CVE-2018-18881
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A Denial of Service (DOS) issue was discovered in ControlByWeb X-320M-I Web-Enabled Instrumentation-Grade Data Acquisition module 1.05 with firmware revision v1.05. An authenticated user can configure invalid network settings, stopping TCP based communications to the device. A physical factory reset is required to restore the device to an operational state.
Se ha descubierto un problema de denegación de servicio (DoS) en el módulo de adquisición de datos ControlByWeb X-320M-I Web-Enabled Instrumentation-Grade 1.05 con la revisión de firmware v1.05. Un usuario autenticado puede configurar unas opciones de red inválidas, paralizando las comunicaciones TCP al dispositivo. Se necesita realizar un reinicio físico a fábrica para restaurar el dispositivo a un estado funcional.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-10-31 CVE Reserved
- 2019-03-17 CVE Published
- 2024-08-05 CVE Updated
- 2024-08-07 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/106655 | Third Party Advisory | |
https://applied-risk.com/labs/advisories | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Controlbyweb Search vendor "Controlbyweb" | X-320m-i Firmware Search vendor "Controlbyweb" for product "X-320m-i Firmware" | <= 1.05 Search vendor "Controlbyweb" for product "X-320m-i Firmware" and version " <= 1.05" | - |
Affected
| in | Controlbyweb Search vendor "Controlbyweb" | X-320m-i Search vendor "Controlbyweb" for product "X-320m-i" | - | - |
Safe
|