Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2015-3963

Summary
Assigner-icscert
Assigner Org ID-7d14cffa-0d7d-4270-9dc0-52cabd5a23a6
Published At-04 Aug, 2015 | 01:00
Updated At-06 Aug, 2024 | 06:04
Rejected At-
Credits

Wind River VxWorks before 5.5.1, 6.5.x through 6.7.x before 6.7.1.1, 6.8.x before 6.8.3, 6.9.x before 6.9.4.4, and 7.x before 7 ipnet_coreip 1.2.2.0, as used on Schneider Electric SAGE RTU devices before J2 and other devices, does not properly generate TCP initial sequence number (ISN) values, which makes it easier for remote attackers to spoof TCP sessions by predicting an ISN value.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:icscert
Assigner Org ID:7d14cffa-0d7d-4270-9dc0-52cabd5a23a6
Published At:04 Aug, 2015 | 01:00
Updated At:06 Aug, 2024 | 06:04
Rejected At:
▼CVE Numbering Authority (CNA)

Wind River VxWorks before 5.5.1, 6.5.x through 6.7.x before 6.7.1.1, 6.8.x before 6.8.3, 6.9.x before 6.9.4.4, and 7.x before 7 ipnet_coreip 1.2.2.0, as used on Schneider Electric SAGE RTU devices before J2 and other devices, does not properly generate TCP initial sequence number (ISN) values, which makes it easier for remote attackers to spoof TCP sessions by predicting an ISN value.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securityfocus.com/bid/75302
vdb-entry
x_refsource_BID
http://www.securitytracker.com/id/1032730
vdb-entry
x_refsource_SECTRACK
http://www.schneider-electric.com/ww/en/download/document/SEVD-2015-162-01
x_refsource_CONFIRM
https://ics-cert.us-cert.gov/advisories/ICSA-15-169-01A
x_refsource_MISC
http://www.securitytracker.com/id/1033181
vdb-entry
x_refsource_SECTRACK
https://security.netapp.com/advisory/ntap-20160324-0001/
x_refsource_CONFIRM
https://ics-cert.us-cert.gov/advisories/ICSA-15-169-01
x_refsource_MISC
Hyperlink: http://www.securityfocus.com/bid/75302
Resource:
vdb-entry
x_refsource_BID
Hyperlink: http://www.securitytracker.com/id/1032730
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: http://www.schneider-electric.com/ww/en/download/document/SEVD-2015-162-01
Resource:
x_refsource_CONFIRM
Hyperlink: https://ics-cert.us-cert.gov/advisories/ICSA-15-169-01A
Resource:
x_refsource_MISC
Hyperlink: http://www.securitytracker.com/id/1033181
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: https://security.netapp.com/advisory/ntap-20160324-0001/
Resource:
x_refsource_CONFIRM
Hyperlink: https://ics-cert.us-cert.gov/advisories/ICSA-15-169-01
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.securityfocus.com/bid/75302
vdb-entry
x_refsource_BID
x_transferred
http://www.securitytracker.com/id/1032730
vdb-entry
x_refsource_SECTRACK
x_transferred
http://www.schneider-electric.com/ww/en/download/document/SEVD-2015-162-01
x_refsource_CONFIRM
x_transferred
https://ics-cert.us-cert.gov/advisories/ICSA-15-169-01A
x_refsource_MISC
x_transferred
http://www.securitytracker.com/id/1033181
vdb-entry
x_refsource_SECTRACK
x_transferred
https://security.netapp.com/advisory/ntap-20160324-0001/
x_refsource_CONFIRM
x_transferred
https://ics-cert.us-cert.gov/advisories/ICSA-15-169-01
x_refsource_MISC
x_transferred
Hyperlink: http://www.securityfocus.com/bid/75302
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: http://www.securitytracker.com/id/1032730
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: http://www.schneider-electric.com/ww/en/download/document/SEVD-2015-162-01
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://ics-cert.us-cert.gov/advisories/ICSA-15-169-01A
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.securitytracker.com/id/1033181
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: https://security.netapp.com/advisory/ntap-20160324-0001/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://ics-cert.us-cert.gov/advisories/ICSA-15-169-01
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:ics-cert@hq.dhs.gov
Published At:04 Aug, 2015 | 01:59
Updated At:12 Apr, 2025 | 10:46

Wind River VxWorks before 5.5.1, 6.5.x through 6.7.x before 6.7.1.1, 6.8.x before 6.8.3, 6.9.x before 6.9.4.4, and 7.x before 7 ipnet_coreip 1.2.2.0, as used on Schneider Electric SAGE RTU devices before J2 and other devices, does not properly generate TCP initial sequence number (ISN) values, which makes it easier for remote attackers to spoof TCP sessions by predicting an ISN value.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.05.8MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:P
Type: Primary
Version: 2.0
Base score: 5.8
Base severity: MEDIUM
Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:P
CPE Matches

windriver
windriver
>>vxworks>>Versions from 6.5(inclusive) to 6.6(inclusive)
cpe:2.3:o:windriver:vxworks:*:*:*:*:*:*:*:*
windriver
windriver
>>vxworks>>Versions from 6.7(inclusive) to 6.7.1.1(exclusive)
cpe:2.3:o:windriver:vxworks:*:*:*:*:*:*:*:*
windriver
windriver
>>vxworks>>Versions from 6.8(inclusive) to 6.8.3(exclusive)
cpe:2.3:o:windriver:vxworks:*:*:*:*:*:*:*:*
windriver
windriver
>>vxworks>>Versions from 6.9(inclusive) to 6.9.4.4(exclusive)
cpe:2.3:o:windriver:vxworks:*:*:*:*:*:*:*:*
windriver
windriver
>>vxworks>>6.6.3
cpe:2.3:o:windriver:vxworks:6.6.3:*:*:*:cert:*:*:*
windriver
windriver
>>vxworks>>6.6.4
cpe:2.3:o:windriver:vxworks:6.6.4:*:*:*:cert:*:*:*
windriver
windriver
>>vxworks>>6.6.4.1
cpe:2.3:o:windriver:vxworks:6.6.4.1:*:*:*:cert:*:*:*
windriver
windriver
>>vxworks>>7.0
cpe:2.3:o:windriver:vxworks:7.0:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>sage_1210>>-
cpe:2.3:h:schneider-electric:sage_1210:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>sage_1230>>-
cpe:2.3:h:schneider-electric:sage_1230:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>sage_1250>>-
cpe:2.3:h:schneider-electric:sage_1250:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>sage_1310>>-
cpe:2.3:h:schneider-electric:sage_1310:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>sage_1330>>-
cpe:2.3:h:schneider-electric:sage_1330:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>sage_1350>>-
cpe:2.3:h:schneider-electric:sage_1350:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>sage_1410>>-
cpe:2.3:h:schneider-electric:sage_1410:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>sage_1430>>-
cpe:2.3:h:schneider-electric:sage_1430:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>sage_1450>>-
cpe:2.3:h:schneider-electric:sage_1450:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>sage_2200>>-
cpe:2.3:h:schneider-electric:sage_2200:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>sage_2400>>-
cpe:2.3:h:schneider-electric:sage_2400:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>sage_3030>>-
cpe:2.3:h:schneider-electric:sage_3030:-:*:*:*:*:*:*:*
Schneider Electric SE
schneider-electric
>>sage_3030_magnum>>-
cpe:2.3:h:schneider-electric:sage_3030_magnum:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-330Primarynvd@nist.gov
CWE ID: CWE-330
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.schneider-electric.com/ww/en/download/document/SEVD-2015-162-01ics-cert@hq.dhs.gov
Patch
Third Party Advisory
http://www.securityfocus.com/bid/75302ics-cert@hq.dhs.gov
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1032730ics-cert@hq.dhs.gov
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1033181ics-cert@hq.dhs.gov
Third Party Advisory
VDB Entry
https://ics-cert.us-cert.gov/advisories/ICSA-15-169-01ics-cert@hq.dhs.gov
Third Party Advisory
US Government Resource
https://ics-cert.us-cert.gov/advisories/ICSA-15-169-01Aics-cert@hq.dhs.gov
Third Party Advisory
US Government Resource
https://security.netapp.com/advisory/ntap-20160324-0001/ics-cert@hq.dhs.gov
Third Party Advisory
http://www.schneider-electric.com/ww/en/download/document/SEVD-2015-162-01af854a3a-2127-422b-91ae-364da2661108
Patch
Third Party Advisory
http://www.securityfocus.com/bid/75302af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1032730af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1033181af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
https://ics-cert.us-cert.gov/advisories/ICSA-15-169-01af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
US Government Resource
https://ics-cert.us-cert.gov/advisories/ICSA-15-169-01Aaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
US Government Resource
https://security.netapp.com/advisory/ntap-20160324-0001/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
Hyperlink: http://www.schneider-electric.com/ww/en/download/document/SEVD-2015-162-01
Source: ics-cert@hq.dhs.gov
Resource:
Patch
Third Party Advisory
Hyperlink: http://www.securityfocus.com/bid/75302
Source: ics-cert@hq.dhs.gov
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id/1032730
Source: ics-cert@hq.dhs.gov
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id/1033181
Source: ics-cert@hq.dhs.gov
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://ics-cert.us-cert.gov/advisories/ICSA-15-169-01
Source: ics-cert@hq.dhs.gov
Resource:
Third Party Advisory
US Government Resource
Hyperlink: https://ics-cert.us-cert.gov/advisories/ICSA-15-169-01A
Source: ics-cert@hq.dhs.gov
Resource:
Third Party Advisory
US Government Resource
Hyperlink: https://security.netapp.com/advisory/ntap-20160324-0001/
Source: ics-cert@hq.dhs.gov
Resource:
Third Party Advisory
Hyperlink: http://www.schneider-electric.com/ww/en/download/document/SEVD-2015-162-01
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Third Party Advisory
Hyperlink: http://www.securityfocus.com/bid/75302
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id/1032730
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id/1033181
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://ics-cert.us-cert.gov/advisories/ICSA-15-169-01
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
US Government Resource
Hyperlink: https://ics-cert.us-cert.gov/advisories/ICSA-15-169-01A
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
US Government Resource
Hyperlink: https://security.netapp.com/advisory/ntap-20160324-0001/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

7Records found

CVE-2018-2599
Matching Score-8
Assigner-Oracle
ShareView Details
Matching Score-8
Assigner-Oracle
CVSS Score-4.8||MEDIUM
EPSS-0.10% / 27.49%
||
7 Day CHG~0.00%
Published-18 Jan, 2018 | 02:00
Updated-03 Oct, 2024 | 20:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L).

Action-Not Available
Vendor-Canonical Ltd.Debian GNU/LinuxHP Inc.Oracle CorporationRed Hat, Inc.
Product-enterprise_linux_serverubuntu_linuxxp7_command_viewenterprise_linux_server_eusenterprise_linux_server_aussatellitejdkstruxureware_data_center_expertjrockitxp_command_viewdebian_linuxxp_p9000_command_viewjreenterprise_linux_workstationenterprise_linux_server_tusenterprise_linux_desktopJava
CVE-2020-7548
Matching Score-6
Assigner-Schneider Electric
ShareView Details
Matching Score-6
Assigner-Schneider Electric
CVSS Score-9.8||CRITICAL
EPSS-0.59% / 68.24%
||
7 Day CHG~0.00%
Published-01 Dec, 2020 | 14:45
Updated-04 Aug, 2024 | 09:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A CWE-330 - Use of Insufficiently Random Values vulnerability exists in Smartlink, PowerTag, and Wiser Series Gateways (see security notification for version information) that could allow unauthorized users to login.

Action-Not Available
Vendor-n/a
Product-acti9_powertag_linkacti9_smartlink_el_bacti9_smartlink_si_d_firmwareacti9_smartlink_si_b_firmwarewiser_link_firmwarewiser_linkacti9_powertag_link_hdwiser_energywiser_energy_firmwareacti9_smartlink_si_dacti9_powertag_link_firmwareacti9_powertag_link_hd_firmwareacti9_smartlink_si_bacti9_smartlink_el_b_firmwareSmartlink, PowerTag, and Wiser Series Gateways (see security notification for version information)
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2017-6026
Matching Score-6
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-6
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.1||CRITICAL
EPSS-14.76% / 94.24%
||
7 Day CHG~0.00%
Published-30 Jun, 2017 | 02:35
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Use of Insufficiently Random Values issue was discovered in Schneider Electric Modicon PLCs Modicon M241, firmware versions prior to Version 4.0.5.11, and Modicon M251, firmware versions prior to Version 4.0.5.11. The session numbers generated by the web application are lacking randomization and are shared between several users. This may allow a current session to be compromised.

