Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2017-9855

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-05 Aug, 2017 | 17:00
Updated At-29 Oct, 2024 | 13:57
Rejected At-
Credits

An issue was discovered in SMA Solar Technology products. A secondary authentication system is available for Installers called the Grid Guard system. This system uses predictable codes, and a single Grid Guard code can be used on any SMA inverter. Any such code, when combined with the installer account, allows changing very sensitive parameters. NOTE: the vendor reports that Grid Guard is not an authentication feature; it is only a tracing feature. Also, only Sunny Boy TLST-21 and TL-21 and Sunny Tripower TL-10 and TL-30 could potentially be affected

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:05 Aug, 2017 | 17:00
Updated At:29 Oct, 2024 | 13:57
Rejected At:
▼CVE Numbering Authority (CNA)

An issue was discovered in SMA Solar Technology products. A secondary authentication system is available for Installers called the Grid Guard system. This system uses predictable codes, and a single Grid Guard code can be used on any SMA inverter. Any such code, when combined with the installer account, allows changing very sensitive parameters. NOTE: the vendor reports that Grid Guard is not an authentication feature; it is only a tracing feature. Also, only Sunny Boy TLST-21 and TL-21 and Sunny Tripower TL-10 and TL-30 could potentially be affected

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.sma.de/en/statement-on-cyber-security.html
x_refsource_MISC
https://horusscenario.com/CVE-information/
x_refsource_MISC
http://www.sma.de/fileadmin/content/global/specials/documents/cyber-security/Whitepaper-Cyber-Security-AEN1732_07.pdf
x_refsource_MISC
Hyperlink: http://www.sma.de/en/statement-on-cyber-security.html
Resource:
x_refsource_MISC
Hyperlink: https://horusscenario.com/CVE-information/
Resource:
x_refsource_MISC
Hyperlink: http://www.sma.de/fileadmin/content/global/specials/documents/cyber-security/Whitepaper-Cyber-Security-AEN1732_07.pdf
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Vendor
sma
Product
sunny_boy_3600_firmware
CPEs
  • cpe:2.3:o:sma:sunny_boy_3600_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • -
Vendor
sma
Product
sunny_boy_5000_firmware
CPEs
  • cpe:2.3:o:sma:sunny_boy_5000_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • -
Vendor
sma
Product
sunny_tripower_core1_firmware
CPEs
  • cpe:2.3:o:sma:sunny_tripower_core1_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • -
Vendor
sma
Product
sunny_tripower_15000tl_firmware
CPEs
  • cpe:2.3:o:sma:sunny_tripower_15000tl_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • -
Vendor
sma
Product
sunny_tripower_20000tl_firmware
CPEs
  • cpe:2.3:o:sma:sunny_tripower_20000tl_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • -
Vendor
sma
Product
sunny_tripower_25000tl_firmware
CPEs
  • cpe:2.3:o:sma:sunny_tripower_25000tl_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • -
Vendor
sma
Product
sunny_tripower_5000tl_firmware
CPEs
  • cpe:2.3:o:sma:sunny_tripower_5000tl_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • -
Vendor
sma
Product
sunny_tripower_12000tl_firmware
CPEs
  • cpe:2.3:o:sma:sunny_tripower_12000tl_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • -
Vendor
sma
Product
sunny_tripower_60_firmware
CPEs
  • cpe:2.3:o:sma:sunny_tripower_60_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • -
Vendor
sma
Product
sunny_boy_3000tl_firmware
CPEs
  • cpe:2.3:o:sma:sunny_boy_3000tl_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • -
Vendor
sma
Product
sunny_boy_3600tl_firmware
CPEs
  • cpe:2.3:o:sma:sunny_boy_3600tl_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • -
Vendor
sma
Product
sunny_boy_4000tl_firmware
CPEs
  • cpe:2.3:o:sma:sunny_boy_4000tl_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • -
Vendor
sma
Product
sunny_boy_5000tl_firmware
CPEs
  • cpe:2.3:o:sma:sunny_boy_5000tl_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • -
Vendor
sma
Product
sunny_boy_1.5_firmware
CPEs
  • cpe:2.3:o:sma:sunny_boy_1.5_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • -
Vendor
sma
Product
sunny_boy_2.5_firmware
CPEs
  • cpe:2.3:o:sma:sunny_boy_2.5_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • -
Vendor
sma
Product
sunny_boy_3.0_firmware
CPEs
  • cpe:2.3:o:sma:sunny_boy_3.0_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • -
Vendor
sma
Product
sunny_boy_3.6_firmware
CPEs
  • cpe:2.3:o:sma:sunny_boy_3.6_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • -
Vendor
sma
Product
sunny_boy_4.0_firmware
CPEs
  • cpe:2.3:o:sma:sunny_boy_4.0_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • -
Vendor
sma
Product
sunny_boy_5.0_firmware
CPEs
  • cpe:2.3:o:sma:sunny_boy_5.0_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • -
Vendor
sma
Product
sunny_central_2200_firmware
CPEs
  • cpe:2.3:o:sma:sunny_central_2200_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • -
Vendor
sma
Product
sunny_central_1000cp_xt_firmware
CPEs
  • cpe:2.3:o:sma:sunny_central_1000cp_xt_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • -
Vendor
sma
Product
sunny_central_800cp_xt_firmware
CPEs
  • cpe:2.3:o:sma:sunny_central_800cp_xt_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • -
Vendor
sma
Product
sunny_central_850cp_xt_firmware
CPEs
  • cpe:2.3:o:sma:sunny_central_850cp_xt_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • -
Vendor
sma
Product
sunny_central_900cp_xt_firmware
CPEs
  • cpe:2.3:o:sma:sunny_central_900cp_xt_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • -
Vendor
sma
Product
sunny_central_500cp_xt_firmware
CPEs
  • cpe:2.3:o:sma:sunny_central_500cp_xt_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • -
Vendor
sma
Product
sunny_central_630cp_xt_firmware
CPEs
  • cpe:2.3:o:sma:sunny_central_630cp_xt_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • -
Vendor
sma
Product
sunny_central_720cp_xt_firmware
CPEs
  • cpe:2.3:o:sma:sunny_central_720cp_xt_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • -
Vendor
sma
Product
sunny_central_760cp_xt_firmware
CPEs
  • cpe:2.3:o:sma:sunny_central_760cp_xt_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • -
Vendor
sma
Product
sunny_central_storage_500_firmware
CPEs
  • cpe:2.3:o:sma:sunny_central_storage_500_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • -
Vendor
sma
Product
sunny_central_storage_630_firmware
CPEs
  • cpe:2.3:o:sma:sunny_central_storage_630_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • -
Vendor
sma
Product
sunny_central_storage_720_firmware
CPEs
  • cpe:2.3:o:sma:sunny_central_storage_720_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • -
Vendor
sma
Product
sunny_central_storage_760_firmware
CPEs
  • cpe:2.3:o:sma:sunny_central_storage_760_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • -
Vendor
sma
Product
sunny_central_storage_800_firmware
CPEs
  • cpe:2.3:o:sma:sunny_central_storage_800_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • -
Vendor
sma
Product
sunny_central_storage_850_firmware
CPEs
  • cpe:2.3:o:sma:sunny_central_storage_850_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • -
Vendor
sma
Product
sunny_central_storage_900_firmware
CPEs
  • cpe:2.3:o:sma:sunny_central_storage_900_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • -
Vendor
sma
Product
sunny_central_storage_1000_firmware
CPEs
  • cpe:2.3:o:sma:sunny_central_storage_1000_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • -
Vendor
sma
Product
sunny_central_storage_2200_firmware
CPEs
  • cpe:2.3:o:sma:sunny_central_storage_2200_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • -
Vendor
sma
Product
sunny_central_storage_2500-ev_firmware
CPEs
  • cpe:2.3:o:sma:sunny_central_storage_2500-ev_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • -
Vendor
sma
Product
sunny_boy_storage_2.5_firmware
CPEs
  • cpe:2.3:o:sma:sunny_boy_storage_2.5_firmware:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • -
Problem Types
TypeCWE IDDescription
CWECWE-863CWE-863 Incorrect Authorization
Type: CWE
CWE ID: CWE-863
Description: CWE-863 Incorrect Authorization
Metrics
VersionBase scoreBase severityVector
3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.sma.de/en/statement-on-cyber-security.html
x_refsource_MISC
x_transferred
https://horusscenario.com/CVE-information/
x_refsource_MISC
x_transferred
http://www.sma.de/fileadmin/content/global/specials/documents/cyber-security/Whitepaper-Cyber-Security-AEN1732_07.pdf
x_refsource_MISC
x_transferred
Hyperlink: http://www.sma.de/en/statement-on-cyber-security.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://horusscenario.com/CVE-information/
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.sma.de/fileadmin/content/global/specials/documents/cyber-security/Whitepaper-Cyber-Security-AEN1732_07.pdf
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:05 Aug, 2017 | 17:29
Updated At:20 Apr, 2025 | 01:37

An issue was discovered in SMA Solar Technology products. A secondary authentication system is available for Installers called the Grid Guard system. This system uses predictable codes, and a single Grid Guard code can be used on any SMA inverter. Any such code, when combined with the installer account, allows changing very sensitive parameters. NOTE: the vendor reports that Grid Guard is not an authentication feature; it is only a tracing feature. Also, only Sunny Boy TLST-21 and TL-21 and Sunny Tripower TL-10 and TL-30 could potentially be affected

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Primary3.09.8CRITICAL
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Primary2.07.5HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
Type: Secondary
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 3.0
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 7.5
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

sma
sma
>>sunny_boy_3600_firmware>>-
cpe:2.3:o:sma:sunny_boy_3600_firmware:-:*:*:*:*:*:*:*
sma
sma
>>sunny_boy_3600>>-
cpe:2.3:h:sma:sunny_boy_3600:-:*:*:*:*:*:*:*
sma
sma
>>sunny_boy_5000_firmware>>-
cpe:2.3:o:sma:sunny_boy_5000_firmware:-:*:*:*:*:*:*:*
sma
sma
>>sunny_boy_5000>>-
cpe:2.3:h:sma:sunny_boy_5000:-:*:*:*:*:*:*:*
sma
sma
>>sunny_tripower_core1_firmware>>-
cpe:2.3:o:sma:sunny_tripower_core1_firmware:-:*:*:*:*:*:*:*
sma
sma
>>sunny_tripower_core1>>-
cpe:2.3:h:sma:sunny_tripower_core1:-:*:*:*:*:*:*:*
sma
sma
>>sunny_tripower_15000tl_firmware>>-
cpe:2.3:o:sma:sunny_tripower_15000tl_firmware:-:*:*:*:*:*:*:*
sma
sma
>>sunny_tripower_15000tl>>-
cpe:2.3:h:sma:sunny_tripower_15000tl:-:*:*:*:*:*:*:*
sma
sma
>>sunny_tripower_20000tl_firmware>>-
cpe:2.3:o:sma:sunny_tripower_20000tl_firmware:-:*:*:*:*:*:*:*
sma
sma
>>sunny_tripower_20000tl>>-
cpe:2.3:h:sma:sunny_tripower_20000tl:-:*:*:*:*:*:*:*
sma
sma
>>sunny_tripower_25000tl_firmware>>-
cpe:2.3:o:sma:sunny_tripower_25000tl_firmware:-:*:*:*:*:*:*:*
sma
sma
>>sunny_tripower_25000tl>>-
cpe:2.3:h:sma:sunny_tripower_25000tl:-:*:*:*:*:*:*:*
sma
sma
>>sunny_tripower_5000tl_firmware>>-
cpe:2.3:o:sma:sunny_tripower_5000tl_firmware:-:*:*:*:*:*:*:*
sma
sma
>>sunny_tripower_5000tl>>-
cpe:2.3:h:sma:sunny_tripower_5000tl:-:*:*:*:*:*:*:*
sma
sma
>>sunny_tripower_12000tl_firmware>>-
cpe:2.3:o:sma:sunny_tripower_12000tl_firmware:-:*:*:*:*:*:*:*
sma
sma
>>sunny_tripower_12000tl>>-
cpe:2.3:h:sma:sunny_tripower_12000tl:-:*:*:*:*:*:*:*
sma
sma
>>sunny_tripower_60_firmware>>-
cpe:2.3:o:sma:sunny_tripower_60_firmware:-:*:*:*:*:*:*:*
sma
sma
>>sunny_tripower_60>>-
cpe:2.3:h:sma:sunny_tripower_60:-:*:*:*:*:*:*:*
sma
sma
>>sunny_boy_3000tl_firmware>>-
cpe:2.3:o:sma:sunny_boy_3000tl_firmware:-:*:*:*:*:*:*:*
sma
sma
>>sunny_boy_3000tl>>-
cpe:2.3:h:sma:sunny_boy_3000tl:-:*:*:*:*:*:*:*
sma
sma
>>sunny_boy_3600tl_firmware>>-
cpe:2.3:o:sma:sunny_boy_3600tl_firmware:-:*:*:*:*:*:*:*
sma
sma
>>sunny_boy_3600tl>>-
cpe:2.3:h:sma:sunny_boy_3600tl:-:*:*:*:*:*:*:*
sma
sma
>>sunny_boy_4000tl_firmware>>-
cpe:2.3:o:sma:sunny_boy_4000tl_firmware:-:*:*:*:*:*:*:*
sma
sma
>>sunny_boy_4000tl>>-
cpe:2.3:h:sma:sunny_boy_4000tl:-:*:*:*:*:*:*:*
sma
sma
>>sunny_boy_5000tl_firmware>>-
cpe:2.3:o:sma:sunny_boy_5000tl_firmware:-:*:*:*:*:*:*:*
sma
sma
>>sunny_boy_5000tl>>-
cpe:2.3:h:sma:sunny_boy_5000tl:-:*:*:*:*:*:*:*
sma
sma
>>sunny_boy_1.5_firmware>>-
cpe:2.3:o:sma:sunny_boy_1.5_firmware:-:*:*:*:*:*:*:*
sma
sma
>>sunny_boy_1.5>>-
cpe:2.3:h:sma:sunny_boy_1.5:-:*:*:*:*:*:*:*
sma
sma
>>sunny_boy_2.5_firmware>>-
cpe:2.3:o:sma:sunny_boy_2.5_firmware:-:*:*:*:*:*:*:*
sma
sma
>>sunny_boy_2.5>>-
cpe:2.3:h:sma:sunny_boy_2.5:-:*:*:*:*:*:*:*
sma
sma
>>sunny_boy_3.0_firmware>>-
cpe:2.3:o:sma:sunny_boy_3.0_firmware:-:*:*:*:*:*:*:*
sma
sma
>>sunny_boy_3.0>>-
cpe:2.3:h:sma:sunny_boy_3.0:-:*:*:*:*:*:*:*
sma
sma
>>sunny_boy_3.6_firmware>>-
cpe:2.3:o:sma:sunny_boy_3.6_firmware:-:*:*:*:*:*:*:*
sma
sma
>>sunny_boy_3.6>>-
cpe:2.3:h:sma:sunny_boy_3.6:-:*:*:*:*:*:*:*
sma
sma
>>sunny_boy_4.0_firmware>>-
cpe:2.3:o:sma:sunny_boy_4.0_firmware:-:*:*:*:*:*:*:*
sma
sma
>>sunny_boy_4.0>>-
cpe:2.3:h:sma:sunny_boy_4.0:-:*:*:*:*:*:*:*
sma
sma
>>sunny_boy_5.0_firmware>>-
cpe:2.3:o:sma:sunny_boy_5.0_firmware:-:*:*:*:*:*:*:*
sma
sma
>>sunny_boy_5.0>>-
cpe:2.3:h:sma:sunny_boy_5.0:-:*:*:*:*:*:*:*
sma
sma
>>sunny_central_2200_firmware>>-
cpe:2.3:o:sma:sunny_central_2200_firmware:-:*:*:*:*:*:*:*
sma
sma
>>sunny_central_2200>>-
cpe:2.3:h:sma:sunny_central_2200:-:*:*:*:*:*:*:*
sma
sma
>>sunny_central_1000cp_xt_firmware>>-
cpe:2.3:o:sma:sunny_central_1000cp_xt_firmware:-:*:*:*:*:*:*:*
sma
sma
>>sunny_central_1000cp_xt>>-
cpe:2.3:h:sma:sunny_central_1000cp_xt:-:*:*:*:*:*:*:*
sma
sma
>>sunny_central_800cp_xt_firmware>>-
cpe:2.3:o:sma:sunny_central_800cp_xt_firmware:-:*:*:*:*:*:*:*
sma
sma
>>sunny_central_800cp_xt>>-
cpe:2.3:h:sma:sunny_central_800cp_xt:-:*:*:*:*:*:*:*
sma
sma
>>sunny_central_850cp_xt_firmware>>-
cpe:2.3:o:sma:sunny_central_850cp_xt_firmware:-:*:*:*:*:*:*:*
sma
sma
>>sunny_central_850cp_xt>>-
cpe:2.3:h:sma:sunny_central_850cp_xt:-:*:*:*:*:*:*:*
sma
sma
>>sunny_central_900cp_xt_firmware>>-
cpe:2.3:o:sma:sunny_central_900cp_xt_firmware:-:*:*:*:*:*:*:*
sma
sma
>>sunny_central_900cp_xt>>-
cpe:2.3:h:sma:sunny_central_900cp_xt:-:*:*:*:*:*:*:*
sma
sma
>>sunny_central_500cp_xt_firmware>>-
cpe:2.3:o:sma:sunny_central_500cp_xt_firmware:-:*:*:*:*:*:*:*
sma
sma
>>sunny_central_500cp_xt>>-
cpe:2.3:h:sma:sunny_central_500cp_xt:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
NVD-CWE-noinfoPrimarynvd@nist.gov
CWE-863Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: NVD-CWE-noinfo
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-863
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.sma.de/en/statement-on-cyber-security.htmlcve@mitre.org
N/A
http://www.sma.de/fileadmin/content/global/specials/documents/cyber-security/Whitepaper-Cyber-Security-AEN1732_07.pdfcve@mitre.org
N/A
https://horusscenario.com/CVE-information/cve@mitre.org
Third Party Advisory
http://www.sma.de/en/statement-on-cyber-security.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.sma.de/fileadmin/content/global/specials/documents/cyber-security/Whitepaper-Cyber-Security-AEN1732_07.pdfaf854a3a-2127-422b-91ae-364da2661108
N/A
https://horusscenario.com/CVE-information/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
Hyperlink: http://www.sma.de/en/statement-on-cyber-security.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: http://www.sma.de/fileadmin/content/global/specials/documents/cyber-security/Whitepaper-Cyber-Security-AEN1732_07.pdf
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://horusscenario.com/CVE-information/
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: http://www.sma.de/en/statement-on-cyber-security.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: http://www.sma.de/fileadmin/content/global/specials/documents/cyber-security/Whitepaper-Cyber-Security-AEN1732_07.pdf
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://horusscenario.com/CVE-information/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

189Records found

CVE-2023-27388
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-1.33% / 79.16%
||
7 Day CHG~0.00%
Published-23 May, 2023 | 00:00
Updated-31 Jan, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authentication vulnerability in T&D Corporation and ESPEC MIC CORP. data logger products allows a remote unauthenticated attacker to login to the product as a registered user. Affected products and versions are as follows: T&D Corporation data logger products (TR-71W/72W all firmware versions, RTR-5W all firmware versions, WDR-7 all firmware versions, WDR-3 all firmware versions, and WS-2 all firmware versions), and ESPEC MIC CORP. data logger products (RT-12N/RS-12N all firmware versions, RT-22BN all firmware versions, and TEU-12N all firmware versions).

Action-Not Available
Vendor-tanddespecmicT&D Corporation and ESPEC MIC CORP.
Product-wdr-7_firmwarewdr-3_firmwarert-12nws-2rs-12nwdr-7ws-2_firmwarert-22bn_firmwareteu-12n_firmwaretr-71w_firmwarert-22bnwdr-3tr-71wteu-12nrs-12n_firmwaretr-72wrt-12n_firmwaretr-72w_firmwarertr-5w_firmwarertr-5wT&D Corporation and ESPEC MIC CORP. data logger products
CWE ID-CWE-863
Incorrect Authorization
CWE ID-CWE-287
Improper Authentication
CVE-2023-26258
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-88.36% / 99.47%
||
7 Day CHG~0.00%
Published-03 Jul, 2023 | 00:00
Updated-25 Nov, 2024 | 18:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Arcserve UDP through 9.0.6034 allows authentication bypass. The method getVersionInfo at WebServiceImpl/services/FlashServiceImpl leaks the AuthUUID token. This token can be used at /WebServiceImpl/services/VirtualStandbyServiceImpl to obtain a valid session. This session can be used to execute any task as administrator.

Action-Not Available
Vendor-n/aArcserve, LLC
Product-udpn/a
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-26829
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.27% / 50.01%
||
7 Day CHG~0.00%
Published-31 Mar, 2023 | 00:00
Updated-18 Feb, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An authentication bypass vulnerability in the Password Reset component of Gladinet CentreStack before 13.5.9808 allows remote attackers to set a new password for any valid user account, without needing the previous known password, resulting in a full authentication bypass.

Action-Not Available
Vendor-gladinetn/a
Product-centrestackn/a
CWE ID-CWE-863
Incorrect Authorization
CVE-2022-39955
Matching Score-4
Assigner-Switzerland National Cyber Security Centre (NCSC)
ShareView Details
Matching Score-4
Assigner-Switzerland National Cyber Security Centre (NCSC)
CVSS Score-7.3||HIGH
EPSS-0.14% / 34.90%
||
7 Day CHG~0.00%
Published-20 Sep, 2022 | 00:00
Updated-29 May, 2025 | 13:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Partial rule set bypass in OWASP ModSecurity Core Rule Set by submitting a specially crafted HTTP Content-Type header

The OWASP ModSecurity Core Rule Set (CRS) is affected by a partial rule set bypass by submitting a specially crafted HTTP Content-Type header field that indicates multiple character encoding schemes. A vulnerable back-end can potentially be exploited by declaring multiple Content-Type "charset" names and therefore bypassing the configurable CRS Content-Type header "charset" allow list. An encoded payload can bypass CRS detection this way and may then be decoded by the backend. The legacy CRS versions 3.0.x and 3.1.x are affected, as well as the currently supported versions 3.2.1 and 3.3.2. Integrators and users are advised to upgrade to 3.2.2 and 3.3.3 respectively.

Action-Not Available
Vendor-owaspOWASPDebian GNU/LinuxFedora Project
Product-owasp_modsecurity_core_rule_setdebian_linuxfedoraModSecurity Core Rule Set
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-23594
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.31% / 53.52%
||
7 Day CHG~0.00%
Published-31 Mar, 2023 | 00:00
Updated-18 Feb, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An authentication bypass vulnerability in the web client interface for the CL4NX printer before firmware version 1.13.3-u724_r2 provides remote unauthenticated attackers with access to execute commands intended only for valid/authenticated users, such as file uploads and configuration changes.

Action-Not Available
Vendor-sato-globaln/a
Product-cl4nx_pluscl4nx_plus_firmwaren/a
CWE ID-CWE-863
Incorrect Authorization
CVE-2019-16114
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-20.79% / 95.39%
||
7 Day CHG~0.00%
Published-09 Sep, 2019 | 12:15
Updated-05 Aug, 2024 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In ATutor 2.2.4, an unauthenticated attacker can change the application settings and force it to use his crafted database, which allows him to gain access to the application. Next, he can change the directory that the application uploads files to, which allows him to achieve remote code execution. This occurs because install/include/header.php does not restrict certain changes (to db_host, db_login, db_password, and content_dir) within install/include/step5.php.

Action-Not Available
Vendor-atutorn/a
Product-atutorn/a
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-24052
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-0.09% / 26.36%
||
7 Day CHG~0.00%
Published-04 Dec, 2023 | 00:00
Updated-02 Aug, 2024 | 10:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue discovered in Connectize AC21000 G6 641.139.1.1256 allows attackers to gain control of the device via the change password functionality as it does not prompt for the current password.

Action-Not Available
Vendor-connectizen/aconnectize
Product-ac21000_g6_firmwareac21000_g6n/aac21000_g6_firmware
CWE ID-CWE-863
Incorrect Authorization
CVE-2019-15900
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.35% / 56.43%
||
7 Day CHG~0.00%
Published-18 Oct, 2019 | 15:41
Updated-05 Aug, 2024 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in slicer69 doas before 6.2 on certain platforms other than OpenBSD. On platforms without strtonum(3), sscanf was used without checking for error cases. Instead, the uninitialized variable errstr was checked and in some cases returned success even if sscanf failed. The result was that, instead of reporting that the supplied username or group name did not exist, it would execute the command as root.

Action-Not Available
Vendor-doas_projectn/a
Product-doasn/a
CWE ID-CWE-252
Unchecked Return Value
CWE ID-CWE-863
Incorrect Authorization
CWE ID-CWE-754
Improper Check for Unusual or Exceptional Conditions
CWE ID-CWE-908
Use of Uninitialized Resource
CVE-2019-14813
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.3||HIGH
EPSS-8.45% / 92.00%
||
7 Day CHG~0.00%
Published-06 Sep, 2019 | 13:27
Updated-05 Aug, 2024 | 00:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in ghostscript, versions 9.x before 9.50, in the setsystemparams procedure where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.

Action-Not Available
Vendor-Debian GNU/LinuxRed Hat, Inc.openSUSEFedora ProjectArtifex Software Inc.
Product-enterprise_linux_serverdebian_linuxenterprise_linux_server_eusghostscriptopenshift_container_platformenterprise_linux_server_ausenterprise_linuxenterprise_linux_workstationfedoraenterprise_linux_server_tusenterprise_linux_desktopleapghostscript
CWE ID-CWE-648
Incorrect Use of Privileged APIs
CWE ID-CWE-863
Incorrect Authorization
CVE-2019-14237
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.94% / 75.23%
||
7 Day CHG~0.00%
Published-12 Sep, 2019 | 17:56
Updated-05 Aug, 2024 | 00:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

On NXP Kinetis KV1x, Kinetis KV3x, and Kinetis K8x devices, Flash Access Controls (FAC) (a software IP protection method for execute-only access) can be defeated by observing CPU registers and the effect of code/instruction execution.

Action-Not Available
Vendor-nxpn/a
Product-kinetis_k8x_firmwarekinetis_k8xkinetis_kv1x_firmwarekinetis_kv1xkinetis_kv3xkinetis_kv3x_firmwaren/a
CWE ID-CWE-863
Incorrect Authorization
CVE-2019-14236
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.94% / 75.23%
||
7 Day CHG~0.00%
Published-12 Sep, 2019 | 17:43
Updated-05 Aug, 2024 | 00:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

On STMicroelectronics STM32L0, STM32L1, STM32L4, STM32F4, STM32F7, and STM32H7 devices, Proprietary Code Read Out Protection (PCROP) (a software IP protection method) can be defeated by observing CPU registers and the effect of code/instruction execution.

Action-Not Available
Vendor-stn/a
Product-stm32l1_firmwarestm32l4_firmwarestm32f7stm32h7stm32l4stm32f4stm32l0_firmwarestm32h7_firmwarestm32f7_firmwarestm32l0stm32f4_firmwarestm32l1n/a
CWE ID-CWE-863
Incorrect Authorization
CVE-2022-32532
Matching Score-4
Assigner-Apache Software Foundation
ShareView Details
Matching Score-4
Assigner-Apache Software Foundation
CVSS Score-9.8||CRITICAL
EPSS-78.42% / 98.99%
||
7 Day CHG~0.00%
Published-28 Jun, 2022 | 23:20
Updated-03 Aug, 2024 | 07:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authentication Bypass Vulnerability

Apache Shiro before 1.9.1, A RegexRequestMatcher can be misconfigured to be bypassed on some servlet containers. Applications using RegExPatternMatcher with `.` in the regular expression are possibly vulnerable to an authorization bypass.

Action-Not Available
Vendor-The Apache Software Foundation
Product-shiroApache Shiro
CWE ID-CWE-863
Incorrect Authorization
CVE-2019-12419
Matching Score-4
Assigner-Apache Software Foundation
ShareView Details
Matching Score-4
Assigner-Apache Software Foundation
CVSS Score-9.8||CRITICAL
EPSS-14.28% / 94.14%
||
7 Day CHG~0.00%
Published-06 Nov, 2019 | 20:18
Updated-04 Aug, 2024 | 23:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Apache CXF before 3.3.4 and 3.2.11 provides all of the components that are required to build a fully fledged OpenId Connect service. There is a vulnerability in the access token services, where it does not validate that the authenticated principal is equal to that of the supplied clientId parameter in the request. If a malicious client was able to somehow steal an authorization code issued to another client, then they could exploit this vulnerability to obtain an access token for the other client.

Action-Not Available
Vendor-The Apache Software FoundationOracle Corporation
Product-retail_order_brokerflexcube_private_bankingcxfcommerce_guided_searchenterprise_manager_base_platformApache CXF
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-9082
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.29% / 52.20%
||
7 Day CHG~0.00%
Published-22 Sep, 2024 | 08:00
Updated-31 Mar, 2025 | 06:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SourceCodester Online Eyewear Shop User Creation Users.php improper authorization

A vulnerability was found in SourceCodester Online Eyewear Shop 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /classes/Users.php?f=save of the component User Creation Handler. The manipulation of the argument Type with the input 1 leads to improper authorization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-SourceCodesteroretnom23
Product-online_eyewear_shopOnline Eyewear Shoponline_eyewear_shop
CWE ID-CWE-266
Incorrect Privilege Assignment
CWE ID-CWE-285
Improper Authorization
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-32619
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.36% / 57.64%
||
7 Day CHG~0.00%
Published-28 May, 2021 | 21:00
Updated-03 Aug, 2024 | 23:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Static imports inside dynamically imported modules do not adhere to permission checks

Deno is a runtime for JavaScript and TypeScript that uses V8 and is built in Rust. In Deno versions 1.5.0 to 1.10.1, modules that are dynamically imported through `import()` or `new Worker` might have been able to bypass network and file system permission checks when statically importing other modules. The vulnerability has been patched in Deno release 1.10.2.

Action-Not Available
Vendor-denodenoland
Product-denodeno
CWE ID-CWE-285
Improper Authorization
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-32777
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-8.6||HIGH
EPSS-0.02% / 3.66%
||
7 Day CHG~0.00%
Published-24 Aug, 2021 | 20:25
Updated-03 Aug, 2024 | 23:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect concatenation of multiple value request headers in ext-authz extension

Envoy is an open source L7 proxy and communication bus designed for large modern service oriented architectures. In affected versions when ext-authz extension is sending request headers to the external authorization service it must merge multiple value headers according to the HTTP spec. However, only the last header value is sent. This may allow specifically crafted requests to bypass authorization. Attackers may be able to escalate privileges when using ext-authz extension or back end service that uses multiple value headers for authorization. A specifically constructed request may be delivered by an untrusted downstream peer in the presence of ext-authz extension. Envoy versions 1.19.1, 1.18.4, 1.17.4, 1.16.5 contain fixes to the ext-authz extension to correctly merge multiple request header values, when sending request for authorization.

Action-Not Available
Vendor-envoyproxyenvoyproxy
Product-envoyenvoy
CWE ID-CWE-551
Incorrect Behavior Order: Authorization Before Parsing and Canonicalization
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-32779
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-8.6||HIGH
EPSS-0.03% / 8.67%
||
7 Day CHG~0.00%
Published-24 Aug, 2021 | 20:45
Updated-03 Aug, 2024 | 23:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrectly handling of URI '#fragment' element as part of the path element

Envoy is an open source L7 proxy and communication bus designed for large modern service oriented architectures. In affected versions envoy incorrectly handled a URI '#fragment' element as part of the path element. Envoy is configured with an RBAC filter for authorization or similar mechanism with an explicit case of a final "/admin" path element, or is using a negative assertion with final path element of "/admin". The client sends request to "/app1/admin#foo". In Envoy prior to 1.18.0, or 1.18.0+ configured with path_normalization=false. Envoy treats fragment as a suffix of the query string when present, or as a suffix of the path when query string is absent, so it evaluates the final path element as "/admin#foo" and mismatches with the configured "/admin" path element. In Envoy 1.18.0+ configured with path_normalization=true. Envoy transforms this to /app1/admin%23foo and mismatches with the configured /admin prefix. The resulting URI is sent to the next server-agent with the offending "#foo" fragment which violates RFC3986 or with the nonsensical "%23foo" text appended. A specifically constructed request with URI containing '#fragment' element delivered by an untrusted client in the presence of path based request authorization resulting in escalation of Privileges when path based request authorization extensions. Envoy versions 1.19.1, 1.18.4, 1.17.4, 1.16.5 contain fixes that removes fragment from URI path in incoming requests.

Action-Not Available
Vendor-envoyproxyenvoyproxy
Product-envoyenvoy
CWE ID-CWE-551
Incorrect Behavior Order: Authorization Before Parsing and Canonicalization
CWE ID-CWE-863
Incorrect Authorization
CWE ID-CWE-697
Incorrect Comparison
CVE-2021-27177
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.07% / 21.73%
||
7 Day CHG~0.00%
Published-10 Feb, 2021 | 18:34
Updated-03 Aug, 2024 | 20:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on FiberHome HG6245D devices through RP2613. It is possible to bypass authentication by sending the decoded value of the GgpoZWxwCmxpc3QKd2hvCg== string to the telnet server.

Action-Not Available
Vendor-fiberhomen/a
Product-hg6245dhg6245d_firmwaren/a
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-31682
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.11% / 29.54%
||
7 Day CHG~0.00%
Published-03 Jun, 2024 | 19:07
Updated-13 Feb, 2025 | 15:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect access control in the fingerprint authentication mechanism of Phone Cleaner: Boost & Clean v2.2.0 allows attackers to bypass fingerprint authentication due to the use of a deprecated API.

Action-Not Available
Vendor-n/aphonecleaner
Product-n/aboost\&cleaner
CWE ID-CWE-863
Incorrect Authorization
CVE-2019-7304
Matching Score-4
Assigner-Canonical Ltd.
ShareView Details
Matching Score-4
Assigner-Canonical Ltd.
CVSS Score-8.8||HIGH
EPSS-82.22% / 99.17%
||
7 Day CHG~0.00%
Published-23 Apr, 2019 | 15:57
Updated-16 Sep, 2024 | 18:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Local privilege escalation via snapd socket

Canonical snapd before version 2.37.1 incorrectly performed socket owner validation, allowing an attacker to run arbitrary commands as root. This issue affects: Canonical snapd versions prior to 2.37.1.

Action-Not Available
Vendor-Canonical Ltd.
Product-snapdubuntu_linuxsnapd
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-41617
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.70% / 71.07%
||
7 Day CHG~0.00%
Published-24 Oct, 2024 | 00:00
Updated-29 Oct, 2024 | 17:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Money Manager EX WebApp (web-money-manager-ex) 1.2.2 is vulnerable to Incorrect Access Control. The `redirect_if_not_loggedin` function in `functions_security.php` fails to terminate script execution after redirecting unauthenticated users. This flaw allows an unauthenticated attacker to upload arbitrary files, potentially leading to Remote Code Execution.

Action-Not Available
Vendor-n/amoneymanagerex
Product-n/amoney_manager_ex_webapp
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-6914
Matching Score-4
Assigner-WSO2 LLC
ShareView Details
Matching Score-4
Assigner-WSO2 LLC
CVSS Score-9.8||CRITICAL
EPSS-0.06% / 20.13%
||
7 Day CHG~0.00%
Published-22 May, 2025 | 18:26
Updated-27 Aug, 2025 | 21:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect Authorization in Multiple WSO2 Products via Account Recovery SOAP Admin Service Leading to Account Takeover

An incorrect authorization vulnerability exists in multiple WSO2 products due to a business logic flaw in the account recovery-related SOAP admin service. A malicious actor can exploit this vulnerability to reset the password of any user account, leading to a complete account takeover, including accounts with elevated privileges. This vulnerability is exploitable only through the account recovery SOAP admin services exposed via the "/services" context path in affected products. The impact may be reduced if access to these endpoints has been restricted based on the "Security Guidelines for Production Deployment" by disabling exposure to untrusted networks.

Action-Not Available
Vendor-WSO2 LLC
Product-WSO2 IoTWSO2 Identity ServerWSO2 API ManagerWSO2 Open Banking IAMWSO2 Open Banking AMWSO2 Governance RegistryWSO2 Carbon Identity ManagementWSO2 Open banking KMWSO2 Identity Server as Key Manager
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-6782
Matching Score-4
Assigner-STAR Labs SG Pte. Ltd.
ShareView Details
Matching Score-4
Assigner-STAR Labs SG Pte. Ltd.
CVSS Score-9.8||CRITICAL
EPSS-93.71% / 99.84%
||
7 Day CHG~0.00%
Published-06 Aug, 2024 | 03:39
Updated-08 Aug, 2024 | 20:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Calibre Remote Code Execution

Improper access control in Calibre 6.9.0 ~ 7.14.0 allow unauthenticated attackers to achieve remote code execution.

Action-Not Available
Vendor-Calibrecalibre
Product-Calibrecalibre
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-57032
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.26% / 49.08%
||
7 Day CHG~0.00%
Published-17 Jan, 2025 | 00:00
Updated-19 Mar, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

WeGIA < 3.2.0 is vulnerable to Incorrect Access Control in controle/control.php. The application does not validate the value of the old password, so it is possible to change the password by placing any value in the senha_antiga field.

Action-Not Available
Vendor-wegian/a
Product-wegian/a
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-36536
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.19% / 41.50%
||
7 Day CHG~0.00%
Published-24 Jul, 2024 | 00:00
Updated-27 Jun, 2025 | 16:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insecure permissions in fabedge v0.8.1 allows attackers to access sensitive data and escalate privileges by obtaining the service account's token.

Action-Not Available
Vendor-fabedgen/afabedge
Product-fabedgen/afabedge
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-36265
Matching Score-4
Assigner-Apache Software Foundation
ShareView Details
Matching Score-4
Assigner-Apache Software Foundation
CVSS Score-9.8||CRITICAL
EPSS-0.27% / 50.30%
||
7 Day CHG~0.00%
Published-12 Jun, 2024 | 14:12
Updated-19 Mar, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apache Submarine Server Core: authorization bypass

** UNSUPPORTED WHEN ASSIGNED ** Incorrect Authorization vulnerability in Apache Submarine Server Core. This issue affects Apache Submarine Server Core: from 0.8.0. As this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.

Action-Not Available
Vendor-The Apache Software Foundation
Product-submarineApache Submarine Server Core
CWE ID-CWE-863
Incorrect Authorization
CVE-2022-30310
Matching Score-4
Assigner-CERT@VDE
ShareView Details
Matching Score-4
Assigner-CERT@VDE
CVSS Score-9.8||CRITICAL
EPSS-1.09% / 77.05%
||
7 Day CHG~0.00%
Published-13 Jun, 2022 | 13:45
Updated-20 Nov, 2024 | 15:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FESTO: CECC-X-M1 and Servo Press Kit YJKP OS Command Injection vulnerability

In Festo Controller CECC-X-M1 product family in multiple versions, the http-endpoint "cecc-x-acknerr-request" POST request doesn’t check for port syntax. This can result in unauthorized execution of system commands with root privileges due to improper access control command injection.

Action-Not Available
Vendor-festoFesto
Product-controller_cecc-x-m1-mv-s1controller_cecc-x-m1controller_cecc-x-m1-ys-l2_firmwareservo_press_kit_yjkp_firmwareservo_press_kit_yjkp-controller_cecc-x-m1-ys-l1_firmwareservo_press_kit_yjkpcontroller_cecc-x-m1-mv_firmwarecontroller_cecc-x-m1-y-yjkpcontroller_cecc-x-m1-ys-l2controller_cecc-x-m1-mvcontroller_cecc-x-m1_firmwareservo_press_kit_yjkp-_firmwarecontroller_cecc-x-m1-y-yjkp_firmwarecontroller_cecc-x-m1-ys-l1controller_cecc-x-m1-mv-s1_firmwareController CECC-X-M1-MV (4407605)Controller CECC-X-M1-Y-YJKP (4803891)Controller CECC-X-M1 (8124922)Controller CECC-X-M1-MV-S1 (4407606)Controller CECC-X-M1-YS-L1 (8082793)Controller CECC-X-M1-MV (8124923)Controller CECC-X-M1-MV-S1 (8124924)Controller CECC-X-M1-YS-L2 (8082794)Servo Press Kit YJKP (8077950)Servo Press Kit YJKP- (8058596)Controller CECC-X-M1 (4407603)
CWE ID-CWE-863
Incorrect Authorization
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-32986
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.8||CRITICAL
EPSS-0.19% / 40.95%
||
7 Day CHG~0.00%
Published-04 Apr, 2022 | 19:45
Updated-16 Apr, 2025 | 16:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Automation Direct CLICK PLC CPU Modules Authentication Bypass Using an Alternate Path or Channel

After Automation Direct CLICK PLC CPU Modules: C0-1x CPUs with firmware prior to v3.00 is unlocked by an authorized user, the unlocked state does not timeout. If the programming software is interrupted, the PLC remains unlocked. All subsequent programming connections are allowed without authorization. The PLC is only relocked by a power cycle, or when the programming software disconnects correctly.

Action-Not Available
Vendor-AutomationDirect
Product-c0-12dd1e-d_firmwarec0-10dd1e-dc0-12dd1e-1-dc0-11dd1e-dc0-11dre-d_firmwarec0-12are-1-dc0-11dd2e-d_firmwarec0-10dd1e-d_firmwarec0-11dd2e-dc0-12dre-2-dc0-12are-d_firmwarec0-12dd2e-d_firmwarec0-12dre-dc0-12are-2-dc0-10dre-d_firmwarec0-12dd1e-dc0-11dre-dc0-10dre-dc0-11are-dc0-12dd2e-dc0-12dd1e-2-d_firmwarec0-12dd1e-1-d_firmwarec0-12dre-d_firmwarec0-12are-2-d_firmwarec0-12dd2e-2-d_firmwarec0-12dd2e-1-d_firmwarec0-11dd1e-d_firmwarec0-12dd1e-2-dc0-12dd2e-1-dc0-10dd2e-dc0-12dre-2-d_firmwarec0-11are-d_firmwarec0-10are-d_firmwarec0-10dd2e-d_firmwarec0-12dd2e-2-dc0-12are-1-d_firmwarec0-12dre-1-d_firmwarec0-12dre-1-dc0-10are-dc0-12are-dCLICK PLC CPU Modules: C0-1x CPUs
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-48176
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.19% / 41.33%
||
7 Day CHG~0.00%
Published-05 Nov, 2024 | 00:00
Updated-01 May, 2025 | 15:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Lylme Spage v1.9.5 is vulnerable to Incorrect Access Control. There is no limit on the number of login attempts, and the verification code will not be refreshed after a failed login, which allows attackers to blast the username and password and log into the system backend.

Action-Not Available
Vendor-lylmen/alylme
Product-lylme_spagen/alylme_spage
CWE ID-CWE-863
Incorrect Authorization
CVE-2012-6094
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.69% / 70.75%
||
7 Day CHG~0.00%
Published-20 Dec, 2019 | 14:07
Updated-06 Aug, 2024 | 21:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

cups (Common Unix Printing System) 'Listen localhost:631' option not honored correctly which could provide unauthorized access to the system

Action-Not Available
Vendor-cupsDebian GNU/LinuxApple Inc.
Product-cupsdebian_linuxcups
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-48237
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.20% / 42.28%
||
7 Day CHG~0.00%
Published-25 Oct, 2024 | 00:00
Updated-17 Apr, 2025 | 19:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

WTCMS 1.0 is vulnerable to Incorrect Access Control in \Common\Controller\HomebaseController.class.php.

Action-Not Available
Vendor-wtcms_projectn/awtcms_project
Product-wtcmsn/awtcms
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-46918
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.15% / 36.45%
||
7 Day CHG~0.00%
Published-15 Sep, 2024 | 00:00
Updated-13 Mar, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

app/Controller/UserLoginProfilesController.php in MISP before 2.4.198 does not prevent an org admin from viewing sensitive login fields of another org admin in the same org.

Action-Not Available
Vendor-mispn/amisp
Product-mispn/amisp
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-45216
Matching Score-4
Assigner-Apache Software Foundation
ShareView Details
Matching Score-4
Assigner-Apache Software Foundation
CVSS Score-9.8||CRITICAL
EPSS-93.95% / 99.88%
||
7 Day CHG~0.00%
Published-16 Oct, 2024 | 07:50
Updated-01 Jul, 2025 | 20:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apache Solr: Authentication bypass possible using a fake URL Path ending

Improper Authentication vulnerability in Apache Solr. Solr instances using the PKIAuthenticationPlugin, which is enabled by default when Solr Authentication is used, are vulnerable to Authentication bypass. A fake ending at the end of any Solr API URL path, will allow requests to skip Authentication while maintaining the API contract with the original URL Path. This fake ending looks like an unprotected API path, however it is stripped off internally after authentication but before API routing. This issue affects Apache Solr: from 5.3.0 before 8.11.4, from 9.0.0 before 9.7.0. Users are recommended to upgrade to version 9.7.0, or 8.11.4, which fix the issue.

Action-Not Available
Vendor-The Apache Software Foundation
Product-solrApache Solrsolr
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-863
Incorrect Authorization
CVE-2020-21124
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.74% / 72.05%
||
7 Day CHG~0.00%
Published-15 Sep, 2021 | 16:16
Updated-04 Aug, 2024 | 14:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

UReport 2.2.9 allows attackers to execute arbitrary code due to a lack of access control to the designer page.

Action-Not Available
Vendor-ureport_projectn/a
Product-ureportn/a
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-7108
Matching Score-4
Assigner-TR-CERT (Computer Emergency Response Team of the Republic of Türkiye)
ShareView Details
Matching Score-4
Assigner-TR-CERT (Computer Emergency Response Team of the Republic of Türkiye)
CVSS Score-8.2||HIGH
EPSS-0.09% / 27.10%
||
7 Day CHG~0.00%
Published-26 Sep, 2024 | 12:07
Updated-03 Oct, 2024 | 00:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect Authorization in National Keep's CyberMath

Incorrect Authorization vulnerability in National Keep Cyber Security Services CyberMath allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects CyberMath: before CYBM.240816253.

Action-Not Available
Vendor-nationalkeepNational Keep Cyber Security Services
Product-cybermathCyberMath
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-42473
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.5||HIGH
EPSS-0.19% / 41.11%
||
7 Day CHG~0.00%
Published-09 Aug, 2024 | 21:16
Updated-01 Oct, 2024 | 12:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OpenFGA Authorization Bypass

OpenFGA is an authorization/permission engine. OpenFGA v1.5.7 and v1.5.8 are vulnerable to authorization bypass when calling Check API with a model that uses `but not` and `from` expressions and a userset. Users should downgrade to v1.5.6 as soon as possible. This downgrade is backward compatible. As of time of publication, a patch is not available but OpenFGA's maintainers are planning a patch for inclusion in a future release.

Action-Not Available
Vendor-openfgaopenfgaopenfga
Product-openfgaopenfgaopenfga
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-20149
Matching Score-4
Assigner-Tenable Network Security, Inc.
ShareView Details
Matching Score-4
Assigner-Tenable Network Security, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.71% / 71.22%
||
7 Day CHG~0.00%
Published-30 Dec, 2021 | 21:31
Updated-03 Aug, 2024 | 17:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Trendnet AC2600 TEW-827DRU version 2.08B01 does not have sufficient access controls for the WAN interface. The default iptables ruleset for governing access to services on the device only apply to IPv4. All services running on the devices are accessible via the WAN interface via IPv6 by default.

Action-Not Available
Vendor-n/aTRENDnet, Inc.
Product-tew-827dru_firmwaretew-827druTrendnet AC2600 TEW-827DRU
CWE ID-CWE-863
Incorrect Authorization
CVE-2020-8212
Matching Score-4
Assigner-HackerOne
ShareView Details
Matching Score-4
Assigner-HackerOne
CVSS Score-9.8||CRITICAL
EPSS-0.51% / 65.23%
||
7 Day CHG~0.00%
Published-17 Aug, 2020 | 15:40
Updated-04 Aug, 2024 | 09:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in Citrix XenMobile Server 10.12 before RP3, Citrix XenMobile Server 10.11 before RP6, Citrix XenMobile Server 10.10 RP6 and Citrix XenMobile Server before 10.9 RP5 allows access to privileged functionality.

Action-Not Available
Vendor-n/aCitrix (Cloud Software Group, Inc.)
Product-xenmobile_serverCitrix XenMobile Server
CWE ID-CWE-749
Exposed Dangerous Method or Function
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-36994
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.08% / 25.56%
||
7 Day CHG~0.00%
Published-07 Jul, 2023 | 00:00
Updated-13 Nov, 2024 | 20:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In TravianZ 8.3.4 and 8.3.3, Incorrect Access Control in the installation script allows an attacker to overwrite the server configuration and inject PHP code.

Action-Not Available
Vendor-travianz_projectn/a
Product-travianzn/a
CWE ID-CWE-863
Incorrect Authorization
  • Previous
  • 1
  • 2
  • 3
  • 4
  • Next
Details not found