Page 6 of 45 results (0.010 seconds)

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 0

The “restore configuration” feature of Softing Secure Integration Server V1.22 is vulnerable to a directory traversal vulnerability when processing zip files. An attacker can craft a zip file to load an arbitrary dll and execute code. Using the "restore configuration" feature to upload a zip file containing a path traversal file may cause a file to be created and executed upon touching the disk. La funcionalidad de "restore configuration" de Softing Secure Integration Server versión V1.22 ,es susceptible a una vulnerabilidad de salto de directorio cuando son procesados archivos zip. Un atacante puede diseñar un archivo zip para cargar una DLL arbitraria y ejecutar código. • https://industrial.softing.com/fileadmin/psirt/downloads/syt-2022-5.html https://www.cisa.gov/uscert/ics/advisories/icsa-22-228-04 https://ide0x90.github.io/softing-sis-122-rce • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-23: Relative Path Traversal •

CVSS: 7.5EPSS: 0%CPEs: 6EXPL: 0

Softing OPC UA C++ Server SDK, Secure Integration Server, edgeConnector, edgeAggregator, OPC Suite, and uaGate are affected by a NULL pointer dereference vulnerability. Softing OPC UA C++ Server SDK, Secure Integration Server, edgeConnector, edgeAggregator, OPC Suite y uaGate están afectados por una vulnerabilidad de desreferencia de puntero NULL. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Softing Secure Integration Server. Authentication is not required to exploit this vulnerability. The specific flaw exists within the the handling of OPC UA messages. The issue results from dereferencing a NULL pointer. • https://industrial.softing.com/fileadmin/psirt/downloads/syt-2022-7.html https://www.cisa.gov/uscert/ics/advisories/icsa-22-228-04 • CWE-476: NULL Pointer Dereference •

CVSS: 9.8EPSS: 0%CPEs: 6EXPL: 0

Softing Secure Integration Server, edgeConnector, and edgeAggregator software ships with the default administrator credentials as `admin` and password as `admin`. This allows Softing to log in to the server directly to perform administrative functions. Upon installation or upon first login, the application does not ask the user to change the `admin` password. There is no warning or prompt to ask the user to change the default password, and to change the password, many steps are required. Softing Secure Integration Server, edgeConnector y edgeAggregator son enviados con las credenciales de administrador por defecto como "admin" y la contraseña como "admin". • https://industrial.softing.com/fileadmin/psirt/downloads/syt-2022-6.html https://www.cisa.gov/uscert/ics/advisories/icsa-22-228-04 • CWE-287: Improper Authentication •

CVSS: 7.5EPSS: 0%CPEs: 6EXPL: 0

A crafted HTTP packet without a content-type header can create a denial-of-service condition in Softing Secure Integration Server V1.22. Un paquete HTTP diseñado sin un encabezado de tipo de contenido puede crear una condición de denegación de servicio en Softing Secure Integration Server versión V1.22. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Softing Secure Integration Server. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of the Content-Type HTTP header. The issue results from dereferencing a null pointer. • https://industrial.softing.com/fileadmin/psirt/downloads/syt-2022-4.html https://www.cisa.gov/uscert/ics/advisories/icsa-22-228-04 • CWE-476: NULL Pointer Dereference •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Softing OPC UA C++ SDK (Software Development Kit) versions from 5.59 to 5.64 exported library functions don't properly validate received extension objects, which may allow an attacker to crash the software by sending a variety of specially crafted packets to access several unexpected memory locations. Softing OPC UA C++ SDK (Software Development Kit) versiones desde 5.59 hasta 5.64, exportan funciones de biblioteca que no comprueban apropiadamente los objetos de extensión recibidos, lo que puede permitir a un atacante bloquear el software mediante el envío de una variedad de paquetes especialmente diseñados para acceder a varias ubicaciones de memoria no esperadas • https://www.cisa.gov/uscert/ics/advisories/icsa-21-168-02 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •