❌

Reading view

There are new articles available, click to refresh the page.

CVE-2018-10601

CWE-121: STACK-BASED BUFFER OVERFLOW
The vulnerability exposes an "echo" service, in which an attacker-sent buffer to an attacker-chosen device address within the same subnet is copied to the stack with no boundary checks, hence resulting in stack overflow.

CVE-2018-10599

CWE-200: INFORMATION EXPOSURE
The vulnerability allows an unauthenticated attacker to read memory from an attacker-chosen device address within the same subnet.

CVE-2018-10597

CWE-287: IMPROPER AUTHENTICATION
The vulnerability allows an unauthenticated attacker to access memory ("write-what-where") from an attacker-chosen device address within the same subnet.

CVE-2018-18564

CWE-284: IMPROPER ACCESS CONTROL
Improper access control to a service command allows attackers in the adjacent network to execute arbitrary code on the system through a crafted message.

CVE-2018-18563

CWE-434 : UNRESTRICTED UPLOAD OF FILE WITH DANGEROUS TYPE
A vulnerability in the software update mechanism allows an attacker in adjacent network to overwrite arbitrary files on the system through a crafted update package.

CVE-2018-18562

CWE-78: IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN OS COMMAND ('OS COMMAND INJECTION')
Insecure permissions in a service interface may allow authenticated attackers in the adjacent network to execute arbitrary commands on the operating systems.

CVE-2018-18561

CWE-287 : IMPROPER AUTHENTICATION
Weak access credentials may enable attackers in the adjacent network to gain unauthorized service access via a service interface.

CVE-2019-6834

DESERIALIZATION OF UNTRUSTED DATA CWE-502
A vulnerability exists which could allow an attacker to execute arbitrary code on the targeted system with SYSTEM privileges when placing a malicious file at a certain location on the filesystem. By default, this folder location requires the malicious user to be authenticated for this vulnerability to be successfully exploited.

CVE-2019-13921

INSUFFICIENT RESOURCE POOL CWE-410
An unauthenticated attacker sending a large HTTP request to the host where WinAC RTX is running may trigger a denial-of-service condition.

CVE-2019-13559

USE OF HARD-CODED CREDENTIALS CWE - 798
The affected product is shipped with pre-configured hard-coded credentials that may allow root-user access to the controller. A limited application of the affected product may ship without setup and configuration instructions immediately available to the end user. The bulk of controllers go into applications requiring the GE commissioning engineer to change default configurations during the installation process.

CVE-2019-13554

IMPROPER AUTHORIZATION CWE-285
The affected product has an unsecured Telnet protocol that may allow a user to create an authenticated session using generic default credentials.

CVE-2019-19279

IMPROPER INPUT VALIDATION CWE-20
Specially crafted packets sent to Port 50000/UDP of the EN100 Ethernet communication modules could cause a denial-of-service condition on the affected device. A manual reboot is required to recover the service of the device.

CVE-2019-19108

IMPROPER AUTHORIZATION CWE-285
The affected products are vulnerable to a weakness in SNMP service, which allows unauthenticated users to modify the configuration via the service.

CVE-2020-10939

Unprivileged user can override the main service of 'PC WORX SRT' under the Phoenix Contact installation path, and therefore, escalate to run code as SYSTEM user and gain local privilege escalation.
A malicious user can leverage this knowledge and override the main 'PC WORX SRT' service with a rogue binary which will result with running malicious code as SYSTEM user.

CVE-2020-6992

IMPROPER PRIVILEGE MANAGEMENT CWE-269
A local privilege escalation vulnerability has been identified in the GE Digital CIMPLICITY HMI/SCADA product. If exploited, this vulnerability could allow an adversary to modify the system, leading to the arbitrary execution of code. This vulnerability is only exploitable if an attacker has access to an authenticated session.

CVE-2020-10641

IMPROPER ACCESS CONTROLS CWE-284
An unprotected logging route may allow an attacker to write endless log statements into the database without space limits or authentication. This results in consuming the entire available hard-disk space, causing a denial-of-service condition.

CVE-2020-7494

PATH TRAVERSAL CWE-22
An attacker could exploit this path traversal vulnerability by getting a user to visit a malicious page or open a malicious file.

CVE-2020-10612

IMPROPER ACCESS CONTROL CWE-284
SoftPACAgent communicates with SoftPACMonitor over network Port 22000. However, this port is open without any restrictions. This allows an attacker with network access to control the SoftPACAgent service including updating SoftPAC firmware, starting or stopping service, or writing to certain registry values.

Read more: "Security Flaws in Software-Based PLCs Enable Remote Code Execution on Windows Box"

CVE-2019-6820

CWE-306: Missing Authentication for Critical Function vulnerability exists which could cause a modification of device IP configuration (IP address, network mask and gateway IP address)

CVE-2020-12034

IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN SQL COMMAND ('SQL INJECTION') CWE-89
The EDS subsystem does not provide adequate input sanitization, which may allow an attacker to craft specialized EDS files to inject SQL queries and manipulate the database storing the EDS files. This may lead to denial-of-service (DoS) conditions or allow an attacker to manipulate the SQL engine to write or modify files on the system.

Read more: "EDS Subsystem Vulnerabilities Expose OT Assets to Malicious File Delivery"

❌