Normal view

There are new articles available, click to refresh the page.
Before yesterdayTeam82 Disclosure Dashboard

CVE-2019-6834

13 August 2019 at 00:00

DESERIALIZATION OF UNTRUSTED DATA CWE-502
A vulnerability exists which could allow an attacker to execute arbitrary code on the targeted system with SYSTEM privileges when placing a malicious file at a certain location on the filesystem. By default, this folder location requires the malicious user to be authenticated for this vulnerability to be successfully exploited.

CVE-2019-13559

8 October 2019 at 00:00

USE OF HARD-CODED CREDENTIALS CWE - 798
The affected product is shipped with pre-configured hard-coded credentials that may allow root-user access to the controller. A limited application of the affected product may ship without setup and configuration instructions immediately available to the end user. The bulk of controllers go into applications requiring the GE commissioning engineer to change default configurations during the installation process.

CVE-2020-10939

25 March 2020 at 00:00

Unprivileged user can override the main service of 'PC WORX SRT' under the Phoenix Contact installation path, and therefore, escalate to run code as SYSTEM user and gain local privilege escalation.
A malicious user can leverage this knowledge and override the main 'PC WORX SRT' service with a rogue binary which will result with running malicious code as SYSTEM user.

CVE-2020-6992

11 April 2020 at 00:00

IMPROPER PRIVILEGE MANAGEMENT CWE-269
A local privilege escalation vulnerability has been identified in the GE Digital CIMPLICITY HMI/SCADA product. If exploited, this vulnerability could allow an adversary to modify the system, leading to the arbitrary execution of code. This vulnerability is only exploitable if an attacker has access to an authenticated session.

CVE-2020-10612

14 May 2020 at 00:00

IMPROPER ACCESS CONTROL CWE-284
SoftPACAgent communicates with SoftPACMonitor over network Port 22000. However, this port is open without any restrictions. This allows an attacker with network access to control the SoftPACAgent service including updating SoftPAC firmware, starting or stopping service, or writing to certain registry values.

Read more: "Security Flaws in Software-Based PLCs Enable Remote Code Execution on Windows Box"

CVE-2020-12038

19 May 2020 at 00:00

IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119
A memory corruption vulnerability exists in the algorithm that matches square brackets in the EDS subsystem. This may allow an attacker to craft specialized EDS files to crash the EDSParser COM object, leading to denial-of-service conditions.

Read more: "EDS Subsystem Vulnerabilities Expose OT Assets to Malicious File Delivery"

CVE-2020-12034

19 May 2020 at 00:00

IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND ('SQL INJECTION') CWE-89
The EDS subsystem does not provide adequate input sanitization, which may allow an attacker to craft specialized EDS files to inject SQL queries and manipulate the database storing the EDS files. This may lead to denial-of-service (DoS) conditions or allow an attacker to manipulate the SQL engine to write or modify files on the system.

Read more: "EDS Subsystem Vulnerabilities Expose OT Assets to Malicious File Delivery"

❌
❌