Page 5 of 23 results (0.002 seconds)

CVSS: 9.8EPSS: 0%CPEs: 120EXPL: 0

An authorization bypass vulnerability exists in Schneider Electric's Modicon M340, Modicon Premium, Modicon Quantum PLC, BMXNOR0200. Requests to CGI functions allow malicious users to bypass authorization. Existe una vulnerabilidad de omisión de autenticación en Modicon M340, Modicon Premium, Modicon Quantum PLC y BMXNOR0200, de Schneider Electric. Las peticiones a funciones CGI permiten que usuarios maliciosos omitan la autorización. • https://www.schneider-electric.com/en/download/document/SEVD-2018-081-02 • CWE-287: Improper Authentication •

CVSS: 9.8EPSS: 0%CPEs: 120EXPL: 0

Vulnerable hash algorithms exists in Schneider Electric's Modicon Premium, Modicon Quantum, Modicon M340, and BMXNOR0200 controllers in all versions of the communication modules. The algorithm used to encrypt the password is vulnerable to hash collision attacks. Existen algoritmos de hash vulnerables en los controladores Modicon Premium, Modicon Quantum, Modicon M340 y BMXNOR0200, de Schneider Electric, en todas las versiones de los módulos de comunicación. El algoritmo empleado para cifrar la contraseña es vulnerable a ataques de colisión de hash. • http://www.securityfocus.com/bid/103543 https://ics-cert.us-cert.gov/advisories/ICSA-18-086-01 https://www.schneider-electric.com/en/download/document/SEVD-2018-081-01 • CWE-326: Inadequate Encryption Strength •

CVSS: 10.0EPSS: 4%CPEs: 22EXPL: 0

The Schneider Electric Quantum Ethernet Module, as used in the Quantum 140NOE771* and 140CPU65* modules, the Premium TSXETY* and TSXP57* modules, the M340 BMXNOE01* and BMXP3420* modules, and the STB DIO STBNIC2212 and STBNIP2* modules, uses hardcoded passwords for the (1) AUTCSE, (2) AUT_CSE, (3) fdrusers, (4) ftpuser, (5) loader, (6) nic2212, (7) nimrohs2212, (8) nip2212, (9) noe77111_v500, (10) ntpupdate, (11) pcfactory, (12) sysdiag, (13) target, (14) test, (15) USER, and (16) webserver accounts, which makes it easier for remote attackers to obtain access via the (a) TELNET, (b) Windriver Debug, or (c) FTP port. El módulo Schneider Electric Quantum Ethernet, tal como se utiliza en los módulos Quantum 140NOE771* y 140CPU65*, los módulos Premium TSXETY* y TSXP57*, los módulos M340 BMXNOE01* y BMXP3420*, y los módulos STB DIO STBNIC2212 y STBNIP2*, utiliza contraseñas estáticas para las cuentas (1) AUTCSE, (2) AUT_CSE, (3) fdrusers, (4) ftpuser, (5) loader, (6) nic2212, (7) nimrohs2212, (8) nip2212, (9) noe77111_v500, (10) ntpupdate, (11) pcfactory, (12) sysdiag, (13) target, (14) test, (15) USER, y (16) webserver, lo que facilita a atacantes remotos obtener acceso a través de (a) TELNET, (b) Windriver Debug, o (c) el puerto FTP. • http://reversemode.com/index.php?option=com_content&task=view&id=80&Itemid=1 http://secunia.com/advisories/47723 http://www.securityfocus.com/bid/51605 http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-346-01.pdf http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-12-020-03.pdf http://www.us-cert.gov/control_systems/pdf/ICSA-12-018-01.pdf https://exchange.xforce.ibmcloud.com/vulnerabilities/72587 •