Action-Not Available
Vendor-n/aSchneider Electric SE
Product-modicon_m241modicon_m251modicon_m251_firmwaremodicon_m241_firmwareSchneider Electric Modicon PLCs
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2019-6821
Matching Score-6
Assigner-Schneider Electric
ShareView Details
Matching Score-6
Assigner-Schneider Electric
CVSS Score-6.5||MEDIUM
EPSS-0.24% / 46.87%
||
7 Day CHG~0.00%
Published-22 May, 2019 | 19:42
Updated-04 Aug, 2024 | 20:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

CWE-330: Use of Insufficiently Random Values vulnerability, which could cause the hijacking of the TCP connection when using Ethernet communication in Modicon M580 firmware versions prior to V2.30, and all firmware versions of Modicon M340, Modicon Premium, Modicon Quantum.

Action-Not Available
Vendor-n/a
Product-modicon_quantummodicon_quantum_firmwaremodicon_m580_firmwaremodicon_premium_firmwaremodicon_premiummodicon_m340modicon_m340_firmwaremodicon_m580Modicon Controllers, Modicon M580 firmware versions prior to V2.30, and all firmware versions of Modicon M340, Modicon Premium, Modicon Quantum
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2020-13817
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.4||HIGH
EPSS-0.38% / 58.28%
||
7 Day CHG~0.00%
Published-04 Jun, 2020 | 12:31
Updated-05 May, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ntpd in ntp before 4.2.8p14 and 4.3.x before 4.3.100 allows remote attackers to cause a denial of service (daemon exit or system time change) by predicting transmit timestamps for use in spoofed packets. The victim must be relying on unauthenticated IPv4 time sources. There must be an off-path attacker who can query time from the victim's ntpd instance.

Action-Not Available
Vendor-ntpn/aopenSUSENetApp, Inc.Fujitsu Limited
Product-h410shci_compute_node_firmwarecloud_backupontap_toolsleaph500s_firmwarem12-2m10-1_firmwarem12-2_firmwareh410c_firmwarem12-1_firmwareh410ch700sh500sh700e_firmwareh500e_firmwarem12-2s_firmwareclustered_data_ontaph300ehci_management_nodeh300e_firmwarem10-1m10-4s_firmwaredata_ontaph700ehci_compute_nodeh500em12-1h700s_firmwaresolidfirem12-2sm10-4sh410s_firmwareh300s_firmwaresteelstore_cloud_integrated_storagentpelement_softwarem10-4m10-4_firmwareh300sn/a
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2019-12821
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-4.8||MEDIUM
EPSS-0.39% / 59.12%
||
7 Day CHG~0.00%
Published-19 Jul, 2019 | 17:20
Updated-04 Aug, 2024 | 23:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability was found in the app 2.0 of the Shenzhen Jisiwei i3 robot vacuum cleaner, while adding a device to the account using a QR-code. The QR-code follows an easily predictable pattern that depends only on the specific device ID of the robot vacuum cleaner. By generating a QR-code containing information about the device ID, it is possible to connect an arbitrary device and gain full access to it. The device ID has an initial "JSW" substring followed by a six digit number that depends on the specific device.

Action-Not Available
Vendor-jisiwein/a
Product-i3i3_firmwaren/a
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2017-17704
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.4||HIGH
EPSS-0.15% / 36.81%
||
7 Day CHG~0.00%
Published-31 Dec, 2017 | 02:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A door-unlocking issue was discovered on Software House iStar Ultra devices through 6.5.2.20569 when used in conjunction with the IP-ACM Ethernet Door Module. The communications between the IP-ACM and the iStar Ultra is encrypted using a fixed AES key and IV. Each message is encrypted in CBC mode and restarts with the fixed IV, leading to replay attacks of entire messages. There is no authentication of messages beyond the use of the fixed AES key, so message forgery is also possible.

Action-Not Available
Vendor-swhousen/a
Product-istar_ultraistar_ultra_firmwaren/a
CWE ID-CWE-330
Use of Insufficiently Random Values
Details not found