Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2019-3411

Summary
Assigner-zte
Assigner Org ID-6786b568-6808-4982-b61f-398b0d9679eb
Published At-11 Jun, 2019 | 19:19
Updated At-04 Aug, 2024 | 19:12
Rejected At-
Credits

All versions up to BD_R218V2.4 of ZTE MF920 product are impacted by information leak vulnerability. Due to some interfaces can obtain the WebUI login password without login, an attacker can exploit the vulnerability to obtain sensitive information about the affected components.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:zte
Assigner Org ID:6786b568-6808-4982-b61f-398b0d9679eb
Published At:11 Jun, 2019 | 19:19
Updated At:04 Aug, 2024 | 19:12
Rejected At:
▼CVE Numbering Authority (CNA)

All versions up to BD_R218V2.4 of ZTE MF920 product are impacted by information leak vulnerability. Due to some interfaces can obtain the WebUI login password without login, an attacker can exploit the vulnerability to obtain sensitive information about the affected components.

Affected Products
Vendor
ZTE CorporationZTE
Product
ZTE MF920
Versions
Affected
  • From unspecified through All versions up to BD_R218V2.4 (custom)
Problem Types
TypeCWE IDDescription
textN/ACommand Injection
Type: text
CWE ID: N/A
Description: Command Injection
Metrics
VersionBase scoreBase severityVector
3.08.1HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Version: 3.0
Base score: 8.1
Base severity: HIGH
Vector:
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1010686
x_refsource_CONFIRM
Hyperlink: http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1010686
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1010686
x_refsource_CONFIRM
x_transferred
Hyperlink: http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1010686
Resource:
x_refsource_CONFIRM
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:psirt@zte.com.cn
Published At:11 Jun, 2019 | 20:29
Updated At:18 Apr, 2022 | 17:16

All versions up to BD_R218V2.4 of ZTE MF920 product are impacted by information leak vulnerability. Due to some interfaces can obtain the WebUI login password without login, an attacker can exploit the vulnerability to obtain sensitive information about the affected components.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Secondary3.08.1HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Primary2.05.0MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:N
Type: Primary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Type: Secondary
Version: 3.0
Base score: 8.1
Base severity: HIGH
Vector:
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 5.0
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N
CPE Matches

ZTE Corporation
zte
>>mf920>>-
cpe:2.3:h:zte:mf920:-:*:*:*:*:*:*:*
ZTE Corporation
zte
>>mf920_firmware>>Versions before bd_r218v2.4(exclusive)
cpe:2.3:o:zte:mf920_firmware:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-306Primarynvd@nist.gov
CWE ID: CWE-306
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1010686psirt@zte.com.cn
Vendor Advisory
Hyperlink: http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1010686
Source: psirt@zte.com.cn
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

289Records found

CVE-2020-6875
Matching Score-10
Assigner-ZTE Corporation
ShareView Details
Matching Score-10
Assigner-ZTE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.26% / 48.83%
||
7 Day CHG~0.00%
Published-05 Oct, 2020 | 14:48
Updated-04 Aug, 2024 | 09:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A ZTE product is impacted by the improper access control vulnerability. Due to lack of an authentication protection mechanism in the program, attackers could use this vulnerability to gain access right through brute-force attacks. This affects: <ZXONE 19700 SNPE><ZXONE8700V1.40R2B13_SNPE>

Action-Not Available
Vendor-n/aZTE Corporation
Product-zxone_19700_snpezxone_19700_snpe_firmware<ZXONE 19700 SNPE>
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2020-6882
Matching Score-8
Assigner-ZTE Corporation
ShareView Details
Matching Score-8
Assigner-ZTE Corporation
CVSS Score-7.5||HIGH
EPSS-0.32% / 54.37%
||
7 Day CHG~0.00%
Published-21 Dec, 2020 | 17:18
Updated-04 Aug, 2024 | 09:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ZTE E8810/E8820/E8822 series routers have an information leak vulnerability, which is caused by hard-coded MQTT service access credentials on the device. The remote attacker could use this credential to connect to the MQTT server, so as to obtain information about other devices by sending specific topics. This affects:<ZXHN E8810, ZXHN E8820, ZXHN E8822><E8810 V1.0.26, E8810 V2.0.1, E8820 V1.1.3L, E8820 V2.0.13, E8822 V2.0.13>

Action-Not Available
Vendor-n/aZTE Corporation
Product-zxhn_e8820_firmwarezxhn_e8822zxhn_e8810_firmwarezxhn_e8822_firmwarezxhn_e8810zxhn_e8820<ZXHN E8810, ZXHN E8820, ZXHN E8822>
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2015-7255
Matching Score-8
Assigner-CERT/CC
ShareView Details
Matching Score-8
Assigner-CERT/CC
CVSS Score-7.5||HIGH
EPSS-0.80% / 73.15%
||
7 Day CHG~0.00%
Published-29 Aug, 2017 | 15:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ZTE OX-330P, ZXHN H108N, W300V1.0.0S_ZRD_TR1_D68, HG110, GAN9.8T101A-B, MF28G, ZXHN H108N use non-unique X.509 certificates and SSH host keys, which might allow remote attackers to obtain credentials or other sensitive information via a man-in-the-middle attack, passive decryption attack, or impersonating a legitimate device.

Action-Not Available
Vendor-n/aZTE Corporation
Product-hg110_firmwaremf28g_firmwaregan9.8t101a-bw300v1.0.0s_zrd_tr1_d68_firmwareox-330p_firmwaregan9.8t101a-b_firmwareox-330phg110zxhn_h108n_firmwarezxhn_h108nmf28gw300v1.0.0s_zrd_tr1_d68n/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2025-46577
Matching Score-8
Assigner-ZTE Corporation
ShareView Details
Matching Score-8
Assigner-ZTE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.05% / 14.77%
||
7 Day CHG~0.00%
Published-27 Apr, 2025 | 01:21
Updated-12 May, 2025 | 19:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ZTE GoldenDB Database product has an SQL injection vulnerability

There is a SQL injection vulnerability in the GoldenDB database product. Attackers can inject commands to extract database information.

Action-Not Available
Vendor-ZTE Corporation
Product-zxcloud_goldendbGoldenDB
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2025-46575
Matching Score-8
Assigner-ZTE Corporation
ShareView Details
Matching Score-8
Assigner-ZTE Corporation
CVSS Score-4.9||MEDIUM
EPSS-0.04% / 12.69%
||
7 Day CHG~0.00%
Published-27 Apr, 2025 | 01:12
Updated-12 May, 2025 | 19:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ZTE GoldenDB Database product has an information disclosure vulnerability

There is an information disclosure vulnerability in the GoldenDB database product. Attackers can exploit error messages to obtain the system's sensitive information.

Action-Not Available
Vendor-ZTE Corporation
Product-zxcloud_goldendbGoldenDB
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CVE-2025-46578
Matching Score-8
Assigner-ZTE Corporation
ShareView Details
Matching Score-8
Assigner-ZTE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.05% / 14.77%
||
7 Day CHG~0.00%
Published-27 Apr, 2025 | 01:30
Updated-12 May, 2025 | 19:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ZTE GoldenDB Database product has SQL injection vulnerabilities in multiple interfaces

There are SQL injection vulnerabilities in multiple interfaces of the GoldenDB database product. Attackers can exploit these interfaces to inject commands and extract sensitive database information.

Action-Not Available
Vendor-ZTE Corporation
Product-zxcloud_goldendbGoldenDB
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2014-4154
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5||MEDIUM
EPSS-10.26% / 92.86%
||
7 Day CHG~0.00%
Published-16 Jul, 2014 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ZTE ZXV10 W300 router with firmware W300V1.0.0a_ZRD_LK stores sensitive information under the web root with insufficient access control, which allows remote attackers to obtain the PPPoE/PPPoA password via a direct request for basic/tc2wanfun.js.

Action-Not Available
Vendor-n/aZTE Corporation
Product-zxv10_w300zxv10_w300_firmwaren/a
CVE-2025-26705
Matching Score-8
Assigner-ZTE Corporation
ShareView Details
Matching Score-8
Assigner-ZTE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.06% / 18.52%
||
7 Day CHG~0.00%
Published-11 Mar, 2025 | 06:49
Updated-19 Mar, 2025 | 14:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper Privilege Management vulnerability in ZTE GoldenDB allows Privilege Escalation.This issue affects GoldenDB: from 6.1.03 through 6.1.03.05.

Action-Not Available
Vendor-ZTE Corporation
Product-goldendbGoldenDB
CWE ID-CWE-269
Improper Privilege Management
CVE-2021-21732
Matching Score-8
Assigner-ZTE Corporation
ShareView Details
Matching Score-8
Assigner-ZTE Corporation
CVSS Score-7.5||HIGH
EPSS-0.32% / 54.65%
||
7 Day CHG~0.00%
Published-19 May, 2021 | 10:48
Updated-03 Aug, 2024 | 18:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A mobile phone of ZTE is impacted by improper access control vulnerability. Due to improper permission settings, third-party applications can read some files in the proc file system without authorization. Attackers could exploit this vulnerability to obtain sensitive information. This affects Axon 11 5G ZTE/CN_P725A12/P725A12:10/QKQ1.200816.002/20201116.175317:user/release-keys.

Action-Not Available
Vendor-n/aZTE Corporation
Product-axon_11_5g_firmwareaxon_11_5g<Axon 11 5G>
CVE-2021-21730
Matching Score-8
Assigner-ZTE Corporation
ShareView Details
Matching Score-8
Assigner-ZTE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.33% / 55.29%
||
7 Day CHG~0.00%
Published-13 Apr, 2021 | 15:08
Updated-03 Aug, 2024 | 18:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A ZTE product is impacted by improper access control vulnerability. The attacker could exploit this vulnerability to access CLI by brute force attacks.This affects: ZXHN H168N V3.5.0_TY.T6

Action-Not Available
Vendor-n/aZTE Corporation
Product-zxhn_h168n_firmwarezxhn_h168nZXHN H168N
CVE-2014-4019
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-59.44% / 98.16%
||
7 Day CHG~0.00%
Published-20 Feb, 2020 | 17:27
Updated-06 Aug, 2024 | 11:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ZTE ZXV10 W300 router with firmware W300V1.0.0a_ZRD_LK stores sensitive information under the web root with insufficient access control, which allows remote attackers to read backup files via a direct request for rom-0.

Action-Not Available
Vendor-n/aZTE Corporation
Product-zxv10_w300_firmwarezxv10_w300n/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2020-6862
Matching Score-8
Assigner-ZTE Corporation
ShareView Details
Matching Score-8
Assigner-ZTE Corporation
CVSS Score-5.3||MEDIUM
EPSS-13.27% / 93.89%
||
7 Day CHG~0.00%
Published-17 Jan, 2020 | 17:47
Updated-04 Aug, 2024 | 09:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

V6.0.10P2T2 and V6.0.10P2T5 of F6x2W product are impacted by Information leak vulnerability. Unauthorized users could log in directly to obtain page information without entering a verification code.

Action-Not Available
Vendor-ZTE Corporation
Product-f6x2wf6x2w_firmwareF6x2W
CWE ID-CWE-669
Incorrect Resource Transfer Between Spheres
CVE-2022-23138
Matching Score-8
Assigner-ZTE Corporation
ShareView Details
Matching Score-8
Assigner-ZTE Corporation
CVSS Score-7.5||HIGH
EPSS-0.40% / 59.84%
||
7 Day CHG~0.00%
Published-09 Jun, 2022 | 14:34
Updated-03 Aug, 2024 | 03:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ZTE's MF297D product has cryptographic issues vulnerability. Due to the use of weak random values, the security of the device is reduced, and it may face the risk of attack.

Action-Not Available
Vendor-n/aZTE Corporation
Product-mf297dmf297d_firmwareMF297D
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2022-23141
Matching Score-8
Assigner-ZTE Corporation
ShareView Details
Matching Score-8
Assigner-ZTE Corporation
CVSS Score-7.5||HIGH
EPSS-0.30% / 52.85%
||
7 Day CHG~0.00%
Published-15 Jul, 2022 | 14:44
Updated-03 Aug, 2024 | 03:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ZXMP M721 has an information leak vulnerability. Since the serial port authentication on the ZBOOT interface is not effective although it is enabled, an attacker could use this vulnerability to log in to the device to obtain sensitive information.

Action-Not Available
Vendor-n/aZTE Corporation
Product-zxmp_m721zxmp_m721_firmwareZXMP M721
CWE ID-CWE-532
Insertion of Sensitive Information into Log File
CVE-2019-3429
Matching Score-8
Assigner-ZTE Corporation
ShareView Details
Matching Score-8
Assigner-ZTE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.24% / 46.68%
||
7 Day CHG~0.00%
Published-23 Dec, 2019 | 18:09
Updated-04 Aug, 2024 | 19:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

All versions up to V4.01.01.02 of ZTE ZXCLOUD GoldenData VAP product have a file reading vulnerability. Attackers could obtain log file information without authorization, causing the disclosure of sensitive information.

Action-Not Available
Vendor-ZTE Corporation
Product-zxcloud_goldendata_vapZXCLOUD GoldenData VAP
CWE ID-CWE-532
Insertion of Sensitive Information into Log File
CVE-2019-3431
Matching Score-8
Assigner-ZTE Corporation
ShareView Details
Matching Score-8
Assigner-ZTE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.07% / 22.12%
||
7 Day CHG~0.00%
Published-23 Dec, 2019 | 18:10
Updated-04 Aug, 2024 | 19:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

All versions up to V4.01.01.02 of ZTE ZXCLOUD GoldenData VAP product have encryption problems vulnerability. Attackers could sniff unencrypted account and password through the network for front-end system access.

Action-Not Available
Vendor-ZTE Corporation
Product-zxcloud_goldendata_vapZXCLOUD GoldenData VAP
CWE ID-CWE-522
Insufficiently Protected Credentials
CWE ID-CWE-311
Missing Encryption of Sensitive Data
CVE-2017-10936
Matching Score-8
Assigner-ZTE Corporation
ShareView Details
Matching Score-8
Assigner-ZTE Corporation
CVSS Score-7.5||HIGH
EPSS-0.31% / 53.26%
||
7 Day CHG~0.00%
Published-25 Jul, 2018 | 15:00
Updated-17 Sep, 2024 | 03:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SQL injection vulnerability in all versions prior to V4.01.01 of the ZTE ZXCDN-SNS product allows remote attackers to execute arbitrary SQL commands via the aoData parameter, resulting in the disclosure of database information.

Action-Not Available
Vendor-ZTE Corporation
Product-zxcdn-sns_firmwarezxcdn-snsZXCDN-SNS
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2017-10937
Matching Score-8
Assigner-ZTE Corporation
ShareView Details
Matching Score-8
Assigner-ZTE Corporation
CVSS Score-7.5||HIGH
EPSS-0.31% / 53.26%
||
7 Day CHG~0.00%
Published-25 Jul, 2018 | 15:00
Updated-17 Sep, 2024 | 00:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SQL injection vulnerability in all versions prior to V2.01.05.09 of the ZTE ZXIPTV-UCM product allows remote attackers to execute arbitrary SQL commands via the opertype parameter, resulting in the disclosure of database information.

Action-Not Available
Vendor-ZTE Corporation
Product-zxiptv-ucm_firmwarezxiptv-ucmZXIPTV-UCM
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2017-10931
Matching Score-8
Assigner-ZTE Corporation
ShareView Details
Matching Score-8
Assigner-ZTE Corporation
CVSS Score-7.5||HIGH
EPSS-0.40% / 59.76%
||
7 Day CHG~0.00%
Published-19 Sep, 2017 | 14:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The ZXR10 1800-2S before v3.00.40 incorrectly restricts the download of the file directory range for WEB users, resulting in the ability to download any files and cause information leaks such as system configuration.

