Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2012-3416

Summary
Assigner-redhat
Assigner Org ID-53f830b8-0a3f-465b-8143-3b8a9948e749
Published At-25 Aug, 2012 | 10:00
Updated At-06 Aug, 2024 | 20:05
Rejected At-
Credits

Condor before 7.8.2 allows remote attackers to bypass host-based authentication and execute actions such as ALLOW_ADMINISTRATOR or ALLOW_WRITE by connecting from a system with a spoofed reverse DNS hostname.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:redhat
Assigner Org ID:53f830b8-0a3f-465b-8143-3b8a9948e749
Published At:25 Aug, 2012 | 10:00
Updated At:06 Aug, 2024 | 20:05
Rejected At:
▼CVE Numbering Authority (CNA)

Condor before 7.8.2 allows remote attackers to bypass host-based authentication and execute actions such as ALLOW_ADMINISTRATOR or ALLOW_WRITE by connecting from a system with a spoofed reverse DNS hostname.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://exchange.xforce.ibmcloud.com/vulnerabilities/77748
vdb-entry
x_refsource_XF
http://rhn.redhat.com/errata/RHSA-2012-1168.html
vendor-advisory
x_refsource_REDHAT
http://www.securitytracker.com/id?1027395
vdb-entry
x_refsource_SECTRACK
http://osvdb.org/84766
vdb-entry
x_refsource_OSVDB
http://secunia.com/advisories/50246
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/bid/55032
vdb-entry
x_refsource_BID
http://secunia.com/advisories/50294
third-party-advisory
x_refsource_SECUNIA
http://rhn.redhat.com/errata/RHSA-2012-1169.html
vendor-advisory
x_refsource_REDHAT
http://research.cs.wisc.edu/condor/security/vulnerabilities/CONDOR-2012-0002.html
x_refsource_CONFIRM
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/77748
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://rhn.redhat.com/errata/RHSA-2012-1168.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://www.securitytracker.com/id?1027395
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://osvdb.org/84766
Resource:
vdb-entry
x_refsource_OSVDB
Hyperlink: http://secunia.com/advisories/50246
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/bid/55032
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://secunia.com/advisories/50294
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://rhn.redhat.com/errata/RHSA-2012-1169.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://research.cs.wisc.edu/condor/security/vulnerabilities/CONDOR-2012-0002.html
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://exchange.xforce.ibmcloud.com/vulnerabilities/77748
vdb-entry
x_refsource_XF
x_transferred
http://rhn.redhat.com/errata/RHSA-2012-1168.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://www.securitytracker.com/id?1027395
vdb-entry
x_refsource_SECTRACK
x_transferred
http://osvdb.org/84766
vdb-entry
x_refsource_OSVDB
x_transferred
http://secunia.com/advisories/50246
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/bid/55032
vdb-entry
x_refsource_BID
x_transferred
http://secunia.com/advisories/50294
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://rhn.redhat.com/errata/RHSA-2012-1169.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://research.cs.wisc.edu/condor/security/vulnerabilities/CONDOR-2012-0002.html
x_refsource_CONFIRM
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/77748
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://rhn.redhat.com/errata/RHSA-2012-1168.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://www.securitytracker.com/id?1027395
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://osvdb.org/84766
Resource:
vdb-entry
x_refsource_OSVDB
x_transferred
Hyperlink: http://secunia.com/advisories/50246
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/bid/55032
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://secunia.com/advisories/50294
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://rhn.redhat.com/errata/RHSA-2012-1169.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://research.cs.wisc.edu/condor/security/vulnerabilities/CONDOR-2012-0002.html
Resource:
x_refsource_CONFIRM
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secalert@redhat.com
Published At:25 Aug, 2012 | 10:29
Updated At:11 Apr, 2025 | 00:51

Condor before 7.8.2 allows remote attackers to bypass host-based authentication and execute actions such as ALLOW_ADMINISTRATOR or ALLOW_WRITE by connecting from a system with a spoofed reverse DNS hostname.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.010.0HIGH
AV:N/AC:L/Au:N/C:C/I:C/A:C
Type: Primary
Version: 2.0
Base score: 10.0
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

condor_project
condor_project
>>condor>>Versions up to 7.8.1(inclusive)
cpe:2.3:a:condor_project:condor:*:*:*:*:*:*:*:*
condor_project
condor_project
>>condor>>6.5.4
cpe:2.3:a:condor_project:condor:6.5.4:*:*:*:*:*:*:*
condor_project
condor_project
>>condor>>6.8.0
cpe:2.3:a:condor_project:condor:6.8.0:*:*:*:*:*:*:*
condor_project
condor_project
>>condor>>6.8.1
cpe:2.3:a:condor_project:condor:6.8.1:*:*:*:*:*:*:*
condor_project
condor_project
>>condor>>6.8.2
cpe:2.3:a:condor_project:condor:6.8.2:*:*:*:*:*:*:*
condor_project
condor_project
>>condor>>6.8.3
cpe:2.3:a:condor_project:condor:6.8.3:*:*:*:*:*:*:*
condor_project
condor_project
>>condor>>6.8.4
cpe:2.3:a:condor_project:condor:6.8.4:*:*:*:*:*:*:*
condor_project
condor_project
>>condor>>6.8.5
cpe:2.3:a:condor_project:condor:6.8.5:*:*:*:*:*:*:*
condor_project
condor_project
>>condor>>6.8.6
cpe:2.3:a:condor_project:condor:6.8.6:*:*:*:*:*:*:*
condor_project
condor_project
>>condor>>6.8.7
cpe:2.3:a:condor_project:condor:6.8.7:*:*:*:*:*:*:*
condor_project
condor_project
>>condor>>6.8.8
cpe:2.3:a:condor_project:condor:6.8.8:*:*:*:*:*:*:*
condor_project
condor_project
>>condor>>6.8.9
cpe:2.3:a:condor_project:condor:6.8.9:*:*:*:*:*:*:*
condor_project
condor_project
>>condor>>7.00
cpe:2.3:a:condor_project:condor:7.00:*:*:*:*:*:*:*
condor_project
condor_project
>>condor>>7.0.0
cpe:2.3:a:condor_project:condor:7.0.0:*:*:*:*:*:*:*
condor_project
condor_project
>>condor>>7.0.1
cpe:2.3:a:condor_project:condor:7.0.1:*:*:*:*:*:*:*
condor_project
condor_project
>>condor>>7.0.2
cpe:2.3:a:condor_project:condor:7.0.2:*:*:*:*:*:*:*
condor_project
condor_project
>>condor>>7.0.3
cpe:2.3:a:condor_project:condor:7.0.3:*:*:*:*:*:*:*
condor_project
condor_project
>>condor>>7.0.4
cpe:2.3:a:condor_project:condor:7.0.4:*:*:*:*:*:*:*
condor_project
condor_project
>>condor>>7.0.5
cpe:2.3:a:condor_project:condor:7.0.5:*:*:*:*:*:*:*
condor_project
condor_project
>>condor>>7.0.6
cpe:2.3:a:condor_project:condor:7.0.6:*:*:*:*:*:*:*
condor_project
condor_project
>>condor>>7.01
cpe:2.3:a:condor_project:condor:7.01:*:*:*:*:*:*:*
condor_project
condor_project
>>condor>>7.1.0
cpe:2.3:a:condor_project:condor:7.1.0:*:*:*:*:*:*:*
condor_project
condor_project
>>condor>>7.1.1
cpe:2.3:a:condor_project:condor:7.1.1:*:*:*:*:*:*:*
condor_project
condor_project
>>condor>>7.1.2
cpe:2.3:a:condor_project:condor:7.1.2:*:*:*:*:*:*:*
condor_project
condor_project
>>condor>>7.1.3
cpe:2.3:a:condor_project:condor:7.1.3:*:*:*:*:*:*:*
condor_project
condor_project
>>condor>>7.1.4
cpe:2.3:a:condor_project:condor:7.1.4:*:*:*:*:*:*:*
condor_project
condor_project
>>condor>>7.02
cpe:2.3:a:condor_project:condor:7.02:*:*:*:*:*:*:*
condor_project
condor_project
>>condor>>7.2.0
cpe:2.3:a:condor_project:condor:7.2.0:*:*:*:*:*:*:*
condor_project
condor_project
>>condor>>7.2.1
cpe:2.3:a:condor_project:condor:7.2.1:*:*:*:*:*:*:*
condor_project
condor_project
>>condor>>7.2.2
cpe:2.3:a:condor_project:condor:7.2.2:*:*:*:*:*:*:*
condor_project
condor_project
>>condor>>7.2.3
cpe:2.3:a:condor_project:condor:7.2.3:*:*:*:*:*:*:*
condor_project
condor_project
>>condor>>7.2.4
cpe:2.3:a:condor_project:condor:7.2.4:*:*:*:*:*:*:*
condor_project
condor_project
>>condor>>7.03
cpe:2.3:a:condor_project:condor:7.03:*:*:*:*:*:*:*
condor_project
condor_project
>>condor>>7.3.0
cpe:2.3:a:condor_project:condor:7.3.0:*:*:*:*:*:*:*
condor_project
condor_project
>>condor>>7.3.1
cpe:2.3:a:condor_project:condor:7.3.1:*:*:*:*:*:*:*
condor_project
condor_project
>>condor>>7.3.2
cpe:2.3:a:condor_project:condor:7.3.2:*:*:*:*:*:*:*
condor_project
condor_project
>>condor>>7.4.0
cpe:2.3:a:condor_project:condor:7.4.0:*:*:*:*:*:*:*
condor_project
condor_project
>>condor>>7.4.1
cpe:2.3:a:condor_project:condor:7.4.1:*:*:*:*:*:*:*
condor_project
condor_project
>>condor>>7.8.0
cpe:2.3:a:condor_project:condor:7.8.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-287Primarynvd@nist.gov
CWE ID: CWE-287
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://osvdb.org/84766secalert@redhat.com
N/A
http://research.cs.wisc.edu/condor/security/vulnerabilities/CONDOR-2012-0002.htmlsecalert@redhat.com
N/A
http://rhn.redhat.com/errata/RHSA-2012-1168.htmlsecalert@redhat.com
N/A
http://rhn.redhat.com/errata/RHSA-2012-1169.htmlsecalert@redhat.com
N/A
http://secunia.com/advisories/50246secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/50294secalert@redhat.com
Vendor Advisory
http://www.securityfocus.com/bid/55032secalert@redhat.com
N/A
http://www.securitytracker.com/id?1027395secalert@redhat.com
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/77748secalert@redhat.com
N/A
http://osvdb.org/84766af854a3a-2127-422b-91ae-364da2661108
N/A
http://research.cs.wisc.edu/condor/security/vulnerabilities/CONDOR-2012-0002.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://rhn.redhat.com/errata/RHSA-2012-1168.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://rhn.redhat.com/errata/RHSA-2012-1169.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/50246af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/50294af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.securityfocus.com/bid/55032af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securitytracker.com/id?1027395af854a3a-2127-422b-91ae-364da2661108
N/A
https://exchange.xforce.ibmcloud.com/vulnerabilities/77748af854a3a-2127-422b-91ae-364da2661108
N/A
Hyperlink: http://osvdb.org/84766
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://research.cs.wisc.edu/condor/security/vulnerabilities/CONDOR-2012-0002.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://rhn.redhat.com/errata/RHSA-2012-1168.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://rhn.redhat.com/errata/RHSA-2012-1169.html
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://secunia.com/advisories/50246
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/50294
Source: secalert@redhat.com
Resource:
Vendor Advisory
Hyperlink: http://www.securityfocus.com/bid/55032
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://www.securitytracker.com/id?1027395
Source: secalert@redhat.com
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/77748
Source: secalert@redhat.com
Resource: N/A
Hyperlink: http://osvdb.org/84766
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://research.cs.wisc.edu/condor/security/vulnerabilities/CONDOR-2012-0002.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://rhn.redhat.com/errata/RHSA-2012-1168.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://rhn.redhat.com/errata/RHSA-2012-1169.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://secunia.com/advisories/50246
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://secunia.com/advisories/50294
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: http://www.securityfocus.com/bid/55032
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.securitytracker.com/id?1027395
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/77748
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

