Hard-Coded-Credentials.html http://www.securityfocus.com/bid/108147 https://ics-cert.us-cert.gov/advisories/ICSA-19-122-03 https://talosintelligence.com/vulnerability_reports/TALOS-2018-0747 • CWE-798: Use of Hard-coded Credentials •

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 1

An exploitable cross-site scripting vulnerability exists in the ACEManager ping_result.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP ping request can cause reflected javascript code execution, resulting in the execution of javascript code running on the victim's browser. An attacker can get a victim to click a link, or embedded URL, that redirects to the reflected cross-site scripting vulnerability to trigger this vulnerability. Existe una vulnerabilidad de Corss-Site Scripting explotable en la funcionalidad ACEManager ping_result.cgi de Sierra Wireless AirLink ES450 FW 4.9.3. Una petición HTTP especialmente creado puede causar la ejecución de código javascript reflejado, resultando en la ejecución de código javascript en el navegador del víctima. • http://packetstormsecurity.com/files/152650/Sierra-Wireless-AirLink-ES450-ACEManager-ping_result.cgi-Cross-Site-Scripting.html http://www.securityfocus.com/bid/108147 https://ics-cert.us-cert.gov/advisories/ICSA-19-122-03 https://talosintelligence.com/vulnerability_reports/TALOS-2018-0750 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •