Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2019-16672

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-06 Dec, 2019 | 17:07
Updated At-05 Aug, 2024 | 01:17
Rejected At-
Credits

An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Sensitive Credentials data is transmitted in cleartext.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:06 Dec, 2019 | 17:07
Updated At:05 Aug, 2024 | 01:17
Rejected At:
▼CVE Numbering Authority (CNA)

An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Sensitive Credentials data is transmitted in cleartext.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
3.09.8CRITICAL
CVSS:3.0/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N
Version: 3.0
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.0/AC:L/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://cert.vde.com/en-us/advisories
x_refsource_MISC
https://cert.vde.com/en-us/advisories/vde-2019-018
x_refsource_MISC
https://mdcop.weidmueller.com/mediadelivery/asset/900_102694
x_refsource_CONFIRM
https://www.us-cert.gov/ics/advisories/icsa-19-339-02
x_refsource_MISC
Hyperlink: https://cert.vde.com/en-us/advisories
Resource:
x_refsource_MISC
Hyperlink: https://cert.vde.com/en-us/advisories/vde-2019-018
Resource:
x_refsource_MISC
Hyperlink: https://mdcop.weidmueller.com/mediadelivery/asset/900_102694
Resource:
x_refsource_CONFIRM
Hyperlink: https://www.us-cert.gov/ics/advisories/icsa-19-339-02
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://cert.vde.com/en-us/advisories
x_refsource_MISC
x_transferred
https://cert.vde.com/en-us/advisories/vde-2019-018
x_refsource_MISC
x_transferred
https://mdcop.weidmueller.com/mediadelivery/asset/900_102694
x_refsource_CONFIRM
x_transferred
https://www.us-cert.gov/ics/advisories/icsa-19-339-02
x_refsource_MISC
x_transferred
Hyperlink: https://cert.vde.com/en-us/advisories
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://cert.vde.com/en-us/advisories/vde-2019-018
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://mdcop.weidmueller.com/mediadelivery/asset/900_102694
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://www.us-cert.gov/ics/advisories/icsa-19-339-02
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:06 Dec, 2019 | 18:15
Updated At:01 Apr, 2022 | 15:48

An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Sensitive Credentials data is transmitted in cleartext.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Secondary3.09.8CRITICAL
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Primary2.05.0MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:N
Type: Primary
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.0
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 5.0
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N
CPE Matches

weidmueller
weidmueller
>>ie-sw-pl09m-5gc-4gt_firmware>>Versions up to 3.3.4(inclusive)
cpe:2.3:o:weidmueller:ie-sw-pl09m-5gc-4gt_firmware:*:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-pl09m-5gc-4gt>>-
cpe:2.3:h:weidmueller:ie-sw-pl09m-5gc-4gt:-:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-pl09mt-5gc-4gt_firmware>>Versions up to 3.3.4(inclusive)
cpe:2.3:o:weidmueller:ie-sw-pl09mt-5gc-4gt_firmware:*:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-pl09mt-5gc-4gt>>-
cpe:2.3:h:weidmueller:ie-sw-pl09mt-5gc-4gt:-:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-pl18m-2gc-16tx_firmware>>Versions up to 3.4.4(inclusive)
cpe:2.3:o:weidmueller:ie-sw-pl18m-2gc-16tx_firmware:*:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-pl18m-2gc-16tx>>-
cpe:2.3:h:weidmueller:ie-sw-pl18m-2gc-16tx:-:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-pl18mt-2gc-16tx_firmware>>Versions up to 3.4.4(inclusive)
cpe:2.3:o:weidmueller:ie-sw-pl18mt-2gc-16tx_firmware:*:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-pl18mt-2gc-16tx>>-
cpe:2.3:h:weidmueller:ie-sw-pl18mt-2gc-16tx:-:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-pl18m-2gc14tx2sc_firmware>>Versions up to 3.4.4(inclusive)
cpe:2.3:o:weidmueller:ie-sw-pl18m-2gc14tx2sc_firmware:*:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-pl18m-2gc14tx2sc>>-
cpe:2.3:h:weidmueller:ie-sw-pl18m-2gc14tx2sc:-:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-pl18mt-2gc14tx2sc_firmware>>Versions up to 3.4.4(inclusive)
cpe:2.3:o:weidmueller:ie-sw-pl18mt-2gc14tx2sc_firmware:*:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-pl18mt-2gc14tx2sc>>-
cpe:2.3:h:weidmueller:ie-sw-pl18mt-2gc14tx2sc:-:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-pl18m-2gc14tx2st_firmware>>Versions up to 3.4.4(inclusive)
cpe:2.3:o:weidmueller:ie-sw-pl18m-2gc14tx2st_firmware:*:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-pl18m-2gc14tx2st>>-
cpe:2.3:h:weidmueller:ie-sw-pl18m-2gc14tx2st:-:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-pl18mt-2gc14tx2st_firmware>>Versions up to 3.4.4(inclusive)
cpe:2.3:o:weidmueller:ie-sw-pl18mt-2gc14tx2st_firmware:*:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-pl18mt-2gc14tx2st>>-
cpe:2.3:h:weidmueller:ie-sw-pl18mt-2gc14tx2st:-:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-pl18m-2gc14tx2scs_firmware>>Versions up to 3.4.4(inclusive)
cpe:2.3:o:weidmueller:ie-sw-pl18m-2gc14tx2scs_firmware:*:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-pl18m-2gc14tx2scs>>-
cpe:2.3:h:weidmueller:ie-sw-pl18m-2gc14tx2scs:-:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-pl18mt-2gc14tx2scs_firmware>>Versions up to 3.4.4(inclusive)
cpe:2.3:o:weidmueller:ie-sw-pl18mt-2gc14tx2scs_firmware:*:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-pl18mt-2gc14tx2scs>>-
cpe:2.3:h:weidmueller:ie-sw-pl18mt-2gc14tx2scs:-:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-pl16m-16tx_firmware>>Versions up to 3.4.2(inclusive)
cpe:2.3:o:weidmueller:ie-sw-pl16m-16tx_firmware:*:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-pl16m-16tx>>-
cpe:2.3:h:weidmueller:ie-sw-pl16m-16tx:-:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-pl16mt-16tx_firmware>>Versions up to 3.4.2(inclusive)
cpe:2.3:o:weidmueller:ie-sw-pl16mt-16tx_firmware:*:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-pl16mt-16tx>>-
cpe:2.3:h:weidmueller:ie-sw-pl16mt-16tx:-:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-pl16m-14tx-2sc_firmware>>Versions up to 3.4.2(inclusive)
cpe:2.3:o:weidmueller:ie-sw-pl16m-14tx-2sc_firmware:*:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-pl16m-14tx-2sc>>-
cpe:2.3:h:weidmueller:ie-sw-pl16m-14tx-2sc:-:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-pl16mt-14tx-2sc_firmware>>Versions up to 3.4.2(inclusive)
cpe:2.3:o:weidmueller:ie-sw-pl16mt-14tx-2sc_firmware:*:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-pl16mt-14tx-2sc>>-
cpe:2.3:h:weidmueller:ie-sw-pl16mt-14tx-2sc:-:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-pl16m-14tx-2st_firmware>>Versions up to 3.4.2(inclusive)
cpe:2.3:o:weidmueller:ie-sw-pl16m-14tx-2st_firmware:*:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-pl16m-14tx-2st>>-
cpe:2.3:h:weidmueller:ie-sw-pl16m-14tx-2st:-:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-pl16mt-14tx-2st_firmware>>Versions up to 3.4.2(inclusive)
cpe:2.3:o:weidmueller:ie-sw-pl16mt-14tx-2st_firmware:*:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-pl16mt-14tx-2st>>-
cpe:2.3:h:weidmueller:ie-sw-pl16mt-14tx-2st:-:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-vl05m-5tx_firmware>>Versions up to 3.6.6(inclusive)
cpe:2.3:o:weidmueller:ie-sw-vl05m-5tx_firmware:*:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-vl05m-5tx>>-
cpe:2.3:h:weidmueller:ie-sw-vl05m-5tx:-:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-vl05mt-5tx_firmware>>Versions up to 3.6.6(inclusive)
cpe:2.3:o:weidmueller:ie-sw-vl05mt-5tx_firmware:*:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-vl05mt-5tx>>-
cpe:2.3:h:weidmueller:ie-sw-vl05mt-5tx:-:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-vl05m-3tx-2sc_firmware>>Versions up to 3.6.6(inclusive)
cpe:2.3:o:weidmueller:ie-sw-vl05m-3tx-2sc_firmware:*:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-vl05m-3tx-2sc>>-
cpe:2.3:h:weidmueller:ie-sw-vl05m-3tx-2sc:-:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-vl05mt-3tx-2sc_firmware>>Versions up to 3.6.6(inclusive)
cpe:2.3:o:weidmueller:ie-sw-vl05mt-3tx-2sc_firmware:*:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-vl05mt-3tx-2sc>>-
cpe:2.3:h:weidmueller:ie-sw-vl05mt-3tx-2sc:-:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-vl05m-3tx-2st_firmware>>Versions up to 3.6.6(inclusive)
cpe:2.3:o:weidmueller:ie-sw-vl05m-3tx-2st_firmware:*:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-vl05m-3tx-2st>>-
cpe:2.3:h:weidmueller:ie-sw-vl05m-3tx-2st:-:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-vl05mt-3tx-2st_firmware>>Versions up to 3.6.6(inclusive)
cpe:2.3:o:weidmueller:ie-sw-vl05mt-3tx-2st_firmware:*:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-vl05mt-3tx-2st>>-
cpe:2.3:h:weidmueller:ie-sw-vl05mt-3tx-2st:-:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-vl08mt-8tx_firmware>>Versions up to 3.5.2(inclusive)
cpe:2.3:o:weidmueller:ie-sw-vl08mt-8tx_firmware:*:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-vl08mt-8tx>>-
cpe:2.3:h:weidmueller:ie-sw-vl08mt-8tx:-:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-vl08mt-5tx-3sc_firmware>>Versions up to 3.5.2(inclusive)
cpe:2.3:o:weidmueller:ie-sw-vl08mt-5tx-3sc_firmware:*:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-vl08mt-5tx-3sc>>-
cpe:2.3:h:weidmueller:ie-sw-vl08mt-5tx-3sc:-:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-vl08mt-5tx-1sc-2scs_firmware>>Versions up to 3.5.2(inclusive)
cpe:2.3:o:weidmueller:ie-sw-vl08mt-5tx-1sc-2scs_firmware:*:*:*:*:*:*:*:*
weidmueller
weidmueller
>>ie-sw-vl08mt-5tx-1sc-2scs>>-
cpe:2.3:h:weidmueller:ie-sw-vl08mt-5tx-1sc-2scs:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-319Primarynvd@nist.gov
CWE-522Primarynvd@nist.gov
CWE ID: CWE-319
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-522
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://cert.vde.com/en-us/advisoriescve@mitre.org
Third Party Advisory
https://cert.vde.com/en-us/advisories/vde-2019-018cve@mitre.org
Third Party Advisory
https://mdcop.weidmueller.com/mediadelivery/asset/900_102694cve@mitre.org
Vendor Advisory
https://www.us-cert.gov/ics/advisories/icsa-19-339-02cve@mitre.org
Third Party Advisory
US Government Resource
Hyperlink: https://cert.vde.com/en-us/advisories
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: https://cert.vde.com/en-us/advisories/vde-2019-018
Source: cve@mitre.org
Resource:
Third Party Advisory
Hyperlink: https://mdcop.weidmueller.com/mediadelivery/asset/900_102694
Source: cve@mitre.org
Resource:
Vendor Advisory
Hyperlink: https://www.us-cert.gov/ics/advisories/icsa-19-339-02
Source: cve@mitre.org
Resource:
Third Party Advisory
US Government Resource

Change History

0
Information is not available yet

Similar CVEs

474Records found

CVE-2019-5505
Matching Score-4
Assigner-NetApp, Inc.
ShareView Details
Matching Score-4
Assigner-NetApp, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.15% / 36.80%
||
7 Day CHG~0.00%
Published-24 Sep, 2019 | 19:56
Updated-04 Aug, 2024 | 20:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ONTAP Select Deploy administration utility versions 2.2 through 2.12.1 transmit credentials in plaintext.

Action-Not Available
Vendor-n/aNetApp, Inc.
Product-ontap_select_deploy_administration_utilityONTAP Select Deploy administration utility
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2025-25570
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.08% / 24.70%
||
7 Day CHG~0.00%
Published-27 Feb, 2025 | 00:00
Updated-28 Feb, 2025 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vue Vben Admin 2.10.1 allows unauthorized login to the backend due to an issue with hardcoded credentials.

Action-Not Available
Vendor-n/a
Product-n/a
CWE ID-CWE-522
Insufficiently Protected Credentials
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2022-46967
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.58% / 67.87%
||
7 Day CHG~0.00%
Published-26 Jan, 2023 | 00:00
Updated-31 Mar, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An access control issue in Revenue Collection System v1.0 allows unauthenticated attackers to view the contents of /admin/DBbackup/ directory.

Action-Not Available
Vendor-revenue_collection_system_projectn/a
Product-revenue_collection_systemn/a
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2022-4693
Matching Score-4
Assigner-WPScan
ShareView Details
Matching Score-4
Assigner-WPScan
CVSS Score-9.8||CRITICAL
EPSS-2.49% / 84.72%
||
7 Day CHG~0.00%
Published-23 Jan, 2023 | 14:31
Updated-02 Apr, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
User Verification < 1.0.94 - Authentication Bypass

The User Verification WordPress plugin before 1.0.94 was affected by an Auth Bypass security vulnerability. To bypass authentication, we only need to know the user’s username. Depending on whose username we know, which can be easily queried because it is usually public data, we may even be given an administrative role on the website.

Action-Not Available
Vendor-pickpluginsUnknown
Product-user_verificationUser Verification
CWE ID-CWE-522
Insufficiently Protected Credentials
CWE ID-CWE-287
Improper Authentication
CVE-2022-46680
Matching Score-4
Assigner-Schneider Electric
ShareView Details
Matching Score-4
Assigner-Schneider Electric
CVSS Score-8.8||HIGH
EPSS-0.12% / 31.07%
||
7 Day CHG~0.00%
Published-22 May, 2023 | 13:25
Updated-21 Jan, 2025 | 15:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A CWE-319: Cleartext transmission of sensitive information vulnerability exists that could cause disclosure of sensitive information, denial of service, or modification of data if an attacker is able to intercept network traffic.

Action-Not Available
Vendor-Schneider Electric SE
Product-powerlogic_ion8650powerlogic_ion9000_firmwarepowerlogic_ion9000powerlogic_pm8000powerlogic_pm8000_firmwarepowerlogic_ion7400_firmwarepowerlogic_ion8800_firmwarepowerlogic_ion8800powerlogic_ion7400powerlogic_ion8650_firmwarePowerLogic ION9000PowerLogic ION8800Legacy ION products PowerLogic PM8000PowerLogic ION7400PowerLogic ION8650
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2022-45599
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.53% / 66.35%
||
7 Day CHG~0.00%
Published-22 Feb, 2023 | 00:00
Updated-17 Mar, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Aztech WMB250AC Mesh Routers Firmware Version 016 2020 is vulnerable to PHP Type Juggling in file /var/www/login.php, allows attackers to gain escalated privileges only when specific conditions regarding a given accounts hashed password.

Action-Not Available
Vendor-aztechn/a
Product-wmb250ac_firmwarewmb250acn/a
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2022-45611
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.16% / 37.53%
||
7 Day CHG~0.00%
Published-22 Aug, 2023 | 00:00
Updated-27 Nov, 2024 | 14:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Fresenius Kabi PharmaHelp 5.1.759.0 allows attackers to gain escalated privileges via via capture of user login information.

Action-Not Available
Vendor-fresenius-kabin/a
Product-pharmahelppharmahelp_firmwaren/a
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2016-5649
Matching Score-4
Assigner-CERT/CC
ShareView Details
Matching Score-4
Assigner-CERT/CC
CVSS Score-9.8||CRITICAL
EPSS-75.11% / 98.83%
||
7 Day CHG~0.00%
Published-24 Jul, 2018 | 15:00
Updated-06 Aug, 2024 | 01:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Netgear DGN2200 and DGND3700 disclose the administrator password

A vulnerability is in the 'BSW_cxttongr.htm' page of the Netgear DGN2200, version DGN2200-V1.0.0.50_7.0.50, and DGND3700, version DGND3700-V1.0.0.17_1.0.17, which can allow a remote attacker to access this page without any authentication. When processed, it exposes the admin password in clear text before it gets redirected to absw_vfysucc.cgia. An attacker can use this password to gain administrator access to the targeted router's web interface.

Action-Not Available
Vendor-NETGEAR, Inc.
Product-dgnd3700_firmwaredgn2200_firmwaredgnd3700dgn2200DGND3700DGN2200
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2016-5638
Matching Score-4
Assigner-CERT/CC
ShareView Details
Matching Score-4
Assigner-CERT/CC
CVSS Score-7.5||HIGH
EPSS-1.27% / 78.66%
||
7 Day CHG~0.00%
Published-24 Jul, 2018 | 15:00
Updated-06 Aug, 2024 | 01:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Netgear WNDR4500 running firmware version V1.0.1.40_1.0.6877 reveals some sensitive information such as 2.4GHz & 5GHz Wireless Network Name (SSID) and Network Key (Password) in clear text

There are few web pages associated with the genie app on the Netgear WNDR4500 running firmware version V1.0.1.40_1.0.6877. Genie app adds some capabilities over the Web GUI and can be accessed even when you are away from home. A remote attacker can access genie_ping.htm or genie_ping2.htm or genie_ping3.htm page without authentication. Once accessed, the page will be redirected to the aCongratulations2.htma page, which reveals some sensitive information such as 2.4GHz & 5GHz Wireless Network Name (SSID) and Network Key (Password) in clear text.

Action-Not Available
Vendor-NETGEAR, Inc.
Product-wndr4500_firmwarewndr4500WNDR4500
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2022-37109
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-1.31% / 78.96%
||
7 Day CHG~0.00%
Published-14 Nov, 2022 | 00:00
Updated-01 May, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

patrickfuller camp up to and including commit bbd53a256ed70e79bd8758080936afbf6d738767 is vulnerable to Incorrect Access Control. Access to the password.txt file is not properly restricted as it is in the root directory served by StaticFileHandler and the Tornado rule to throw a 403 error when password.txt is accessed can be bypassed. Furthermore, it is not necessary to crack the password hash to authenticate with the application because the password hash is also used as the cookie secret, so an attacker can generate his own authentication cookie.

Action-Not Available
Vendor-camp_projectn/a
Product-campn/a
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2025-7565
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-0.06% / 18.73%
||
7 Day CHG+0.02%
Published-14 Jul, 2025 | 02:44
Updated-17 Jul, 2025 | 17:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
LB-LINK BL-AC3600 Web Management Interface lighttpd.cgi geteasycfg information disclosure

A vulnerability, which was classified as critical, was found in LB-LINK BL-AC3600 up to 1.0.22. This affects the function geteasycfg of the file /cgi-bin/lighttpd.cgi of the component Web Management Interface. The manipulation of the argument Password leads to information disclosure. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-lb-linkLB-LINK
Product-bl-ac3600_firmwarebl-ac3600BL-AC3600
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2022-35411
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-70.89% / 98.64%
||
7 Day CHG~0.00%
Published-08 Jul, 2022 | 18:07
Updated-03 Aug, 2024 | 09:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

rpc.py through 0.6.0 allows Remote Code Execution because an unpickle occurs when the "serializer: pickle" HTTP header is sent. In other words, although JSON (not Pickle) is the default data format, an unauthenticated client can cause the data to be processed with unpickle.

Action-Not Available
Vendor-rpc.py_projectn/a
Product-rpc.pyn/a
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2019-19823
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-1.36% / 79.40%
||
7 Day CHG~0.00%
Published-27 Jan, 2020 | 17:49
Updated-05 Aug, 2024 | 02:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A certain router administration interface (that includes Realtek APMIB 0.11f for Boa 0.94.14rc21) stores cleartext administrative passwords in flash memory and in a file. This affects TOTOLINK A3002RU through 2.0.0, A702R through 2.1.3, N301RT through 2.1.6, N302R through 3.4.0, N300RT through 3.4.0, N200RE through 4.0.0, N150RT through 3.4.0, and N100RE through 3.4.0; Rutek RTK 11N AP through 2019-12-12; Sapido GR297n through 2019-12-12; CIK TELECOM MESH ROUTER through 2019-12-12; KCTVJEJU Wireless AP through 2019-12-12; Fibergate FGN-R2 through 2019-12-12; Hi-Wifi MAX-C300N through 2019-12-12; HCN MAX-C300N through 2019-12-12; T-broad GN-866ac through 2019-12-12; Coship EMTA AP through 2019-12-12; and IO-Data WN-AC1167R through 2019-12-12.

Action-Not Available
Vendor-tbroadsapidoiodatakctvjejuciktelcoshiphiwifihcn_max-c300n_projectfg-productsn/aTOTOLINKRealtek Semiconductor Corp.
Product-a702r_firmwarehcn_max-c300nwn-ac1167rn300rt_firmwaremax-c300n_firmwareemta_ap_firmwrea3002run150rtn200rewn-ac1167r_firmwren302rhcn_max-c300n_firmwarertk_11n_apmesh_router_firmwaren200re_firmwareemta_apwireless_ap_firmwarea3002ru_firmwaregr297n_firmwarefgn-r2gn-866acfgn-r2_firmwarertk_11n_ap_firmwaren301rt_firmwaremax-c300na702rgr297nn301rtn150rt_firmwaremesh_routern300rtn302r_firmwarewireless_apgn-866ac_firmwaren100re_firmwaren100ren/a
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2016-4401
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.47% / 63.61%
||
7 Day CHG~0.00%
Published-06 Nov, 2019 | 14:32
Updated-06 Aug, 2024 | 00:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Aruba ClearPass Policy Manager before 6.5.7 and 6.6.x before 6.6.2 allows attackers to obtain database credentials.

Action-Not Available
Vendor-n/aAruba Networks
Product-clearpassn/a
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2022-34371
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-8.1||HIGH
EPSS-0.26% / 48.78%
||
7 Day CHG~0.00%
Published-02 Sep, 2022 | 17:30
Updated-16 Sep, 2024 | 18:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell PowerScale OneFS, versions 9.0.0 up to and including 9.1.0.19, 9.2.1.12, 9.3.0.6, and 9.4.0.3, contain an unprotected transport of credentials vulnerability. A malicious unprivileged network attacker could potentially exploit this vulnerability, leading to full system compromise.

Action-Not Available
Vendor-Dell Inc.
Product-emc_powerscale_onefsPowerScale OneFS
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2019-20061
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.21% / 43.91%
||
7 Day CHG~0.00%
Published-10 Feb, 2020 | 12:19
Updated-05 Aug, 2024 | 02:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The user-introduction email in MFScripts YetiShare v3.5.2 through v4.5.4 may leak the (system-picked) password if this email is sent in cleartext. In other words, the user is not allowed to choose their own initial password.

Action-Not Available
Vendor-mfscriptsn/a
Product-yetisharen/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2022-0988
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.1||HIGH
EPSS-0.13% / 32.95%
||
7 Day CHG~0.00%
Published-25 Mar, 2022 | 18:02
Updated-16 Apr, 2025 | 16:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Delta Electronics DIAEnergie CLEARTEXT Transmission of Sensitive Information

Delta Electronics DIAEnergie (Version 1.7.5 and prior) is vulnerable to cleartext transmission as the web application runs by default on HTTP. This could allow an attacker to remotely read transmitted information between the client and product.

Action-Not Available
Vendor-Delta Electronics, Inc.
Product-diaenergieDIAEnergie
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2021-22325
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-5.3||MEDIUM
EPSS-0.07% / 22.31%
||
7 Day CHG~0.00%
Published-03 Jun, 2021 | 16:10
Updated-03 Aug, 2024 | 18:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There is an Information Disclosure vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may result in video streams being intercepted during transmission.

Action-Not Available
Vendor-n/aHuawei Technologies Co., Ltd.
Product-magic_uiemuiEMUI;Magic UI
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2021-22703
Matching Score-4
Assigner-Schneider Electric
ShareView Details
Matching Score-4
Assigner-Schneider Electric
CVSS Score-7.5||HIGH
EPSS-0.16% / 37.30%
||
7 Day CHG~0.00%
Published-19 Feb, 2021 | 15:14
Updated-03 Aug, 2024 | 18:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A CWE-319: Cleartext transmission of sensitive information vulnerability exists in PowerLogic ION7400, ION7650, ION83xx/84xx/85xx/8600, ION8650, ION8800, ION9000 and PM800 (see notification for affected versions), that could cause disclosure of user credentials when a malicious actor intercepts HTTP network traffic between a user and the device.

Action-Not Available
Vendor-n/a
Product-powerlogic_ion8650powerlogic_ion8400_firmwarepowerlogic_pm8000_firmwarepowerlogic_pm8000powerlogic_ion8300_firmwarepowerlogic_ion7400_firmwarepowerlogic_ion7650_firmwarepowerlogic_ion8800powerlogic_ion8600powerlogic_ion8500_firmwarepowerlogic_ion8300powerlogic_ion8500powerlogic_ion8600_firmwarepowerlogic_ion9000_firmwarepowerlogic_ion9000powerlogic_ion8400powerlogic_ion8800_firmwarepowerlogic_ion7400powerlogic_ion7650powerlogic_ion8650_firmwarePowerLogic ION7400, ION7650, ION83xx/84xx/85xx/8600, ION8650, ION8800, ION9000 and PM800 (see notification for affected versions)
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2021-22798
Matching Score-4
Assigner-Schneider Electric
ShareView Details
Matching Score-4
Assigner-Schneider Electric
CVSS Score-7.5||HIGH
EPSS-0.29% / 52.07%
||
7 Day CHG~0.00%
Published-11 Feb, 2022 | 17:40
Updated-03 Aug, 2024 | 18:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A CWE-522: Insufficiently Protected Credentials vulnerability exists that could cause Sensitive data such as login credentials being exposed when a Network is sniffed. Affected Product: Conext� ComBox (All Versions)

Action-Not Available
Vendor-n/a
Product-conext_comboxconext_combox_firmwareConext� ComBox (All Versions)
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2021-22702
Matching Score-4
Assigner-Schneider Electric
ShareView Details
Matching Score-4
Assigner-Schneider Electric
CVSS Score-7.5||HIGH
EPSS-0.14% / 35.14%
||
7 Day CHG~0.00%
Published-19 Feb, 2021 | 15:13
Updated-03 Aug, 2024 | 18:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A CWE-319: Cleartext transmission of sensitive information vulnerability exists in PowerLogic ION7400, ION7650, ION7700/73xx, ION83xx/84xx/85xx/8600, ION8650, ION8800, ION9000 and PM800 (see notification for affected versions), that could cause disclosure of user credentials when a malicious actor intercepts Telnet network traffic between a user and the device.

Action-Not Available
Vendor-n/a
Product-powerlogic_ion8650powerlogic_ion7700_firmwarepowerlogic_ion8400_firmwarepowerlogic_pm8000_firmwarepowerlogic_pm8000powerlogic_ion8300_firmwarepowerlogic_ion7400_firmwarepowerlogic_ion7650_firmwarepowerlogic_ion7700powerlogic_ion8600powerlogic_ion8800powerlogic_ion8500_firmwarepowerlogic_ion8600_firmwarepowerlogic_ion8500powerlogic_ion8300powerlogic_ion9000_firmwarepowerlogic_ion7300_firmwarepowerlogic_ion9000powerlogic_ion8400powerlogic_ion7300powerlogic_ion8800_firmwarepowerlogic_ion7400powerlogic_ion7650powerlogic_ion8650_firmwarePowerLogic ION7400, ION7650, ION7700/73xx, ION83xx/84xx/85xx/8600, ION8650, ION8800, ION9000 and PM800 (see notification for affected versions)
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2021-23196
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.3||HIGH
EPSS-0.26% / 49.22%
||
7 Day CHG+0.09%
Published-21 Jan, 2022 | 18:17
Updated-16 Apr, 2025 | 16:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Fresenius Kabi Agilia Connect Infusion System insufficiently protected credentials

The web application on Agilia Link+ version 3.0 implements authentication and session management mechanisms exclusively on the client-side and does not protect authentication attributes sufficiently.

Action-Not Available
Vendor-fresenius-kabiFresenius Kabi
Product-link\+_agilia_firmwareagilia_connect_firmwarevigilant_insightagilia_connectvigilant_mastermedlink\+_agiliavigilant_centeriumagilia_partner_maintenance_softwareAgilia Link+
CWE ID-CWE-522
Insufficiently Protected Credentials
CWE ID-CWE-287
Improper Authentication
CVE-2021-22681
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.8||CRITICAL
EPSS-0.12% / 31.24%
||
7 Day CHG~0.00%
Published-03 Mar, 2021 | 17:59
Updated-03 Aug, 2024 | 18:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Rockwell Automation Studio 5000 Logix Designer Versions 21 and later, and RSLogix 5000 Versions 16 through 20 use a key to verify Logix controllers are communicating with Rockwell Automation CompactLogix 1768, 1769, 5370, 5380, 5480: ControlLogix 5550, 5560, 5570, 5580; DriveLogix 5560, 5730, 1794-L34; Compact GuardLogix 5370, 5380; GuardLogix 5570, 5580; SoftLogix 5800. Rockwell Automation Studio 5000 Logix Designer Versions 21 and later and RSLogix 5000: Versions 16 through 20 are vulnerable because an unauthenticated attacker could bypass this verification mechanism and authenticate with Rockwell Automation CompactLogix 1768, 1769, 5370, 5380, 5480: ControlLogix 5550, 5560, 5570, 5580; DriveLogix 5560, 5730, 1794-L34; Compact GuardLogix 5370, 5380; GuardLogix 5570, 5580; SoftLogix 5800.

Action-Not Available
Vendor-n/aRockwell Automation, Inc.
Product-compactlogix_5380controllogix_5580drivelogix_1794-l34drivelogix_5730guardlogix_5570guardlogix_5580studio_5000_logix_designercompact_guardlogix_5370compactlogix_1769factorytalk_services_platformdrivelogix_5560controllogix_5550rslogix_5000compactlogix_1768controllogix_5570compactlogix_5370compact_guardlogix_5380compactlogix_5480softlogix_5800controllogix_5560Rockwell Automation Studio 5000 Logix Designer, RSLogix 5000, Logix Controllers
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2021-22640
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.5||HIGH
EPSS-0.23% / 45.40%
||
7 Day CHG~0.00%
Published-28 Jul, 2022 | 14:18
Updated-17 Apr, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Ovarro TBox Insufficiently Protected Credentials

An attacker can decrypt the Ovarro TBox login password by communication capture and brute force attacks.

Action-Not Available
Vendor-ovarroOvarro
Product-tbox_ms-cpu32_firmwaretbox_ms-cpu32-s2_firmwaretbox_tg2tbox_lt2-530_firmwaretbox_lt2-532_firmwaretbox_lt2-540_firmwaretbox_rm2tbox_ms-cpu32-s2tbox_lt2-540tbox_lt2-532tbox_lt2-530tbox_ms-cpu32twinsofttbox_tg2_firmwaretbox_rm2_firmwareTBox
CWE ID-CWE-294
Authentication Bypass by Capture-replay
CWE ID-CWE-307
Improper Restriction of Excessive Authentication Attempts
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2021-22946
Matching Score-4
Assigner-HackerOne
ShareView Details
Matching Score-4
Assigner-HackerOne
CVSS Score-7.5||HIGH
EPSS-0.07% / 21.64%
||
7 Day CHG~0.00%
Published-29 Sep, 2021 | 00:00
Updated-03 Aug, 2024 | 18:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A user can tell curl >= 7.20.0 and <= 7.78.0 to require a successful upgrade to TLS when speaking to an IMAP, POP3 or FTP server (`--ssl-reqd` on the command line or`CURLOPT_USE_SSL` set to `CURLUSESSL_CONTROL` or `CURLUSESSL_ALL` withlibcurl). This requirement could be bypassed if the server would return a properly crafted but perfectly legitimate response.This flaw would then make curl silently continue its operations **withoutTLS** contrary to the instructions and expectations, exposing possibly sensitive data in clear text over the network.

Action-Not Available
Vendor-n/aNetApp, Inc.Debian GNU/LinuxOracle CorporationSiemens AGSplunk LLC (Cisco Systems, Inc.)Apple Inc.CURLFedora Project
Product-peoplesoft_enterprise_peopletoolscommunications_cloud_native_core_consolecommunications_cloud_native_core_network_function_cloud_native_environmentcloud_backuph300s_firmwareh410smacoscurlh300ssolidfire_baseboard_management_controllersnapcenterh300e_firmwaresinec_infrastructure_network_servicesclustered_data_ontaph500efedorah500s_firmwareh500e_firmwarecommunications_cloud_native_core_binding_support_functionh700eoncommand_insighth300ecommunications_cloud_native_core_service_communication_proxycommunications_cloud_native_core_network_slice_selection_functioncommunications_cloud_native_core_security_edge_protection_proxyh500scommunications_cloud_native_core_network_repository_functiononcommand_workflow_automationuniversal_forwarderdebian_linuxh410s_firmwareh700s_firmwareh700e_firmwaresolidfire_baseboard_management_controller_firmwareh700scommerce_guided_searchmysql_serverhttps://github.com/curl/curl
CWE ID-CWE-325
Missing Cryptographic Step
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2018-21237
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.01% / 0.73%
||
7 Day CHG~0.00%
Published-04 Jun, 2020 | 16:33
Updated-05 Aug, 2024 | 12:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Foxit PhantomPDF before 8.3.7. It allows NTLM credential theft via a GoToE or GoToR action.

Action-Not Available
Vendor-n/aFoxit Software Incorporated
Product-phantompdfn/a
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2021-20623
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-2.08% / 83.28%
||
7 Day CHG~0.00%
Published-05 Feb, 2021 | 09:35
Updated-03 Aug, 2024 | 17:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Video Insight VMS versions prior to 7.8 allows a remote attacker to execute arbitrary code with the system user privilege by sending a specially crafted request.

Action-Not Available
Vendor-panasonicPanasonic Corporation
Product-video_insight_vmsVideo Insight VMS
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2021-20997
Matching Score-4
Assigner-CERT@VDE
ShareView Details
Matching Score-4
Assigner-CERT@VDE
CVSS Score-7.5||HIGH
EPSS-0.25% / 48.37%
||
7 Day CHG~0.00%
Published-13 May, 2021 | 13:45
Updated-16 Sep, 2024 | 23:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WAGO: Managed Switches: Unauthorized access to password hashes

In multiple managed switches by WAGO in different versions it is possible to read out the password hashes of all Web-based Management users.

Action-Not Available
Vendor-wagoWAGO
Product-0852-1305_firmware0852-13050852-1305\/000-001_firmware0852-1505\/000-0010852-0303_firmware0852-1305\/000-0010852-1505\/000-001_firmware0852-1505_firmware0852-03030852-15050852-13050852-1305/000-0010852-1505/000-0010852-03030852-1505
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2021-20409
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.07% / 21.62%
||
7 Day CHG~0.00%
Published-12 Feb, 2021 | 16:35
Updated-16 Sep, 2024 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Security Verify Information Queue information disclosure

IBM Security Verify Information Queue 1.0.6 and 1.0.7 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 196188.

Action-Not Available
Vendor-IBM CorporationLinux Kernel Organization, Inc
Product-security_verify_information_queuelinux_kernelSecurity Verify Information Queue
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2021-20599
Matching Score-4
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-4
Assigner-Mitsubishi Electric Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.33% / 55.43%
||
7 Day CHG~0.00%
Published-14 Oct, 2021 | 00:00
Updated-03 Aug, 2024 | 17:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cleartext Transmission of Sensitive InformationCleartext transmission of sensitive information vulnerability in MELSEC iQ-R series Safety CPU R08/16/32/120SFCPU firmware versions "26" and prior and MELSEC iQ-R series SIL2 Process CPU R08/16/32/120PSFCPU firmware versions "11" and prior allows a remote unauthenticated attacker to login to a target CPU module by obtaining credentials other than password.

Action-Not Available
Vendor-Mitsubishi Electric Corporation
Product-r08sfcpur120psfcpur08sfcpu_firmwarer32psfcpu_firmwarer120psfcpu_firmwarer16sfcpu_firmwarer32sfcpu_firmwarer32sfcpur08psfcpu_firmwarer16psfcpur08psfcpur120sfcpur16sfcpur32psfcpur120sfcpu_firmwarer16psfcpu_firmwareMELSEC iQ-R series SIL2 Process CPU R32PSFCPUMELSEC iQ-R Series SIL2 Process CPU R08PSFCPUMELSEC iQ-R series SIL2 Process CPU R16PSFCPUMELSEC iQ-R series Safety CPU R120SFCPUMELSEC iQ-R series Safety CPU R32SFCPUMELSEC iQ-R series Safety CPU R16SFCPUMELSEC iQ-R Series Safety CPU R08SFCPUMELSEC iQ-R series SIL2 Process CPU R120PSFCPUr120psfcpur32sfcpur120sfcpur16sfcpur32psfcpur16psfcpur08psfcpumelsec_iq-r08sfcpu
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CWE ID-CWE-639
Authorization Bypass Through User-Controlled Key
CVE-2021-20146
Matching Score-4
Assigner-Tenable Network Security, Inc.
ShareView Details
Matching Score-4
Assigner-Tenable Network Security, Inc.
CVSS Score-9.8||CRITICAL
EPSS-1.49% / 80.32%
||
7 Day CHG~0.00%
Published-09 Dec, 2021 | 15:21
Updated-03 Aug, 2024 | 17:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An unprotected ssh private key exists on the Gryphon devices which could be used to achieve root access to a server affiliated with Gryphon's development and infrastructure. At the time of discovery, the ssh key could be used to login to the development server hosted in Amazon Web Services.

Action-Not Available
Vendor-gryphonconnectn/a
Product-gryphon_tower_firmwaregryphon_towerGryphon Tower router
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2021-20992
Matching Score-4
Assigner-CERT@VDE
ShareView Details
Matching Score-4
Assigner-CERT@VDE
CVSS Score-8.1||HIGH
EPSS-1.20% / 78.10%
||
7 Day CHG~0.00%
Published-19 Apr, 2021 | 14:05
Updated-17 Sep, 2024 | 02:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Fibaro Home Center Unencrypted management interface

In Fibaro Home Center 2 and Lite devices in all versions provide a web based management interface over unencrypted HTTP protocol. Communication between the user and the device can be eavesdropped to hijack sessions, tokens and passwords.

Action-Not Available
Vendor-fibaroFibar Group S.A
Product-home_center_2_firmwarehome_center_2home_center_lite_firmwarehome_center_liteFibaro Home Center
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2020-8507
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.22% / 44.35%
||
7 Day CHG~0.00%
Published-05 Feb, 2020 | 15:15
Updated-04 Aug, 2024 | 10:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Citytv Video application 4.08.0 for Android and 3.35 for iOS sends Unencrypted Analytics.

Action-Not Available
Vendor-rogersmedian/a
Product-citytv_videon/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2020-9477
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.93% / 75.20%
||
7 Day CHG~0.00%
Published-04 Mar, 2020 | 18:16
Updated-04 Aug, 2024 | 10:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on HUMAX HGA12R-02 BRGCAA 1.1.53 devices. A vulnerability in the authentication functionality in the web-based interface could allow an unauthenticated remote attacker to capture packets at the time of authentication and gain access to the cleartext password. An attacker could use this access to create a new user account or control the device.

Action-Not Available
Vendor-humaxdigitaln/a
Product-hga12r-02hga12r-02_firmwaren/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2020-7233
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.39% / 59.16%
||
7 Day CHG~0.00%
Published-19 Jan, 2020 | 19:45
Updated-04 Aug, 2024 | 09:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

KMS Controls BAC-A1616BC BACnet devices have a cleartext password of snowman in the BACKDOOR_NAME variable in the BC_Logon.swf file.

Action-Not Available
Vendor-kmccontrolsn/a
Product-bac-a1616bc_firmwarebac-a1616bcn/a
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2020-8183
Matching Score-4
Assigner-HackerOne
ShareView Details
Matching Score-4
Assigner-HackerOne
CVSS Score-7.5||HIGH
EPSS-0.95% / 75.46%
||
7 Day CHG~0.00%
Published-30 Oct, 2020 | 18:13
Updated-04 Aug, 2024 | 09:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A logic error in Nextcloud Server 19.0.0 caused a plaintext storage of the share password when it was given on the initial create API call.

Action-Not Available
Vendor-n/aNextcloud GmbH
Product-nextcloud_serverNextcloud Server
CWE ID-CWE-256
Plaintext Storage of a Password
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2022-32520
Matching Score-4
Assigner-Schneider Electric
ShareView Details
Matching Score-4
Assigner-Schneider Electric
CVSS Score-8||HIGH
EPSS-0.16% / 37.68%
||
7 Day CHG~0.00%
Published-30 Jan, 2023 | 00:00
Updated-05 Feb, 2025 | 20:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A CWE-522: Insufficiently Protected Credentials vulnerability exists that could result in unwanted access to a DCE instance when performed over a network by a malicious third-party. This CVE is unique from CVE-2022-32518. Affected Products: Data Center Expert (Versions prior to V7.9.0)

Action-Not Available
Vendor-Schneider Electric SE
Product-data_center_expertData Center Expert
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2019-17218
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.15% / 35.81%
||
7 Day CHG~0.00%
Published-06 Oct, 2019 | 15:23
Updated-05 Aug, 2024 | 01:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on V-Zug Combi-Steam MSLQ devices before Ethernet R07 and before WLAN R05. By default, the communication to the web service is unencrypted via http. An attacker is able to intercept and sniff communication to the web service.

Action-Not Available
Vendor-vzugn/a
Product-combi-stream_mslq_firmwarecombi-stream_mslqn/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2020-6997
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.5||HIGH
EPSS-0.15% / 35.90%
||
7 Day CHG~0.00%
Published-24 Mar, 2020 | 20:31
Updated-04 Aug, 2024 | 09:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Moxa EDS-G516E Series firmware, Version 5.2 or lower, sensitive information is transmitted over some web applications in cleartext.

Action-Not Available
Vendor-n/aMoxa Inc.
Product-eds-g516e_firmwareeds-g516eeds-510e_firmwareeds-510eMoxa EDS-G516E Series firmware, Version 5.2 or lower
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2020-6969
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.8||CRITICAL
EPSS-0.45% / 62.88%
||
7 Day CHG~0.00%
Published-05 Feb, 2020 | 15:09
Updated-04 Aug, 2024 | 09:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

It is possible to unmask credentials and other sensitive information on “unprotected” project files, which may allow an attacker to remotely access the C-More Touch Panels EA9 series: firmware versions prior to 6.53 and manipulate system configurations.

Action-Not Available
Vendor-n/aAutomationDirect
Product-c-more_ea9-t6clc-more_ea9-t6cl-r_firmwarec-more_ea9-t10wclc-more_ea9-t12cl_firmwarec-more_ea9-t10clc-more_ea9-rhic-more_ea9-rhi_firmwarec-more_ea9-t7cl-rc-more_ea9-t8cl_firmwarec-more_ea9-t15cl-r_firmwarec-more_ea9-t10wcl_firmwarec-more_ea9-t15cl-rc-more_ea9-t15cl_firmwarec-more_ea9-t15clc-more_ea9-t6cl-rc-more_ea9-t10cl_firmwarec-more_ea9-t12clc-more_ea9-t7clc-more_ea9-t7cl_firmwarec-more_ea9-t8clc-more_ea9-t7cl-r_firmwarec-more_ea9-t6cl_firmwareC-More Touch Panels EA9 series
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2020-6195
Matching Score-4
Assigner-SAP SE
ShareView Details
Matching Score-4
Assigner-SAP SE
CVSS Score-6.4||MEDIUM
EPSS-0.19% / 41.50%
||
7 Day CHG~0.00%
Published-14 Apr, 2020 | 19:36
Updated-04 Aug, 2024 | 08:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SAP Business Objects Business Intelligence Platform (CMC), version 4.1, 4.2, shows cleartext password in the response, leading to Information Disclosure. It involves social engineering in order to gain access to system and If password is known, it would give administrative rights to the attacker to read/modify delete the data and rights within the system.

Action-Not Available
Vendor-SAP SE
Product-businessobjects_business_intelligence_platformSAP Business Objects Business Intelligence Platform
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2020-5594
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-0.33% / 55.37%
||
7 Day CHG~0.00%
Published-23 Jun, 2020 | 07:35
Updated-04 Aug, 2024 | 08:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mitsubishi Electric MELSEC iQ-R, iQ-F, Q, L, and FX series CPU modules all versions contain a vulnerability that allows cleartext transmission of sensitive information between CPU modules and GX Works3 and/or GX Works2 via unspecified vectors.

Action-Not Available
Vendor-Mitsubishi Electric Corporation
Product-melsec-fxmelsec_iq-rmelsec-fx_firmwaremelsec-qmelsec-l_firmwaremelsec-lmelsec_iq-fmelsec_iq-r_firmwaremelsec-q_firmwaremelsec_iq-f_firmwareMELSEC iQ-R, iQ-F, Q, L, and FX series CPU modules
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2020-4695
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.10% / 27.58%
||
7 Day CHG~0.00%
Published-08 Mar, 2021 | 18:00
Updated-16 Sep, 2024 | 16:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM API Connect V10 is impacted by insecure communications during database replication. As the data replication happens over insecure communication channels, an attacker can view unencrypted data leading to a loss of confidentiality.

Action-Not Available
Vendor-IBM Corporation
Product-api_connectAPI Connect
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2022-32519
Matching Score-4
Assigner-Schneider Electric
ShareView Details
Matching Score-4
Assigner-Schneider Electric
CVSS Score-8||HIGH
EPSS-0.19% / 41.30%
||
7 Day CHG~0.00%
Published-30 Jan, 2023 | 00:00
Updated-05 Feb, 2025 | 20:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A CWE-257: Storing Passwords in a Recoverable Format vulnerability exists that could result in unwanted access to a DCE instance when performed over a network by a malicious third-party. Affected Products: Data Center Expert (Versions prior to V7.9.0)

Action-Not Available
Vendor-Schneider Electric SE
Product-data_center_expertData Center Expert
CWE ID-CWE-257
Storing Passwords in a Recoverable Format
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2016-11029
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.11% / 30.75%
||
7 Day CHG~0.00%
Published-07 Apr, 2020 | 13:45
Updated-06 Aug, 2024 | 03:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on Samsung mobile devices with L(5.0/5.1), M(6.0), and N(7.0) software. Attackers can read the password of the Mobile Hotspot in the log because of an unprotected intent. The Samsung ID is SVE-2016-7301 (December 2016).

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidn/a
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2020-25190
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.5||HIGH
EPSS-0.09% / 27.02%
||
7 Day CHG~0.00%
Published-23 Dec, 2020 | 14:07
Updated-16 Sep, 2024 | 21:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MOXA NPort IAW5000A-I/O Series

The built-in WEB server for MOXA NPort IAW5000A-I/O firmware version 2.1 or lower stores and transmits the credentials of third-party services in cleartext.

Action-Not Available
Vendor-Moxa Inc.
Product-nport_iaw5000a-i\/onport_iaw5000a-i\/o_firmwareNPort IAW5000A-I/O
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2022-32518
Matching Score-4
Assigner-Schneider Electric
ShareView Details
Matching Score-4
Assigner-Schneider Electric
CVSS Score-8||HIGH
EPSS-0.16% / 37.68%
||
7 Day CHG~0.00%
Published-30 Jan, 2023 | 00:00
Updated-05 Feb, 2025 | 20:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A CWE-522: Insufficiently Protected Credentials vulnerability exists that could result in unwanted access to a DCE instance when performed over a network by a malicious third-party. This CVE is unique from CVE-2022-32520. Affected Products: Data Center Expert (Versions prior to V7.9.0)

Action-Not Available
Vendor-Schneider Electric SE
Product-data_center_expertData Center Expert
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2020-4092
Matching Score-4
Assigner-HCL Software
ShareView Details
Matching Score-4
Assigner-HCL Software
CVSS Score-5.3||MEDIUM
EPSS-0.06% / 18.73%
||
7 Day CHG~0.00%
Published-06 May, 2020 | 12:30
Updated-04 Aug, 2024 | 07:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

"If port encryption is not enabled on the Domino Server, HCL Nomad on Android and iOS Platforms will communicate in clear text and does not currently have a user interface option to change the setting to request an encrypted communication channel with the Domino server. This can potentially expose sensitive information including but not limited to server names, user IDs and document content."

Action-Not Available
Vendor-n/aHCL Technologies Ltd.
Product-hcl_nomad"HCL Nomad"
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2022-33321
Matching Score-4
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-4
Assigner-Mitsubishi Electric Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.58% / 67.92%
||
7 Day CHG~0.00%
Published-08 Nov, 2022 | 00:00
Updated-01 May, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cleartext Transmission of Sensitive Information vulnerability due to the use of Basic Authentication for HTTP connections in Mitsubishi Electric consumer electronics products (PHOTOVOLTAIC COLOR MONITOR ECO-GUIDE, HEMS adapter, Wi-Fi Interface, Air Conditioning, Induction hob, Mitsubishi Electric HEMS Energy Measurement Unit, Refrigerator, Remote control with Wi-Fi Interface, BATHROOM THERMO VENTILATOR, Rice cooker, Mitsubishi Electric HEMS control adapter, Energy Recovery Ventilator, Smart Switch, Ventilating Fan, Range hood fan, Energy Measurement Unit and Air Purifier) allows a remote unauthenticated attacker to disclose information in the products or cause a denial of service (DoS) condition as a result by sniffing credential information (username and password). The wide range of models/versions of Mitsubishi Electric consumer electronics products are affected by this vulnerability. As for the affected product models/versions, see the Mitsubishi Electric's advisory which is listed in [References] section.

Action-Not Available
Vendor-Mitsubishi Electric Corporation
Product-msz-ln18\/25\/35\/50\/60vgw-e1_firmwaremsz-ef22\/25\/35\/42\/50vgkw-et2_firmwaremsz-ef22\/25\/35\/42\/50vgkb-er1msz-ef22\/25\/35\/42\/50vgkb-a1msz-ln25\/35\/50\/60vg2r-er1_firmwaremac-559if-emac-576if-e1msz-bt20\/25\/35\/50vgk-et1_firmwaremac-566ifb-e_firmwaremsz-hr25\/35\/42\/50\/60\/71vfk-et1_firmwaremsz-ln25\/35\/50\/60vg2v-er3_firmwaremac-559if-e_firmwaremsz-ef22\/25\/35\/42\/50vgkw-er1msz-ln18\/25\/35\/50\/60vg2w-er1msz-ln18\/25\/35\/50\/60vg2w-er2msz-ln18\/25\/35\/50\/60vg2r-et1_firmwaremsz-zy09\/12\/18vfk_firmwaremsz-ap25\/35\/42\/50\/60\/71vgk-et3_firmwaremsz-ft25\/35\/50vgk-sc2_firmwaremac-557if-e_firmwaremsz-bt20\/25\/35\/50vgk-et3msz-ap25\/35\/42\/50vgk-e6_firmwaremsz-ft25\/35\/50vgk-e2_firmwaremsz-ln18\/25\/35\/50\/60vg2v-e3_firmwaremsz-ln18\/25\/35\/50\/60vgv-e1msxy-fp05\/07\/10\/13\/18\/20\/24vgk-sg1msz-bt20\/25\/35\/50vgk-e2msz-ln18\/25\/35\/50vg2b-en1msz-gzy09\/12\/18vfk_firmwaremsz-ln25\/35\/50\/60vg2r-er3msz-ef18\/22\/25\/35\/42\/50vgks-e1msz-ln25\/35\/50\/60vg2r-a2msz-ln25\/35\/50vg2w-en2_firmwaremsz-ap60\/71vgk-et1msz-ln18\/25\/35\/50\/60vgb-e1_firmwaremsz-ln18\/25\/35\/50\/60vg2w-er1_firmwaremsz-bt20\/25\/35\/50vgk-e3msz-ft25\/35\/50vgk-e1_firmwaremsz-ln18\/25\/35\/50\/60vg2w-e1_firmwaremsz-ln25\/35\/50\/60vg2r-a1_firmwaremsz-ln25\/35\/50\/60vgb-er1_firmwaremsz-ef18\/22\/25\/35\/42\/50vgks-e2_firmwaremsz-rw25\/35\/50vg-et1_firmwaremac-558if-e_firmwaremac-568ifb3-emsz-ln18\/25\/35\/50\/60vg2r-et1msz-ln18\/25\/35\/50\/60vgw-e1msz-ef22\/25\/35\/42\/50vgkb-et2_firmwaremac-587if-e_firmwaremsz-ln25\/35\/50\/60vg2b-et3_firmwaremsz-ln25\/35\/50vg2v-en2_firmwaremsz-ef18\/22\/25\/35\/42\/50vgkw-e1msz-ln25\/35\/50\/60vgw-er1_firmwaremsz-ln18\/25\/35\/50\/60vg2w-et1mac-507if-emsz-rw25\/35\/50vg-sc1msz-ef22\/25\/35\/42\/50vgkb-er2_firmwaremsz-ln25\/35\/50\/60vg2v-a2msz-rw25\/35\/50vg-sc1_firmwaremsz-ln18\/25\/35\/50\/60vg2b-et1msz-ap25\/35\/42\/50vgk-e7_firmwaremsz-ln18\/25\/35\/50vg2w-en1_firmwaremsz-ln18\/25\/35\/50\/60vgb-e1msz-gzt09\/12\/18vak_firmwaremsz-ln18\/25\/35\/50\/60vg2v-e3msz-ap25\/35\/42\/50vgk-er1mac-567ifb-emsz-ln18\/25\/35\/50\/60vg2r-e2_firmwaremsz-ln25\/35\/50\/60vg2r-a2_firmwaremsz-ln18\/25\/35\/50\/60vg2b-e1_firmwaremsz-ef22\/25\/35\/42\/50vgks-et2_firmwaremsz-ln25\/35\/50\/60vg2r-er2_firmwaremsy-gp10\/13\/15\/18\/20\/24vfk-sg1_firmwaremsz-rw25\/35\/50vg-e1msz-ln18\/25\/35\/50\/60vg2v-e1_firmwaremsz-ln25\/35\/50\/60vgb-a1_firmwaremsz-bt20\/25\/35\/50vgk-e2_firmwaremsz-ap22\/25\/35\/42\/50\/61\/70\/80vgkd-a1_firmwaremsz-ln25\/35\/50\/60vg2b-a1_firmwaremsz-ft25\/35\/50vgk-et1_firmwaremsz-gzy09\/12\/18vfkmsz-exa09\/12vakmsz-ay25\/35\/42\/50vgk-e1msz-ln25\/35\/50\/60vg2v-er1msxy-fp05\/07\/10\/13\/18\/20\/24vgk-sg1_firmwaremsz-hr25\/35\/42\/50\/60\/71vfk-er1_firmwares-mac-702if-zmsz-ap60\/71vgk-e1msz-ef18\/22\/25\/35\/42\/50vgks-e2pac-whs01wf-e_firmwaremsz-ln18\/25\/35\/50vg2r-en1_firmwares-mac-905ifmsz-ap25\/35\/42\/50vgk-et1_firmwaremsz-ft25\/35\/50vgk-e1msz-ap60\/71vgk-et1_firmwaremsz-ef22\/25\/35\/42\/50vgks-a1_firmwaremsz-ay25\/35\/42\/50vgk-et1msz-ln18\/25\/35\/50\/60vgr-e1msz-ln18\/25\/35\/50vg2w-en1msz-ln25\/35\/50\/60vg2v-er1_firmwaremsz-ef22\/25\/35\/42\/50vgks-er1msz-ef22\/25\/35\/42\/50vgkw-et1_firmwaremsz-ef22\/25\/35\/42\/50vgks-er1_firmwaremsz-ef22\/25\/35\/42\/50vgkb-er2msz-hr25\/35\/42\/50vfk-e6_firmwaremsz-ln18\/25\/35\/50vg2v-en1_firmwaremsz-ln25\/35\/50\/60vg2v-a2_firmwaremsz-ln25\/35\/50\/60vg2b-a1msz-ft20\/25vfkmfz-xt50\/60vfk_firmwaremsz-ln25\/35\/50\/60vg2b-er3_firmwaremsz-ay25\/35\/42\/50vgkp-er1_firmwaremsz-ln18\/25\/35\/50vg2v-en1msz-hr25\/35\/42\/50\/60\/71vfk-e1mac-557if-e1msz-hr25\/35\/42\/50\/60\/71vfk-et1msz-ln25\/35\/50\/60vgv-a1msz-ay25\/35\/42\/50vgk-e1_firmwaremsz-ky09\/12\/18vfk_firmwaremsz-ln25\/35\/50\/60vgr-a1msz-wx18\/20\/25vfk_firmwares-mac-702if-z_firmwaremsz-ln25\/35\/50vg2v-en2msz-ap60\/71vgk-e1_firmwaremac-587if2-e_firmwaremsz-ay25\/35\/42\/50vgk-sc1_firmwaremsz-ln25\/35\/50\/60vg2b-et3msz-ef22\/25\/35\/42\/50vgks-et2msz-ln25\/35\/50\/60vgv-a1_firmwaremsz-ef22\/25\/35\/42\/50vgks-et1_firmwaremsz-ap25\/35\/42\/50vgk-e8_firmwaremsz-ap25\/35\/42\/50\/60\/71vgk-er3_firmwaremsz-ay25\/35\/42\/50vgk-et1_firmwaremsz-ef18\/22\/25\/35\/42\/50vgkb-e2_firmwaremsz-ay25\/35\/42\/50vgk-er1_firmwaremsz-ln18\/25\/35\/50\/60vg2v-e1msz-ef22\/25\/35\/42\/50vgkw-er2_firmwaremsz-ln25\/35\/50vg2w-en2msz-ln25\/35\/50\/60vg2r-et2_firmwaremsz-ln25\/35\/50\/60vg2w-et3msz-fx20\/25vfkmsz-ef22\/25\/35\/42\/50vgks-er2mac-568ifb3-e_firmwaremsz-ap25\/35\/42\/50vgk-en3_firmwaremsz-ap25\/35\/42\/50vgk-e1mac-559if-e1msz-ln25\/35\/50\/60vg2b-et2_firmwaremsz-ln18\/25\/35\/50\/60vg2r-e1_firmwaremsz-ef22\/25\/35\/42\/50vgkw-et2mac-507if-e_firmwaremsz-ln18\/25\/35\/50\/60vgv-e1_firmwaremsz-ay25\/35\/42\/50vgk-e6msz-ln18\/25\/35\/50\/60vg2r-e3_firmwaremsz-ay25\/35\/42\/50vgkp-sc1_firmwaremsz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-e2msz-ef22\/25\/35\/42\/50vgkw-a1_firmwaremsz-ln18\/25\/35\/50vg2w-sc1msz-ln18\/25\/35\/50\/60vg2v-et1msz-ln25\/35\/50\/60vg2b-er2_firmwaremac-568ifb2-emsz-ef22\/25\/35\/42\/50vgks-a1msz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-et2mac-587if2-emsz-ay25\/35\/42\/50vgk-er1msz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-er2_firmwaremac-567ifb2-e_firmwaremsz-ln25\/35\/50\/60vgb-er1msz-rw25\/35\/50vg-e1_firmwaremsz-ln25\/35\/50\/60vgr-a1_firmwaremsz-ef18\/22\/25\/35\/42\/50vgkb-e2msz-ln25\/35\/50\/60vg2v-a1_firmwaremsz-ap60\/71vgk-er1_firmwaremsz-ef22\/25\/35\/42\/50vgkb-et1msz-ln25\/35\/50vg2v-sc1_firmwaremsz-bt20\/25\/35\/50vgk-et2msz-ap25\/35\/42\/50vgk-et1s-mac-702if-fmfz-xt50\/60vfkmsz-ap25\/35\/42\/50vgk-en1msz-ln25\/35\/50vg2b-en2msz-ef22\/25\/35\/42\/50vgkb-et1_firmwaremsz-bt20\/25\/35\/50vgk-e1_firmwaremac-558if-e1_firmwaremsz-ap25\/35\/42\/50vgk-en2_firmwaremac-567ifb2-emsz-ap25\/35\/42\/50vgk-e8msz-ln25\/35\/50\/60vg2b-er1_firmwaremsz-ln25\/35\/50\/60vgv-er1_firmwaremsz-ln18\/25\/35\/50\/60vg2v-e2_firmwaremsz-ky09\/12\/18vfkmsz-ef18\/22\/25\/35\/42\/50vgkw-e2_firmwaremac-567ifb-e_firmwaremsz-ef22\/25\/35\/42\/50vgks-er2_firmwaremsz-ln18\/25\/35\/50\/60vg2b-e1msz-ln25\/35\/50vg2r-en2ma-ew85s-uk_firmwaremsz-wx18\/20\/25vfkmsz-hr25\/35\/42\/50\/60\/71vfk-e1_firmwaremac-576if-e1_firmwaremsz-ln25\/35\/50\/60vg2v-er2msz-ap25\/35\/42\/50vgk-en2msz-ln18\/25\/35\/50\/60vg2v-e2msz-ln18\/25\/35\/50\/60vg2w-e3_firmwaremsz-bt20\/25\/35\/50vgk-er1_firmwares-mac-002ifs-mac-702if-bmsz-ln25\/35\/50vg2b-sc1msz-ln18\/25\/35\/50\/60vg2r-e2msz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-er2msz-eza09\/12vak_firmwaremsz-rw25\/35\/50vg-er1_firmwaremsz-ln18\/25\/35\/50\/60vg2b-e3_firmwaremsz-ft25\/35\/50vgk-sc2msz-ln25\/35\/50vg2v-sc1msz-ln18\/25\/35\/50\/60vg2r-e1msz-ap22\/25\/35\/42\/50\/61\/70\/80vgkd-a1pac-wf010-e_firmwaremac-568ifb-e_firmwaremsz-ln18\/25\/35\/50vg2r-en1mfz-gxt50\/60\/73vfkmsz-ft20\/25vfk_firmwaremsz-bt20\/25\/35\/50vgk-et3_firmwaremsz-ay25\/35\/42\/50vgkp-er1msz-zy09\/12\/18vfks-mac-906if_firmwares-mac-906ifmsz-ef18\/22\/25\/35\/42\/50vgkw-e2mac-557if-e1_firmwaremsz-ay25\/35\/42\/50vgkp-sc1mac-568if-e_firmwaremsz-ln25\/35\/50\/60vg2w-et3_firmwaremsz-ln25\/35\/50\/60vg2v-et3msz-zt09\/12\/18vakmsz-bt20\/25\/35\/50vgk-et2_firmwaremsz-bt20\/25\/35\/50vgk-e3_firmwaremsz-ln18\/25\/35\/50\/60vg2w-e2msz-bt20\/25\/35\/50vgk-er1msz-hr25\/35\/42\/50vfk-e6msz-ay25\/35\/42\/50vgkp-e6msz-ln25\/35\/50vg2b-sc1_firmwaremac-568if-emsz-ft25\/35\/50vgk-sc1msy-gp10\/13\/15\/18\/20\/24vfk-sg1msz-fx20\/25vfk_firmwaremsz-ln18\/25\/35\/50\/60vg2w-et2_firmwaremsz-eza09\/12vakmsz-ln25\/35\/50vg2r-sc1_firmwaremsz-bt20\/25\/35\/50vgk-er2msz-bt20\/25\/35\/50vgk-e1msz-ln25\/35\/50\/60vg2v-er3msz-ln18\/25\/35\/50vg2w-sc1_firmwaremsz-bt20\/25\/35\/50vgk-et1msz-ap25\/35\/42\/50\/60\/71vgk-e3_firmwaremsz-ln18\/25\/35\/50\/60vg2w-et1_firmwaremsz-ap25\/35\/42\/50vgk-e1_firmwaremac-568ifb-emsz-ln25\/35\/50\/60vg2r-er2mac-588if-e_firmwaremsz-ap25\/35\/42\/50vgk-e6msz-ef22\/25\/35\/42\/50vgkw-a1msz-ap22\/25\/35\/42\/50\/60\/71\/80vgkd-a2msz-ln25\/35\/50\/60vg2v-et2msz-ln25\/35\/50vg2r-sc1msz-ln25\/35\/50\/60vgw-er1msz-ln18\/25\/35\/50\/60vg2w-e2_firmwaremsz-ln18\/25\/35\/50\/60vg2b-et1_firmwaremac-558if-e1mac-558if-emsz-ln25\/35\/50\/60vgb-a1ma-ew85s-emsz-ln18\/25\/35\/50\/60vg2w-e3msz-ln25\/35\/50\/60vg2r-er3_firmwaremsz-ln25\/35\/50\/60vg2v-er2_firmwaremsz-ap25\/35\/42\/50vgk-e7msz-ef18\/22\/25\/35\/42\/50vgks-e1_firmwaremsz-ef22\/25\/35\/42\/50vgkw-et1mac-587if-emsz-ln25\/35\/50\/60vg2r-er1mac-559if-e1_firmwaremsz-ln18\/25\/35\/50\/60vg2b-e2_firmwaremsz-ln25\/35\/50\/60vg2b-er2mac-566ifb-emsz-ef22\/25\/35\/42\/50vgkb-et2msz-ln18\/25\/35\/50\/60vg2b-e3msz-rw25\/35\/50vg-et1msz-ap25\/35\/42\/50\/60\/71vgk-et3msz-ay25\/35\/42\/50vgk-sc1msz-ln18\/25\/35\/50\/60vg2w-et2msz-ap25\/35\/42\/50vgk-en3msz-hr25\/35\/42\/50\/60\/71vfk-er1msz-ef22\/25\/35\/42\/50vgkb-a1_firmwaremsz-ap25\/35\/42\/50\/60\/71vgk-er3msz-ln25\/35\/50\/60vg2b-er3msz-ln25\/35\/50\/60vg2b-et2msz-ef22\/25\/35\/42\/50vgkw-er1_firmwaremsz-ay25\/35\/42\/50vgkp-et1msz-ap25\/35\/42\/50vgk-er1_firmwaremac-568ifb2-e_firmwaremsz-ln25\/35\/50\/60vg2b-er1ma-ew85s-e_firmwaremfz-gxt50\/60\/73vfk_firmwaremac-557if-emsz-ln25\/35\/50\/60vg2r-et3_firmwares-mac-702if-f_firmwaremsz-zt09\/12\/18vak_firmwaremsz-ln18\/25\/35\/50\/60vg2r-e3msz-ln25\/35\/50\/60vg2v-et3_firmwaremsz-ay25\/35\/42\/50vgkp-e6_firmwaremsz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-et2_firmwaremsz-ln25\/35\/50\/60vg2w-er3msz-ln25\/35\/50\/60vg2r-et3msz-ln25\/35\/50\/60vg2r-et2s-mac-905if_firmwaremsz-ln25\/35\/50\/60vg2v-a1msz-ln25\/35\/50vg2b-en2_firmwaremsz-ln25\/35\/50\/60vg2w-er3_firmwares-mac-002if_firmwaremsz-exa09\/12vak_firmwaremsz-ln25\/35\/50\/60vg2b-a2_firmwaremsz-gzt09\/12\/18vakmsz-ln25\/35\/50\/60vgr-er1msz-ap60\/71vgk-er1msz-ln25\/35\/50vg2r-en2_firmwaremsz-bt20\/25\/35\/50vgk-er2_firmwaremsz-ft25\/35\/50vgk-e2msz-ln25\/35\/50\/60vg2v-et2_firmwaremsz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-e2_firmwaremsz-rw25\/35\/50vg-er1msz-ay25\/35\/42\/50vgkp-et1_firmwaremsz-ln18\/25\/35\/50\/60vgr-e1_firmwaremsz-ln18\/25\/35\/50\/60vg2b-e2msz-ef22\/25\/35\/42\/50vgkw-er2msz-ln18\/25\/35\/50\/60vg2v-et1_firmwaremsz-ef18\/22\/25\/35\/42\/50vgkb-e1_firmwaremsz-ap25\/35\/42\/50vgk-en1_firmwaremsz-ef22\/25\/35\/42\/50vgkb-er1_firmwaremsz-ft25\/35\/50vgk-sc1_firmwaremsz-ln25\/35\/50\/60vgv-er1msz-ln25\/35\/50\/60vgr-er1_firmwaremsz-ln18\/25\/35\/50\/60vg2w-er2_firmwaremsz-ln18\/25\/35\/50\/60vg2w-e1msz-ef18\/22\/25\/35\/42\/50vgkw-e1_firmwaremsz-ap22\/25\/35\/42\/50\/60\/71\/80vgkd-a2_firmwares-mac-702if-b_firmwaremsz-ln25\/35\/50\/60vg2b-a2msz-ef18\/22\/25\/35\/42\/50vgkb-e1msz-ft25\/35\/50vgk-et1pac-whs01wf-epac-wf010-ema-ew85s-ukmsz-ap25\/35\/42\/50\/60\/71vgk-e3msz-ay25\/35\/42\/50vgk-e6_firmwaremsz-ln18\/25\/35\/50vg2b-en1_firmwaremsz-ef22\/25\/35\/42\/50vgks-et1mac-588if-emsz-ln25\/35\/50\/60vg2r-a1Air Conditioning MSZ-LN25/35/50/60VG2B-ER1Air Conditioning MSZ-AY25/35/42/50VGKP-ER1Air Conditioning MSZ-EF18/22/25/35/42/50VGKW-E1BATHROOM THERMO VENTILATOR V-143BZL2-HMWi-Fi Interface MAC-576IF-E1Air Conditioning MSZ-LN18/25/35/50/60VG2W-E3Air Conditioning MSZ-LN25/35/50/60VG2V-ER2Air Conditioning MSZ-LN25/35/50/60VG2R-ER2Remote control with Wi-Fi Interface RMCB-D6SE-TWi-Fi Interface PAC-WF010-EAir Conditioning MSZ-LN25/35/50/60VG2V-ET3Air Conditioning MSZ-LN18/25/35/50/60VG2B-E3Ventilating Fan VD-15ZFVC5-HMWi-Fi Interface GT-RA1Air Conditioning MSZ-LN18/25/35/50/60VGV-E1Ventilating Fan V-18ZMVC2-HMWi-Fi Interface S-MAC-702IF-FHEMS adapter MAC-894IFWi-Fi Interface MAC-558IF-E1Energy Recovery Ventilator VL-20ZMH3-R-HMAir Conditioning MSZ-GZT09/12/18VAKAir Conditioning MSZ-LN25/35/50/60VG2R-A2Mitsubishi Electric HEMS control adapter P-HM04WAPHOTOVOLTAIC COLOR MONITOR ECO-GUIDE PV-DR006L-IFU-GW-YAir Conditioning MSZ-LN18/25/35/50/60VG2W-ET1Air Conditioning MSZ-EF22/25/35/42/50VGKW-ET2Air Conditioning MSZ-LN25/35/50/60VG2R-ER3Air Conditioning MSZ-FT20/25VFKAir Conditioning MSZ-LN25/35/50VG2R-EN2Ventilating Fan VD-18ZFVC3-HMAir Conditioning MSZ-FD40/56/63/71/8022SRemote control with Wi-Fi Interface RMCB-H6SE-TAir Conditioning MSZ-AP60/71VGK-E1Ventilating Fan VD-15ZFVC3-HMAir Conditioning MSZ-ZW22/25/28/36/40/56/63/71/80/9020(S)Air Conditioning MSZ-AP22/25/35/42/50/60/71/80VGKD-A2Wi-Fi Interface MAC-558IF-EAir Conditioning MSZ-AY25/35/42/50VGK-E6Air Conditioning MSZ-LN18/25/35/50/60VG2R-E3Wi-Fi Interface MAC-567IFB2-EAir Conditioning MSZ-LN18/25/35/50/60VG2W-E1PHOTOVOLTAIC COLOR MONITOR ECO-GUIDE PV-DR006L-IFU-MRC-MRefrigerator MR-WXD52/60/70GAir Conditioning MSZ-LN25/35/50/60VG2W-ER3Air Conditioning MSZ-KY09/12/18VFKAir Conditioning MSZ-AP25/35/42/50/60/71VGK-ER3Air Conditioning MSZ-BT20/25/35/50VGK-ER2Air Conditioning MSZ-AP15/20/25/35/42/50/60/71VGK-ER2Air Conditioning MSZ-AP25/35/42/50VGK-EN2Air Conditioning MSZ-ZXV22/25/28/36/40/56/63/71/80/9021(S)Air Conditioning MSZ-AY25/35/42/50VGK-ER1Wi-Fi Interface GT-HR1Smart Switch P-1600SWRCWi-Fi Interface MAC-895IFAir Conditioning MSZ-LN18/25/35/50/60VG2V-E1Air Purifier MA-EW85S-EAir Conditioning MSZ-LN18/25/35/50/60VG2B-E2Air Conditioning MSZ-LN25/35/50/60VG2V-A2Air Conditioning MSZ-LN18/25/35/50/60VG2V-E3Wi-Fi Interface MAC-567IFB-EVentilating Fan V-150CRL-D-HMAir Conditioning MSZ-EF22/25/35/42/50VGKW-A1BATHROOM THERMO VENTILATOR V-141BZ-HM-SYHAir Conditioning MSZ-LN18/25/35/50/60VG2W-ER2Air Conditioning MSZ-AP22/25/35/42/50/61/70/80VGKD-A1Energy Measurement Unit HM-EM02Air Conditioning MSZ-BT20/25/35/50VGK-ET2Wi-Fi Interface MAC-888IFEnergy Measurement Unit HM-EM03-EHEMS adapter HM-01A-CSRange hood fan V-6047S-HMAir Conditioning MSZ-EM22/25/28/36/40/56/63/71/80/9020E8(S)Air Conditioning MSZ-EF18/22/25/35/42/50VGKS-E1Air Conditioning MSZ-EF18/22/25/35/42/50VGKB-E2Wi-Fi Interface MAC-900IFAir Conditioning MSZ-LN25/35/50VG2B-SC1BATHROOM THERMO VENTILATOR V-141BZ-HM-SLAir Conditioning MSZ-AP25/35/42/50VGK-E6Air Conditioning MSZ-EF18/22/25/35/42/50VGKB-E1Air Conditioning MSZ-EF18/22/25/35/42/50VGKS-E2HEMS adapter GT-HEM3BATHROOM THERMO VENTILATOR V-243BZL-HMWi-Fi Interface PAC-SK43MLAir Conditioning MSZ-BT20/25/35/50VGK-ET1HEMS adapter P-HM03WAAir Conditioning MSZ-EF22/25/35/42/50VGKW-ER2Wi-Fi Interface S-MAC-702IF-ZAir Conditioning MSZ-LN25/35/50/60VG2R-ET3BATHROOM THERMO VENTILATOR WD-240DK-RCAir Conditioning MSZ-BT20/25/35/50VGK-ER1PHOTOVOLTAIC COLOR MONITOR ECO-GUIDE PV-DR006L-IFU-GW-MAir Conditioning MSZ-LN18/25/35/50VG2V-EN1Air Conditioning MSZ-EF22/25/35/42/50VGKB-ET2Air Purifier MA-EW85S-UKHEMS adapter HM-02A-REFAir Conditioning MSZ-AP25/35/42/50VGK-E8Air Conditioning MSZ-LN25/35/50/60VGB-ER1Energy Recovery Ventilator VL-200ZMHSV3-RCHEMS adapter GT-HEM3-MWi-Fi Interface MAC-559IF-E1HEMS adapter GT-HEM3-EAir Conditioning MSZ-LN25/35/50/60VG2B-A1HEMS adapter GT-HEM5-EAir Conditioning MSZ-LN25/35/50/60VG2B-ET2Wi-Fi Interface MAC-587IF-EAir Conditioning MSZ-AY25/35/42/50VGKP-ET1Wi-Fi Interface PAC-WHS01WF-EAir Conditioning MSZ-RW25/35/50VG-ET1Air Conditioning MSZ-LN18/25/35/50/60VG2R-E2Air Conditioning MSZ-FZ40/56/63/71/80/9020SAir Conditioning MSZ-EF22/25/35/42/50VGKB-A1PHOTOVOLTAIC COLOR MONITOR ECO-GUIDE PV-DR006L-SET-MAir Conditioning MSZ-AP25/35/42/50VGK-ER1Range hood fan V-904S-HMWi-Fi Interface S-MAC-905IFWi-Fi Interface MAC-507IF-EWi-Fi Interface S-MAC-002IFAir Conditioning MSZ-FT25/35/50VGK-SC2Wi-Fi Interface MAC-568IFB-EInduction hob G32M-HAir Conditioning MSZ-LN25/35/50VG2V-EN2Air Conditioning MSY-GP10/13/15/18/20/24VFK-SG1Air Conditioning MSZ-FT25/35/50VGK-ET1Air Conditioning MSZ-LN18/25/35/50/60VG2V-ET1Air Conditioning MSZ-LN25/35/50/60VG2R-A1Air Conditioning MSZ-LN18/25/35/50VG2R-EN1Refrigerator MR-MXD50/57GHEMS adapter GT-HEM1Air Conditioning MSZ-AP25/35/42/50VGK-ET1Air Conditioning MSZ-RW25/35/50VG-SC1Air Conditioning MSZ-ZD25/28/40/56/63/71/8022(S)Air Conditioning MSXY-FP05/07/10/13/18/20/24VGK-SG1Air Conditioning MSZ-LN25/35/50VG2B-EN2Air Conditioning MSZ-EF22/25/35/42/50VGKB-ET1Wi-Fi Interface MAC-559IF-EAir Conditioning MSZ-EF22/25/35/42/50VGKS-ER2Air Conditioning MSZ-LN25/35/50/60VG2V-ER1BATHROOM THERMO VENTILATOR V-143BZL-HMRange hood fan V-754S-HMAir Conditioning MSZ-LN25/35/50/60VG2R-ET2Air Conditioning MSZ-AY25/35/42/50VGKP-SC1Energy Recovery Ventilator VL-20ZMH3-L-HMMitsubishi Electric HEMS Energy Measurement Unit HM-EM02Remote control with Wi-Fi Interface RMCB-F6SE-THEMS adapter HM-02A-CSAir Conditioning MSZ-BT20/25/35/50VGK-E2Wi-Fi Interface GT-RA2Air Conditioning MSZ-EZA09/12VAKWi-Fi Interface S-MAC-702IF-BAir Conditioning MSZ-LN25/35/50/60VGV-A1Ventilating Fan VD-15ZFVC2-HMHEMS adapter HM-01A-EXAir Conditioning MSZ-HR25/35/42/50VFK-E6Air Conditioning MSZ-ZY09/12/18VFKAir Conditioning MSZ-LN25/35/50/60VG2W-ET3Air Conditioning MSZ-LN18/25/35/50/60VG2B-E1Air Conditioning MSZ-AP60/71VGK-ER1Air Conditioning MSZ-AY25/35/42/50VGK-ET1HEMS adapter HM-W002-ACBAir Conditioning MSZ-LN18/25/35/50/60VG2B-ET1Air Conditioning MSZ-AP25/35/42/50VGK-E1Air Conditioning MSZ-LN25/35/50/60VG2B-ER3Air Conditioning MSZ-LN25/35/50/60VG2B-A2Air Conditioning MSZ-AP60/71VGK-ET1PHOTOVOLTAIC COLOR MONITOR ECO-GUIDE PV-DR006L-IFU-MRC-YSmart Switch P-10SWRCAir Conditioning MSZ-RW25/35/50VG-ER1HEMS adapter HM-W002-ACPHOTOVOLTAIC COLOR MONITOR ECO-GUIDE PV-DR006L-SET-YAir Conditioning MSZ-LN25/35/50/60VG2V-ET2Wi-Fi Interface MAC-568IF-EAir Conditioning MSZ-AP25/35/42/50VGK-E7Air Conditioning MSZ-LN18/25/35/50/60VGR-E1Air Conditioning MSZ-HR25/35/42/50/60/71VFK-ER1Air Conditioning MSZ-LN25/35/50/60VGR-A1Wi-Fi Interface MAC-568IFB3-EAir Conditioning MSZ-AP15/20/25/35/42/50/60/71VGK-ET2Air Conditioning MSZ-LN18/25/35/50/60VG2R-E1Induction hob G32MS-HAir Conditioning MSZ-LN18/25/35/50/60VG2W-ER1Air Conditioning MSZ-EF22/25/35/42/50VGKS-A1Wi-Fi Interface MAC-588IF-EAir Conditioning MSZ-EF22/25/35/42/50VGKS-ER1Air Conditioning MSZ-ZW22/25/28/36/40/56/63/71/80/9021(S)Ventilating Fan VD-18ZFVC2-HMEnergy Recovery Ventilator VL-11ZFHV-HMAir Conditioning MSZ-LN25/35/50/60VG2R-ER1Air Conditioning MSZ-LN18/25/35/50/60VG2W-ET2Air Conditioning MSZ-RW25/35/50VG-E1Air Conditioning MSZ-HXV25/28/40/56/63/71/8022SAir Conditioning MSZ-EF22/25/35/42/50VGKB-ER2Air Conditioning MSZ-BT20/25/35/50VGK-ET3HEMS adapter GT-HEM2Rice cooker NJ-AWBX10Refrigerator MR-WZ55/61HAir Conditioning MSZ-EM22/25/28/36/40/56/63/71/80E2(S)Air Conditioning MSZ-FZV40/56/63/71/80/9020SHEMS adapter HM-WF001Air Conditioning MSZ-LN18/25/35/50VG2W-SC1BATHROOM THERMO VENTILATOR WD-240DK2-RCAir Conditioning MSZ-LN25/35/50/60VGV-ER1BATHROOM THERMO VENTILATOR V-241BZ5-RCAir Conditioning MSZ-EF18/22/25/35/42/50VGKW-E2Air Conditioning MFZ-GXT50/60/73VFKAir Conditioning MSZ-LN18/25/35/50/60VGB-E1Air Conditioning MSZ-LN18/25/35/50/60VG2W-E2Air Conditioning MSZ-EM22/25/28/36/40/56/63/71/80/90E3(S)HEMS adapter GT-HEM4-EAir Conditioning MSZ-HR25/35/42/50/60/71VFK-ET1Air Conditioning MSZ-LN18/25/35/50/60VG2R-ET1Smart Switch P-04SWRCBATHROOM THERMO VENTILATOR V-241BZ-RCAir Conditioning MSZ-LN25/35/50/60VG2V-A1HEMS adapter VEZ-HM01WA Air Conditioning MSZ-EM22/25/28/36/40/56/63/71/80/9021E9(S)Air Conditioning MSZ-FZ40/56/63/71/80/9021SAir Conditioning MSZ-AP25/35/42/50VGK-EN1Air Conditioning MSZ-LN25/35/50VG2V-SC1Ventilating Fan V-18ZMVC3-HMVentilating Fan VD-18ZFVC5-HMAir Conditioning MSZ-FT25/35/50VGK-E1Air Conditioning MSZ-LN25/35/50/60VG2B-ET3Wi-Fi Interface MAC-884IFAir Conditioning MSZ-AP25/35/42/50/60/71VGK-E3Wi-Fi Interface MAC-557IF-E1Air Conditioning MSZ-FT25/35/50VGK-E2Air Conditioning MSZ-BT20/25/35/50VGK-E3HEMS adapter GT-HEM4Wi-Fi Interface MAC-557IF-ERefrigerator MR-MZ54/60HAir Conditioning MSZ-EF22/25/35/42/50VGKB-ER1Air Conditioning MSZ-FZV40/56/63/71/80/9021SInduction hob CS-PT31HNWSR-HMitsubishi Electric HEMS Energy Measurement Unit HM-EM03-WAir Conditioning MSZ-EF22/25/35/42/50VGKW-ET1Air Conditioning MSZ-LN25/35/50/60VGR-ER1Air Conditioning MSZ-LN25/35/50VG2W-EN2Air Conditioning MSZ-FX20/25VFKAir Conditioning MSZ-LN25/35/50/60VG2V-ER3HEMS adapter P-01HMAAir Conditioning MSZ-AY25/35/42/50VGK-SC1Air Conditioning MSZ-AP25/35/42/50VGK-EN3Air Conditioning MFZ-XT50/60VFKAir Conditioning MSZ-ZT09/12/18VAKHEMS adapter HM-01A-VEHAir Conditioning MSZ-BT20/25/35/50VGK-E1Air Conditioning MSZ-WX18/20/25VFKAir Conditioning MSZ-AP15/20/25/35/42/50/60/71VGK-E2Wi-Fi Interface MAC-587IF2-EAir Conditioning MSZ-AP25/35/42/50/60/71VGK-ET3Air Conditioning MSZ-VXV40/56/63/71/8022SAir Conditioning MSZ-LN25/35/50VG2R-SC1Air Conditioning MSZ-LN25/35/50/60VG2B-ER2Air Conditioning MSZ-EF22/25/35/42/50VGKW-ER1Air Conditioning MSZ-LN25/35/50/60VGB-A1Air Conditioning MSZ-EXA09/12VAKAir Conditioning MSZ-GZY09/12/18VFKAir Conditioning MSZ-LN18/25/35/50VG2W-EN1Air Conditioning MSZ-HR25/35/42/50/60/71VFK-E1Wi-Fi Interface MAC-568IFB2-EAir Conditioning MSZ-LN25/35/50/60VGW-ER1Air Conditioning MSZ-ZXV22/25/28/36/40/56/63/71/80/9020(S)Air Conditioning MSZ-EF22/25/35/42/50VGKS-ET1HEMS adapter P-HM02WAHEMS adapter HM-02A-VEHAir Conditioning MSZ-LN18/25/35/50VG2B-EN1Air Conditioning MSZ-AY25/35/42/50VGK-E1Air Conditioning MSZ-EF22/25/35/42/50VGKS-ET2Air Conditioning MSZ-LN18/25/35/50/60VG2V-E2BATHROOM THERMO VENTILATOR V-243BZL2-HMAir Conditioning MSZ-FT25/35/50VGK-SC1BATHROOM THERMO VENTILATOR V-141BZ-HM-YHAir Conditioning MSZ-AY25/35/42/50VGKP-E6Air Conditioning MSZ-LN18/25/35/50/60VGW-E1Wi-Fi Interface P-WA01Wi-Fi Interface MAC-566IFB-EWi-Fi Interface S-MAC-906IF
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2018-20385
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.64% / 69.74%
||
7 Day CHG~0.00%
Published-23 Dec, 2018 | 21:00
Updated-16 Sep, 2024 | 16:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

CastleNet CBV38Z4EC 125.553mp1.39219mp1.899.007, CBV38Z4ECNIT 125.553mp1.39219mp1.899.005ITT, CBW383G4J 37.556mp5.008, and CBW38G4J 37.553mp1.008 devices allow remote attackers to discover credentials via iso.3.6.1.4.1.4491.2.4.1.1.6.1.1.0 and iso.3.6.1.4.1.4491.2.4.1.1.6.1.2.0 SNMP requests.

Action-Not Available
Vendor-castlenetn/a
Product-cbv38z4eccbw383g4j_firmwarecbw38g4j_firmwarecbv38z4ecnitcbv38z4ecnit_firmwarecbw383g4jcbw38g4jcbv38z4ec_firmwaren/a
CWE ID-CWE-522
Insufficiently Protected Credentials
  • Previous
  • 1
  • 2
  • ...
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • Next
Details not found