7 results (0.015 seconds)

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

Enabled IP Forwarding feature in B&R Automation Runtime versions before 6.0.2 may allow remote attack-ers to compromise network security by routing IP-based packets through the host, potentially by-passing firewall, router, or NAC filtering. • https://www.br-automation.com/fileadmin/SA24P011-d8aaf02f.pdf • CWE-653: Improper Isolation or Compartmentalization CWE-1188: Initialization of a Resource with an Insecure Default •

CVSS: 8.3EPSS: 0%CPEs: 1EXPL: 0

Diffie-Hellman groups with insufficient strength are used in the SSL/TLS stack of B&R Automation Runtime versions before 6.0.2, allowing a network attacker to decrypt the SSL/TLS communication. • https://www.br-automation.com/fileadmin/SA24P011-d8aaf02f.pdf • CWE-326: Inadequate Encryption Strength •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

A reflected cross-site scripting (XSS) vulnerability exists in the SVG version of System Diagnostics Manager of B&R Automation Runtime versions <= G4.93 that enables a remote attacker to execute arbitrary JavaScript code in the context of the attacked user’s browser session. Existe una vulnerabilidad de cross-site scripting (XSS) reflejada en la versión SVG de System Diagnostics Manager de B&amp;R Automation Runtime versiones &lt;= G4.93 que permite a un atacante remoto ejecutar código JavaScript arbitrario en el contexto de la sesión del navegador del usuario atacado. • https://www.br-automation.com/fileadmin/SA23P018_SDM_Web_interface_vulnerable_to_XSS-1d75bee8.pdf • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

The FTP server used on the B&R Automation Runtime supports unsecure encryption mechanisms, such as SSLv3, TLSv1.0 and TLS1.1. An network-based attacker can exploit the flaws to conduct man-in-the-middle attacks or to decrypt communications between the affected product clients. Uso de una vulnerabilidad de algoritmo criptográfico defectuoso o riesgoso en B&amp;R Industrial Automation Automation Runtime (módulos SDM). El servidor FTP utilizado en B&amp;R Automation Runtime admite mecanismos de cifrado no seguros, como SSLv3, TLSv1.0 y TLS1.1. Un atacante basado en red puede explotar las fallas para realizar ataques de intermediario o para descifrar las comunicaciones entre los clientes del producto afectado. • https://www.br-automation.com/fileadmin/SA23P004_FTP_uses_unsecure_encryption_mechanisms-f57c147c.pdf • CWE-327: Use of a Broken or Risky Cryptographic Algorithm CWE-1240: Use of a Cryptographic Primitive with a Risky Implementation •

CVSS: 8.6EPSS: 0%CPEs: 1EXPL: 0

Improper initialization implementation in Portmapper used in B&R Industrial Automation Automation Runtime <G4.93 allows unauthenticated network-based attackers to cause permanent denial-of-service conditions. • https://www.br-automation.com/downloads_br_productcatalogue/assets/1689787619746-en-original-1.0.pdf • CWE-665: Improper Initialization CWE-770: Allocation of Resources Without Limits or Throttling •