223Records found

CVE-2007-6234
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-5.35% / 89.87%
||
7 Day CHG+0.93%
Published-04 Dec, 2007 | 18:00
Updated-07 Aug, 2024 | 16:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

index.php in FTP Admin 0.1.0 allows remote attackers to bypass authentication and obtain administrative access via a loggedin parameter with a value of true, as demonstrated by adding a user account.

Action-Not Available
Vendor-ftp_adminn/a
Product-ftp_adminn/a
CWE ID-CWE-287
Improper Authentication
CVE-2017-9860
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.43% / 62.38%
||
7 Day CHG~0.00%
Published-05 Aug, 2017 | 17:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in SMA Solar Technology products. An attacker can use Sunny Explorer or the SMAdata2+ network protocol to update the device firmware without ever having to authenticate. If an attacker is able to create a custom firmware version that is accepted by the inverter, the inverter is compromised completely. This allows the attacker to do nearly anything: for example, giving access to the local OS, creating a botnet, using the inverters as a stepping stone into companies, etc. NOTE: the vendor reports that this attack has always been blocked by "a final integrity and compatibility check." Also, only Sunny Boy TLST-21 and TL-21 and Sunny Tripower TL-10 and TL-30 could potentially be affected

Action-Not Available
Vendor-sman/a
Product-sunny_central_storage_800sunny_central_630cp_xt_firmwaresunny_boy_5000tlsunny_boy_5.0_firmwaresunny_boy_3600sunny_boy_3600tlsunny_boy_3.0_firmwaresunny_central_storage_800_firmwaresunny_central_800cp_xt_firmwaresunny_tripower_25000tlsunny_boy_3600_firmwaresunny_central_720cp_xt_firmwaresunny_central_storage_500sunny_tripower_25000tl_firmwaresunny_central_2200_firmwaresunny_tripower_5000tlsunny_tripower_20000tl_firmwaresunny_central_storage_850sunny_central_storage_900_firmwaresunny_tripower_15000tl_firmwaresunny_central_storage_720_firmwaresunny_tripower_12000tlsunny_central_storage_2200sunny_tripower_60_firmwaresunny_central_760cp_xtsunny_boy_4.0_firmwaresunny_central_storage_2500-evsunny_central_850cp_xt_firmwaresunny_central_500cp_xt_firmwaresunny_boy_5000sunny_boy_1.5sunny_central_800cp_xtsunny_central_storage_1000_firmwaresunny_tripower_20000tlsunny_central_storage_2200_firmwaresunny_central_storage_850_firmwaresunny_central_storage_630_firmwaresunny_central_storage_760_firmwaresunny_boy_3.6sunny_central_storage_630sunny_central_500cp_xtsunny_tripower_core1_firmwaresunny_central_720cp_xtsunny_tripower_core1sunny_central_storage_500_firmwaresunny_boy_4000tlsunny_central_630cp_xtsunny_boy_3600tl_firmwaresunny_boy_4.0sunny_boy_2.5sunny_central_storage_760sunny_central_760cp_xt_firmwaresunny_tripower_15000tlsunny_boy_storage_2.5sunny_boy_5000_firmwaresunny_central_storage_900sunny_boy_1.5_firmwaresunny_boy_3000tlsunny_boy_2.5_firmwaresunny_boy_4000tl_firmwaresunny_central_storage_1000sunny_boy_storage_2.5_firmwaresunny_tripower_5000tl_firmwaresunny_tripower_60sunny_central_900cp_xt_firmwaresunny_boy_5000tl_firmwaresunny_central_storage_2500-ev_firmwaresunny_central_2200sunny_boy_3.0sunny_central_1000cp_xt_firmwaresunny_central_storage_720sunny_boy_5.0sunny_boy_3.6_firmwaresunny_central_850cp_xtsunny_central_900cp_xtsunny_tripower_12000tl_firmwaresunny_boy_3000tl_firmwaresunny_central_1000cp_xtn/a
CWE ID-CWE-287
Improper Authentication
CVE-2017-12337
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-9.8||CRITICAL
EPSS-13.19% / 93.97%
||
7 Day CHG~0.00%
Published-16 Nov, 2017 | 07:00
Updated-31 Jul, 2025 | 15:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the upgrade mechanism of Cisco collaboration products based on the Cisco Voice Operating System software platform could allow an unauthenticated, remote attacker to gain unauthorized, elevated access to an affected device. The vulnerability occurs when a refresh upgrade (RU) or Prime Collaboration Deployment (PCD) migration is performed on an affected device. When a refresh upgrade or PCD migration is completed successfully, an engineering flag remains enabled and could allow root access to the device with a known password. If the vulnerable device is subsequently upgraded using the standard upgrade method to an Engineering Special Release, service update, or a new major release of the affected product, this vulnerability is remediated by that action. Note: Engineering Special Releases that are installed as COP files, as opposed to the standard upgrade method, do not remediate this vulnerability. An attacker who can access an affected device over SFTP while it is in a vulnerable state could gain root access to the device. This access could allow the attacker to compromise the affected system completely. Cisco Bug IDs: CSCvg22923, CSCvg55112, CSCvg55128, CSCvg55145, CSCvg58619, CSCvg64453, CSCvg64456, CSCvg64464, CSCvg64475, CSCvg68797.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-mediasenseprime_license_managerunified_communications_managerunified_contact_center_expresshosted_collaboration_solutionunified_intelligence_centeremergency_responderunified_communications_manager_im_and_presence_servicesocialminerfinesseunity_connectionCisco Voice Operating System
CWE ID-CWE-287
Improper Authentication
CVE-2007-1062
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-5.73% / 90.26%
||
7 Day CHG~0.00%
Published-22 Feb, 2007 | 01:00
Updated-07 Aug, 2024 | 12:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Cisco Unified IP Conference Station 7935 3.2(15) and earlier, and Station 7936 3.3(12) and earlier does not properly handle administrator HTTP sessions, which allows remote attackers to bypass authentication controls via a direct URL request to the administrative HTTP interface for a limited time

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-unified_ip_conference_station_7936unified_ip_conference_station_7935_firmwareunified_ip_conference_station_firmware_7936unified_ip_conference_station_7935n/a
CWE ID-CWE-287
Improper Authentication
CVE-2007-1160
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-1.11% / 77.83%
||
7 Day CHG~0.00%
Published-28 Feb, 2007 | 00:00
Updated-07 Aug, 2024 | 12:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

webSPELL 4.0, and possibly later versions, allows remote attackers to bypass authentication via a ws_auth cookie, a different vulnerability than CVE-2006-4782.

Action-Not Available
Vendor-webspelln/a
Product-webspelln/a
CWE ID-CWE-287
Improper Authentication
CVE-2017-7649
Matching Score-4
Assigner-Eclipse Foundation
ShareView Details
Matching Score-4
Assigner-Eclipse Foundation
CVSS Score-9.8||CRITICAL
EPSS-0.37% / 58.52%
||
7 Day CHG~0.00%
Published-11 Sep, 2017 | 16:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The network enabled distribution of Kura before 2.1.0 takes control over the device's firewall setup but does not allow IPv6 firewall rules to be configured. Still the Equinox console port 5002 is left open, allowing to log into Kura without any user credentials over unencrypted telnet and executing commands using the Equinox "exec" command. As the process is running as "root" full control over the device can be acquired. IPv6 is also left in auto-configuration mode, accepting router advertisements automatically and assigns a MAC address based IPv6 address.

Action-Not Available
Vendor-Eclipse Foundation AISBL
Product-kuraEclipse Kura Installer
CWE ID-CWE-287
Improper Authentication
CVE-2017-7450
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.33% / 55.32%
||
7 Day CHG~0.00%
Published-05 Apr, 2017 | 23:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

AIRTAME HDMI dongle with firmware before 2.2.0 allows unauthenticated access to a big part of the management interface. It is possible to extract all information including the Wi-Fi password, reboot, or force a software update at an arbitrary time.

Action-Not Available
Vendor-airtamen/a
Product-hdmi_donglehdmi_dongle_firmwaren/a
CWE ID-CWE-287
Improper Authentication
CVE-2017-8023
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-9.8||CRITICAL
EPSS-15.17% / 94.45%
||
7 Day CHG~0.00%
Published-01 Apr, 2019 | 20:54
Updated-16 Sep, 2024 | 17:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
EMC Networker Remote Code Execution Vulnerability

EMC NetWorker may potentially be vulnerable to an unauthenticated remote code execution vulnerability in the Networker Client execution service (nsrexecd) when oldauth authentication method is used. An unauthenticated remote attacker could send arbitrary commands via RPC service to be executed on the host system with the privileges of the nsrexecd service, which runs with administrative privileges.

Action-Not Available
Vendor-Dell Inc.
Product-emc_networkerNetworker
CWE ID-CWE-287
Improper Authentication
CVE-2017-7588
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-16.64% / 94.78%
||
7 Day CHG~0.00%
Published-12 Apr, 2017 | 10:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

On certain Brother devices, authorization is mishandled by including a valid AuthCookie cookie in the HTTP response to a failed login attempt. Affected models are: MFC-J6973CDW MFC-J4420DW MFC-8710DW MFC-J4620DW MFC-L8850CDW MFC-J3720 MFC-J6520DW MFC-L2740DW MFC-J5910DW MFC-J6920DW MFC-L2700DW MFC-9130CW MFC-9330CDW MFC-9340CDW MFC-J5620DW MFC-J6720DW MFC-L8600CDW MFC-L9550CDW MFC-L2720DW DCP-L2540DW DCP-L2520DW HL-3140CW HL-3170CDW HL-3180CDW HL-L8350CDW HL-L2380DW ADS-2500W ADS-1000W ADS-1500W.

Action-Not Available
Vendor-n/aBrother Industries, Ltd.
Product-mfc-j5910dwmfc-j6973cdwmfc-l8850cdwmfc-j6920dwads-1500wads_firmwaremfc-j6720dwmfc_firmwaremfc-l2740dwmfc-8710dwdcp-l2520dwhl-l8350cdwmfc-9130cwhl-3170cdwmfc-l2700dwads-2500wdcp-l2540dwmfc-l8600cdwmfc-l9550cdwads-1000wmfc-j6520dwmfc-l2720dwhl-l2380dwmfc-9340cdwmfc-j4620dwmfc-j5620dwhl-3140cwmfc-9330cdwmfc-j4420dwhl_firmwaremfc-j3720hl-3180cdwdcp_firmwaren/a
CWE ID-CWE-287
Improper Authentication
CVE-2017-6869
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-9.8||CRITICAL
EPSS-1.47% / 80.66%
||
7 Day CHG~0.00%
Published-08 Aug, 2017 | 00:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability was discovered in Siemens ViewPort for Web Office Portal before revision number 1453 that could allow an unauthenticated remote user to upload arbitrary code and execute it with the permissions of the operating-system user running the web server by sending specially crafted network packets to port 443/TCP or port 80/TCP.

Action-Not Available
Vendor-n/aSiemens AG
Product-viewport_for_web_office_portalViewPort for Web Office Portal before revision number 1453
CWE ID-CWE-287
Improper Authentication
CVE-2017-5791
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-9.8||CRITICAL
EPSS-58.61% / 98.16%
||
7 Day CHG~0.00%
Published-13 Oct, 2017 | 02:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The doFilter method in UrlAccessController in HPE Intelligent Management Center (iMC) PLAT 7.2 E0403P06 allows remote bypass of authentication via unspecified strings in a URI.

Action-Not Available
Vendor-n/aHP Inc.
Product-intelligent_management_center_platHPE Intelligent Management Center (IMC) PLAT
CWE ID-CWE-287
Improper Authentication
CVE-2017-3831
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-9.8||CRITICAL
EPSS-6.12% / 90.59%
||
7 Day CHG~0.00%
Published-15 Mar, 2017 | 20:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the web-based GUI of Cisco Mobility Express 1800 Series Access Points could allow an unauthenticated, remote attacker to bypass authentication. The attacker could be granted full administrator privileges. The vulnerability is due to improper implementation of authentication for accessing certain web pages using the GUI interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web interface of the affected system. A successful exploit could allow the attacker to bypass authentication and perform unauthorized configuration changes or issue control commands to the affected device. This vulnerability affects Cisco Mobility Express 1800 Series Access Points running a software version prior to 8.2.110.0. Cisco Bug IDs: CSCuy68219.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-aironet_1815iaironet_1850iaironet_1850eaironet_1830eaironet_access_point_softwareaironet_1810waironet_1830iaironet_1810Cisco Mobility Express 1800 Access Point Series
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-264
Not Available
CVE-2017-3791
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-10||CRITICAL
EPSS-15.66% / 94.55%
||
7 Day CHG~0.00%
Published-01 Feb, 2017 | 19:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the web-based GUI of Cisco Prime Home could allow an unauthenticated, remote attacker to bypass authentication and execute actions with administrator privileges. The vulnerability is due to a processing error in the role-based access control (RBAC) of URLs. An attacker could exploit this vulnerability by sending API commands via HTTP to a particular URL without prior authentication. An exploit could allow the attacker to perform any actions in Cisco Prime Home with administrator privileges. This vulnerability affects Cisco Prime Home versions from 6.3.0.0 to the first fixed release 6.5.0.1. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. Cisco Bug IDs: CSCvb49837.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-cisco_prime_homeCisco Prime Home versions from 6.3.0.0 to the first fixed release 6.5.0.1
CWE ID-CWE-287
Improper Authentication
CVE-2017-2126
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-13.46% / 94.05%
||
7 Day CHG~0.00%
Published-22 Jul, 2017 | 00:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

WAPM-1166D firmware Ver.1.2.7 and earlier, WAPM-APG600H firmware Ver.1.16.1 and earlier allows remote attackers to bypass authentication and access the configuration interface via unspecified vectors.

