Page 3 of 13 results (0.012 seconds)

CVSS: 7.4EPSS: 0%CPEs: 1EXPL: 0

A vulnerability was discovered in Siemens SiPass integrated (All versions before V2.70) that could allow an attacker in a Man-in-the-Middle position between the SiPass integrated server and SiPass integrated clients to read or modify the network communication. Se ha descubierto una vulnerabilidad en Siemens SiPass integrated (todas las versiones anteriores a la V2.70) que podría permitir que un atacante en posición Man-in-the-Middle entre el servidor SiPass integrated y los clientes SiPass integrated leyese o modificase la comunicación de red. • http://www.securityfocus.com/bid/99578 https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-339433.pdf • CWE-300: Channel Accessible by Non-Endpoint •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

A vulnerability was discovered in Siemens SiPass integrated (All versions before V2.70) that could allow an attacker with local access to the SiPass integrated server or SiPass integrated client to potentially obtain credentials from the systems. Se ha descubierto una vulnerabilidad en Siemens SiPass integrated (todas las versiones anteriores a la V2.70) que podría permitir que un atacante con acceso local al servidor SiPass integrated o al cliente SiPass integrated obtuviese credenciales de los sistemas. • http://www.securityfocus.com/bid/99578 https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-339433.pdf • CWE-257: Storing Passwords in a Recoverable Format •

CVSS: 10.0EPSS: 39%CPEs: 1EXPL: 1

AscoServer.exe in the server in Siemens SiPass integrated MP2.6 and earlier does not properly handle IOCP RPC messages received over an Ethernet network, which allows remote attackers to write data to any memory location and consequently execute arbitrary code via crafted messages, as demonstrated by an arbitrary pointer dereference attack or a buffer overflow attack. AscoServer.exe en el servidor en Siemens SiPass integrated MP2.6 y anteriores no trata correctamente los mensajes RPC IOCP recibidos a través de una red Ethernet, lo que permite a atacantes remotos escribir datos en cualquier posición de memoria y por lo tanto ejecutar código de su elección a través de mensajes modificados a mano, tal y como se ha demostrado por un ataque de desreferencia de un puntero de su elección o un ataque de desbordamiento de búfer. • https://www.exploit-db.com/exploits/22397 http://ics-cert.us-cert.gov/advisories/ICSA-12-305-01 http://ioactive.com/pdfs/SIEMENS_Sipass_Integrated_Ethernet_Bus_Arbitrary_Pointer_Dereference_V4.pdf http://secunia.com/advisories/50900 http://www.osvdb.org/86129 http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-938777.pdf • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •