Page 6 of 34 results (0.003 seconds)

CVSS: 6.5EPSS: 0%CPEs: 134EXPL: 0

An Information Exposure Through Query Strings in GET Request issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. An information exposure through query strings vulnerability in the web interface has been identified, which may allow an attacker to impersonate a legitimate user. Se ha descubierto un problema de exposición de información mediante cadenas de consulta en peticiones GET en los switches Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS y OCTOPUS Classic Platform. Se ha identificado una vulnerabilidad de exposición de información mediante cadenas de consulta en la interfaz web que podría permitir que un atacante suplante a un usuario legítimo. • http://www.securityfocus.com/bid/103340 https://ics-cert.us-cert.gov/advisories/ICSA-18-065-01 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-598: Use of GET Request Method With Sensitive Query Strings •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

An issue has been discovered on the Belden Hirschmann Tofino Xenon Security Appliance before 03.2.00. An incomplete firmware signature allows a local attacker to upgrade the equipment (kernel, file system) with unsigned, attacker-controlled, data. This occurs because the appliance_config file is signed but the .tar.sec file is unsigned. Se ha descubierto un problema en las versiones anteriores a la 03.2.00 de Belden Hirschmann Tofino Xenon Security Appliance. Una firma incompleta del firmware permite que un atacante local actualice el equipamiento (kernel, sistema de archivo) con datos no firmados controlados por el atacante. • https://github.com/airbus-seclab/security-advisories/blob/master/belden/tofino.txt https://www.belden.com/hubfs/support/security/bulletins/Belden-Security-Bulletin-BSECV-2017-14-1v1-1.pdf • CWE-347: Improper Verification of Cryptographic Signature •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

An issue has been discovered on the Belden Hirschmann Tofino Xenon Security Appliance before 03.2.00. Design flaws in OPC classic and in custom netfilter modules allow an attacker to remotely activate rules on the firewall and to connect to any TCP port of a protected asset, thus bypassing the firewall. The attack methodology is a crafted OPC dynamic port shift. Se ha descubierto un problema en las versiones anteriores a la 03.2.00 de Belden Hirschmann Tofino Xenon Security Appliance. Los fallos de diseño en módulos OPC classic y netfilter personalizados permiten que un atacante active remotamente las reglas en el firewall y se conecte a cualquier puerto TCP de un activo protegido, eludiendo el firewall. • https://github.com/airbus-seclab/security-advisories/blob/master/belden/tofino.txt https://www.belden.com/hubfs/support/security/bulletins/Belden-Security-Bulletin-BSECV-2017-14-1v1-1.pdf • CWE-20: Improper Input Validation •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

An issue has been discovered on the Belden Hirschmann Tofino Xenon Security Appliance before 03.2.00. Improper handling of the mbap.length field of ModBus packets in the ModBus DPI filter allows an attacker to send malformed/crafted packets to a protected asset, bypassing function code filtering. Se ha descubierto un problema en las versiones anteriores a la 03.2.00 de Belden Hirschmann Tofino Xenon Security Appliance. La manipulación incorrecta del campo mbap.length de paquetes ModBus en el filtro ModBus DPI permite que un atacante envíe paquetes mal formados/manipulados a un activo protegido, omitiendo el filtrado de códigos de función. • https://github.com/airbus-seclab/security-advisories/blob/master/belden/tofino.txt https://www.belden.com/hubfs/support/security/bulletins/Belden-Security-Bulletin-BSECV-2017-14-1v1-1.pdf •

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

A Server-Side Request Forgery issue was discovered in Belden Hirschmann GECKO Lite Managed switch, Version 2.0.00 and prior versions. The web server receives a request, but does not sufficiently verify that the request is being sent to the expected destination. Se ha descubierto un problema de Server-Site Request Forgery (SSRF) en el switch Belden Hirschmann GECKO Lite Managed, en versiones 2.0.00 y anteriores. El servidor web recibe una petición, pero no verifica lo suficiente que la petición se está enviando a su destino esperado. • https://ics-cert.us-cert.gov/advisories/ICSA-17-026-02A • CWE-918: Server-Side Request Forgery (SSRF) •