Action-Not Available
Vendor-BUFFALO INC.
Product-wapm-apg600hwapm-apg600h_firmwarewapm-1166d_firmwarewapm-1166dWAPM-APG600HWAPM-1166D
CWE ID-CWE-287
Improper Authentication
CVE-2015-5998
Matching Score-4
Assigner-CERT/CC
ShareView Details
Matching Score-4
Assigner-CERT/CC
CVSS Score-10||HIGH
EPSS-0.72% / 72.09%
||
7 Day CHG~0.00%
Published-14 Sep, 2015 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Impero Education Pro before 5105 relies on the -1|AUTHENTICATE\x02PASSWORD string for authentication, which allows remote attackers to execute arbitrary programs via an encrypted command.

Action-Not Available
Vendor-imperon/a
Product-impero_education_pron/a
CWE ID-CWE-287
Improper Authentication
CVE-2015-0653
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-10||HIGH
EPSS-7.80% / 91.80%
||
7 Day CHG~0.00%
Published-13 Mar, 2015 | 01:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The management interface in Cisco TelePresence Video Communication Server (VCS) and Cisco Expressway before X7.2.4, X8 before X8.1.2, and X8.2 before X8.2.2 and Cisco TelePresence Conductor before X2.3.1 and XC2.4 before XC2.4.1 allows remote attackers to bypass authentication via crafted login parameters, aka Bug IDs CSCur02680 and CSCur05556.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-expressway_softwaretelepresence_conductortelepresence_video_communication_server_softwaren/a
CWE ID-CWE-287
Improper Authentication
CVE-2007-5383
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-2.08% / 83.69%
||
7 Day CHG~0.00%
Published-12 Oct, 2007 | 01:00
Updated-07 Aug, 2024 | 15:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Thomson/Alcatel SpeedTouch 7G router, as used for the BT Home Hub 6.2.6.B and earlier, allows remote attackers on an intranet to bypass authentication and gain administrative access via vectors including a '/' (slash) character at the end of the PATH_INFO to cgi/b, aka "double-slash auth bypass." NOTE: remote attackers outside the intranet can exploit this by leveraging a separate CSRF vulnerability. NOTE: SpeedTouch 780 might also be affected by some of these issues.

Action-Not Available
Vendor-btn/aAlcatel-Lucent Enterprise (ALE International)
Product-speedtouch_7g_routerhome_hubn/a
CWE ID-CWE-287
Improper Authentication
CVE-2008-1268
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-10||HIGH
EPSS-1.06% / 77.31%
||
7 Day CHG~0.00%
Published-10 Mar, 2008 | 17:00
Updated-07 Aug, 2024 | 08:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The FTP server on the Linksys WRT54G 7 router with 7.00.1 firmware does not verify authentication credentials, which allows remote attackers to establish an FTP session by sending an arbitrary username and password.

Action-Not Available
Vendor-n/aLinksys Holdings, Inc.
Product-wrt54gn/a
CWE ID-CWE-287
Improper Authentication
CVE-2015-7755
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-85.63% / 99.35%
||
7 Day CHG~0.00%
Published-19 Dec, 2015 | 11:00
Updated-22 Oct, 2025 | 00:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2025-10-23||Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Juniper ScreenOS 6.2.0r15 through 6.2.0r18, 6.3.0r12 before 6.3.0r12b, 6.3.0r13 before 6.3.0r13b, 6.3.0r14 before 6.3.0r14b, 6.3.0r15 before 6.3.0r15b, 6.3.0r16 before 6.3.0r16b, 6.3.0r17 before 6.3.0r17b, 6.3.0r18 before 6.3.0r18b, 6.3.0r19 before 6.3.0r19b, and 6.3.0r20 before 6.3.0r21 allows remote attackers to obtain administrative access by entering an unspecified password during a (1) SSH or (2) TELNET session.

Action-Not Available
Vendor-n/aJuniper Networks, Inc.
Product-screenosn/aScreenOS
CWE ID-CWE-287
Improper Authentication
CVE-2014-6436
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-14.75% / 94.34%
||
7 Day CHG~0.00%
Published-12 Jan, 2018 | 17:00
Updated-06 Aug, 2024 | 12:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Aztech ADSL DSL5018EN (1T1R), DSL705E, and DSL705EU devices improperly manage sessions, which allows remote attackers to bypass authentication in opportunistic circumstances and execute arbitrary commands with administrator privileges by leveraging an existing web portal login.

