Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2019-14927

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-28 Oct, 2019 | 12:08
Updated At-10 Sep, 2024 | 17:10
Rejected At-
Credits

An issue was discovered on Mitsubishi Electric Europe B.V. ME-RTU devices through 2.02 and INEA ME-RTU devices through 3.0. An unauthenticated remote configuration download vulnerability allows an attacker to download the smartRTU's configuration file (which contains data such as usernames, passwords, and other sensitive RTU data).

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:28 Oct, 2019 | 12:08
Updated At:10 Sep, 2024 | 17:10
Rejected At:
▼CVE Numbering Authority (CNA)

An issue was discovered on Mitsubishi Electric Europe B.V. ME-RTU devices through 2.02 and INEA ME-RTU devices through 3.0. An unauthenticated remote configuration download vulnerability allows an attacker to download the smartRTU's configuration file (which contains data such as usernames, passwords, and other sensitive RTU data).

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.mogozobo.com/
N/A
https://www.mogozobo.com/?p=3593
N/A
Hyperlink: https://www.mogozobo.com/
Resource: N/A
Hyperlink: https://www.mogozobo.com/?p=3593
Resource: N/A
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.mogozobo.com/
x_refsource_MISC
x_transferred
https://www.mogozobo.com/?p=3593
x_refsource_MISC
x_transferred
Hyperlink: https://www.mogozobo.com/
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://www.mogozobo.com/?p=3593
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:28 Oct, 2019 | 13:15
Updated At:10 Sep, 2024 | 17:15

An issue was discovered on Mitsubishi Electric Europe B.V. ME-RTU devices through 2.02 and INEA ME-RTU devices through 3.0. An unauthenticated remote configuration download vulnerability allows an attacker to download the smartRTU's configuration file (which contains data such as usernames, passwords, and other sensitive RTU data).

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Primary2.05.0MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:N
Type: Primary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Type: Primary
Version: 2.0
Base score: 5.0
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N
CPE Matches

Mitsubishi Electric Corporation
mitsubishielectric
>>smartrtu_firmware>>Versions up to 2.02(inclusive)
cpe:2.3:o:mitsubishielectric:smartrtu_firmware:*:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>smartrtu>>-
cpe:2.3:h:mitsubishielectric:smartrtu:-:*:*:*:*:*:*:*
inea
inea
>>me-rtu_firmware>>Versions up to 3.0(inclusive)
cpe:2.3:o:inea:me-rtu_firmware:*:*:*:*:*:*:*:*
inea
inea
>>me-rtu>>-
cpe:2.3:h:inea:me-rtu:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-306Primarynvd@nist.gov
CWE-425Primarynvd@nist.gov
CWE ID: CWE-306
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-425
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.mogozobo.com/cve@mitre.org
Third Party Advisory
https://www.mogozobo.com/?p=3593cve@mitre.org
Exploit
Third Party Advisory
Hyperlink: https://www.mogozobo.com/
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: https://www.mogozobo.com/?p=3593
Source: cve@mitre.org
Resource:
Exploit
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

340Records found

CVE-2018-16060
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-6.19% / 90.47%
||
7 Day CHG~0.00%
Published-15 Oct, 2021 | 19:04
Updated-11 Sep, 2024 | 14:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mitsubishi Electric Europe B.V. SmartRTU devices allow remote attackers to obtain sensitive information (directory listing and source code) via a direct request to the /web URI.

Action-Not Available
Vendor-n/aMitsubishi Electric Corporation
Product-smartrtusmartrtu_firmwaren/a
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2021-20599
Matching Score-8
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-8
Assigner-Mitsubishi Electric Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.33% / 55.45%
||
7 Day CHG~0.00%
Published-14 Oct, 2021 | 00:00
Updated-03 Aug, 2024 | 17:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cleartext Transmission of Sensitive InformationCleartext transmission of sensitive information vulnerability in MELSEC iQ-R series Safety CPU R08/16/32/120SFCPU firmware versions "26" and prior and MELSEC iQ-R series SIL2 Process CPU R08/16/32/120PSFCPU firmware versions "11" and prior allows a remote unauthenticated attacker to login to a target CPU module by obtaining credentials other than password.

Action-Not Available
Vendor-Mitsubishi Electric Corporation
Product-r08sfcpur120psfcpur08sfcpu_firmwarer32psfcpu_firmwarer120psfcpu_firmwarer16sfcpu_firmwarer32sfcpu_firmwarer32sfcpur08psfcpu_firmwarer16psfcpur08psfcpur120sfcpur16sfcpur32psfcpur120sfcpu_firmwarer16psfcpu_firmwareMELSEC iQ-R series SIL2 Process CPU R32PSFCPUMELSEC iQ-R Series SIL2 Process CPU R08PSFCPUMELSEC iQ-R series SIL2 Process CPU R16PSFCPUMELSEC iQ-R series Safety CPU R120SFCPUMELSEC iQ-R series Safety CPU R32SFCPUMELSEC iQ-R series Safety CPU R16SFCPUMELSEC iQ-R Series Safety CPU R08SFCPUMELSEC iQ-R series SIL2 Process CPU R120PSFCPUr120psfcpur32sfcpur120sfcpur16sfcpur32psfcpur16psfcpur08psfcpumelsec_iq-r08sfcpu
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CWE ID-CWE-639
Authorization Bypass Through User-Controlled Key
CVE-2021-20594
Matching Score-8
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-8
Assigner-Mitsubishi Electric Corporation
CVSS Score-7.5||HIGH
EPSS-0.86% / 74.12%
||
7 Day CHG~0.00%
Published-06 Aug, 2021 | 00:00
Updated-03 Aug, 2024 | 17:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Mitsubishi Electric MELSEC iQ-R series Safety CPU modules R08/16/32/120SFCPU firmware versions "26" and prior and Mitsubishi Electric MELSEC iQ-R series SIL2 Process CPU modules R08/16/32/120PSFCPU firmware versions "11" and prior allows a remote unauthenticated attacker to acquire legitimate user names registered in the module via brute-force attack on user names.

Action-Not Available
Vendor-n/aMitsubishi Electric Corporation
Product-r08sfcpur120psfcpur08sfcpu_firmwarer32psfcpu_firmwarer120psfcpu_firmwarer16sfcpu_firmwarer32sfcpur32sfcpu_firmwarer08psfcpu_firmwarer16psfcpur08psfcpur120sfcpur16sfcpur32psfcpur120sfcpu_firmwarer16psfcpu_firmwareMitsubishi Electric MELSEC iQ-R series Safety CPU modules R08/16/32/120SFCPU; Mitsubishi Electric MELSEC iQ-R series SIL2 Process CPU modules R08/16/32/120PSFCPU
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2022-29831
Matching Score-8
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-8
Assigner-Mitsubishi Electric Corporation
CVSS Score-7.5||HIGH
EPSS-0.77% / 72.54%
||
7 Day CHG~0.00%
Published-24 Nov, 2022 | 23:36
Updated-25 Apr, 2025 | 17:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use of Hard-coded Password vulnerability in Mitsubishi Electric Corporation GX Works3 versions from 1.015R to 1.095Z allows a remote unauthenticated attacker to obtain information about the project file for MELSEC safety CPU modules.

Action-Not Available
Vendor-Mitsubishi Electric Corporation
Product-gx_works3GX Works3
CWE ID-CWE-259
Use of Hard-coded Password
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2022-29825
Matching Score-8
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-8
Assigner-Mitsubishi Electric Corporation
CVSS Score-5.6||MEDIUM
EPSS-0.33% / 55.43%
||
7 Day CHG~0.00%
Published-24 Nov, 2022 | 23:21
Updated-25 Apr, 2025 | 17:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use of Hard-coded Password vulnerability in Mitsubishi Electric GX Works3 versions from 1.000A to 1.090U and GT Designer3 Version1 (GOT2000) versions from 1.122C to 1.290C allows an unauthenticated attacker to disclose sensitive information. As a result, unauthenticated users may view programs and project files or execute programs illegally.

Action-Not Available
Vendor-Mitsubishi Electric Corporation
Product-gx_works3GT Designer3 Version1 (GOT2000)GX Works3
CWE ID-CWE-259
Use of Hard-coded Password
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2022-29829
Matching Score-8
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-8
Assigner-Mitsubishi Electric Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.59% / 68.21%
||
7 Day CHG~0.00%
Published-24 Nov, 2022 | 23:23
Updated-24 Apr, 2025 | 19:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use of Hard-coded Cryptographic Key vulnerability in Mitsubishi Electric GX Works3 versions from 1.000A to 1.090U, GT Designer3 Version1 (GOT2000) versions from 1.122C to 1.290C and Motion Control Setting(GX Works3 related software) versions from 1.035M to 1.042U allows a remote unauthenticated attacker to disclose sensitive information. As a result, unauthenticated users may view programs and project files or execute programs illegally.

Action-Not Available
Vendor-Mitsubishi Electric Corporation
Product-gx_works3Motion Control Setting(GX Works3 related software)GX Works3GT Designer3 Version1 (GOT2000)
CWE ID-CWE-321
Use of Hard-coded Cryptographic Key
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2022-29827
Matching Score-8
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-8
Assigner-Mitsubishi Electric Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.59% / 68.21%
||
7 Day CHG~0.00%
Published-24 Nov, 2022 | 23:22
Updated-25 Apr, 2025 | 17:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use of Hard-coded Cryptographic Key vulnerability in Mitsubishi Electric GX Works3 versions from 1.000A and later allows a remote unauthenticated attacker to disclose sensitive information. As a result, unauthenticated attackers may view programs and project files or execute programs illegally.

Action-Not Available
Vendor-Mitsubishi Electric Corporation
Product-gx_works3GX Works3
CWE ID-CWE-321
Use of Hard-coded Cryptographic Key
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2022-29828
Matching Score-8
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-8
Assigner-Mitsubishi Electric Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.59% / 68.21%
||
7 Day CHG~0.00%
Published-24 Nov, 2022 | 23:23
Updated-25 Apr, 2025 | 17:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use of Hard-coded Cryptographic Key vulnerability in Mitsubishi Electric GX Works3 versions from 1.000A and later allows a remote unauthenticated attacker to disclose sensitive information. As a result, unauthenticated attackers may view programs and project file or execute programs illegally.

Action-Not Available
Vendor-Mitsubishi Electric Corporation
Product-gx_works3GX Works3
CWE ID-CWE-321
Use of Hard-coded Cryptographic Key
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2022-25164
Matching Score-8
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-8
Assigner-Mitsubishi Electric Corporation
CVSS Score-8.6||HIGH
EPSS-0.26% / 49.34%
||
7 Day CHG~0.00%
Published-24 Nov, 2022 | 23:21
Updated-25 Apr, 2025 | 17:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cleartext Storage of Sensitive Information vulnerability in Mitsubishi Electric GX Works3 versions from 1.000A to 1.095Z and Mitsubishi Electric MX OPC UA Module Configurator-R versions 1.08J and prior allows a remote unauthenticated attacker to disclose sensitive information. As a result, unauthenticated attackers can gain unauthorized access to the MELSEC CPU module and the MELSEC OPC UA server module.

Action-Not Available
Vendor-Mitsubishi Electric Corporation
Product-mx_opc_ua_module_configurator-rgx_works3MX OPC UA Module Configurator-RGX Works3
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CVE-2020-5602
Matching Score-8
Assigner-JPCERT/CC
ShareView Details
Matching Score-8
Assigner-JPCERT/CC
CVSS Score-7.5||HIGH
EPSS-0.41% / 60.39%
||
7 Day CHG~0.00%
Published-30 Jun, 2020 | 10:20
Updated-04 Aug, 2024 | 08:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mitsubishi Electoric FA Engineering Software (CPU Module Logging Configuration Tool Ver. 1.94Y and earlier, CW Configurator Ver. 1.010L and earlier, EM Software Development Kit (EM Configurator) Ver. 1.010L and earlier, GT Designer3 (GOT2000) Ver. 1.221F and earlier, GX LogViewer Ver. 1.96A and earlier, GX Works2 Ver. 1.586L and earlier, GX Works3 Ver. 1.058L and earlier, M_CommDTM-HART Ver. 1.00A, M_CommDTM-IO-Link Ver. 1.02C and earlier, MELFA-Works Ver. 4.3 and earlier, MELSEC-L Flexible High-Speed I/O Control Module Configuration Tool Ver.1.004E and earlier, MELSOFT FieldDeviceConfigurator Ver. 1.03D and earlier, MELSOFT iQ AppPortal Ver. 1.11M and earlier, MELSOFT Navigator Ver. 2.58L and earlier, MI Configurator Ver. 1.003D and earlier, Motion Control Setting Ver. 1.005F and earlier, MR Configurator2 Ver. 1.72A and earlier, MT Works2 Ver. 1.156N and earlier, RT ToolBox2 Ver. 3.72A and earlier, and RT ToolBox3 Ver. 1.50C and earlier) allows an attacker to conduct XML External Entity (XXE) attacks via unspecified vectors.

Action-Not Available
Vendor-Mitsubishi Electric Corporation
Product-melsoft_fielddeviceconfiguratorm_commdtm-hartgx_works3melfa-worksmelsoft_iq_appportalgt_designer3gx_logviewermt_works2motion_control_settingcw_configuratormelsec-l_flexible_high-speed_i\/o_control_module_configuration_toolcpu_module_logging_configuration_toolmelsoft_navigatorgx_works2m_commdtm-io-linkmr_configurator2mi_configuratorrt_toolbox2em_configuratorrt_toolbox3Mitsubishi Electoric FA Engineering Software
CWE ID-CWE-611
Improper Restriction of XML External Entity Reference
CVE-2023-2061
Matching Score-8
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-8
Assigner-Mitsubishi Electric Corporation
CVSS Score-6.2||MEDIUM
EPSS-0.42% / 61.35%
||
7 Day CHG~0.00%
Published-02 Jun, 2023 | 04:03
Updated-05 Mar, 2025 | 18:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authentication bypass vulnerability in MELSEC iQ-R Series / iQ-F Series EtherNet/IP Modules

Use of Hard-coded Password vulnerability in FTP function on Mitsubishi Electric Corporation MELSEC iQ-R Series EtherNet/IP module RJ71EIP91 and MELSEC iQ-F Series EtherNet/IP module FX5-ENET/IP allows a remote unauthenticated attacker to obtain a hard-coded password and access to the module via FTP.

Action-Not Available
Vendor-Mitsubishi Electric Corporation
Product-sw1dnn-eipctfx5-bd_firmwarefx5-enet\/ip_firmwarerj71eip91rj71eip91_firmwaresw1dnn-eipctfx5-bdfx5-enet\/ipsw1dnn-eipct-bd_firmwaresw1dnn-eipct-bdMELSEC iQ-R Series EtherNet/IP module RJ71EIP91MELSEC iQ-F Series EtherNet/IP module FX5-ENET/IP
CWE ID-CWE-259
Use of Hard-coded Password
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2023-0457
Matching Score-8
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-8
Assigner-Mitsubishi Electric Corporation
CVSS Score-7.5||HIGH
EPSS-1.21% / 78.17%
||
7 Day CHG~0.00%
Published-03 Mar, 2023 | 04:18
Updated-05 Mar, 2025 | 20:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Information Disclosure Vulnerability in MELSEC Series

Plaintext Storage of a Password vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series, MELSEC iQ-R Series, MELSEC-Q Series and MELSEC-L Series allows a remote unauthenticated attacker to disclose plaintext credentials stored in project files and login into FTP server or Web server.

Action-Not Available
Vendor-Mitsubishi Electric Corporation
Product-fx5uj-24mt\/essfx5s-40mt\/es_firmwarefx5s-80mr\/esfx5uj-24mt\/es_firmwarefx5uj-60mr\/es_firmwarefx5uj-60mt\/essfx5s-40mt\/esfx5-enetfx5uj-40mt\/es_firmwarefx5-enet\/ip_firmwarefx5uj-24mt\/ess_firmwarefx5uc-32mt\/ds-tsfx5uj-24mr\/es-afx5s-60mt\/es_firmwarefx5uj-60mr\/esfx5uj-60mt\/ess_firmwarefx5s-40mr\/es_firmwarefx5uj-24mr\/esfx5s-30mr\/es_firmwarefx5s-60mr\/esfx5uj-60mt\/es-afx5uc-64mt\/dfx5uc-32mt\/dssfx5uj-40mr\/es_firmwarefx5s-30mt\/esfx5s-60mr\/es_firmwarefx5s-30mt\/ess_firmwarefx5uj-24mt\/es-a_firmwarefx5s-40mt\/ess_firmwarefx5s-60mt\/esfx5uj-24mt\/esfx5uj-40mr\/esfx5s-30mt\/es_firmwarefx5s-60mt\/essfx5-enet_firmwarefx5-enet\/ipfx5uc-64mt\/dss_firmwarefx5uc-32mt\/dss_firmwarefx5uc-96mt\/d_firmwarefx5uj-60mr\/es-a_firmwarefx5s-60mt\/ess_firmwarefx5s-80mt\/esfx5uj-40mr\/es-afx5s-40mr\/esfx5s-40mt\/essfx5uj-60mt\/esfx5uc-32mt\/dss-tsfx5uj-24mr\/es-a_firmwarefx5uc-32mt\/dfx5uj-60mt\/es_firmwarefx5s-30mt\/essfx5uj-60mr\/es-afx5uj-40mt\/es-afx5s-80mt\/essfx5s-80mr\/es_firmwarefx5uc-64mt\/dssfx5uc-96mt\/dfx5uc-32mr\/ds-ts_firmwarefx5s-30mr\/esfx5uj-40mt\/ess_firmwarefx5s-80mt\/es_firmwarefx5uc-32mr\/ds-tsfx5uc-32mt\/ds-ts_firmwarefx5uj-60mt\/es-a_firmwarefx5uj-40mt\/es-a_firmwarefx5uj-24mr\/es_firmwarefx5uj-24mt\/es-afx5uc-64mt\/d_firmwarefx5uj-40mt\/essfx5uj-40mt\/esfx5uc-32mt\/dss-ts_firmwarefx5uc-96mt\/dss_firmwarefx5uj-40mr\/es-a_firmwarefx5s-80mt\/ess_firmwarefx5uc-32mt\/d_firmwarefx5uc-96mt\/dssMELSEC iQ-R Series R04ENCPUMELSEC iQ-F Series FX5UJ-60MR/ES-AMELSEC iQ-F Series FX5UJ-40MR/ESMELSEC-L Series L02CPUMELSEC iQ-F Series FX5S-60MT/ESSMELSEC iQ-F Series FX5S-80MT/ESSMELSEC iQ-R Series R16PCPUMELSEC-L Series L26CPU-PBTMELSEC iQ-F Series FX5U-64MT/DSSMELSEC-Q Series Q20UDEHCPUMELSEC iQ-F Series FX5UJ-24MR/ES-AMELSEC-Q Series Q06UDVCPUMELSEC-Q Series Q06UDPVCPUMELSEC iQ-R Series R16PSFCPUMELSEC iQ-F Series FX5U-64MT/ESMELSEC iQ-R Series R16SFCPUMELSEC iQ-F Series FX5U-64MT/ESSMELSEC-L Series L26CPU-PMELSEC iQ-R Series R32PCPUMELSEC iQ-F Series FX5UC-32MT/DMELSEC iQ-F Series FX5U-32MT/ESSMELSEC iQ-R Series R16CPUMELSEC iQ-R Series R32SFCPUMELSEC iQ-R Series R120PCPUMELSEC iQ-F Series FX5U-32MT/DSSMELSEC-L Series L06CPUMELSEC iQ-F Series FX5S-30MR/ESMELSEC iQ-F Series FX5U-32MT/ESMELSEC iQ-F Series FX5S-60MT/ESMELSEC iQ-F Series FX5UJ-60MT/ESMELSEC iQ-F Series FX5U-80MR/ESMELSEC iQ-F Series FX5-ENETMELSEC iQ-F Series FX5UC-32MT/DS-TSMELSEC iQ-F Series FX5S-40MT/ESMELSEC iQ-R Series R00CPUMELSEC-L Series LJ71E71-100MELSEC iQ-F Series FX5U-64MR/DSMELSEC iQ-R Series R32CPUMELSEC iQ-F Series FX5-ENET/IPMELSEC iQ-R Series R120ENCPUMELSEC iQ-R Series R08PSFCPUMELSEC-L Series L26CPUMELSEC iQ-F Series FX5S-30MT/ESSMELSEC-Q Series Q03UDECPUMELSEC iQ-F Series FX5UC-32MR/DS-TSMELSEC iQ-F Series FX5UJ-24MT/ESSMELSEC-Q Series Q04UDEHCPUMELSEC-Q Series Q06UDEHCPUMELSEC iQ-F Series FX5U-32MR/DSMELSEC iQ-F Series FX5UJ-24MT/ESMELSEC-Q Series Q04UDPVCPUMELSEC-Q Series QJ71E71-100MELSEC iQ-F Series FX5UJ-60MT/ES-AMELSEC iQ-F Series FX5S-60MR/ESMELSEC iQ-F Series FX5UC-96MT/DMELSEC iQ-F Series FX5UC-32MT/DSS-TSMELSEC iQ-F Series FX5S-40MT/ESSMELSEC iQ-F Series FX5UC-96MT/DSSMELSEC-Q Series Q26UDPVCPUMELSEC iQ-F Series FX5UC-32MT/DSSMELSEC iQ-F Series FX5U-64MT/DSMELSEC iQ-F Series FX5UC-64MT/DMELSEC-L Series L26CPU-BTMELSEC iQ-R Series R12CCPU-VMELSEC iQ-F Series FX5S-40MR/ESMELSEC iQ-R Series R120CPUMELSEC iQ-F Series FX5UJ-60MT/ESSMELSEC iQ-F Series FX5U-80MT/DSMELSEC iQ-F Series FX5U-32MT/DSMELSEC iQ-F Series FX5UJ-40MR/ES-AMELSEC iQ-F Series FX5S-30MT/ESMELSEC iQ-F Series FX5U-80MR/DSMELSEC-Q Series Q50UDEHCPUMELSEC-Q Series Q100UDEHCPUMELSEC-Q Series Q13UDPVCPUMELSEC iQ-F Series FX5S-80MR/ESMELSEC iQ-F Series FX5U-80MT/ESMELSEC iQ-F Series FX5U-80MT/ESSMELSEC iQ-F Series FX5UJ-24MR/ESMELSEC-L Series L06CPU-PMELSEC iQ-F Series FX5S-80MT/ESMELSEC iQ-R Series R08PCPUMELSEC iQ-R Series R08CPUMELSEC iQ-R Series R08SFCPUMELSEC iQ-F Series FX5UJ-40MT/ESMELSEC iQ-F Series FX5UJ-24MT/ES-AMELSEC iQ-R Series R32PSFCPUMELSEC iQ-R Series R120PSFCPUMELSEC iQ-R Series R01CPUMELSEC iQ-F Series FX5UJ-40MT/ESSMELSEC iQ-F Series FX5U-80MT/DSSMELSEC iQ-F Series FX5UJ-60MR/ESMELSEC-Q Series Q26UDVCPUMELSEC-Q Series Q26UDEHCPUMELSEC iQ-R Series R04CPUMELSEC-Q Series Q13UDVCPUMELSEC iQ-R Series RJ71EN71MELSEC iQ-F Series FX5U-32MR/ESMELSEC iQ-F Series FX5UJ-40MT/ES-AMELSEC iQ-F Series FX5U-64MR/ESMELSEC iQ-R Series R02CPUMELSEC-L Series L02CPU-PMELSEC-Q Series Q03UDVCPUMELSEC iQ-R Series R08ENCPUMELSEC iQ-R Series R120SFCPUMELSEC iQ-R Series R16ENCPUMELSEC iQ-F Series FX5UC-64MT/DSSMELSEC-Q Series Q13UDEHCPUMELSEC-Q Series Q10UDEHCPUMELSEC iQ-R Series R32ENCPUMELSEC-Q Series Q04UDVCPU
CWE ID-CWE-256
Plaintext Storage of a Password
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2016-8370
Matching Score-8
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-8
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.5||HIGH
EPSS-0.18% / 40.29%
||
7 Day CHG~0.00%
Published-13 Feb, 2017 | 21:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Mitsubishi Electric Automation MELSEC-Q series Ethernet interface modules QJ71E71-100, all versions, QJ71E71-B5, all versions, and QJ71E71-B2, all versions. Weakly encrypted passwords are transmitted to a MELSEC-Q PLC.

Action-Not Available
Vendor-n/aMitsubishi Electric Corporation
Product-qj71e71-b2_firmwareqj71e71-b5_firmwareqj71e71-b2qj71e71-100qj71e71-b5qj71e71-100_firmwareMitsubishi Electric MELSEC-Q Series Ethernet Interface Module
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CVE-2023-0525
Matching Score-8
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-8
Assigner-Mitsubishi Electric Corporation
CVSS Score-7.5||HIGH
EPSS-0.31% / 53.92%
||
7 Day CHG~0.00%
Published-03 Aug, 2023 | 23:42
Updated-18 Oct, 2024 | 20:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Weak Encoding for Password vulnerability in Mitsubishi Electric Corporation GOT2000 Series GT27 model versions 01.49.000 and prior, GT25 model versions 01.49.000 and prior, GT23 model versions 01.49.000 and prior, GT21 model versions 01.49.000 and prior, GOT SIMPLE Series GS25 model versions 01.49.000 and prior, GS21 model versions 01.49.000 and prior, GT Designer3 Version1 (GOT2000) versions 1.295H and prior and GT SoftGOT2000 versions 1.295H and prior allows a remote unauthenticated attacker to obtain plaintext passwords by sniffing packets containing encrypted passwords and decrypting the encrypted passwords, in the case of transferring data with GT Designer3 Version1(GOT2000) and GOT2000 Series or GOT SIMPLE Series with the Data Transfer Security function enabled, or in the case of transferring data by the SoftGOT-GOT link function with GT SoftGOT2000 and GOT2000 series with the Data Transfer Security function enabled.

Action-Not Available
Vendor-Mitsubishi Electric Corporation
Product-gt23_firmwaregt25gt21_firmwaregs21_firmwaregt25_firmwaregt27gs21gt_designer3gt27_firmwaregs25gs25_firmwaregt23gt21gt_softgot2000GOT2000 Series GT27 modelGOT2000 Series GT23 modelGOT2000 Series GT21 modelGOT SIMPLE Series GS21 modelGT SoftGOT2000GOT2000 Series GT25 modelGT Designer3 Version1 (GOT2000)GOT SIMPLE Series GS25 model
CWE ID-CWE-261
Weak Encoding for Password
CWE ID-CWE-326
Inadequate Encryption Strength
CVE-2019-14929
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-2.15% / 83.56%
||
7 Day CHG~0.00%
Published-28 Oct, 2019 | 12:11
Updated-10 Sep, 2024 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on Mitsubishi Electric Europe B.V. ME-RTU devices through 2.02 and INEA ME-RTU devices through 3.0. Stored cleartext passwords could allow an unauthenticated attacker to obtain configured username and password combinations on the RTU due to the weak credentials management on the RTU. An unauthenticated user can obtain the exposed password credentials to gain access to the following services: DDNS service, Mobile Network Provider, and OpenVPN service.

Action-Not Available
Vendor-inean/aMitsubishi Electric Corporation
Product-me-rtu_firmwaresmartrtusmartrtu_firmwareme-rtun/a
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2023-2060
Matching Score-8
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-8
Assigner-Mitsubishi Electric Corporation
CVSS Score-7.5||HIGH
EPSS-0.25% / 48.29%
||
7 Day CHG~0.00%
Published-02 Jun, 2023 | 04:02
Updated-05 Mar, 2025 | 18:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authentication bypass vulnerability in MELSEC iQ-R Series / iQ-F Series EtherNet/IP Modules

Weak Password Requirements vulnerability in FTP function on Mitsubishi Electric Corporation MELSEC iQ-R Series EtherNet/IP module RJ71EIP91 and MELSEC iQ-F Series EtherNet/IP module FX5-ENET/IP allows a remote unauthenticated attacker to access to the module via FTP by dictionary attack or password sniffing.

Action-Not Available
Vendor-Mitsubishi Electric Corporation
Product-sw1dnn-eipctfx5-bd_firmwarefx5-enet\/ip_firmwarerj71eip91_firmwaresw1dnn-eipctfx5-bdfx5-enet\/ipsw1dnn-eipct-bd_firmwarerj71eip91sw1dnn-eipct-bdMELSEC iQ-R Series EtherNet/IP module RJ71EIP91MELSEC iQ-F Series EtherNet/IP module FX5-ENET/IP
CWE ID-CWE-521
Weak Password Requirements
CVE-2022-29826
Matching Score-8
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-8
Assigner-Mitsubishi Electric Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.26% / 49.34%
||
7 Day CHG~0.00%
Published-24 Nov, 2022 | 23:22
Updated-25 Apr, 2025 | 17:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cleartext Storage of Sensitive Information vulnerability in Mitsubishi Electric GX Works3 versions from 1.000A to 1.087R and Motion Control Setting(GX Works3 related software) versions from 1.000A to 1.042U allows a remote unauthenticated attacker to disclose sensitive information. As a result, unauthenticated users may view programs and project files or execute programs illegally.

Action-Not Available
Vendor-Mitsubishi Electric Corporation
Product-gx_works3Motion Control Setting(GX Works3 related software)GX Works3
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CVE-2023-6942
Matching Score-6
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-6
Assigner-Mitsubishi Electric Corporation
CVSS Score-7.5||HIGH
EPSS-0.53% / 66.46%
||
7 Day CHG~0.00%
Published-30 Jan, 2024 | 09:06
Updated-29 May, 2025 | 15:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Missing Authentication for Critical Function vulnerability in Mitsubishi Electric Corporation EZSocket versions 3.0 to 5.92, GT Designer3 Version1(GOT1000) versions 1.325P and prior, GT Designer3 Version1(GOT2000) versions 1.320J and prior, GX Works2 versions 1.11M and later, GX Works3 versions 1.106L and prior, MELSOFT Navigator versions 1.04E to 2.102G, MT Works2 versions 1.190Y and prior, MX Component versions 4.00A to 5.007H and MX OPC Server DA/UA all versions allows a remote unauthenticated attacker to bypass authentication by sending specially crafted packets and connect to the products illegally.

Action-Not Available
Vendor-Mitsubishi Electric Corporation
Product-gx_works2got1000got2000mt_works2ezsocketmc_works64gx_works3melsoft_navigatorfr_configurator2mx_componentMX OPC Server DA/UAMT Works2MX ComponentEZSocketGX Works2GT Designer3 Version1(GOT1000)GX Works3MELSOFT NavigatorGT Designer3 Version1(GOT2000)
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-4699
Matching Score-6
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-6
Assigner-Mitsubishi Electric Corporation
CVSS Score-10||CRITICAL
EPSS-0.91% / 74.95%
||
7 Day CHG~0.00%
Published-06 Nov, 2023 | 05:02
Updated-17 Mar, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Arbitrary Command Execution Vulnerability in Mitsubishi Electric proprietary protocol communication of multiple FA products

Missing Authentication for Critical Function vulnerability in Mitsubishi Electric Corporation MELSEC-F Series CPU modules, MELSEC iQ-F Series, MELSEC iQ-R series CPU modules, MELSEC iQ-R series, MELSEC iQ-L series, MELSEC Q series, MELSEC-L series, Mitsubishi Electric CNC M800V/M80V series, Mitsubishi Electric CNC M800/M80/E80 series and Mitsubishi Electric CNC M700V/M70V/E70 series allows a remote unauthenticated attacker to execute arbitrary commands by sending specific packets to the affected products. This could lead to disclose or tamper with information by reading or writing control programs, or cause a denial-of-service (DoS) condition on the products by resetting the memory contents of the products to factory settings or resetting the products remotely.

Action-Not Available
Vendor-Mitsubishi Electric Corporation
Product-fx3u-64mr\/ds_firmwarefx3uc-32mt-lt-2fx3u-128mt\/ess_firmwarefx3u-48mt\/es-a_firmwarefx5u-64mr\/dsfx3u-32ms\/esfx3g-14mt\/es-afx3s-10mr\/es_firmwarefx5uj-24mt\/es-a_firmwarefx3ge-24mt\/dsfx3u-64mr\/ua1fx3u-16mr\/es_firmwarefx5uc-64mt\/d_firmwarefx3u-80mt\/dsfx3ge-40mt\/dssfx3u-48mt\/dsfx3u-80mr\/es_firmwarefx5uj-24mr\/ds_firmwarefx3u-64mr\/es_firmwarefx3g-24mr\/es-a_firmwarefx3u-16mr\/es-afx3u-128mt\/es-afx5u-80mt\/dss_firmwarefx5u-32mt\/ess_firmwarefx3s-14mt\/esfx5u-32mt\/ds_firmwarefx3g-60mt\/es_firmwarefx5uj-40mr\/es-afx5uj-60mt\/dsfx3uc-96mt\/dfx5s-30mt\/ess_firmwarefx3s-30mt\/esfx3g-24mt\/ds_firmwarefx3ge-24mt\/ds_firmwarefx5u-64mt\/dss_firmwarefx5u-80mr\/dsfx5uc-32mt\/ds-ts_firmwarefx3uc-64mt\/dssfx3u-64mt\/esfx3g-24mt\/es-afx3ge-40mr\/dsfx5s-80mr\/es_firmwarefx3s-30mr\/es-2adfx5s-60mt\/ess_firmwarefx3g-24mt\/dss_firmwarefx5uj-24mt\/dss_firmwarefx3s-30mr\/ds_firmwarefx3u-16mt\/es_firmwarefx3sa-30mr-cm_firmwarefx3gc-32mt\/d_firmwarefx3ge-24mt\/dssfx3ga-24mr-cmfx3uc-96mt\/dss_firmwarefx5uc-32mt\/ds-tsfx3u-16mt\/dss_firmwarefx3g-14mr\/es-afx3sa-10mr-cmfx3g-60mt\/dssfx3s-14mt\/es_firmwarefx3g-40mt\/es-afx5uj-24mr\/es_firmwarefx5uj-24mr\/esfx3uc-32mt-lt_firmwarefx3ga-24mr-cm_firmwarefx5uj-24mt\/essfx5s-60mr\/esfx5uc-32mt\/dss_firmwarefx3uc-32mt\/dfx3uc-16mt\/dss-p4fx3sa-10mt-cmfx5s-60mt\/essfx5u-80mr\/esfx3g-40mt\/dsfx5u-80mt\/dssfx3g-60mr\/es-a_firmwarefx3s-20mt\/ds_firmwarefx3u-128mt\/es-a_firmwarefx3uc-32mt\/dss_firmwarefx3ge-24mt\/dss_firmwarefx3uc-16mt\/d_firmwarefx3g-40mt\/essfx5uj-24mr\/es-a_firmwarefx3u-16mr\/es-a_firmwarefx3g-14mt\/ess_firmwarefx3u-48mt\/dss_firmwarefx3s-20mt\/dssfx5uj-60mt\/esfx5uc-96mt\/dssfx3u-16mt\/ess_firmwarefx3g-40mt\/dssfx5uj-40mt\/dsfx3u-32mr\/es_firmwarefx3ge-24mr\/esfx3sa-14mr-cmfx3u-128mr\/es-afx3g-14mr\/es_firmwarefx5uj-60mr\/es-a_firmwarefx3ge-24mt\/es_firmwarefx3g-14mt\/dss_firmwarefx3ge-24mt\/ess_firmwarefx3u-64mt\/dsfx5u-80mt\/ess_firmwarefx3g-14mt\/ds_firmwarefx3u-80mt\/es-afx3gc-32mt\/dss_firmwarefx3u-48mr\/es_firmwarefx3g-40mr\/dsfx3uc-64mt\/dss_firmwarefx3u-128mr\/ds_firmwarefx3s-30mt\/es-2ad_firmwarefx3u-64mr\/es-afx3sa-20mt-cm_firmwarefx3s-10mr\/esfx3s-10mt\/ess_firmwarefx3u-80mt\/ds_firmwarefx5u-64mt\/dssfx5s-40mt\/esfx3s-20mr\/esfx3u-80mt\/dssfx3u-16mr\/esfx3g-60mt\/essfx5u-64mt\/dsfx3s-14mt\/dssfx3g-24mt\/essfx3ge-24mt\/essfx3s-14mr\/ds_firmwarefx5u-80mt\/dsfx5uc-96mt\/d_firmwarefx5uc-64mt\/dfx3ge-40mt\/dss_firmwarefx3g-60mr\/esfx3g-40mr\/es_firmwarefx5uj-40mt\/ess_firmwarefx3u-48mt\/dssfx3ge-40mt\/dsfx3ge-40mr\/ds_firmwarefx3g-24mt\/esfx3uc-16mr\/d-tfx3s-10mt\/dsfx5uj-24mt\/es-afx5u-32mt\/esfx3s-30mt\/ess-2adfx3g-60mr\/es_firmwarefx3ga-40mr-cmfx3sa-14mt-cmfx3u-128mt\/dsfx3u-32mt\/dsfx5uj-60mr\/ds_firmwarefx3u-64ms\/esfx3s-10mt\/esfx3ge-40mr\/esfx5uj-60mt\/dss_firmwarefx3s-10mt\/essfx5s-80mt\/es_firmwarefx3g-40mt\/esfx5u-32mt\/dsfx3u-64mr\/ua1_firmwarefx3u-64mt\/ds_firmwarefx3u-128mt\/dssfx3ge-40mt\/essfx3sa-20mr-cm_firmwarefx5s-80mt\/ess_firmwarefx3ge-24mr\/ds_firmwarefx3u-48mt\/ds_firmwarefx3uc-32mt-ltfx3u-32mt\/essfx3u-32mr\/ds_firmwarefx5uj-60mt\/es-a_firmwarefx5s-80mt\/essfx3g-24mt\/ess_firmwarefx3g-60mt\/dss_firmwarefx3sa-10mr-cm_firmwarefx3u-128mt\/essfx3u-16mt\/esfx3u-32mt\/es-a_firmwarefx5u-32mt\/es_firmwarefx3u-80mr\/es-a_firmwarefx3g-60mr\/ds_firmwarefx3s-20mt\/dsfx3ge-24mr\/dsfx3ga-60mt-cm_firmwarefx5uj-60mr\/es-afx3s-30mr\/es_firmwarefx5s-30mr\/es_firmwarefx3u-32mr\/dsfx3u-64mt\/es-a_firmwarefx3s-30mt\/ess-2ad_firmwarefx5s-40mr\/es_firmwarefx5s-40mt\/essfx3u-16mt\/ds_firmwarefx5u-80mr\/es_firmwarefx3ga-60mt-cmfx5uc-32mt\/d_firmwarefx3g-14mt\/esfx3sa-14mt-cm_firmwarefx3ge-40mt\/ess_firmwarefx3sa-14mr-cm_firmwarefx5uj-40mt\/dss_firmwarefx3s-10mr\/ds_firmwarefx3g-24mr\/es_firmwarefx3uc-16mr\/d-t_firmwarefx3g-14mt\/es_firmwarefx3s-14mt\/ess_firmwarefx3g-24mr\/dsfx5u-32mt\/essfx5uj-60mt\/ess_firmwarefx3u-64mt\/essfx3s-30mt\/dsfx3g-24mt\/es-a_firmwarefx5uc-32mr\/ds-tsfx3u-32mt\/ess_firmwarefx3g-60mt\/ess_firmwarefx3g-24mt\/dssfx5u-80mt\/es_firmwarefx3s-30mr\/es-2ad_firmwarefx5uj-40mr\/dsfx3u-48mt\/ess_firmwarefx5s-30mt\/esfx3u-64mt\/dss_firmwarefx3uc-64mt\/dfx3u-80mt\/dss_firmwarefx3g-14mt\/dssfx3g-14mr\/es-a_firmwarefx5s-40mt\/ess_firmwarefx3s-14mr\/esfx5uj-40mt\/es_firmwarefx3s-20mt\/ess_firmwarefx3uc-16mt\/d-p4_firmwarefx3sa-30mt-cmfx3uc-96mt\/d_firmwarefx5uj-24mt\/ess_firmwarefx5uj-24mt\/es_firmwarefx3g-40mt\/es_firmwarefx3g-60mr\/es-afx5u-80mt\/ds_firmwarefx3u-128mr\/es-a_firmwarefx5s-30mt\/essfx3u-64mt\/dssfx3g-14mr\/esfx5s-30mr\/esfx3s-20mr\/dsfx5u-32mr\/es_firmwarefx5uj-40mt\/es-afx3uc-16mt\/dssfx3ga-60mr-cm_firmwarefx3u-48mr\/ds_firmwarefx3s-10mt\/dssfx5s-40mr\/esfx5s-30mt\/es_firmwarefx3u-16mr\/dsfx3ga-40mt-cmfx5uj-40mr\/ds_firmwarefx3s-30mt\/dssfx3u-80mt\/esfx3s-14mr\/dsfx3u-80mt\/ess_firmwarefx3sa-30mr-cmfx5uj-24mt\/dsfx3g-24mr\/es-afx3u-32mr\/es-a_firmwarefx3u-128mr\/esfx3g-60mt\/esfx5uj-60mr\/es_firmwarefx3u-16mt\/dssfx5uj-24mt\/dssfx3u-32mr\/esfx3s-30mr\/esfx3u-64mt\/es_firmwarefx3g-40mt\/dss_firmwarefx5u-64mt\/ess_firmwarefx3u-16mt\/essfx3s-20mt\/essfx3u-128mt\/efx5uc-32mt\/dss-ts_firmwarefx3u-48mt\/essfx3uc-32mt\/d_firmwarefx3ga-60mr-cmfx3g-60mt\/es-afx3u-32mr\/ua1_firmwarefx3u-32mt\/es_firmwarefx3uc-16mt\/dfx3ga-24mt-cmfx3ge-40mt\/es_firmwarefx3g-24mr\/esfx5uj-40mr\/es_firmwarefx3g-60mt\/dsfx5uj-60mt\/es-afx3s-10mt\/ds_firmwarefx5u-64mt\/es_firmwarefx3u-32mt\/es-afx3ge-40mt\/ds_firmwarefx3s-10mt\/es_firmwarefx3gc-32mt\/dfx3u-32mr\/es-afx5uj-24mr\/dsfx5u-80mt\/essfx3u-64ms\/es_firmwarefx3s-30mt\/ds_firmwarefx5u-64mt\/essfx3u-32mt\/dss_firmwarefx3u-16mt\/dsfx5uj-24mr\/es-afx3g-60mr\/dsfx5u-64mr\/ds_firmwarefx5s-80mr\/esfx3s-20mr\/ds_firmwarefx3sa-20mt-cmfx3uc-16mr\/ds-t_firmwarefx3u-48mr\/es-a_firmwarefx3g-14mt\/dsfx5uc-64mt\/dssfx3u-32ms\/es_firmwarefx3g-40mr\/es-afx3ge-24mt\/esfx3s-14mt\/dss_firmwarefx5uj-60mr\/dsfx3g-14mt\/es-a_firmwarefx5uj-24mt\/ds_firmwarefx3sa-30mt-cm_firmwarefx3u-80mr\/esfx3g-40mt\/ess_firmwarefx3u-64mt\/ess_firmwarefx3u-80mt\/essfx5uj-60mt\/es_firmwarefx3uc-32mt\/dssfx3g-40mr\/es-a_firmwarefx3ge-40mt\/esfx3s-14mt\/dsfx5uc-64mt\/dss_firmwarefx5uj-40mt\/ds_firmwarefx5s-80mt\/esfx3u-48mr\/es-afx3s-30mt\/dss_firmwarefx3gc-32mt\/dssfx3s-10mr\/dsfx5u-64mt\/ds_firmwarefx3ge-40mr\/es_firmwarefx5uj-40mt\/essfx5uc-32mt\/dssfx3u-16mt\/es-afx3u-80mt\/es-a_firmwarefx3u-16mt\/es-a_firmwarefx3uc-16mt\/d-p4fx3u-128mt\/dss_firmwarefx3g-40mt\/ds_firmwarefx3ge-24mr\/es_firmwarefx3u-32mr\/ua1fx3g-14mr\/ds_firmwarefx3g-60mt\/es-a_firmwarefx3g-60mt\/ds_firmwarefx5uj-40mt\/es-a_firmwarefx5u-64mt\/esfx3u-48mt\/es_firmwarefx3uc-16mt\/dss-p4_firmwarefx3u-80mr\/es-afx3s-14mr\/es_firmwarefx5u-32mr\/esfx3g-14mr\/dsfx3ga-40mt-cm_firmwarefx3u-80mr\/ds_firmwarefx3u-48mt\/esfx5uj-60mt\/dssfx5uj-40mt\/dssfx3s-20mr\/es_firmwarefx5uj-60mr\/esfx3s-30mt\/ess_firmwarefx3u-32mt\/esfx3sa-20mr-cmfx3ga-24mt-cm_firmwarefx3sa-10mt-cm_firmwarefx3u-48mr\/dsfx3u-64mr\/dsfx3u-80mr\/dsfx5uc-32mt\/dss-tsfx5uj-40mt\/esfx3u-64mr\/es-a_firmwarefx3s-30mt\/essfx3g-40mr\/esfx5u-64mr\/esfx3u-48mt\/es-afx5uc-32mr\/ds-ts_firmwarefx3uc-32mt-lt-2_firmwarefx3u-32mt\/ds_firmwarefx3u-128mt\/ds_firmwarefx3g-24mr\/ds_firmwarefx3u-64mt\/es-afx3g-14mt\/essfx3s-20mt\/dss_firmwarefx3s-14mt\/essfx3g-24mt\/es_firmwarefx3uc-16mt\/dss_firmwarefx3g-24mt\/dsfx5u-32mr\/dsfx5uj-60mt\/ds_firmwarefx5s-60mr\/es_firmwarefx5u-80mt\/esfx3u-128mr\/es_firmwarefx3u-16mr\/ds_firmwarefx3s-20mt\/esfx5u-32mt\/dss_firmwarefx5uj-24mt\/esfx3uc-16mr\/ds-tfx3s-30mr\/dsfx5uj-40mr\/es-a_firmwarefx3u-128mr\/dsfx3s-14mt\/ds_firmwarefx5s-60mt\/es_firmwarefx3u-80mt\/es_firmwarefx5uj-40mr\/esfx3uc-64mt\/d_firmwarefx3uc-96mt\/dssfx3u-48mr\/esfx5s-60mt\/esfx3s-30mt\/es_firmwarefx5u-64mr\/es_firmwarefx3u-64mr\/esfx5uc-32mt\/dfx5u-32mr\/ds_firmwarefx3s-10mt\/dss_firmwarefx5uc-96mt\/dfx3s-20mt\/es_firmwarefx3u-32mt\/dssfx3s-30mt\/es-2adfx5uj-60mt\/essfx3g-40mt\/es-a_firmwarefx3ga-40mr-cm_firmwarefx5uc-96mt\/dss_firmwarefx5s-40mt\/es_firmwarefx5u-80mr\/ds_firmwarefx3g-40mr\/ds_firmwarefx3u-128mt\/e_firmwarefx5u-32mt\/dssMELSEC-F Series FX3G-40MT/ESSMELSEC iQ-F Series FX5U-32MT/ESSMELSEC-F Series FX3U-64MT/ESMELSEC iQ-R Series RD77MS4MELSEC iQ-F Series FX5S-30MT/ESMELSEC-F Series FX3U-32MR/UA1MELSEC-F Series FX3S-10MT/DSSMELSEC-F Series FX3UC-16MT/DMELSEC-F Series FX3S-14MR/DSMELSEC-F Series FX3GA-60MT-CMMELSEC-F Series FX3G-60MT/DSSMitsubishi Electric CNC M700V Series M750VSMELSEC iQ-F Series FX5S-80MT/ESSMELSEC-F Series FX3GC-32MT/DSSMELSEC iQ-R Series R32ENCPUMELSEC-F Series FX3GA-60MR-CMMELSEC-F Series FX3S-10MR/DSMELSEC iQ-F Series FX5U-80MT/DSMELSEC-F Series FX3UC-16MT/D-P4MELSEC-F Series FX3U-48MT/ESSMELSEC-F Series FX3U-32MT/ES-AMELSEC-F Series FX3U-16MT/DSMELSEC-F Series FX3U-128MR/ESMELSEC-F Series FX3GE-40MT/DSMELSEC Q Series Q172DSCPUMELSEC iQ-F Series FX5U-80MR/DSMELSEC-F Series FX3S-10MT/ESMELSEC-F Series FX3U-32MT/DSSMELSEC iQ-F Series FX5UJ-24MT/ES-AMELSEC-F Series FX3G-60MR/ESMELSEC-F Series FX3SA-10MT-CMMELSEC iQ-F Series FX5S-60MT/ESSMELSEC iQ-F Series FX5UJ-40MT/ESMELSEC L Series LD77MS2MELSEC-F Series FX3UC-16MR/DS-TMELSEC-F Series FX3G-60MT/ESMELSEC-F Series FX3SA-30MT-CMMELSEC-F Series FX3S-20MT/ESSMELSEC iQ-R Series R16PCPUMELSEC iQ-R Series R16MTCPUMELSEC-F Series FX3G-40MT/ES-AMELSEC iQ-F Series FX5UJ-24MR/ESMELSEC iQ-F Series FX5S-30MT/ESSMELSEC iQ-R Series RD78G4MELSEC-F Series FX3S-14MT/ESMELSEC iQ-F Series FX5UJ-60MT/ESMELSEC-F Series FX3S-20MR/DSMELSEC-F Series FX3U-80MT/DSSMELSEC-F Series FX3S-20MT/DSMELSEC iQ-F Series FX5U-64MR/DSMELSEC-F Series FX3U-128MT/ESSMELSEC-F Series FX3U-48MT/DSSMELSEC iQ-F Series FX5UJ-40MT/ESSMELSEC iQ-R Series R120ENCPUMELSEC iQ-F Series FX5UC-64MT/DMELSEC-F Series FX3GE-24MT/ESMELSEC-F Series FX3SA-10MR-CMMELSEC-F Series FX3SA-30MR-CMMELSEC-F Series FX3U-64MR/ES-AMELSEC iQ-R Series RD78G8Mitsubishi Electric CNC M700V Series M730VSMELSEC-F Series FX3S-20MT/DSSMELSEC L Series LD77MS4MELSEC-F Series FX3UC-32MT-LT-2Mitsubishi Electric CNC M700V Series M730VWMELSEC iQ-R Series R08PCPUMitsubishi Electric CNC M80 Series M80MELSEC-F Series FX3U-64MR/DSMELSEC iQ-R Series R120CPUMELSEC-F Series FX3U-16MT/ES-AMELSEC-F Series FX3S-30MT/DSMELSEC iQ-F Series FX5UJ-24MT/DSMELSEC iQ-F Series FX5UJ-60MR/ESMELSEC iQ-F Series FX5-40SSC-GMELSEC iQ-R Series RD77GF32MELSEC-F Series FX3S-30MR/DSMELSEC-F Series FX3GA-24MT-CMMELSEC iQ-R Series R120PCPUMELSEC-F Series FX3S-30MT/ES-2ADMELSEC L Series LD77MS16MELSEC-F Series FX3U-80MT/ES-AMELSEC iQ-F Series FX5S-60MR/ESMELSEC iQ-R Series R04ENCPUMELSEC iQ-R Series R32MTCPUMELSEC-F Series FX3UC-16MT/DSSMELSEC-F Series FX3U-16MR/DSMELSEC-F Series FX3G-60MR/ES-AMELSEC iQ-F Series FX5S-30MR/ESMELSEC-F Series FX3S-20MT/ESMELSEC-F Series FX3S-30MT/ESS-2ADMELSEC-F Series FX3S-30MR/ESMitsubishi Electric CNC M800 Series M800SMELSEC iQ-F Series FX5UC-32MR/DS-TSMELSEC iQ-F Series FX5UJ-40MT/DSSMELSEC Q Series QD77MS16MELSEC Q Series QD77MS2MELSEC-F Series FX3G-14MT/ES-AMitsubishi Electric CNC M70V Series M70VMELSEC-F Series FX3G-24MT/DSSMELSEC-F Series FX3G-14MR/ES-AMELSEC iQ-F Series FX5UJ-40MR/DSMELSEC-F Series FX3G-14MT/DSMELSEC iQ-F Series FX5UC-32MT/DSS-TSMELSEC iQ-F Series FX5U-80MT/ESSMELSEC-F Series FX3G-40MT/DSMELSEC iQ-F Series FX5UJ-60MT/ES-AMELSEC-F Series FX3U-32MS/ESMELSEC iQ-F Series FX5UJ-40MR/ES-AMELSEC iQ-F Series FX5UJ-24MT/ESMELSEC-F Series FX3G-40MR/ES-AMELSEC iQ-F Series FX5UJ-60MT/ESSMELSEC iQ-F Series FX5S-80MR/ESMELSEC-F Series FX3U-32MR/ESMitsubishi Electric CNC M800V Series M800VWMELSEC-F Series FX3S-14MT/DSSMELSEC-F Series FX3U-128MR/ES-AMELSEC iQ-F Series FX5U-64MT/ESMELSEC-F Series FX3S-14MT/DSMELSEC-F Series FX3U-48MT/ESMELSEC-F Series FX3GE-40MT/ESSMELSEC-F Series FX3U-16MT/DSSMELSEC iQ-F Series FX5S-40MT/ESSMELSEC iQ-F Series FX5UJ-24MR/ES-AMELSEC-F Series FX3U-16MT/ESSMELSEC-F Series FX3G-40MT/DSSMELSEC iQ-R Series RD77MS2MELSEC-F Series FX3UC-16MT/DSS-P4MELSEC iQ-F Series FX5UC-96MT/DMELSEC-F Series FX3G-24MT/DSMELSEC-F Series FX3S-14MT/ESSMELSEC iQ-F Series FX5-40SSC-SMELSEC iQ-R Series RD78G64MELSEC-F Series FX3U-48MR/ESMELSEC-F Series FX3S-14MR/ESMELSEC-F Series FX3G-14MT/DSSMitsubishi Electric CNC E70 Series E70MELSEC iQ-F Series FX5U-32MT/DSMELSEC Q Series QD77GF8MELSEC-F Series FX3U-16MR/ESMELSEC-F Series FX3S-10MR/ESMELSEC iQ-F Series FX5U-80MT/DSSMELSEC iQ-F Series FX5UJ-40MR/ESMELSEC-F Series FX3S-30MT/ESSMELSEC-F Series FX3UC-96MT/DSSMELSEC iQ-R Series R16ENCPUMELSEC iQ-F Series FX5U-80MT/ESMELSEC-F Series FX3S-30MR/ES-2ADMELSEC-F Series FX3G-24MT/ESMELSEC iQ-L Series LD78G16MELSEC iQ-F Series FX5U-32MR/DSMELSEC-F Series FX3U-48MT/ES-AMELSEC iQ-R Series RD77GF8MELSEC-F Series FX3GA-40MT-CMMitsubishi Electric CNC M700V Series M720VSMELSEC iQ-F Series FX5UJ-60MR/ES-AMELSEC-F Series FX3U-48MR/ES-AMELSEC-F Series FX3G-14MR/ESMELSEC-F Series FX3U-80MT/ESMELSEC-F Series FX3U-48MT/DSMELSEC-F Series FX3U-64MT/ESSMELSEC-F Series FX3U-128MT/ESMELSEC-F Series FX3G-24MR/ES-AMELSEC-F Series FX3GC-32MT/DMELSEC Q Series QD77GF4MELSEC-F Series FX3UC-64MT/DMitsubishi Electric CNC M700V Series M750VWMELSEC-F Series FX3S-10MT/ESSMELSEC-F Series FX3GE-24MT/DSMELSEC-F Series FX3S-30MT/ESMELSEC-F Series FX3GE-40MT/DSSMELSEC-F Series FX3G-40MR/DSMELSEC-F Series FX3SA-14MR-CMMELSEC iQ-F Series FX5UC-32MT/DSSMELSEC-F Series FX3U-128MR/DSMELSEC-F Series FX3GE-24MT/DSSMELSEC-F Series FX3GA-24MR-CMMELSEC-F Series FX3G-24MR/DSMELSEC iQ-F Series FX5UJ-40MT/ES-AMELSEC-F Series FX3S-20MR/ESMELSEC-F Series FX3U-64MR/ESMELSEC-F Series FX3U-48MR/DSMELSEC-F Series FX3SA-14MT-CMMitsubishi Electric CNC M80V Series M80VMELSEC-F Series FX3U-80MR/ES-AMELSEC-F Series FX3U-128MT/DSMELSEC-F Series FX3G-24MT/ESSMELSEC Q Series QD77GF16MELSEC-F Series FX3U-16MR/ES-AMELSEC-F Series FX3GE-40MR/DSMELSEC iQ-R Series RD77GF4MELSEC iQ-F Series FX5U-32MR/ESMELSEC iQ-L Series LD78G4MELSEC-F Series FX3G-60MT/ESSMELSEC-F Series FX3S-10MT/DSMELSEC iQ-F Series FX5UJ-24MT/ESSMELSEC iQ-R Series RD77GF16MELSEC-F Series FX3G-40MT/ESMELSEC Q Series QD77MS4MELSEC-F Series FX3UC-64MT/DSSMELSEC-F Series FX3G-60MT/ES-AMELSEC-F Series FX3G-14MT/ESMELSEC-F Series FX3GE-24MR/DSMELSEC-F Series FX3U-32MR/DSMELSEC iQ-F Series FX5U-32MT/DSSMELSEC-F Series FX3U-32MT/DSMELSEC iQ-F Series FX5U-32MT/ESMELSEC-F Series FX3U-32MR/ES-AMELSEC-F Series FX3SA-20MR-CMMELSEC iQ-F Series FX5S-80MT/ESMELSEC iQ-R Series R32CPUMELSEC-F Series FX3G-60MT/DSMELSEC iQ-F Series FX5UJ-60MT/DSMitsubishi Electric CNC M800V Series M800VSMELSEC-F Series FX3U-80MR/DSMELSEC-F Series FX3U-64MT/DSSMELSEC-F Series FX3G-40MR/ESMELSEC-F Series FX3UC-16MR/D-TMELSEC-F Series FX3GE-40MT/ESMELSEC iQ-R Series RD78GHWMELSEC-F Series FX3SA-20MT-CMMELSEC iQ-F Series FX5S-40MT/ESMELSEC iQ-F Series FX5-80SSC-GMitsubishi Electric CNC M700V Series M720VWMELSEC-F Series FX3U-80MT/DSMELSEC iQ-F Series FX5U-64MT/ESSMELSEC-F Series FX3UC-96MT/DMELSEC iQ-R Series RD78G32MELSEC iQ-R Series RD78GHVMELSEC iQ-F Series FX5UC-96MT/DSSMELSEC iQ-R Series RD77MS16MELSEC-F Series FX3G-24MT/ES-AMELSEC iQ-F Series FX5U-64MT/DSMELSEC-F Series FX3U-128MT/ES-AMELSEC iQ-F Series FX5UC-32MT/DS-TSMELSEC-F Series FX3U-16MT/ESMELSEC iQ-R Series R16CPUMELSEC iQ-F Series FX5U-64MR/ESMELSEC iQ-F Series FX5UJ-24MR/DSMELSEC-F Series FX3U-32MT/ESSMELSEC iQ-R Series RD77MS8MELSEC iQ-R Series RD78G16Mitsubishi Electric CNC M80 Series M80WMitsubishi Electric CNC E80 Series E80MELSEC iQ-F Series FX5U-80MR/ESMitsubishi Electric CNC M80V Series M80VWMELSEC iQ-F Series FX5UC-64MT/DSSMELSEC-F Series FX3U-80MT/ESSMELSEC-F Series FX3GE-24MR/ESMELSEC-F Series FX3S-30MT/DSSMELSEC iQ-F Series FX5UJ-24MT/DSSMELSEC-F Series FX3G-24MR/ESMELSEC iQ-F Series FX5UJ-40MT/DSMELSEC iQ-F Series FX5UC-32MT/DMELSEC-F Series FX3U-32MT/ESMELSEC-F Series FX3GE-24MT/ESSMELSEC Q Series Q170MSCPUMELSEC iQ-R Series R04CPUMELSEC-F Series FX3G-14MR/DSMELSEC iQ-F Series FX5S-60MT/ESMELSEC iQ-R Series R08CPUMELSEC iQ-F Series FX5UJ-60MR/DSMELSEC-F Series FX3G-14MT/ESSMELSEC-F Series FX3UC-32MT/DMELSEC-F Series FX3U-80MR/ESMELSEC-F Series FX3U-128MT/DSSMELSEC-F Series FX3GA-40MR-CMMELSEC iQ-F Series FX5U-64MT/DSSMitsubishi Electric CNC M800 Series M800WMELSEC Q Series Q173DSCPUMELSEC iQ-R Series R32PCPUMELSEC iQ-F Series FX5-80SSC-SMELSEC-F Series FX3U-64MR/UA1MELSEC-F Series FX3UC-32MT/DSSMELSEC iQ-R Series R08ENCPUMELSEC-F Series FX3UC-32MT-LTMELSEC-F Series FX3GE-40MR/ESMELSEC-F Series FX3U-64MS/ESMELSEC-F Series FX3U-64MT/DSMELSEC iQ-R Series R64MTCPUMELSEC-F Series FX3G-60MR/DSMELSEC iQ-F Series FX5S-40MR/ESMELSEC-F Series FX3U-64MT/ES-AMELSEC iQ-F Series FX5UJ-60MT/DSS
CWE ID-CWE-306
Missing Authentication for Critical Function
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2024-13185
Matching Score-4
Assigner-Vivo Mobile Communication Co., Ltd.
ShareView Details
Matching Score-4
Assigner-Vivo Mobile Communication Co., Ltd.
CVSS Score-6.3||MEDIUM
EPSS-0.09% / 26.19%
||
7 Day CHG~0.00%
Published-08 Jan, 2025 | 08:08
Updated-08 Jan, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MinigameCenter module information leakage vulnerability

The MinigameCenter module has insufficient restrictions on loading URLs, which may lead to some information leakage.

Action-Not Available
Vendor-vivo
Product-MinigameCenter
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2018-21041
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.12% / 31.41%
||
7 Day CHG~0.00%
Published-08 Apr, 2020 | 16:44
Updated-05 Aug, 2024 | 12:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on Samsung mobile devices with O(8.x) software. Access to Gallery in the Secure Folder can occur without authentication. The Samsung ID is SVE-2018-13057 (December 2018).

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidn/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2022-37062
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.96% / 75.61%
||
7 Day CHG~0.00%
Published-18 Aug, 2022 | 17:05
Updated-03 Aug, 2024 | 10:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

All FLIR AX8 thermal sensor cameras version up to and including 1.46.16 are affected by an insecure design vulnerability due to an improper directory access restriction. An unauthenticated, remote attacker can exploit this by sending a URI that contains the path of the SQLite users database and download it. A successful exploit could allow the attacker to extract usernames and hashed passwords.

Action-Not Available
Vendor-flirn/a
Product-flir_ax8_firmwareflir_ax8n/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-13186
Matching Score-4
Assigner-Vivo Mobile Communication Co., Ltd.
ShareView Details
Matching Score-4
Assigner-Vivo Mobile Communication Co., Ltd.
CVSS Score-6.3||MEDIUM
EPSS-0.09% / 26.19%
||
7 Day CHG~0.00%
Published-08 Jan, 2025 | 08:28
Updated-08 Jan, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MinigameCenter information leakage vulnerability

The MinigameCenter module has insufficient restrictions on loading URLs, which may lead to some information leakage.

Action-Not Available
Vendor-vivo
Product-MinigameCenter
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2019-19822
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-2.79% / 85.52%
||
7 Day CHG~0.00%
Published-27 Jan, 2020 | 17:55
Updated-05 Aug, 2024 | 02:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A certain router administration interface (that includes Realtek APMIB 0.11f for Boa 0.94.14rc21) allows remote attackers to retrieve the configuration, including sensitive data (usernames and passwords). This affects TOTOLINK A3002RU through 2.0.0, A702R through 2.1.3, N301RT through 2.1.6, N302R through 3.4.0, N300RT through 3.4.0, N200RE through 4.0.0, N150RT through 3.4.0, and N100RE through 3.4.0; Rutek RTK 11N AP through 2019-12-12; Sapido GR297n through 2019-12-12; CIK TELECOM MESH ROUTER through 2019-12-12; KCTVJEJU Wireless AP through 2019-12-12; Fibergate FGN-R2 through 2019-12-12; Hi-Wifi MAX-C300N through 2019-12-12; HCN MAX-C300N through 2019-12-12; T-broad GN-866ac through 2019-12-12; Coship EMTA AP through 2019-12-12; and IO-Data WN-AC1167R through 2019-12-12.

Action-Not Available
Vendor-hcn_max-c300n_projectcoshiphiwifisapidoiodatatbroadciktelkctvjejufg-productsn/aTOTOLINKRealtek Semiconductor Corp.
Product-a702r_firmwarehcn_max-c300nwn-ac1167rn300rt_firmwaremax-c300n_firmwareemta_ap_firmwrea3002run150rtn200rewn-ac1167r_firmwren302rhcn_max-c300n_firmwarertk_11n_apmesh_router_firmwaren200re_firmwareemta_apwireless_ap_firmwarea3002ru_firmwaregr297n_firmwarefgn-r2gn-866acfgn-r2_firmwarertk_11n_ap_firmwaren301rt_firmwaremax-c300na702rgr297nn301rtn150rt_firmwaremesh_routern300rtn302r_firmwarewireless_apgn-866ac_firmwaren100re_firmwaren100ren/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-22012
Matching Score-4
Assigner-VMware by Broadcom
ShareView Details
Matching Score-4
Assigner-VMware by Broadcom
CVSS Score-7.5||HIGH
EPSS-0.66% / 70.08%
||
7 Day CHG~0.00%
Published-23 Sep, 2021 | 11:58
Updated-03 Aug, 2024 | 18:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The vCenter Server contains an information disclosure vulnerability due to an unauthenticated appliance management API. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to gain access to sensitive information.

Action-Not Available
Vendor-n/aVMware (Broadcom Inc.)
Product-vcenter_servercloud_foundationVMware vCenter Server
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-13173
Matching Score-4
Assigner-Vivo Mobile Communication Co., Ltd.
ShareView Details
Matching Score-4
Assigner-Vivo Mobile Communication Co., Ltd.
CVSS Score-6.3||MEDIUM
EPSS-0.09% / 26.19%
||
7 Day CHG~0.00%
Published-08 Jan, 2025 | 07:44
Updated-08 Jan, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Health information leakage vulnerability

The health module has insufficient restrictions on loading URLs, which may lead to some information leakage.

Action-Not Available
Vendor-vivo
Product-Health
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-22997
Matching Score-4
Assigner-F5, Inc.
ShareView Details
Matching Score-4
Assigner-F5, Inc.
CVSS Score-7.5||HIGH
EPSS-0.32% / 54.46%
||
7 Day CHG~0.00%
Published-31 Mar, 2021 | 17:35
Updated-03 Aug, 2024 | 18:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

On all 7.x and 6.x versions (fixed in 8.0.0), BIG-IQ HA ElasticSearch service does not implement any form of authentication for the clustering transport services, and all data used by ElasticSearch for transport is unencrypted. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated.

Action-Not Available
Vendor-n/aF5, Inc.
Product-big-iq_centralized_managementBIG-IQ
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2018-20220
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-44.85% / 97.49%
||
7 Day CHG~0.00%
Published-17 Mar, 2019 | 20:51
Updated-05 Aug, 2024 | 11:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on Teracue ENC-400 devices with firmware 2.56 and below. While the web interface requires authentication before it can be interacted with, a large portion of the HTTP endpoints are missing authentication. An attacker is able to view these pages before being authenticated, and some of these pages may disclose sensitive information.

Action-Not Available
Vendor-teracuen/a
Product-enc-400_hdsdi_firmwareenc-400_hdsdienc-400_hdmi2_firmwareenc-400_hdmienc-400_hdmi_firmwareenc-400_hdmi2n/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2018-18264
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-91.70% / 99.67%
||
7 Day CHG~0.00%
Published-03 Jan, 2019 | 01:00
Updated-05 Aug, 2024 | 11:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Kubernetes Dashboard before 1.10.1 allows attackers to bypass authentication and use Dashboard's Service Account for reading secrets within the cluster.

Action-Not Available
Vendor-n/aKubernetes
Product-dashboardn/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2019-11321
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.27% / 49.89%
||
7 Day CHG~0.00%
Published-18 Apr, 2019 | 16:47
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Motorola CX2 1.01 and M2 1.01. The router opens TCP port 8010. Users can send hnap requests to this port without authentication to obtain information such as the MAC addresses of connected client devices.

Action-Not Available
Vendor-n/aMotorola Mobility LLC. (Lenovo Group Limited)
Product-m2_firmwarem2cx2_firmwarecx2n/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-6595
Matching Score-4
Assigner-Progress Software Corporation
ShareView Details
Matching Score-4
Assigner-Progress Software Corporation
CVSS Score-7.5||HIGH
EPSS-0.33% / 55.36%
||
7 Day CHG~0.00%
Published-14 Dec, 2023 | 16:06
Updated-16 Oct, 2024 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WhatsUp Gold Unauthenticated Access to an API Endpoint

In WhatsUp Gold versions released before 2023.1, an API endpoint was found to be missing an authentication mechanism. It is possible for an unauthenticated attacker to enumerate ancillary credential information stored within WhatsUp Gold.

Action-Not Available
Vendor-Progress Software Corporation
Product-whatsup_goldWhatsUp Gold
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2019-10941
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-5.3||MEDIUM
EPSS-0.18% / 40.38%
||
7 Day CHG~0.00%
Published-14 Sep, 2021 | 10:47
Updated-04 Aug, 2024 | 22:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SINEMA Server (All versions < V14 SP3). Missing authentication for functionality that requires administrative user identity could allow an attacker to obtain encoded system configuration backup files. This is only possible through network access to the affected system, and successful exploitation requires no system privileges.

Action-Not Available
Vendor-Siemens AG
Product-sinema_serverSINEMA Server
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-20150
Matching Score-4
Assigner-Tenable Network Security, Inc.
ShareView Details
Matching Score-4
Assigner-Tenable Network Security, Inc.
CVSS Score-5.3||MEDIUM
EPSS-38.80% / 97.16%
||
7 Day CHG~0.00%
Published-30 Dec, 2021 | 21:31
Updated-03 Aug, 2024 | 17:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Trendnet AC2600 TEW-827DRU version 2.08B01 improperly discloses information via redirection from the setup wizard. Authentication can be bypassed and a user may view information as Admin by manually browsing to the setup wizard and forcing it to redirect to the desired page.

Action-Not Available
Vendor-n/aTRENDnet, Inc.
Product-tew-827dru_firmwaretew-827druTrendnet AC2600 TEW-827DRU
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-5786
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.10% / 28.87%
||
7 Day CHG~0.00%
Published-26 Oct, 2023 | 15:31
Updated-02 Aug, 2024 | 08:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
GeoServer GeoWebCache rest.html direct request

A vulnerability was found in GeoServer GeoWebCache up to 1.15.1. It has been declared as problematic. This vulnerability affects unknown code of the file /geoserver/gwc/rest.html. The manipulation leads to direct request. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-243592.

Action-Not Available
Vendor-geoserverGeoServergeoserver
Product-geowebcacheGeoWebCachegeowebcache
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2019-10046
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.53% / 66.22%
||
7 Day CHG~0.00%
Published-31 May, 2019 | 21:11
Updated-04 Aug, 2024 | 22:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An unauthenticated attacker can obtain information about the Pydio 8.2.2 configuration including session timeout, libraries, and license information.

Action-Not Available
Vendor-pydion/a
Product-pydion/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-5253
Matching Score-4
Assigner-Nozomi Networks Inc.
ShareView Details
Matching Score-4
Assigner-Nozomi Networks Inc.
CVSS Score-6.3||MEDIUM
EPSS-0.24% / 47.38%
||
7 Day CHG~0.00%
Published-15 Jan, 2024 | 10:53
Updated-17 Jun, 2025 | 21:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Check Point IoT integration: WebSocket returns assets data without authentication in Guardian/CMC before 23.3.0

A missing authentication check in the WebSocket channel used for the Check Point IoT integration in Nozomi Networks Guardian and CMC, may allow an unauthenticated attacker to obtain assets data without authentication. Malicious unauthenticated users with knowledge on the underlying system may be able to extract limited asset information.

Action-Not Available
Vendor-nozominetworksNozomi Networks
Product-cmcguardianGuardianCMC
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2022-34570
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.29% / 51.72%
||
7 Day CHG~0.00%
Published-25 Jul, 2022 | 21:37
Updated-03 Aug, 2024 | 09:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

WAVLINK WN579 X3 M79X3.V5030.191012/M79X3.V5030.191012 contains an information leak which allows attackers to obtain the key information via accessing the messages.txt page.

Action-Not Available
Vendor-n/aWAVLINK Technology Ltd.
Product-wl-wn579x3_firmwarewl-wn579x3n/a
CWE ID-CWE-532
Insertion of Sensitive Information into Log File
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2022-33138
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-7.5||HIGH
EPSS-0.53% / 66.08%
||
7 Day CHG~0.00%
Published-12 Jul, 2022 | 10:06
Updated-03 Aug, 2024 | 08:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SIMATIC MV540 H (All versions < V3.3), SIMATIC MV540 S (All versions < V3.3), SIMATIC MV550 H (All versions < V3.3), SIMATIC MV550 S (All versions < V3.3), SIMATIC MV560 U (All versions < V3.3), SIMATIC MV560 X (All versions < V3.3). Affected devices do not perform authentication for several web API endpoints. This could allow an unauthenticated remote attacker to read and download data from the device.

Action-Not Available
Vendor-Siemens AG
Product-simatic_mv540_s_firmwaresimatic_mv540_ssimatic_mv560_x_firmwaresimatic_mv560_usimatic_mv560_u_firmwaresimatic_mv550_s_firmwaresimatic_mv540_hsimatic_mv550_h_firmwaresimatic_mv550_ssimatic_mv560_xsimatic_mv550_hsimatic_mv540_h_firmwareSIMATIC MV560 USIMATIC MV540 SSIMATIC MV540 HSIMATIC MV550 HSIMATIC MV550 SSIMATIC MV560 X
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2020-3142
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-0.50% / 64.78%
||
7 Day CHG~0.00%
Published-26 Jan, 2020 | 04:55
Updated-15 Nov, 2024 | 17:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Webex Meetings Suite and Cisco Webex Meetings Online Unauthenticated Meeting Join Vulnerability

A vulnerability in Cisco Webex Meetings Suite sites and Cisco Webex Meetings Online sites could allow an unauthenticated, remote attendee to join a password-protected meeting without providing the meeting password. The connection attempt must initiate from a Webex mobile application for either iOS or Android. The vulnerability is due to unintended meeting information exposure in a specific meeting join flow for mobile applications. An unauthorized attendee could exploit this vulnerability by accessing a known meeting ID or meeting URL from the mobile device&rsquo;s web browser. The browser will then request to launch the device&rsquo;s Webex mobile application. A successful exploit could allow the unauthorized attendee to join the password-protected meeting. The unauthorized attendee will be visible in the attendee list of the meeting as a mobile attendee. Cisco has applied updates that address this vulnerability and no user action is required. This vulnerability affects Cisco Webex Meetings Suite sites and Cisco Webex Meetings Online sites releases earlier than 39.11.5 and 40.1.3.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-webex_meetings_onlineCisco Webex Meetings
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2022-32157
Matching Score-4
Assigner-Splunk Inc.
ShareView Details
Matching Score-4
Assigner-Splunk Inc.
CVSS Score-7.5||HIGH
EPSS-0.50% / 65.08%
||
7 Day CHG~0.00%
Published-15 Jun, 2022 | 16:50
Updated-17 Sep, 2024 | 02:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Splunk Enterprise deployment servers allow unauthenticated forwarder bundle downloads

Splunk Enterprise deployment servers in versions before 9.0 allow unauthenticated downloading of forwarder bundles. Remediation requires you to update the deployment server to version 9.0 and Configure authentication for deployment servers and clients (https://docs.splunk.com/Documentation/Splunk/9.0.0/Security/ConfigDSDCAuthEnhancements#Configure_authentication_for_deployment_servers_and_clients). Once enabled, deployment servers can manage only Universal Forwarder versions 9.0 and higher. Though the vulnerability does not directly affect Universal Forwarders, remediation requires updating all Universal Forwarders that the deployment server manages to version 9.0 or higher prior to enabling the remediation.

Action-Not Available
Vendor-Splunk LLC (Cisco Systems, Inc.)
Product-splunkSplunk Enterprise
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2022-31847
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-50.59% / 97.76%
||
7 Day CHG~0.00%
Published-14 Jun, 2022 | 13:09
Updated-03 Aug, 2024 | 07:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in /cgi-bin/ExportAllSettings.sh of WAVLINK WN579 X3 M79X3.V5030.180719 allows attackers to obtain sensitive router information via a crafted POST request.

Action-Not Available
Vendor-n/aWAVLINK Technology Ltd.
Product-wn579x3_firmwarewn579x3n/a
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2022-29881
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-5.3||MEDIUM
EPSS-1.08% / 76.95%
||
7 Day CHG~0.00%
Published-10 May, 2022 | 09:47
Updated-03 Aug, 2024 | 06:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P850 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00), SICAM P855 (All versions < V3.00). The web based management interface of affected devices does not employ special access protection for certain internal developer views. This could allow unauthenticated users to extract internal configuration details.

Action-Not Available
Vendor-Siemens AG
Product-7kg8501-0aa11-2aa0_firmware7kg8551-0aa01-2aa07kg8501-0aa11-0aa07kg8500-0aa10-0aa0_firmware7kg8501-0aa31-2aa0_firmware7kg8551-0aa02-2aa0_firmware7kg8551-0aa02-0aa0_firmware7kg8551-0aa32-2aa0_firmware7kg8550-0aa00-0aa07kg8550-0aa00-0aa0_firmware7kg8501-0aa01-0aa07kg8551-0aa02-0aa07kg8500-0aa30-0aa07kg8551-0aa32-0aa0_firmware7kg8551-0aa02-2aa07kg8550-0aa30-0aa0_firmware7kg8501-0aa32-0aa07kg8500-0aa30-2aa0_firmware7kg8501-0aa01-0aa0_firmware7kg8501-0aa02-0aa07kg8551-0aa12-2aa07kg8500-0aa00-0aa07kg8551-0aa01-0aa0_firmware7kg8501-0aa11-2aa07kg8501-0aa31-0aa07kg8501-0aa12-2aa0_firmware7kg8501-0aa32-2aa07kg8550-0aa00-2aa0_firmware7kg8550-0aa30-2aa07kg8501-0aa31-0aa0_firmware7kg8550-0aa30-0aa07kg8501-0aa12-0aa0_firmware7kg8551-0aa12-0aa07kg8500-0aa30-2aa07kg8501-0aa32-2aa0_firmware7kg8500-0aa10-2aa0_firmware7kg8500-0aa00-2aa0_firmware7kg8501-0aa01-2aa0_firmware7kg8501-0aa02-0aa0_firmware7kg8500-0aa10-0aa07kg8551-0aa12-0aa0_firmware7kg8550-0aa30-2aa0_firmware7kg8551-0aa32-2aa07kg8501-0aa11-0aa0_firmware7kg8550-0aa10-2aa07kg8501-0aa02-2aa0_firmware7kg8551-0aa32-0aa07kg8501-0aa32-0aa0_firmware7kg8551-0aa12-2aa0_firmware7kg8550-0aa10-0aa0_firmware7kg8501-0aa01-2aa07kg8550-0aa00-2aa07kg8551-0aa31-2aa0_firmware7kg8551-0aa11-2aa07kg8501-0aa12-0aa07kg8551-0aa31-0aa0_firmware7kg8551-0aa11-0aa07kg8500-0aa00-2aa07kg8551-0aa01-2aa0_firmware7kg8550-0aa10-2aa0_firmware7kg8550-0aa10-0aa07kg8551-0aa31-0aa07kg8551-0aa11-0aa0_firmware7kg8551-0aa11-2aa0_firmware7kg8500-0aa30-0aa0_firmware7kg8551-0aa01-0aa07kg8501-0aa02-2aa07kg8500-0aa10-2aa07kg8551-0aa31-2aa07kg8501-0aa31-2aa07kg8501-0aa12-2aa07kg8500-0aa00-0aa0_firmwareSICAM P850SICAM P855
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2022-28991
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.26% / 49.29%
||
7 Day CHG~0.00%
Published-20 May, 2022 | 12:53
Updated-03 Aug, 2024 | 06:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multi Store Inventory Management System v1.0 was discovered to contain an information disclosure vulnerability which allows attackers to access sensitive files.

Action-Not Available
Vendor-bdtaskn/a
Product-multi_store_inventory_management_systemn/a
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2022-27480
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-7.5||HIGH
EPSS-0.45% / 62.64%
||
7 Day CHG~0.00%
Published-12 Apr, 2022 | 09:08
Updated-03 Aug, 2024 | 05:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SICAM A8000 CP-8031 (All versions < V4.80), SICAM A8000 CP-8050 (All versions < V4.80). Affected devices do not require an user to be authenticated to access certain files. This could allow unauthenticated attackers to download these files.

Action-Not Available
Vendor-Siemens AG
Product-sicam_a8000_cp-8031sicam_a8000_cp-8050sicam_a8000_cp-8031_firmwaresicam_a8000_cp-8050_firmwareSICAM A8000 CP-8050SICAM A8000 CP-8031
CWE ID-CWE-862
Missing Authorization
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2020-9143
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-5.3||MEDIUM
EPSS-0.09% / 25.71%
||
7 Day CHG~0.00%
Published-13 Jan, 2021 | 21:52
Updated-04 Aug, 2024 | 10:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There is a missing authentication vulnerability in some Huawei smartphone.Successful exploitation of this vulnerability may lead to low-sensitive information exposure.

Action-Not Available
Vendor-n/aHuawei Technologies Co., Ltd.
Product-magic_uiemuiEMUI;Magic UI
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2022-26267
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.88% / 74.37%
||
7 Day CHG~0.00%
Published-18 Mar, 2022 | 22:57
Updated-03 Aug, 2024 | 04:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Piwigo v12.2.0 was discovered to contain an information leak via the action parameter in /admin/maintenance_actions.php.

Action-Not Available
Vendor-n/aPiwigo
Product-piwigon/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2020-9275
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.76% / 72.28%
||
7 Day CHG~0.00%
Published-20 Apr, 2020 | 22:39
Updated-04 Aug, 2024 | 10:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on D-Link DSL-2640B B2 EU_4.01B devices. A cfm UDP service listening on port 65002 allows remote, unauthenticated exfiltration of administrative credentials.

Action-Not Available
Vendor-n/aD-Link Corporation
Product-dsl-2640bdsl-2640b_firmwaren/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2022-26159
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-91.58% / 99.66%
||
7 Day CHG~0.00%
Published-28 Feb, 2022 | 03:53
Updated-03 Aug, 2024 | 04:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The auto-completion plugin in Ametys CMS before 4.5.0 allows a remote unauthenticated attacker to read documents such as plugins/web/service/search/auto-completion/<domain>/en.xml (and similar pathnames for other languages), which contain all characters typed by all users, including the content of private pages. For example, a private page may contain usernames, e-mail addresses, and possibly passwords.

Action-Not Available
Vendor-ametysn/a
Product-ametysn/a
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2022-27169
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-7.5||HIGH
EPSS-0.56% / 67.46%
||
7 Day CHG~0.00%
Published-25 May, 2022 | 20:15
Updated-15 Apr, 2025 | 19:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An information disclosure vulnerability exists in the OAS Engine SecureBrowseFile functionality of Open Automation Software OAS Platform V16.00.0112. A specially-crafted network request can lead to a disclosure of sensitive information. An attacker can send a network request to trigger this vulnerability.

Action-Not Available
Vendor-openautomationsoftwareOpen Automation Software
Product-oas_platformOAS Platform
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2020-8497
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-34.66% / 96.87%
||
7 Day CHG~0.00%
Published-23 Mar, 2020 | 15:01
Updated-04 Aug, 2024 | 10:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Artica Pandora FMS through 7.42, an unauthenticated attacker can read the chat history. The file is in JSON format and it contains user names, user IDs, private messages, and timestamps.

Action-Not Available
Vendor-n/aPandora FMS S.L.U.
Product-pandora_fmsn/a
CWE ID-CWE-306
Missing Authentication for Critical Function
  • Previous
  • 1
  • 2
  • 3
  • ...
  • 6
  • 7
  • Next
Details not found