Action-Not Available
Vendor-ZTE Corporation
Product-zxr10_3800-8_firmwarezxr10_160zxr10_160_firmwarezxr10_2800-4zxr10_2800-4_firmwarezxr10_1800-2szxr10_3800-8zxr10_1800-2s_firmwareZX10 1800-2S
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2017-10933
Matching Score-8
Assigner-ZTE Corporation
ShareView Details
Matching Score-8
Assigner-ZTE Corporation
CVSS Score-7.5||HIGH
EPSS-0.41% / 60.26%
||
7 Day CHG~0.00%
Published-19 Oct, 2017 | 21:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

All versions prior to V2.06.00.00 of ZTE ZXDT22 SF01, an monitoring system of ZTE energy product, are impacted by directory traversal vulnerability that allows remote attackers to read arbitrary files on the system via a full path name after host address.

Action-Not Available
Vendor-ZTE Corporation
Product-zxdt22_sf01_firmwarezxdt22_sf01ZXDT22 SF01
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2015-7248
Matching Score-8
Assigner-CERT/CC
ShareView Details
Matching Score-8
Assigner-CERT/CC
CVSS Score-7.5||HIGH
EPSS-17.23% / 94.77%
||
7 Day CHG~0.00%
Published-30 Dec, 2015 | 02:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ZTE ZXHN H108N R1A devices before ZTE.bhs.ZXHNH108NR1A.k_PE allow remote attackers to discover usernames and password hashes by reading the cgi-bin/webproc HTML source code, a different vulnerability than CVE-2015-8703.

Action-Not Available
Vendor-n/aZTE Corporation
Product-zxhn_h108n_r1a_firmwarezxhn_h108n_r1an/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2017-10930
Matching Score-8
Assigner-ZTE Corporation
ShareView Details
Matching Score-8
Assigner-ZTE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.33% / 54.95%
||
7 Day CHG~0.00%
Published-19 Sep, 2017 | 14:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The ZXR10 1800-2S before v3.00.40 incorrectly restricts access to a resource from an unauthorized actor, resulting in ordinary users being able to download configuration files to steal information like administrator accounts and passwords.

Action-Not Available
Vendor-ZTE Corporation
Product-zxr10_3800-8_firmwarezxr10_160zxr10_160_firmwarezxr10_2800-4zxr10_2800-4_firmwarezxr10_1800-2szxr10_3800-8zxr10_1800-2s_firmwareZX10 1800-2S
CWE ID-CWE-552
Files or Directories Accessible to External Parties
CVE-2018-7357
Matching Score-6
Assigner-ZTE Corporation
ShareView Details
Matching Score-6
Assigner-ZTE Corporation
CVSS Score-6.5||MEDIUM
EPSS-39.17% / 97.18%
||
7 Day CHG~0.00%
Published-14 Nov, 2018 | 15:00
Updated-05 Aug, 2024 | 06:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ZTE ZXHN H168N product with versions V2.2.0_PK1.2T5, V2.2.0_PK1.2T2, V2.2.0_PK11T7 and V2.2.0_PK11T have an improper access control vulnerability, which may allow an unauthorized user to gain unauthorized access.

Action-Not Available
Vendor-ZTE Corporation
Product-zxhn_h168n_firmwarezxhn_h168nZXHN H168N
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2017-3216
Matching Score-6
Assigner-CERT/CC
ShareView Details
Matching Score-6
Assigner-CERT/CC
CVSS Score-9.8||CRITICAL
EPSS-3.17% / 86.41%
||
7 Day CHG~0.00%
Published-20 Jun, 2017 | 00:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

WiMAX routers based on the MediaTek SDK (libmtk) that use a custom httpd plugin are vulnerable to an authentication bypass allowing a remote, unauthenticated attacker to gain administrator access to the device by performing an administrator password change on the device via a crafted POST request.

Action-Not Available
Vendor-madagreenpacketGreen PacketMADAHuawei Technologies Co., Ltd.ZTE CorporationZyxel Networks Corporation
Product-max218m_firmwarehes-339m_firmwaremax318m_firmwareox-330phes-319m_firmwaresoho_wireless_router_firmwarehes-309mmax218m1w_firmwaresoho_wireless_routerbm2022hes-319m2w_firmwarebm2022_firmwaremax338mox350ox-330p_firmwarehes-339mhes-319m2wmax338m_firmwaremax218m1wmax218mw_firmwaremax218mmax308m_fimwarehes-319mhes-309m_firmwareox350_firmwaremax318mmax308mmax218mwMAX218MOX-330PSoho Wireless RouterOX350MAX218MWHES-309MMAX308MMAX338MMAX318MMAX218M1WHES-319MHES-319M2WBM2022HES-339M
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2011-4322
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.25% / 48.54%
||
7 Day CHG~0.00%
Published-21 Jan, 2020 | 14:57
Updated-07 Aug, 2024 | 00:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

websitebaker prior to and including 2.8.1 has an authentication error in backup module.

Action-Not Available
Vendor-websitebakerwebsitebaker
Product-websitebakerwebsitebaker
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2019-0312
Matching Score-4
Assigner-SAP SE
ShareView Details
Matching Score-4
Assigner-SAP SE
CVSS Score-5.3||MEDIUM
EPSS-0.18% / 39.46%
||
7 Day CHG~0.00%
Published-12 Jun, 2019 | 16:11
Updated-04 Aug, 2024 | 17:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Several web pages provided SAP NetWeaver Process Integration (versions: SAP_XIESR: 7.10 to 7.11, 7.20, 7.30, 7.31, 7.40, 7.50 and SAP_XITOOL: 7.10 to 7.11, 7.30, 7.31, 7.40, 7.50) are not password protected. An attacker could access landscape information like host names, ports or other technical data in the absence of restrictive firewall and port settings.

Action-Not Available
Vendor-SAP SE
Product-netweaver_process_integrationSAP NetWeaver Process Integration(SAP_XIESR)SAP NetWeaver Process Integration(SAP_XITOOL)
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-26263
Matching Score-4
Assigner-TWCERT/CC
ShareView Details
Matching Score-4
Assigner-TWCERT/CC
CVSS Score-5.3||MEDIUM
EPSS-0.07% / 20.70%
||
7 Day CHG~0.00%
Published-15 Feb, 2024 | 02:56
Updated-23 Jan, 2025 | 17:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
EBM Technologies RISWEB - Improper Access Control

EBM Technologies RISWEB's specific URL path is not properly controlled by permission, allowing attackers to browse specific pages and query sensitive data without login.

Action-Not Available
Vendor-ebmtechEBM Technologiesebm_technologies
Product-riswebRISWEBrisweb
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2018-6223
Matching Score-4
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-4
Assigner-Trend Micro, Inc.
CVSS Score-9.8||CRITICAL
EPSS-5.40% / 89.73%
||
7 Day CHG~0.00%
Published-15 Mar, 2018 | 19:00
Updated-05 Aug, 2024 | 05:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A missing authentication for appliance registration vulnerability in Trend Micro Email Encryption Gateway 5.5 could allow an attacker to manipulate the registration process of the product to reset configuration parameters.

Action-Not Available
Vendor-Trend Micro Incorporated
Product-email_encryption_gatewayTrend Micro Email Encryption Gateway
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-3825
Matching Score-4
Assigner-TR-CERT (Computer Emergency Response Team of the Republic of Türkiye)
ShareView Details
Matching Score-4
Assigner-TR-CERT (Computer Emergency Response Team of the Republic of Türkiye)
CVSS Score-9.6||CRITICAL
EPSS-0.40% / 60.17%
||
7 Day CHG~0.00%
Published-01 Oct, 2021 | 14:36
Updated-16 Sep, 2024 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing Authorization Checks in LiderAhenk

On 2.1.15 version and below of Lider module in LiderAhenk software is leaking it's configurations via an unsecured API. An attacker with an access to the configurations API could get valid LDAP credentials.

Action-Not Available
Vendor-pardusTUBITAK
Product-liderahenkLider
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-5871
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-0.06% / 19.66%
||
7 Day CHG~0.00%
Published-09 Jun, 2025 | 09:31
Updated-09 Jun, 2025 | 17:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Papendorf SOL Connect Center Web Interface missing authentication

A vulnerability was found in Papendorf SOL Connect Center 3.3.0.0 and classified as problematic. Affected by this issue is some unknown functionality of the component Web Interface. The manipulation leads to missing authentication. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-Papendorf
Product-SOL Connect Center
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2022-48289
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-7.5||HIGH
EPSS-0.07% / 21.71%
||
7 Day CHG~0.00%
Published-09 Feb, 2023 | 00:00
Updated-24 Mar, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The bundle management module lacks authentication and control mechanisms in some APIs. Successful exploitation of this vulnerability may affect data confidentiality.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-emuiharmonyosHarmonyOSEMUI
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2022-48300
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-7.5||HIGH
EPSS-0.07% / 21.71%
||
7 Day CHG~0.00%
Published-09 Feb, 2023 | 00:00
Updated-24 Mar, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The WMS module lacks the authentication mechanism in some APIs. Successful exploitation of this vulnerability may affect data confidentiality.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-emuiharmonyosHarmonyOSEMUI
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-23815
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-8.7||HIGH
EPSS-0.05% / 15.00%
||
7 Day CHG~0.00%
Published-13 May, 2025 | 09:38
Updated-13 May, 2025 | 19:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in Desigo CC (All versions if access from Installed Clients to Desigo CC server is allowed from networks outside of a highly protected zone), Desigo CC (All versions if access from Installed Clients to Desigo CC server is only allowed within highly protected zones). The affected server application fails to authenticate specific client requests. Modification of the client binary could allow an unauthenticated remote attacker to execute arbitrary SQL queries on the server database via the event port (default: 4998/tcp)

Action-Not Available
Vendor-Siemens AG
Product-Desigo CC
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-5876
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-0.06% / 19.66%
||
7 Day CHG~0.00%
Published-09 Jun, 2025 | 12:00
Updated-09 Jun, 2025 | 13:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Lucky LM-520-SC/LM-520-FSC/LM-520-FSC-SAM missing authentication

A vulnerability classified as problematic was found in Lucky LM-520-SC, LM-520-FSC and LM-520-FSC-SAM up to 20250321. Affected by this vulnerability is an unknown functionality. The manipulation leads to missing authentication. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-Lucky
Product-LM-520-FSC-SAMLM-520-SCLM-520-FSC
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-21619
Matching Score-4
Assigner-Juniper Networks, Inc.
ShareView Details
Matching Score-4
Assigner-Juniper Networks, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.25% / 47.96%
||
7 Day CHG~0.00%
Published-25 Jan, 2024 | 22:48
Updated-17 Jun, 2025 | 21:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Junos OS: SRX Series and EX Series: J-Web - unauthenticated access to temporary files containing sensitive information

A Missing Authentication for Critical Function vulnerability combined with a Generation of Error Message Containing Sensitive Information vulnerability in J-Web of Juniper Networks Junos OS on SRX Series and EX Series allows an unauthenticated, network-based attacker to access sensitive system information. When a user logs in, a temporary file which contains the configuration of the device (as visible to that user) is created in the /cache folder. An unauthenticated attacker can then attempt to access such a file by sending a specific request to the device trying to guess the name of such a file. Successful exploitation will reveal configuration information. This issue affects Juniper Networks Junos OS on SRX Series and EX Series: * All versions earlier than 20.4R3-S9; * 21.2 versions earlier than 21.2R3-S7; * 21.3 versions earlier than 21.3R3-S5; * 21.4 versions earlier than 21.4R3-S6; * 22.1 versions earlier than 22.1R3-S5; * 22.2 versions earlier than 22.2R3-S3; * 22.3 versions earlier than 22.3R3-S2; * 22.4 versions earlier than 22.4R3; * 23.2 versions earlier than 23.2R1-S2, 23.2R2.

Action-Not Available
Vendor-Juniper Networks, Inc.
Product-ex4400ex2200-vcex4300-48tafiex4300-24tex_redundant_power_systemex6200ex4300_multigigabitex3300ex3400ex4100-fex2300-48mpsrx550ex2300mex2200ex6210ex4300-48t-sex4300mjunosex4550-vcex9251ex4550\/vcsrx240mex4300-24t-sex3300-vcex4300-48tex4300-32fex8200-vcex4300-vcsrx380srx4200ex2300-24tex9200ex4300-48mp-sex2300-24mpex4300-24pex4300srx5000ex2200-cex9250ex2300ex_rpsex9253srx1400srx4300ex4600ex4300-48tdc-afiex2300-24pex4300-mpsrx5600ex2300-csrx650ex4500-vcex4300-32f-ssrx345ex4200-vcsrx5800ex4300-48t-dcsrx110srx4000ex2300-48psrx550_hmsrx240h2srx220ex4100_multigigabitex4400-24xex9204srx5400ex4650srx100srx3400srx300srx2300ex8208ex8200srx210ex4500ex4600-vcex3200ex4550srx1500ex8216ex4300-48tdcex4200srx340srx4100ex4300-48t-dc-afisrx3600ex4300-48mpsrx240ex2300-48tex9208ex4300-48pex4300-32f-dcex4300-48t-afiex4400_multigigabitsrx1600ex4100ex9214srx320ex4300-48p-sex2300_multigigabitex4300-24p-ssrx4600srx550msrx4700Junos OS
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-21183
Matching Score-4
Assigner-Oracle
ShareView Details
Matching Score-4
Assigner-Oracle
CVSS Score-7.5||HIGH
EPSS-0.40% / 59.76%
||
7 Day CHG+0.17%
Published-16 Jul, 2024 | 22:40
Updated-26 Mar, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).

Action-Not Available
Vendor-Oracle Corporation
Product-weblogic_serverWebLogic Serverweblogic_server
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-5872
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-0.06% / 19.66%
||
7 Day CHG~0.00%
Published-09 Jun, 2025 | 10:00
Updated-09 Jun, 2025 | 17:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
eGauge EG3000 Energy Monitor Setting missing authentication

A vulnerability was found in eGauge EG3000 Energy Monitor 3.6.3. It has been classified as problematic. This affects an unknown part of the component Setting Handler. The manipulation leads to missing authentication. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-eGauge
Product-EG3000 Energy Monitor
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-21006
Matching Score-4
Assigner-Oracle
ShareView Details
Matching Score-4
Assigner-Oracle
CVSS Score-7.5||HIGH
EPSS-83.02% / 99.21%
||
7 Day CHG~0.00%
Published-16 Apr, 2024 | 21:25
Updated-18 Mar, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).

Action-Not Available
Vendor-Oracle Corporation
Product-weblogic_serverWebLogic Server
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-2076
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.11% / 29.33%
||
7 Day CHG~0.00%
Published-01 Mar, 2024 | 18:31
Updated-16 Apr, 2025 | 20:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CodeAstro House Rental Management System tenant.php missing authentication

A vulnerability was found in CodeAstro House Rental Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file booking.php/owner.php/tenant.php. The manipulation leads to missing authentication. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-255392.

Action-Not Available
Vendor-CodeAstro
Product-house_rental_management_systemHouse Rental Management Systemhouse_rental_management_system
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-21007
Matching Score-4
Assigner-Oracle
ShareView Details
Matching Score-4
Assigner-Oracle
CVSS Score-7.5||HIGH
EPSS-0.43% / 61.41%
||
7 Day CHG~0.00%
Published-16 Apr, 2024 | 21:26
Updated-21 May, 2025 | 19:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).

Action-Not Available
Vendor-Oracle Corporation
Product-weblogic_serverWebLogic Server
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2018-20220
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-44.85% / 97.49%
||
7 Day CHG~0.00%
Published-17 Mar, 2019 | 20:51
Updated-05 Aug, 2024 | 11:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on Teracue ENC-400 devices with firmware 2.56 and below. While the web interface requires authentication before it can be interacted with, a large portion of the HTTP endpoints are missing authentication. An attacker is able to view these pages before being authenticated, and some of these pages may disclose sensitive information.

Action-Not Available
Vendor-teracuen/a
Product-enc-400_hdsdi_firmwareenc-400_hdsdienc-400_hdmi2_firmwareenc-400_hdmienc-400_hdmi_firmwareenc-400_hdmi2n/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2022-45794
Matching Score-4
Assigner-Dragos, Inc.
ShareView Details
Matching Score-4
Assigner-Dragos, Inc.
CVSS Score-8.6||HIGH
EPSS-0.16% / 37.93%
||
7 Day CHG~0.00%
Published-10 Jan, 2024 | 22:56
Updated-22 May, 2025 | 15:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Omron CJ-series and CS-series unauthenticated filesystem access.

An attacker with network access to the affected PLC (CJ-series and CS-series PLCs, all versions) may use a network protocol to read and write files on the PLC internal memory and memory card.

Action-Not Available
Vendor-omronOmron
Product-sysmac_cj2h-cpu64-eipsysmac_cj2h-cpu67-eip_firmwaresysmac_cj2h-cpu64-eip_firmwaresysmac_cj2m-cpu12sysmac_cs1d-cpu67psysmac_cs1d-cpu67sa_firmwaresysmac_cs1g-cpu42h_firmwaresysmac_cj2m-cpu32sysmac_cj2h-cpu67-eipsysmac_cs1d-cpu65h_firmwaresysmac_cj2m-cpu11_firmwaresysmac_cj2m-cpu14_firmwaresysmac_cj2h-cpu64_firmwaresysmac_cs1h-cpu66hsysmac_cj2h-cpu67sysmac_cj2m-cpu31sysmac_cs1h-cpu66h_firmwaresysmac_cj2h-cpu65-eip_firmwaresysmac_cs1h-cpu64hsysmac_cj2m-cpu34sysmac_cj2h-cpu65-eipsysmac_cj1g-cpu45p_firmwaresysmac_cs1h-cpu64h_firmwaresysmac_cj2h-cpu65_firmwaresysmac_cs1g-cpu44hsysmac_cj2m-cpu33_firmwaresysmac_cj2h-cpu65sysmac_cs1g-cpu43hsysmac_cs1d-cpu44sa_firmwaresysmac_cs1h-cpu63h_firmwaresysmac_cj1g-cpu44psysmac_cj2m-cpu13sysmac_cs1g-cpu45hsysmac_cj1g-cpu45psysmac_cs1h-cpu63hsysmac_cj2m-cpu15sysmac_cs1g-cpu43h_firmwaresysmac_cj2m-cpu32_firmwaresysmac_cj2m-cpu34_firmwaresysmac_cj2m-cpu31_firmwaresysmac_cj2m-cpu13_firmwaresysmac_cj2m-cpu33sysmac_cj1g-cpu43p_firmwaresysmac_cj2h-cpu66-eip_firmwaresysmac_cs1d-cpu67p_firmwaresysmac_cj2m-cpu35sysmac_cs1d-cpu65p_firmwaresysmac_cj2h-cpu68-eipsysmac_cj2m-cpu12_firmwaresysmac_cs1d-cpu67hsysmac_cj2m-cpu35_firmwaresysmac_cs1h-cpu65h_firmwaresysmac_cj2m-cpu15_firmwaresysmac_cj2h-cpu64sysmac_cs1d-cpu65psysmac_cs1h-cpu67hsysmac_cs1d-cpu68hasysmac_cs1d-cpu67sasysmac_cj2m-cpu11sysmac_cs1h-cpu65hsysmac_cj1g-cpu44p_firmwaresysmac_cs1g-cpu45h_firmwaresysmac_cj2h-cpu68sysmac_cs1d-cpu67h_firmwaresysmac_cj2h-cpu66_firmwaresysmac_cs1d-cpu65hsysmac_cj2m-cpu14sysmac_cs1g-cpu42hsysmac_cj1g-cpu42p_firmwaresysmac_cs1d-cpu68ha_firmwaresysmac_cj2h-cpu68_firmwaresysmac_cj2h-cpu66-eipsysmac_cj2h-cpu66sysmac_cs1d-cpu44sasysmac_cs1h-cpu67h_firmwaresysmac_cj1g-cpu42psysmac_cj2h-cpu67_firmwaresysmac_cs1d-cpu67ha_firmwaresysmac_cj1g-cpu43psysmac_cj2h-cpu68-eip_firmwaresysmac_cs1g-cpu44h_firmwaresysmac_cs1d-cpu67haCJ-series and CS-series CPU modules
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2018-21041
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.12% / 31.38%
||
7 Day CHG~0.00%
Published-08 Apr, 2020 | 16:44
Updated-05 Aug, 2024 | 12:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on Samsung mobile devices with O(8.x) software. Access to Gallery in the Secure Folder can occur without authentication. The Samsung ID is SVE-2018-13057 (December 2018).

Action-Not Available
Vendor-n/aGoogle LLC
Product-androidn/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-13173
Matching Score-4
Assigner-Vivo Mobile Communication Co., Ltd.
ShareView Details
Matching Score-4
Assigner-Vivo Mobile Communication Co., Ltd.
CVSS Score-6.3||MEDIUM
EPSS-0.09% / 26.16%
||
7 Day CHG~0.00%
Published-08 Jan, 2025 | 07:44
Updated-08 Jan, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Health information leakage vulnerability

The health module has insufficient restrictions on loading URLs, which may lead to some information leakage.

Action-Not Available
Vendor-vivo
Product-Health
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-13186
Matching Score-4
Assigner-Vivo Mobile Communication Co., Ltd.
ShareView Details
Matching Score-4
Assigner-Vivo Mobile Communication Co., Ltd.
CVSS Score-6.3||MEDIUM
EPSS-0.09% / 26.16%
||
7 Day CHG~0.00%
Published-08 Jan, 2025 | 08:28
Updated-08 Jan, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MinigameCenter information leakage vulnerability

The MinigameCenter module has insufficient restrictions on loading URLs, which may lead to some information leakage.

Action-Not Available
Vendor-vivo
Product-MinigameCenter
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-13185
Matching Score-4
Assigner-Vivo Mobile Communication Co., Ltd.
ShareView Details
Matching Score-4
Assigner-Vivo Mobile Communication Co., Ltd.
CVSS Score-6.3||MEDIUM
EPSS-0.09% / 26.16%
||
7 Day CHG~0.00%
Published-08 Jan, 2025 | 08:08
Updated-08 Jan, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MinigameCenter module information leakage vulnerability

The MinigameCenter module has insufficient restrictions on loading URLs, which may lead to some information leakage.

Action-Not Available
Vendor-vivo
Product-MinigameCenter
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-35936
Matching Score-4
Assigner-Apache Software Foundation
ShareView Details
Matching Score-4
Assigner-Apache Software Foundation
CVSS Score-5.3||MEDIUM
EPSS-0.17% / 38.24%
||
7 Day CHG~0.00%
Published-16 Aug, 2021 | 07:25
Updated-04 Aug, 2024 | 00:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
No Authentication on Logging Server

If remote logging is not used, the worker (in the case of CeleryExecutor) or the scheduler (in the case of LocalExecutor) runs a Flask logging server and is listening on a specific port and also binds on 0.0.0.0 by default. This logging server had no authentication and allows reading log files of DAG jobs. This issue affects Apache Airflow < 2.1.2.

Action-Not Available
Vendor-The Apache Software Foundation
Product-airflowApache Airflow
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-48814
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-7.5||HIGH
EPSS-0.11% / 29.57%
||
7 Day CHG~0.00%
Published-08 Jul, 2025 | 16:57
Updated-23 Aug, 2025 | 00:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Remote Desktop Licensing Service Security Feature Bypass Vulnerability

Missing authentication for critical function in Windows Remote Desktop Licensing Service allows an unauthorized attacker to bypass a security feature over a network.

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2012windows_10_22h2windows_server_2022_23h2windows_10_21h2windows_11_24h2windows_server_2019windows_server_2025windows_server_2022windows_10_1607windows_11_23h2windows_10_1809windows_server_2016windows_server_2008windows_11_22h2Windows Server 2019Windows Server 2016 (Server Core installation)Windows 11 version 22H2Windows Server 2012Windows Server 2016Windows Server 2019 (Server Core installation)Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2025Windows Server 2012 (Server Core installation)Windows Server 2012 R2Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows 10 Version 1809Windows 10 Version 1607Windows Server 2025 (Server Core installation)Windows 11 Version 24H2Windows 10 Version 21H2Windows Server 2022Windows 11 version 22H3Windows 11 Version 23H2Windows Server 2012 R2 (Server Core installation)Windows 10 Version 22H2Windows Server 2008 R2 Service Pack 1
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-6595
Matching Score-4
Assigner-Progress Software Corporation
ShareView Details
Matching Score-4
Assigner-Progress Software Corporation
CVSS Score-7.5||HIGH
EPSS-0.33% / 55.33%
||
7 Day CHG~0.00%
Published-14 Dec, 2023 | 16:06
Updated-16 Oct, 2024 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WhatsUp Gold Unauthenticated Access to an API Endpoint

In WhatsUp Gold versions released before 2023.1, an API endpoint was found to be missing an authentication mechanism. It is possible for an unauthenticated attacker to enumerate ancillary credential information stored within WhatsUp Gold.

Action-Not Available
Vendor-Progress Software Corporation
Product-whatsup_goldWhatsUp Gold
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-5253
Matching Score-4
Assigner-Nozomi Networks Inc.
ShareView Details
Matching Score-4
Assigner-Nozomi Networks Inc.
CVSS Score-6.3||MEDIUM
EPSS-0.24% / 47.37%
||
7 Day CHG~0.00%
Published-15 Jan, 2024 | 10:53
Updated-17 Jun, 2025 | 21:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Check Point IoT integration: WebSocket returns assets data without authentication in Guardian/CMC before 23.3.0

A missing authentication check in the WebSocket channel used for the Check Point IoT integration in Nozomi Networks Guardian and CMC, may allow an unauthenticated attacker to obtain assets data without authentication. Malicious unauthenticated users with knowledge on the underlying system may be able to extract limited asset information.

Action-Not Available
Vendor-nozominetworksNozomi Networks
Product-cmcguardianGuardianCMC
CWE ID-CWE-306
Missing Authentication for Critical Function
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • Next
Details not found