CVE-2011-4859
https://notcve.org/view.php?id=CVE-2011-4859
The Schneider Electric Quantum Ethernet Module, as used in the Quantum 140NOE771* and 140CPU65* modules, the Premium TSXETY* and TSXP57* modules, the M340 BMXNOE01* and BMXP3420* modules, and the STB DIO STBNIC2212 and STBNIP2* modules, uses hardcoded passwords for the (1) AUTCSE, (2) AUT_CSE, (3) fdrusers, (4) ftpuser, (5) loader, (6) nic2212, (7) nimrohs2212, (8) nip2212, (9) noe77111_v500, (10) ntpupdate, (11) pcfactory, (12) sysdiag, (13) target, (14) test, (15) USER, and (16) webserver accounts, which makes it easier for remote attackers to obtain access via the (a) TELNET, (b) Windriver Debug, or (c) FTP port. El módulo Schneider Electric Quantum Ethernet, tal como se utiliza en los módulos Quantum 140NOE771* y 140CPU65*, los módulos Premium TSXETY* y TSXP57*, los módulos M340 BMXNOE01* y BMXP3420*, y los módulos STB DIO STBNIC2212 y STBNIP2*, utiliza contraseñas estáticas para las cuentas (1) AUTCSE, (2) AUT_CSE, (3) fdrusers, (4) ftpuser, (5) loader, (6) nic2212, (7) nimrohs2212, (8) nip2212, (9) noe77111_v500, (10) ntpupdate, (11) pcfactory, (12) sysdiag, (13) target, (14) test, (15) USER, y (16) webserver, lo que facilita a atacantes remotos obtener acceso a través de (a) TELNET, (b) Windriver Debug, o (c) el puerto FTP. • http://reversemode.com/index.php?option=com_content&task=view&id=80&Itemid=1 http://secunia.com/advisories/47723 http://www.securityfocus.com/bid/51605 http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-346-01.pdf http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-12-020-03.pdf http://www.us-cert.gov/control_systems/pdf/ICSA-12-018-01.pdf https://exchange.xforce.ibmcloud.com/vulnerabilities/72587 •
CVE-2011-4860
https://notcve.org/view.php?id=CVE-2011-4860
The ComputePassword function in the Schneider Electric Quantum Ethernet Module on the NOE 771 device (aka the Quantum 140NOE771* module) generates the password for the fwupgrade account by performing a calculation on the MAC address, which makes it easier for remote attackers to obtain access via a (1) ARP request message or (2) Neighbor Solicitation message. La función ComputePassword del módulo Schneider Electric Quantum Ethernet del dispositivo NOE 771 (modulo Quantum 140NOE771*) genera la contraseña de la cuenta fwupgrade realizando un cálculo con la dirección MAC, lo que facilita a atacantes remotos obtener acceso a través de (1) un mensaje de petición ARP o (2) un mensaje de descubrimiento de elementos en la misma red ("Neighbor Solicitation"). • http://reversemode.com/index.php?option=com_content&task=view&id=80&Itemid=1 • CWE-287: Improper Authentication •
CVE-2011-4861
https://notcve.org/view.php?id=CVE-2011-4861
The modbus_125_handler function in the Schneider Electric Quantum Ethernet Module on the NOE 771 device (aka the Quantum 140NOE771* module) allows remote attackers to install arbitrary firmware updates via a MODBUS 125 function code to TCP port 502. La función modbus_125_handler del módulo Schneider Electric Quantum Ethernet del dispositivo NOE 771 (módulo Quantum 140NOE771*) permite a atacantes remotos instalar actualizaciones de firmware arbitrarias a través de un código de función MODBUS 125 al puerto TCP 502. • http://reversemode.com/index.php?option=com_content&task=view&id=80&Itemid=1 • CWE-264: Permissions, Privileges, and Access Controls •