Action-Not Available
Vendor-aztechn/a
Product-dsl705edsl705euadsl_dsl5018en_\(1t1r\)_firmwaredsl705eu_firmwaredsl705e_firmwareadsl_dsl5018en_\(1t1r\)n/a
CWE ID-CWE-287
Improper Authentication
CVE-2018-17153
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-92.20% / 99.70%
||
7 Day CHG~0.00%
Published-18 Sep, 2018 | 00:00
Updated-05 Aug, 2024 | 10:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

It was discovered that the Western Digital My Cloud device before 2.30.196 is affected by an authentication bypass vulnerability. An unauthenticated attacker can exploit this vulnerability to authenticate as an admin user without needing to provide a password, thereby gaining full control of the device. (Whenever an admin logs into My Cloud, a server-side session is created that is bound to the user's IP address. After the session is created, it is possible to call authenticated CGI modules by sending the cookie username=admin in the HTTP request. The invoked CGI will check if a valid session is present and bound to the user's IP address.) It was found that it is possible for an unauthenticated attacker to create a valid session without a login. The network_mgr.cgi CGI module contains a command called "cgi_get_ipv6" that starts an admin session -- tied to the IP address of the user making the request -- if the additional parameter "flag" with the value "1" is provided. Subsequent invocation of commands that would normally require admin privileges now succeed if an attacker sets the username=admin cookie.

Action-Not Available
Vendor-n/aWestern Digital Corp.
Product-my_cloud_mirror_gen_2_firmwaremy_cloud_wdbctl0020hwtmy_cloud_ex4my_cloud_ex2my_cloud_pr4100my_cloud_mirror_firmwaremy_cloud_ex4_firmwaremy_cloud_dl2100my_cloud_pr2100my_cloud_ex4100my_cloud_ex2_ultramy_cloud_mirror_gen_2my_cloud_mirrormy_cloud_ex2100my_cloud_dl4100my_cloud_wdbctl0020hwt_firmwaremy_cloud_ex2100_firmwaremy_cloud_dl4100_firmwaremy_cloud_pr2100_firmwaremy_cloud_ex2_firmwaremy_cloud_ex2_ultra_firmwaren/a
CWE ID-CWE-287
Improper Authentication
CVE-2018-14705
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.41% / 61.02%
||
7 Day CHG~0.00%
Published-24 Feb, 2020 | 18:16
Updated-05 Aug, 2024 | 09:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Lack of Authentication/Authorization on Administrative Web Pages

In Drobo 5N2 4.0.5, all optional applications lack any form of authentication/authorization validation. As a result, any user capable of accessing the device over the network may interact with and control these applications. This not only poses a severe risk to the availability of these applications, but also poses severe risks to the confidentiality and integrity of data stored within the applications and the device itself.

Action-Not Available
Vendor-drobon/a
Product-5n2_firmware5n2n/a
CWE ID-CWE-287
Improper Authentication
CVE-2021-41506
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.97% / 76.32%
||
7 Day CHG~0.00%
Published-30 Jun, 2022 | 12:43
Updated-04 Aug, 2024 | 03:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Xiaongmai AHB7008T-MH-V2, AHB7804R-ELS, AHB7804R-MH-V2, AHB7808R-MS-V2, AHB7808R-MS, AHB7808T-MS-V2, AHB7804R-LMS, HI3518_50H10L_S39 V4.02.R11.7601.Nat.Onvif.20170420, V4.02.R11.Nat.Onvif.20160422, V4.02.R11.7601.Nat.Onvif.20170424, V4.02.R11.Nat.Onvif.20170327, V4.02.R11.Nat.Onvif.20161205, V4.02.R11.Nat.20170301, V4.02.R12.Nat.OnvifS.20170727 is affected by a backdoor in the macGuarder and dvrHelper binaries of DVR/NVR/IP camera firmware due to static root account credentials in the system.

Action-Not Available
Vendor-xiongmaitechn/a
Product-ahb7804r-lms_firmwareahb7804r-mh-v2ahb7008t-mh-v2ahb7804r-mh-v2_firmwareahb7808t-ms-v2ahb7808r-msahb7008t-mh-v2_firmwareahb7808r-ms-v2ahb7804r-lmsahb7808r-ms_firmwarehi3518e_50h10l_s39ahb7804r-elshi3518e_50h10l_s39_firmwareahb7808r-ms-v2_firmwareahb7808t-ms-v2_firmwareahb7804r-els_firmwaren/a
CWE ID-CWE-287
Improper Authentication
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next
Details not found