Page 3 of 13 results (0.001 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

A vulnerability was discovered in Siemens SiPass integrated (All versions before V2.70) that could allow an attacker with local access to the SiPass integrated server or SiPass integrated client to potentially obtain credentials from the systems. Se ha descubierto una vulnerabilidad en Siemens SiPass integrated (todas las versiones anteriores a la V2.70) que podría permitir que un atacante con acceso local al servidor SiPass integrated o al cliente SiPass integrated obtuviese credenciales de los sistemas. • http://www.securityfocus.com/bid/99578 https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-339433.pdf • CWE-257: Storing Passwords in a Recoverable Format •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

A vulnerability was discovered in Siemens SiPass integrated (All versions before V2.70) that could allow an attacker with network access to the SiPass integrated server to bypass the authentication mechanism and perform administrative operations. Se ha descubierto una vulnerabilidad en Siemens SiPass integrated (todas las versiones anteriores a la V2.70) que podría permitir que un atacante con acceso red al servidor SiPass integrated omitiese el mecanismo de autenticación y realizase operaciones administrativas. • http://www.securityfocus.com/bid/99578 https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-339433.pdf • CWE-287: Improper Authentication •

CVSS: 10.0EPSS: 38%CPEs: 1EXPL: 1

AscoServer.exe in the server in Siemens SiPass integrated MP2.6 and earlier does not properly handle IOCP RPC messages received over an Ethernet network, which allows remote attackers to write data to any memory location and consequently execute arbitrary code via crafted messages, as demonstrated by an arbitrary pointer dereference attack or a buffer overflow attack. AscoServer.exe en el servidor en Siemens SiPass integrated MP2.6 y anteriores no trata correctamente los mensajes RPC IOCP recibidos a través de una red Ethernet, lo que permite a atacantes remotos escribir datos en cualquier posición de memoria y por lo tanto ejecutar código de su elección a través de mensajes modificados a mano, tal y como se ha demostrado por un ataque de desreferencia de un puntero de su elección o un ataque de desbordamiento de búfer. • https://www.exploit-db.com/exploits/22397 http://ics-cert.us-cert.gov/advisories/ICSA-12-305-01 http://ioactive.com/pdfs/SIEMENS_Sipass_Integrated_Ethernet_Bus_Arbitrary_Pointer_Dereference_V4.pdf http://secunia.com/advisories/50900 http://www.osvdb.org/86129 http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-938777.pdf • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •