7 results (0.005 seconds)

CVSS: 7.8EPSS: 0%CPEs: 12EXPL: 0

Multiple Phoenix Contact PLCnext control devices in versions prior to 2021.0.5 LTS are prone to a DoS attack through special crafted JSON requests. Múltiples dispositivos de control Phoenix Contact PLCnext en versiones anteriores a 2021.0.5 LTS, son propensos a un ataque DoS mediante peticiones JSON especialmente diseñadas • https://cert.vde.com/en/advisories/VDE-2021-029 • CWE-20: Improper Input Validation •

CVSS: 6.5EPSS: 0%CPEs: 12EXPL: 0

On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS a specially crafted LLDP packet may lead to a high system load in the PROFINET stack. An attacker can cause failure of system services or a complete reboot. En Phoenix Contact PLCnext Control Devices versiones anteriores a 2021.0 LTS, un paquete LLDP especialmente diseñado puede conllevar a una alta carga del sistema en la pila PROFINET. Un atacante puede causar un fallo en los servicios del sistema o un reinicio completo • https://cert.vde.com/en-us/advisories/vde-2020-049 • CWE-20: Improper Input Validation •

CVSS: 10.0EPSS: 0%CPEs: 12EXPL: 0

On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS an attacker can use this vulnerability i.e. to open a reverse shell with root privileges. En Phoenix Contact PLCnext Control Devices versiones anteriores a 2021.0 LTS, un atacante puede utilizar esta vulnerabilidad, es decir, para abrir un shell inverso con privilegios root • https://cert.vde.com/en-us/advisories/vde-2020-049 • CWE-269: Improper Privilege Management •

CVSS: 5.5EPSS: 0%CPEs: 12EXPL: 0

On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS an attacker can use the knowledge gained by reading the insufficiently protected sensitive information to plan further attacks. En Phoenix Contact PLCnext Control Devices versiones anteriores a 2021.0 LTS, un atacante puede utilizar los conocimientos adquiridos al leer la información confidencial que no está suficientemente protegida para planificar futuros ataques • https://cert.vde.com/en-us/advisories/vde-2020-049 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.0EPSS: 0%CPEs: 12EXPL: 0

On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS an authenticated low privileged user could embed malicious Javascript code to gain admin rights when the admin user visits the vulnerable website (local privilege escalation). En Phoenix Contact PLCnext Control Devices versiones anteriores a 2021.0 LTS, un usuario autenticado poco privilegiado podría insertar código Javascript malicioso para alcanzar derechos de administrador cuando el usuario administrador visita el sitio web vulnerable (escalada de privilegios local) • https://cert.vde.com/en-us/advisories/vde-2020-049 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •