
CVE-2022-40282 – Hirschmann (Belden) BAT-C2 8.8.1.0R8 Command Injection
https://notcve.org/view.php?id=CVE-2022-40282
25 Nov 2022 — The web server of Hirschmann BAT-C2 before 09.13.01.00R04 allows authenticated command injection. This allows an authenticated attacker to pass commands to the shell of the system because the dir parameter of the FsCreateDir Ajax function is not sufficiently sanitized. The vendor's ID is BSECV-2022-21. El servidor web de Hirschmann BAT-C2 anterior a 09.13.01.00R04 permite la inyección de comandos autenticados. Esto permite que un atacante autenticado pase comandos al shell del sistema porque el parámetro di... • https://packetstorm.news/files/id/170063 •

CVE-2021-30066
https://notcve.org/view.php?id=CVE-2021-30066
03 Apr 2022 — On Schneider Electric ConneXium Tofino Firewall TCSEFEA23F3F22 before 03.23, TCSEFEA23F3F20/21, and Belden Tofino Xenon Security Appliance, an arbitrary firmware image can be loaded because firmware signature verification (for a USB stick) can be bypassed. NOTE: this issue exists because of an incomplete fix of CVE-2017-11400. En Schneider Electric ConneXium Tofino Firewall TCSEFEA23F3F22 versiones anteriores a 03.23, TCSEFEA23F3F20/21, y Belden Tofino Xenon Security Appliance, puede cargarse una imagen de ... • https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-011-05 • CWE-347: Improper Verification of Cryptographic Signature •

CVE-2021-30065
https://notcve.org/view.php?id=CVE-2021-30065
03 Apr 2022 — On Schneider Electric ConneXium Tofino Firewall TCSEFEA23F3F22 before 03.23, TCSEFEA23F3F20/21, and Belden Tofino Xenon Security Appliance, crafted ModBus packets can bypass the ModBus enforcer. NOTE: this issue exists because of an incomplete fix of CVE-2017-11401. En Schneider Electric ConneXium Tofino Firewall TCSEFEA23F3F22 versiones hasta 03.23, TCSEFEA23F3F20/21 y Belden Tofino Xenon Security Appliance, los paquetes ModBus diseñados pueden omitir el ModBus enforcer. NOTA: este problema se presenta deb... • https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-011-05 •

CVE-2021-30064
https://notcve.org/view.php?id=CVE-2021-30064
03 Apr 2022 — On Schneider Electric ConneXium Tofino Firewall TCSEFEA23F3F22 before 03.23, TCSEFEA23F3F20/21, and Belden Tofino Xenon Security Appliance, an SSH login can succeed with hardcoded default credentials (if the device is in the uncommissioned state). En Schneider Electric ConneXium Tofino Firewall TCSEFEA23F3F22 versiones hasta 03.23, TCSEFEA23F3F20/21 y Belden Tofino Xenon Security Appliance, un inicio de sesión SSH puede tener éxito con credenciales embebidas predeterminadas (si el dispositivo está en el est... • https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-011-05 • CWE-798: Use of Hard-coded Credentials •

CVE-2021-30063
https://notcve.org/view.php?id=CVE-2021-30063
03 Apr 2022 — On Schneider Electric ConneXium Tofino OPCLSM TCSEFM0000 before 03.23 and Belden Tofino Xenon Security Appliance, crafted OPC packets can cause an OPC enforcer denial of service. En Schneider Electric ConneXium Tofino OPCLSM TCSEFM0000 versiones hasta 03.23 y Belden Tofino Xenon Security Appliance, los paquetes OPC diseñados pueden provocar una denegación de servicio del ejecutor OPC • https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-011-05 •

CVE-2021-30062
https://notcve.org/view.php?id=CVE-2021-30062
03 Apr 2022 — On Schneider Electric ConneXium Tofino OPCLSM TCSEFM0000 before 03.23 and Belden Tofino Xenon Security Appliance, crafted OPC packets can bypass the OPC enforcer. En Schneider Electric ConneXium Tofino OPCLSM TCSEFM0000 versiones anteriores a 03.23 y Belden Tofino Xenon Security Appliance, los paquetes OPC diseñados pueden omitir el reforzador OPC • https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-011-05 •

CVE-2021-30061
https://notcve.org/view.php?id=CVE-2021-30061
03 Apr 2022 — On Schneider Electric ConneXium Tofino Firewall TCSEFEA23F3F22 before 03.23, TCSEFEA23F3F20/21, and Belden Tofino Xenon Security Appliance, physically proximate attackers can execute code via a crafted file on a USB stick. En Schneider Electric ConneXium Tofino Firewall TCSEFEA23F3F22 versiones anteriores a 03.23, TCSEFEA23F3F20/21, y Belden Tofino Xenon Security Appliance, los atacantes físicamente próximos pueden ejecutar código por medio de un archivo diseñado en una memoria USB • https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-011-05 •

CVE-2021-27734
https://notcve.org/view.php?id=CVE-2021-27734
17 May 2021 — Hirschmann HiOS 07.1.01, 07.1.02, and 08.1.00 through 08.5.xx and HiSecOS 03.3.00 through 03.5.01 allow remote attackers to change the credentials of existing users. Hirschmann HiOS versiones 07.1.01, 07.1.02 y versiones 08.1.00 hasta 08.5.xx y HiSecOS versiones 03.3.00 hasta 03.5.01, permiten a atacantes remotos cambiar las credenciales de los usuarios existentes • https://dam.belden.com/dmm3bwsv3/assetstream.aspx?assetid=12914&mediaformatid=50063&destinationid=10016 • CWE-287: Improper Authentication •

CVE-2020-9307
https://notcve.org/view.php?id=CVE-2020-9307
11 Feb 2021 — Hirschmann OS2, RSP, and RSPE devices before HiOS 08.3.00 allow a denial of service. An unauthenticated, adjacent attacker can cause an infinite loop on one of the HSR ring ports of the device. This effectively breaks the redundancy of the HSR ring. If the attacker can perform the same attack on a second device, the ring is broken into two parts (thus disrupting communication between devices in the different parts). Los dispositivos Hirschmann OS2, RSP y RSPE anteriores a HiOS versiones 08.3.00, permiten un... • https://www.belden.com/dfsmedia/f1e38517e0cd4caa8b1acb6619890f5e/12276-source/options/view • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVE-2020-6994
https://notcve.org/view.php?id=CVE-2020-6994
03 Apr 2020 — A buffer overflow vulnerability was found in some devices of Hirschmann Automation and Control HiOS and HiSecOS. The vulnerability is due to improper parsing of URL arguments. An attacker could exploit this vulnerability by specially crafting HTTP requests to overflow an internal buffer. The following devices using HiOS Version 07.0.02 and lower are affected: RSP, RSPE, RSPS, RSPL, MSP, EES, EES, EESX, GRS, OS, RED. The following devices using HiSecOS Version 03.2.00 and lower are affected: EAGLE20/30. • https://www.us-cert.gov/ics/advisories/icsa-20-091-01 • CWE-12: ASP.NET Misconfiguration: Missing Custom Error Page CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •