10 results (0.045 seconds)

CVSS: 10.0EPSS: 1%CPEs: 28EXPL: 0

27 Feb 2023 — The configuration backend allows an unauthenticated user to write arbitrary data with root privileges to the storage, which could lead to unauthenticated remote code execution and full system compromise. • https://cert.vde.com/en/advisories/VDE-2022-060 • CWE-306: Missing Authentication for Critical Function •

CVSS: 5.3EPSS: 0%CPEs: 28EXPL: 0

27 Feb 2023 — A CORS Misconfiguration in the web-based management allows a malicious third party webserver to misuse all basic information pages on the webserver. In combination with CVE-2022-45138 this could lead to disclosure of device information like CPU diagnostics. As there is just a limited amount of information readable the impact only affects a small subset of confidentiality. • https://cert.vde.com/en/advisories/VDE-2022-060 • CWE-346: Origin Validation Error •

CVSS: 10.0EPSS: 0%CPEs: 28EXPL: 0

27 Feb 2023 — The configuration backend of the web-based management can be used by unauthenticated users, although only authenticated users should be able to use the API. The vulnerability allows an unauthenticated attacker to read and set several device parameters that can lead to full compromise of the device. • https://cert.vde.com/en/advisories/VDE-2022-060 • CWE-306: Missing Authentication for Critical Function •

CVSS: 6.4EPSS: 0%CPEs: 28EXPL: 0

27 Feb 2023 — The configuration backend of the web-based management is vulnerable to reflected XSS (Cross-Site Scripting) attacks that targets the users browser. This leads to a limited impact of confidentiality and integrity but no impact of availability. • https://cert.vde.com/en/advisories/VDE-2022-060 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 10.0EPSS: 0%CPEs: 245EXPL: 0

09 Nov 2022 — In WAGO I/O-Check Service in multiple products an attacker can send a specially crafted packet containing OS commands to crash the diagnostic tool and write memory. En WAGO I/O-Check Service en varios productos, un atacante puede enviar un paquete especialmente manipulado que contiene comandos del Sistema Operativo para bloquear la herramienta de diagnóstico y escribir en la memoria. In WAGO I/O-Check Service in multiple products an attacker can send a specially crafted packet containing OS commands to cras... • https://cert.vde.com/en/advisories/VDE-2020-036 • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 245EXPL: 0

09 Nov 2022 — In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to provoke a denial of service. En WAGO I/O-Check Service en varios productos, un atacante remoto no autenticado puede enviar un paquete especialmente manipulado que contiene comandos del Sistema Operativo para provocar una Denegación de Servicio (DoS). In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet... • https://cert.vde.com/en/advisories/VDE-2020-036 • CWE-770: Allocation of Resources Without Limits or Throttling •

CVSS: 8.5EPSS: 0%CPEs: 245EXPL: 0

09 Nov 2022 — In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to provoke a denial of service and an limited out-of-bounds read. En WAGO I/O-Check Service en múltiples productos, un atacante remoto no autenticado puede enviar un paquete especialmente manipulado que contiene comandos del Sistema Operativo para provocar una Denegación de Servicio (DoS) y una lectura fuera de los límites limitada. In WAGO I/O-Check Service in multipl... • https://cert.vde.com/en/advisories/VDE-2020-036 • CWE-125: Out-of-bounds Read •

CVSS: 9.4EPSS: 0%CPEs: 245EXPL: 0

09 Nov 2022 — In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to crash the iocheck process and write memory resulting in loss of integrity and DoS. En WAGO I/O-Check Service en varios productos, un atacante remoto no autenticado puede enviar un paquete especialmente manipulado que contiene comandos del Sistema Operativo para bloquear el proceso iocheck y escribir en la memoria, lo que resulta en pérdida de integridad y DoS. In WA... • https://cert.vde.com/en/advisories/VDE-2020-036 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.8EPSS: 0%CPEs: 156EXPL: 0

17 Oct 2022 — WAGO Series PFC100/PFC200, Series Touch Panel 600, Compact Controller CC100 and Edge Controller in multiple versions are prone to a loss of MAC-Address-Filtering after reboot. This may allow an remote attacker to circumvent the reach the network that should be protected by the MAC address filter. WAGO Series PFC100/PFC200, Series Touch Panel 600, Compact Controller CC100 and Edge Controller en varias versiones son propensos a perder el filtrado de direcciones MAC tras el reinicio. Esto puede permitir a un a... • https://cert.vde.com/en/advisories/VDE-2022-042 • CWE-440: Expected Behavior Violation •

CVSS: 5.4EPSS: 0%CPEs: 50EXPL: 0

09 Mar 2022 — Various configuration pages of the device are vulnerable to reflected XSS (Cross-Site Scripting) attacks. An authorized attacker with user privileges may use this to gain access to confidential information on a PC that connects to the WBM after it has been compromised. Varias páginas de configuración del dispositivo son vulnerables a ataques de tipo XSS (Cross-Site Scripting) reflejados. Un atacante autorizado con privilegios de usuario puede usar esto para conseguir acceso a información confidencial en un ... • https://cert.vde.com/en/advisories/VDE-2022-004 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •