Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2019-3801

Summary
Assigner-dell
Assigner Org ID-c550e75a-17ff-4988-97f0-544cde3820fe
Published At-25 Apr, 2019 | 20:17
Updated At-17 Sep, 2024 | 02:56
Rejected At-
Credits

Java Projects using HTTP to fetch dependencies

Cloud Foundry cf-deployment, versions prior to 7.9.0, contain java components that are using an insecure protocol to fetch dependencies when building. A remote unauthenticated malicious attacker could hijack the DNS entry for the dependency, and inject malicious code into the component.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:dell
Assigner Org ID:c550e75a-17ff-4988-97f0-544cde3820fe
Published At:25 Apr, 2019 | 20:17
Updated At:17 Sep, 2024 | 02:56
Rejected At:
▼CVE Numbering Authority (CNA)
Java Projects using HTTP to fetch dependencies

Cloud Foundry cf-deployment, versions prior to 7.9.0, contain java components that are using an insecure protocol to fetch dependencies when building. A remote unauthenticated malicious attacker could hijack the DNS entry for the dependency, and inject malicious code into the component.

Affected Products
Vendor
Cloud FoundryCloud Foundry
Product
CredHub
Versions
Affected
  • From 2.1 before 2.1.3 (custom)
  • From 1.9 before 1.9.10 (custom)
Vendor
Cloud FoundryCloud Foundry
Product
UAA Release (OSS)
Versions
Affected
  • From All before v64.0 (custom)
Vendor
Cloud FoundryCloud Foundry
Product
cf-deployment
Versions
Affected
  • From All before v7.9.0 (custom)
Vendor
VMware (Broadcom Inc.)Pivotal
Product
UAA Release (LTS)
Versions
Affected
  • From v60 before v60.2 (custom)
  • From v64 before v64.1 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-494CWE-494: Download of Code Without Integrity Check
Type: CWE
CWE ID: CWE-494
Description: CWE-494: Download of Code Without Integrity Check
Metrics
VersionBase scoreBase severityVector
3.08.7HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
Version: 3.0
Base score: 8.7
Base severity: HIGH
Vector:
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.cloudfoundry.org/blog/cve-2019-3801
x_refsource_CONFIRM
http://www.securityfocus.com/bid/108104
vdb-entry
x_refsource_BID
Hyperlink: https://www.cloudfoundry.org/blog/cve-2019-3801
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securityfocus.com/bid/108104
Resource:
vdb-entry
x_refsource_BID
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.cloudfoundry.org/blog/cve-2019-3801
x_refsource_CONFIRM
x_transferred
http://www.securityfocus.com/bid/108104
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: https://www.cloudfoundry.org/blog/cve-2019-3801
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securityfocus.com/bid/108104
Resource:
vdb-entry
x_refsource_BID
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security_alert@emc.com
Published At:25 Apr, 2019 | 21:29
Updated At:29 Oct, 2021 | 19:45

Cloud Foundry cf-deployment, versions prior to 7.9.0, contain java components that are using an insecure protocol to fetch dependencies when building. A remote unauthenticated malicious attacker could hijack the DNS entry for the dependency, and inject malicious code into the component.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Secondary3.08.7HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
Primary2.05.0MEDIUM
AV:N/AC:L/Au:N/C:N/I:P/A:N
Type: Primary
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.0
Base score: 8.7
Base severity: HIGH
Vector:
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
Type: Primary
Version: 2.0
Base score: 5.0
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:N/C:N/I:P/A:N
CPE Matches

Cloud Foundry
cloudfoundry
>>cf-deployment>>Versions before 7.9.0(exclusive)
cpe:2.3:a:cloudfoundry:cf-deployment:*:*:*:*:*:*:*:*
Cloud Foundry
cloudfoundry
>>credhub>>Versions from 1.9(inclusive) to 1.9.10(exclusive)
cpe:2.3:a:cloudfoundry:credhub:*:*:*:*:*:*:*:*
Cloud Foundry
cloudfoundry
>>credhub>>Versions from 2.1(inclusive) to 2.1.3(exclusive)
cpe:2.3:a:cloudfoundry:credhub:*:*:*:*:*:*:*:*
Cloud Foundry
cloudfoundry
>>uaa_release>>Versions before 64.0(exclusive)
cpe:2.3:a:cloudfoundry:uaa_release:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-319Primarynvd@nist.gov
CWE-494Secondarysecurity_alert@emc.com
CWE ID: CWE-319
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-494
Type: Secondary
Source: security_alert@emc.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.securityfocus.com/bid/108104security_alert@emc.com
Third Party Advisory
VDB Entry
https://www.cloudfoundry.org/blog/cve-2019-3801security_alert@emc.com
Vendor Advisory
Hyperlink: http://www.securityfocus.com/bid/108104
Source: security_alert@emc.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://www.cloudfoundry.org/blog/cve-2019-3801
Source: security_alert@emc.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

80Records found

CVE-2019-3793
Matching Score-10
Assigner-Dell
ShareView Details
Matching Score-10
Assigner-Dell
CVSS Score-8.1||HIGH
EPSS-0.30% / 52.44%
||
7 Day CHG~0.00%
Published-24 Apr, 2019 | 15:21
Updated-17 Sep, 2024 | 02:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Invitations Service supports HTTP connections

Pivotal Apps Manager Release, versions 665.0.x prior to 665.0.28, versions 666.0.x prior to 666.0.21, versions 667.0.x prior to 667.0.7, contain an invitation service that accepts HTTP. A remote unauthenticated user could listen to network traffic and gain access to the authorization credentials used to make the invitation requests.

Action-Not Available
Vendor-VMware (Broadcom Inc.)
Product-application_serviceApps Manager
CWE ID-CWE-300
Channel Accessible by Non-Endpoint
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2016-2169
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-5.3||MEDIUM
EPSS-0.24% / 46.63%
||
7 Day CHG~0.00%
Published-18 Apr, 2018 | 16:00
Updated-16 Sep, 2024 | 18:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cloud Foundry Cloud Controller, capi-release versions prior to 1.0.0 and cf-release versions prior to v237, contain a business logic flaw. An application developer may create an application with a route that conflicts with a platform service route and receive traffic intended for the service.

Action-Not Available
Vendor-Cloud Foundry
Product-cloud_controllercapi-releasecf-releaseCloud Controller
CWE ID-CWE-17
Not Available
CVE-2016-0761
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-9.8||CRITICAL
EPSS-0.55% / 66.96%
||
7 Day CHG~0.00%
Published-25 May, 2017 | 17:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cloud Foundry Garden-Linux versions prior to v0.333.0 and Elastic Runtime 1.6.x version prior to 1.6.17 contain a flaw in managing container files during Docker image preparation that could be used to delete, corrupt or overwrite host files and directories, including other container filesystems on the host.

Action-Not Available
Vendor-VMware (Broadcom Inc.)Cloud Foundry
Product-garden_linuxcloud_foundry_elastic_runtimeCloud Foundry
CVE-2015-5171
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.49% / 64.37%
||
7 Day CHG~0.00%
Published-24 Oct, 2017 | 17:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The password change functionality in Cloud Foundry Runtime cf-release before 216, UAA before 2.5.2, and Pivotal Cloud Foundry (PCF) Elastic Runtime before 1.7.0 allow attackers to have unspecified impact by leveraging failure to expire existing sessions.

Action-Not Available
Vendor-n/aVMware (Broadcom Inc.)Cloud Foundry
Product-cloud_foundry_uaacf-releasecloud_foundry_elastic_runtimen/a
CWE ID-CWE-613
Insufficient Session Expiration
CVE-2015-5172
Matching Score-8
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-8
Assigner-Red Hat, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.40% / 59.78%
||
7 Day CHG~0.00%
Published-24 Oct, 2017 | 17:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cloud Foundry Runtime cf-release before 216, UAA before 2.5.2, and Pivotal Cloud Foundry (PCF) Elastic Runtime before 1.7.0 allow attackers to have unspecified impact by leveraging failure to expire password reset links.

Action-Not Available
Vendor-n/aVMware (Broadcom Inc.)Cloud Foundry
Product-cloud_foundry_uaacf-releasecloud_foundry_elastic_runtimen/a
CWE ID-CWE-640
Weak Password Recovery Mechanism for Forgotten Password
CVE-2018-11047
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-7.5||HIGH
EPSS-0.28% / 50.83%
||
7 Day CHG~0.00%
Published-24 Jul, 2018 | 19:00
Updated-17 Sep, 2024 | 02:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cloud Foundry UAA, versions 4.19 prior to 4.19.2 and 4.12 prior to 4.12.4 and 4.10 prior to 4.10.2 and 4.7 prior to 4.7.6 and 4.5 prior to 4.5.7, incorrectly authorizes requests to admin endpoints by accepting a valid refresh token in lieu of an access token. Refresh tokens by design have a longer expiration time than access tokens, allowing the possessor of a refresh token to authenticate longer than expected. This affects the administrative endpoints of the UAA. i.e. /Users, /Groups, etc. However, if the user has been deleted or had groups removed, or the client was deleted, the refresh token will no longer be valid.

Action-Not Available
Vendor-VMware (Broadcom Inc.)Cloud Foundry
Product-cloud_foundry_uaaCloud Foundry UAA
CWE ID-CWE-863
Incorrect Authorization
CVE-2017-4994
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-7.5||HIGH
EPSS-0.26% / 48.63%
||
7 Day CHG~0.00%
Published-13 Jun, 2017 | 06:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Cloud Foundry Foundation cf-release versions prior to v263; UAA release 2.x versions prior to v2.7.4.18, 3.6.x versions prior to v3.6.12, 3.9.x versions prior to v3.9.14, and other versions prior to v4.3.0; and UAA bosh release (uaa-release) 13.x versions prior to v13.16, 24.x versions prior to v24.11, 30.x versions prior to 30.4, and other versions prior to v40. There was an issue with forwarded http headers in UAA that could result in account corruption.

Action-Not Available
Vendor-n/aVMware (Broadcom Inc.)Cloud Foundry
Product-cloud_foundry_uaacloud_foundry_cfcloud_foundry_uaa_boshCloud Foundry
CWE ID-CWE-20
Improper Input Validation
CVE-2019-3788
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-8.7||HIGH
EPSS-0.60% / 68.31%
||
7 Day CHG~0.00%
Published-25 Apr, 2019 | 20:17
Updated-16 Sep, 2024 | 22:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
UAA redirect-uri allows wildcard in the subdomain

Cloud Foundry UAA Release, versions prior to 71.0, allows clients to be configured with an insecure redirect uri. Given a UAA client was configured with a wildcard in the redirect uri's subdomain, a remote malicious unauthenticated user can craft a phishing link to get a UAA access code from the victim.

Action-Not Available
Vendor-VMware (Broadcom Inc.)Cloud Foundry
Product-uaa_releaseUAA Release (OSS)Pivotal Application Service
CWE ID-CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
CVE-2019-3783
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-8.7||HIGH
EPSS-0.23% / 45.97%
||
7 Day CHG~0.00%
Published-07 Mar, 2019 | 19:00
Updated-16 Sep, 2024 | 23:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cloud Foundry Stratos Deploys With Public Default Session Store Secret

Cloud Foundry Stratos, versions prior to 2.3.0, deploys with a public default session store secret. A malicious user with default session store secret can brute force another user's current Stratos session, and act on behalf of that user.

Action-Not Available
Vendor-Cloud Foundry
Product-stratosStratos
CWE ID-CWE-384
Session Fixation
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CVE-2019-11270
Matching Score-8
Assigner-VMware by Broadcom
ShareView Details
Matching Score-8
Assigner-VMware by Broadcom
CVSS Score-7.3||HIGH
EPSS-0.23% / 45.58%
||
7 Day CHG~0.00%
Published-05 Aug, 2019 | 16:21
Updated-17 Sep, 2024 | 04:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
UAA clients.write vulnerability

Cloud Foundry UAA versions prior to v73.4.0 contain a vulnerability where a malicious client possessing the 'clients.write' authority or scope can bypass the restrictions imposed on clients created via 'clients.write' and create clients with arbitrary scopes that the creator does not possess.

Action-Not Available
Vendor-VMware (Broadcom Inc.)Cloud Foundry
Product-cloud_foundry_uaaoperations_managerapplication_serviceUAA Release (OSS)
CWE ID-CWE-269
Improper Privilege Management
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CVE-2017-4992
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-9.8||CRITICAL
EPSS-0.39% / 59.01%
||
7 Day CHG~0.00%
Published-13 Jun, 2017 | 06:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Cloud Foundry Foundation cf-release versions prior to v261; UAA release 2.x versions prior to v2.7.4.17, 3.6.x versions prior to v3.6.11, 3.9.x versions prior to v3.9.13, and other versions prior to v4.2.0; and UAA bosh release (uaa-release) 13.x versions prior to v13.15, 24.x versions prior to v24.10, 30.x versions prior to 30.3, and other versions prior to v37. There is privilege escalation (arbitrary password reset) with user invitations.

Action-Not Available
Vendor-n/aVMware (Broadcom Inc.)Cloud Foundry
Product-cloud_foundry_uaacf-releasecloud_foundry_uaa_boshCloud Foundry
CWE ID-CWE-269
Improper Privilege Management
CVE-2016-5007
Matching Score-8
Assigner-Dell
ShareView Details
Matching Score-8
Assigner-Dell
CVSS Score-7.5||HIGH
EPSS-0.29% / 52.02%
||
7 Day CHG~0.00%
Published-25 May, 2017 | 17:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Both Spring Security 3.2.x, 4.0.x, 4.1.0 and the Spring Framework 3.2.x, 4.0.x, 4.1.x, 4.2.x rely on URL pattern mappings for authorization and for mapping requests to controllers respectively. Differences in the strictness of the pattern matching mechanisms, for example with regards to space trimming in path segments, can lead Spring Security to not recognize certain paths as not protected that are in fact mapped to Spring MVC controllers that should be protected. The problem is compounded by the fact that the Spring Framework provides richer features with regards to pattern matching as well as by the fact that pattern matching in each Spring Security and the Spring Framework can easily be customized creating additional differences.

Action-Not Available
Vendor-VMware (Broadcom Inc.)
Product-spring_frameworkspring_securitySpring SecuritySpring Framework
CVE-2020-5399
Matching Score-6
Assigner-VMware by Broadcom
ShareView Details
Matching Score-6
Assigner-VMware by Broadcom
CVSS Score-7.6||HIGH
EPSS-0.20% / 42.26%
||
7 Day CHG~0.00%
Published-12 Feb, 2020 | 20:30
Updated-16 Sep, 2024 | 19:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CredHub does not properly enable TLS for MySQL database connections

Cloud Foundry CredHub, versions prior to 2.5.10, connects to a MySQL database without TLS even when configured to use TLS. A malicious user with access to the network between CredHub and its MySQL database may eavesdrop on database connections and thereby gain unauthorized access to CredHub and other components.

Action-Not Available
Vendor-VMware (Broadcom Inc.)Cloud Foundry
Product-cloud_foundry_cf-deploymentcredhubCredHub
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2019-11276
Matching Score-6
Assigner-VMware by Broadcom
ShareView Details
Matching Score-6
Assigner-VMware by Broadcom
CVSS Score-5.4||MEDIUM
EPSS-0.05% / 13.30%
||
7 Day CHG~0.00%
Published-19 Aug, 2019 | 14:49
Updated-16 Sep, 2024 | 16:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apps Manager sends tokens to Spring apps via HTTP

Pivotal Apps Manager, included in Pivotal Application Service versions 2.3.x prior to 2.3.16, 2.4.x prior to 2.4.12, 2.5.x prior to 2.5.8, and 2.6.x prior to 2.6.3, makes a request to the /cloudapplication endpoint via Spring actuator, and subsequent requests via unsecured http. An adjacent unauthenticated user could eavesdrop on the network traffic and gain access to the unencrypted token allowing the attacker to read the type of access a user has over an app. They may also modify the logging level, potentially leading to lost information that would otherwise have been logged.

Action-Not Available
Vendor-VMware (Broadcom Inc.)
Product-application_servicePivotal Application Service (PAS)
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2002-0671
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.51% / 65.45%
||
7 Day CHG~0.00%
Published-02 Apr, 2003 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Pingtel xpressa SIP-based voice-over-IP phone 1.2.5 through 1.2.7.4 downloads phone applications from a web site but can not verify the integrity of the applications, which could allow remote attackers to install Trojan horse applications via DNS spoofing.

Action-Not Available
Vendor-pingteln/a
Product-xpressaxpressa_firmwaren/a
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2001-1125
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-4.58% / 88.78%
||
7 Day CHG~0.00%
Published-15 Mar, 2002 | 05:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Symantec LiveUpdate before 1.6 does not use cryptography to ensure the integrity of download files, which allows remote attackers to execute arbitrary code via DNS spoofing of the update.symantec.com site.

Action-Not Available
Vendor-n/aSymantec Corporation
Product-liveupdaten/a
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2024-27438
Matching Score-4
Assigner-Apache Software Foundation
ShareView Details
Matching Score-4
Assigner-Apache Software Foundation
CVSS Score-9.8||CRITICAL
EPSS-2.91% / 85.82%
||
7 Day CHG~0.00%
Published-21 Mar, 2024 | 09:39
Updated-17 Jun, 2025 | 13:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apache Doris: Downloading arbitrary remote jar files resulting in remote command execution

Download of Code Without Integrity Check vulnerability in Apache Doris. The jdbc driver files used for JDBC catalog is not checked and may resulting in remote command execution. Once the attacker is authorized to create a JDBC catalog, he/she can use arbitrary driver jar file with unchecked code snippet. This code snippet will be run when catalog is initializing without any check. This issue affects Apache Doris: from 1.2.0 through 2.0.4. Users are recommended to upgrade to version 2.0.5 or 2.1.x, which fixes the issue.

Action-Not Available
Vendor-The Apache Software Foundation
Product-dorisApache Dorisdoris
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2022-46680
Matching Score-4
Assigner-Schneider Electric
ShareView Details
Matching Score-4
Assigner-Schneider Electric
CVSS Score-8.8||HIGH
EPSS-0.12% / 31.10%
||
7 Day CHG~0.00%
Published-22 May, 2023 | 13:25
Updated-21 Jan, 2025 | 15:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A CWE-319: Cleartext transmission of sensitive information vulnerability exists that could cause disclosure of sensitive information, denial of service, or modification of data if an attacker is able to intercept network traffic.

Action-Not Available
Vendor-Schneider Electric SE
Product-powerlogic_ion8650powerlogic_ion9000_firmwarepowerlogic_ion9000powerlogic_pm8000powerlogic_pm8000_firmwarepowerlogic_ion7400_firmwarepowerlogic_ion8800_firmwarepowerlogic_ion8800powerlogic_ion7400powerlogic_ion8650_firmwarePowerLogic ION9000PowerLogic ION8800Legacy ION products PowerLogic PM8000PowerLogic ION7400PowerLogic ION8650
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2023-6248
Matching Score-4
Assigner-Automotive Security Research Group (ASRG)
ShareView Details
Matching Score-4
Assigner-Automotive Security Research Group (ASRG)
CVSS Score-10||CRITICAL
EPSS-3.21% / 86.52%
||
7 Day CHG~0.00%
Published-21 Nov, 2023 | 21:49
Updated-17 Oct, 2024 | 18:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Data leakage and arbitrary remote code execution in Syrus cloud devices

The Syrus4 IoT gateway utilizes an unsecured MQTT server to download and execute arbitrary commands, allowing a remote unauthenticated attacker to execute code on any Syrus4 device connected to the cloud service. The MQTT server also leaks the location, video and diagnostic data from each connected device. An attacker who knows the IP address of the server is able to connect and perform the following operations: * Get location data of the vehicle the device is connected to * Send CAN bus messages via the ECU module ( https://syrus.digitalcomtech.com/docs/ecu-1 https://syrus.digitalcomtech.com/docs/ecu-1 ) * Immobilize the vehicle via the safe-immobilizer module ( https://syrus.digitalcomtech.com/docs/system-tools#safe-immobilization https://syrus.digitalcomtech.com/docs/system-tools#safe-immobilization ) * Get live video through the connected video camera * Send audio messages to the driver ( https://syrus.digitalcomtech.com/docs/system-tools#apx-tts https://syrus.digitalcomtech.com/docs/system-tools#apx-tts )

Action-Not Available
Vendor-digitalcomtechDigital Communications Technologiesdigitalcomtech
Product-syrus_4g_iot_telematics_gatewaysyrus_4g_iot_telematics_gateway_firmwareSyrus4 IoT Telematics Gatewaysyrus_4g_iot_telematics_gateway_firmware
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2025-32880
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.03% / 6.83%
||
7 Day CHG~0.00%
Published-20 Jun, 2025 | 00:00
Updated-08 Jul, 2025 | 14:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on COROS PACE 3 devices through 3.0808.0. It implements a function to connect the watch to a WLAN. With WLAN access, the COROS Pace 3 downloads firmware files via HTTP. However, the communication is not encrypted and allows sniffing and machine-in-the-middle attacks.

Action-Not Available
Vendor-yftechn/a
Product-coros_pace_3_firmwarecoros_pace_3n/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2020-15604
Matching Score-4
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-4
Assigner-Trend Micro, Inc.
CVSS Score-7.5||HIGH
EPSS-0.23% / 45.93%
||
7 Day CHG~0.00%
Published-24 Sep, 2020 | 01:50
Updated-04 Aug, 2024 | 13:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An incomplete SSL server certification validation vulnerability in the Trend Micro Security 2019 (v15) consumer family of products could allow an attacker to combine this vulnerability with another attack to trick an affected client into downloading a malicious update instead of the expected one. CWE-494: Update files are not properly verified.

Action-Not Available
Vendor-Microsoft CorporationTrend Micro Incorporated
Product-internet_security_2019officescan_cloudmaximum_security_2019premium_security_2019windowsantivirus\+_2019Trend Micro Security (Consumer)
CWE ID-CWE-295
Improper Certificate Validation
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2022-43724
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-9.8||CRITICAL
EPSS-0.35% / 56.92%
||
7 Day CHG~0.00%
Published-13 Dec, 2022 | 00:00
Updated-22 Apr, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SICAM PAS/PQS (All versions < V7.0). Affected software transmits the database credentials for the inbuilt SQL server in cleartext. In combination with the by default enabled xp_cmdshell feature unauthenticated remote attackers could execute custom OS commands. At the time of assigning the CVE, the affected firmware version of the component has already been superseded by succeeding mainline versions.

Action-Not Available
Vendor-Siemens AG
Product-sicam_pas\/pqsSICAM PAS/PQS
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2023-41921
Matching Score-4
Assigner-National Cyber Security Centre Netherlands (NCSC-NL)
ShareView Details
Matching Score-4
Assigner-National Cyber Security Centre Netherlands (NCSC-NL)
CVSS Score-9.8||CRITICAL
EPSS-0.10% / 27.53%
||
7 Day CHG~0.00%
Published-02 Jul, 2024 | 07:42
Updated-02 Aug, 2024 | 19:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Download of Code Without Integrity Check in Kiloview P1/P2 devices

A vulnerability allows attackers to download source code or an executable from a remote location and execute the code without sufficiently verifying the origin and integrity of the code. This vulnerability can allow attackers to modify the firmware before uploading it to the system, thus achieving the modification of the target’s integrity to achieve an insecure state.

Action-Not Available
Vendor-Kiloviewkiloview
Product-P1/P2p2_4g_video_encoder_firmwarep1_4g_video_encoder_firmware
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2021-27569
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.06% / 20.15%
||
7 Day CHG~0.00%
Published-07 May, 2021 | 16:31
Updated-03 Aug, 2024 | 21:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Emote Remote Mouse through 4.0.0.0. Attackers can maximize or minimize the window of a running process by sending the process name in a crafted packet. This information is sent in cleartext and is not protected by any authentication logic.

Action-Not Available
Vendor-remotemousen/a
Product-emote_remote_mousen/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-39245
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-9.8||CRITICAL
EPSS-0.30% / 52.95%
||
7 Day CHG~0.00%
Published-15 Feb, 2024 | 13:03
Updated-23 Jan, 2025 | 16:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DELL ESI (Enterprise Storage Integrator) for SAP LAMA, version 10.0, contains an information disclosure vulnerability in EHAC component. An remote unauthenticated attacker could potentially exploit this vulnerability by eavesdropping the network traffic to gain admin level credentials.

Action-Not Available
Vendor-Dell Inc.
Product-enterprise_storage_integrator_for_sap_landscape_managementESI (Enterprise Storage Integrator) for SAP LAMAenterprise_storage_integrator_for_sap_lama
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2025-31355
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-7.2||HIGH
EPSS-0.04% / 10.08%
||
7 Day CHG~0.00%
Published-20 Aug, 2025 | 13:09
Updated-21 Aug, 2025 | 18:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A firmware update vulnerability exists in the Firmware Signature Validation functionality of Tenda AC6 V5.0 V02.03.01.110. A specially crafted malicious file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.

Action-Not Available
Vendor-Tenda Technology Co., Ltd.
Product-ac6_firmwareac6AC6 V5.0
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2023-40254
Matching Score-4
Assigner-KrCERT/CC
ShareView Details
Matching Score-4
Assigner-KrCERT/CC
CVSS Score-7.5||HIGH
EPSS-0.04% / 11.03%
||
7 Day CHG~0.00%
Published-11 Aug, 2023 | 06:08
Updated-10 Oct, 2024 | 14:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Download of Code Without Integrity Check vulnerability in Genians Genian NAC V4.0, Genians Genian NAC V5.0, Genians Genian NAC Suite V5.0, Genians Genian ZTNA allows Malicious Software Update.This issue affects Genian NAC V4.0: from V4.0.0 through V4.0.155; Genian NAC V5.0: from V5.0.0 through V5.0.42 (Revision 117460); Genian NAC Suite V5.0: from V5.0.0 through V5.0.54; Genian ZTNA: from V6.0.0 through V6.0.15.

Action-Not Available
Vendor-geniansGeniansgenians
Product-genian_nacgenian_ztnaGenian ZTNAGenian NAC V5.0Genian NAC V4.0Genian NAC Suite V5.0genian_nac
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2025-28236
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.20% / 41.81%
||
7 Day CHG~0.00%
Published-18 Apr, 2025 | 00:00
Updated-22 Apr, 2025 | 15:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Nautel VX Series transmitters VX SW v6.4.0 and below was discovered to contain a remote code execution (RCE) vulnerability in the firmware update process. This vulnerability allows attackers to execute arbitrary code via supplying a crafted update package to the /#/software/upgrades endpoint.

Action-Not Available
Vendor-n/a
Product-n/a
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2025-26199
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.20% / 42.27%
||
7 Day CHG+0.01%
Published-18 Jun, 2025 | 00:00
Updated-09 Jul, 2025 | 18:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

CloudClassroom-PHP-Project v1.0 is affected by an insecure credential transmission vulnerability. The application transmits passwords over unencrypted HTTP during the login process, exposing sensitive credentials to potential interception by network-based attackers. A remote attacker with access to the same network (e.g., public Wi-Fi or compromised router) can capture login credentials via Man-in-the-Middle (MitM) techniques. If the attacker subsequently uses the credentials to log in and exploit administrative functions (e.g., file upload), this may lead to remote code execution depending on the environment.

Action-Not Available
Vendor-vishalmathurn/a
Product-cloudclassroom-php_projectn/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2023-37220
Matching Score-4
Assigner-Israel National Cyber Directorate (INCD)
ShareView Details
Matching Score-4
Assigner-Israel National Cyber Directorate (INCD)
CVSS Score-7.2||HIGH
EPSS-0.05% / 14.04%
||
7 Day CHG~0.00%
Published-03 Sep, 2023 | 13:47
Updated-01 Oct, 2024 | 13:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Synel Terminals - CWE-494: Download of Code Without Integrity Check

Synel Terminals - CWE-494: Download of Code Without Integrity Check

Action-Not Available
Vendor-synelSynelsynel
Product-biolite-n2_firmwaresy-785sy-7500_firmwaresy-910_firmwaresy-777_firmwaresy-755sy-777sy-751_firmwaresy-755_firmwaresy-745synergy_5_firmwaresynergybioentry-w2_firmwaresy-715_firmwaresynergy\/x_firmwaresynergy_touchsynergy\/xsy-785_firmwarebioentry-w2sy-711sy-745_firmwaresy-910sy-765_firmwaresy-780_firmwarebioentry_p2synergy_firmwaresynergy_10sy-715biolite-n2bioentry_p2_firmwaresynergy\/asy-711_firmwaresynergy_10_firmwaresynergy\/a_firmwaresy110_face_firmwaresy-780sy-751sy-765sy110_facesy-7500synergy_touch_firmwaresynergy_5Terminalsterminals
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2020-10376
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.22% / 45.08%
||
7 Day CHG~0.00%
Published-11 Mar, 2020 | 13:35
Updated-04 Aug, 2024 | 10:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Technicolor TC7337NET 08.89.17.23.03 devices allow remote attackers to discover passwords by sniffing the network for an "Authorization: Basic" HTTP header.

Action-Not Available
Vendor-technicolorn/a
Product-tc7337net_firmwaretc7337netn/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2021-20623
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-2.08% / 83.26%
||
7 Day CHG~0.00%
Published-05 Feb, 2021 | 09:35
Updated-03 Aug, 2024 | 17:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Video Insight VMS versions prior to 7.8 allows a remote attacker to execute arbitrary code with the system user privilege by sending a specially crafted request.

Action-Not Available
Vendor-panasonicPanasonic Corporation
Product-video_insight_vmsVideo Insight VMS
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2020-9477
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.93% / 75.17%
||
7 Day CHG~0.00%
Published-04 Mar, 2020 | 18:16
Updated-04 Aug, 2024 | 10:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on HUMAX HGA12R-02 BRGCAA 1.1.53 devices. A vulnerability in the authentication functionality in the web-based interface could allow an unauthenticated remote attacker to capture packets at the time of authentication and gain access to the cleartext password. An attacker could use this access to create a new user account or control the device.

Action-Not Available
Vendor-humaxdigitaln/a
Product-hga12r-02hga12r-02_firmwaren/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2023-33730
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-1.19% / 77.97%
||
7 Day CHG~0.00%
Published-31 May, 2023 | 00:00
Updated-10 Jan, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Privilege Escalation in the "GetUserCurrentPwd" function in Microworld Technologies eScan Management Console 14.0.1400.2281 allows any remote attacker to retrieve password of any admin or normal user in plain text format.

Action-Not Available
Vendor-escanavn/a
Product-escan_management_consolen/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2020-7873
Matching Score-4
Assigner-KrCERT/CC
ShareView Details
Matching Score-4
Assigner-KrCERT/CC
CVSS Score-8.8||HIGH
EPSS-0.23% / 46.04%
||
7 Day CHG~0.00%
Published-09 Sep, 2021 | 12:48
Updated-04 Aug, 2024 | 09:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Download of code without integrity check vulnerability in ActiveX control of Younglimwon Co., Ltd allows the attacker to cause a arbitrary file download and execution.

Action-Not Available
Vendor-ksystemYounglimwon Co., Ltd
Product-k-system_wellcommK-System WellComm
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2020-7812
Matching Score-4
Assigner-KrCERT/CC
ShareView Details
Matching Score-4
Assigner-KrCERT/CC
CVSS Score-7.8||HIGH
EPSS-0.46% / 63.32%
||
7 Day CHG~0.00%
Published-28 May, 2020 | 13:12
Updated-04 Aug, 2024 | 09:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Kaoni ezHTTPTrans Active-X File Download and Execution Vulnerability

Ezhttptrans.ocx ActiveX Control in Kaoni ezHTTPTrans 1.0.0.70 and prior versions contain a vulnerability that could allow remote attacker to download arbitrary file by setting the arguments to the activex method. This can be leveraged for code execution by rebooting the victim’s PC.

Action-Not Available
Vendor-kaoniKaoniMicrosoft Corporation
Product-windowsezhttptransezHTTPTrans
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2023-31410
Matching Score-4
Assigner-SICK AG
ShareView Details
Matching Score-4
Assigner-SICK AG
CVSS Score-9.8||CRITICAL
EPSS-0.07% / 20.77%
||
7 Day CHG~0.00%
Published-19 Jun, 2023 | 14:57
Updated-11 Dec, 2024 | 20:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A remote unprivileged attacker can intercept the communication via e.g. Man-In-The-Middle, due to the absence of Transport Layer Security (TLS) in the SICK EventCam App. This lack of encryption in the communication channel can lead to the unauthorized disclosure of sensitive information. The attacker can exploit this weakness to eavesdrop on the communication between the EventCam App and the Client, and potentially manipulate the data being transmitted.

Action-Not Available
Vendor-SICK AG
Product-sick_eventcam_appEventCam App
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2020-7883
Matching Score-4
Assigner-KrCERT/CC
ShareView Details
Matching Score-4
Assigner-KrCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-0.77% / 72.56%
||
7 Day CHG~0.00%
Published-28 Dec, 2021 | 19:12
Updated-17 Sep, 2024 | 02:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Printchaser v2.2021.804.1 and earlier versions contain a vulnerability, which could allow remote attacker to download and execute remote file by setting the argument, variable in the activeX module. This can be leveraged for code execution.

Action-Not Available
Vendor-wowsoftWOWSOFTMicrosoft Corporation
Product-windowsprintchaserPrintchaser
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2020-7806
Matching Score-4
Assigner-KrCERT/CC
ShareView Details
Matching Score-4
Assigner-KrCERT/CC
CVSS Score-7.8||HIGH
EPSS-0.46% / 63.32%
||
7 Day CHG~0.00%
Published-06 May, 2020 | 12:50
Updated-04 Aug, 2024 | 09:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Tobesoft Xplatform ActiveX File Download Vulnerability

Tobesoft Xplatform 9.2.2.250 and earlier version have an arbitrary code execution vulnerability by using method supported by Xplatform ActiveX Control. It allows attacker to cause remote code execution.

Action-Not Available
Vendor-tobesoftTobesoftMicrosoft Corporation
Product-windowsxplatformXplatform
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2022-33321
Matching Score-4
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-4
Assigner-Mitsubishi Electric Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.58% / 67.90%
||
7 Day CHG~0.00%
Published-08 Nov, 2022 | 00:00
Updated-01 May, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cleartext Transmission of Sensitive Information vulnerability due to the use of Basic Authentication for HTTP connections in Mitsubishi Electric consumer electronics products (PHOTOVOLTAIC COLOR MONITOR ECO-GUIDE, HEMS adapter, Wi-Fi Interface, Air Conditioning, Induction hob, Mitsubishi Electric HEMS Energy Measurement Unit, Refrigerator, Remote control with Wi-Fi Interface, BATHROOM THERMO VENTILATOR, Rice cooker, Mitsubishi Electric HEMS control adapter, Energy Recovery Ventilator, Smart Switch, Ventilating Fan, Range hood fan, Energy Measurement Unit and Air Purifier) allows a remote unauthenticated attacker to disclose information in the products or cause a denial of service (DoS) condition as a result by sniffing credential information (username and password). The wide range of models/versions of Mitsubishi Electric consumer electronics products are affected by this vulnerability. As for the affected product models/versions, see the Mitsubishi Electric's advisory which is listed in [References] section.

Action-Not Available
Vendor-Mitsubishi Electric Corporation
Product-msz-ln18\/25\/35\/50\/60vgw-e1_firmwaremsz-ef22\/25\/35\/42\/50vgkw-et2_firmwaremsz-ef22\/25\/35\/42\/50vgkb-er1msz-ef22\/25\/35\/42\/50vgkb-a1msz-ln25\/35\/50\/60vg2r-er1_firmwaremac-559if-emac-576if-e1msz-bt20\/25\/35\/50vgk-et1_firmwaremac-566ifb-e_firmwaremsz-hr25\/35\/42\/50\/60\/71vfk-et1_firmwaremsz-ln25\/35\/50\/60vg2v-er3_firmwaremac-559if-e_firmwaremsz-ef22\/25\/35\/42\/50vgkw-er1msz-ln18\/25\/35\/50\/60vg2w-er1msz-ln18\/25\/35\/50\/60vg2w-er2msz-ln18\/25\/35\/50\/60vg2r-et1_firmwaremsz-zy09\/12\/18vfk_firmwaremsz-ap25\/35\/42\/50\/60\/71vgk-et3_firmwaremsz-ft25\/35\/50vgk-sc2_firmwaremac-557if-e_firmwaremsz-bt20\/25\/35\/50vgk-et3msz-ap25\/35\/42\/50vgk-e6_firmwaremsz-ft25\/35\/50vgk-e2_firmwaremsz-ln18\/25\/35\/50\/60vg2v-e3_firmwaremsz-ln18\/25\/35\/50\/60vgv-e1msxy-fp05\/07\/10\/13\/18\/20\/24vgk-sg1msz-bt20\/25\/35\/50vgk-e2msz-ln18\/25\/35\/50vg2b-en1msz-gzy09\/12\/18vfk_firmwaremsz-ln25\/35\/50\/60vg2r-er3msz-ef18\/22\/25\/35\/42\/50vgks-e1msz-ln25\/35\/50\/60vg2r-a2msz-ln25\/35\/50vg2w-en2_firmwaremsz-ap60\/71vgk-et1msz-ln18\/25\/35\/50\/60vgb-e1_firmwaremsz-ln18\/25\/35\/50\/60vg2w-er1_firmwaremsz-bt20\/25\/35\/50vgk-e3msz-ft25\/35\/50vgk-e1_firmwaremsz-ln18\/25\/35\/50\/60vg2w-e1_firmwaremsz-ln25\/35\/50\/60vg2r-a1_firmwaremsz-ln25\/35\/50\/60vgb-er1_firmwaremsz-ef18\/22\/25\/35\/42\/50vgks-e2_firmwaremsz-rw25\/35\/50vg-et1_firmwaremac-558if-e_firmwaremac-568ifb3-emsz-ln18\/25\/35\/50\/60vg2r-et1msz-ln18\/25\/35\/50\/60vgw-e1msz-ef22\/25\/35\/42\/50vgkb-et2_firmwaremac-587if-e_firmwaremsz-ln25\/35\/50\/60vg2b-et3_firmwaremsz-ln25\/35\/50vg2v-en2_firmwaremsz-ef18\/22\/25\/35\/42\/50vgkw-e1msz-ln25\/35\/50\/60vgw-er1_firmwaremsz-ln18\/25\/35\/50\/60vg2w-et1mac-507if-emsz-rw25\/35\/50vg-sc1msz-ef22\/25\/35\/42\/50vgkb-er2_firmwaremsz-ln25\/35\/50\/60vg2v-a2msz-rw25\/35\/50vg-sc1_firmwaremsz-ln18\/25\/35\/50\/60vg2b-et1msz-ap25\/35\/42\/50vgk-e7_firmwaremsz-ln18\/25\/35\/50vg2w-en1_firmwaremsz-ln18\/25\/35\/50\/60vgb-e1msz-gzt09\/12\/18vak_firmwaremsz-ln18\/25\/35\/50\/60vg2v-e3msz-ap25\/35\/42\/50vgk-er1mac-567ifb-emsz-ln18\/25\/35\/50\/60vg2r-e2_firmwaremsz-ln25\/35\/50\/60vg2r-a2_firmwaremsz-ln18\/25\/35\/50\/60vg2b-e1_firmwaremsz-ef22\/25\/35\/42\/50vgks-et2_firmwaremsz-ln25\/35\/50\/60vg2r-er2_firmwaremsy-gp10\/13\/15\/18\/20\/24vfk-sg1_firmwaremsz-rw25\/35\/50vg-e1msz-ln18\/25\/35\/50\/60vg2v-e1_firmwaremsz-ln25\/35\/50\/60vgb-a1_firmwaremsz-bt20\/25\/35\/50vgk-e2_firmwaremsz-ap22\/25\/35\/42\/50\/61\/70\/80vgkd-a1_firmwaremsz-ln25\/35\/50\/60vg2b-a1_firmwaremsz-ft25\/35\/50vgk-et1_firmwaremsz-gzy09\/12\/18vfkmsz-exa09\/12vakmsz-ay25\/35\/42\/50vgk-e1msz-ln25\/35\/50\/60vg2v-er1msxy-fp05\/07\/10\/13\/18\/20\/24vgk-sg1_firmwaremsz-hr25\/35\/42\/50\/60\/71vfk-er1_firmwares-mac-702if-zmsz-ap60\/71vgk-e1msz-ef18\/22\/25\/35\/42\/50vgks-e2pac-whs01wf-e_firmwaremsz-ln18\/25\/35\/50vg2r-en1_firmwares-mac-905ifmsz-ap25\/35\/42\/50vgk-et1_firmwaremsz-ft25\/35\/50vgk-e1msz-ap60\/71vgk-et1_firmwaremsz-ef22\/25\/35\/42\/50vgks-a1_firmwaremsz-ay25\/35\/42\/50vgk-et1msz-ln18\/25\/35\/50\/60vgr-e1msz-ln18\/25\/35\/50vg2w-en1msz-ln25\/35\/50\/60vg2v-er1_firmwaremsz-ef22\/25\/35\/42\/50vgks-er1msz-ef22\/25\/35\/42\/50vgkw-et1_firmwaremsz-ef22\/25\/35\/42\/50vgks-er1_firmwaremsz-ef22\/25\/35\/42\/50vgkb-er2msz-hr25\/35\/42\/50vfk-e6_firmwaremsz-ln18\/25\/35\/50vg2v-en1_firmwaremsz-ln25\/35\/50\/60vg2v-a2_firmwaremsz-ln25\/35\/50\/60vg2b-a1msz-ft20\/25vfkmfz-xt50\/60vfk_firmwaremsz-ln25\/35\/50\/60vg2b-er3_firmwaremsz-ay25\/35\/42\/50vgkp-er1_firmwaremsz-ln18\/25\/35\/50vg2v-en1msz-hr25\/35\/42\/50\/60\/71vfk-e1mac-557if-e1msz-hr25\/35\/42\/50\/60\/71vfk-et1msz-ln25\/35\/50\/60vgv-a1msz-ay25\/35\/42\/50vgk-e1_firmwaremsz-ky09\/12\/18vfk_firmwaremsz-ln25\/35\/50\/60vgr-a1msz-wx18\/20\/25vfk_firmwares-mac-702if-z_firmwaremsz-ln25\/35\/50vg2v-en2msz-ap60\/71vgk-e1_firmwaremac-587if2-e_firmwaremsz-ay25\/35\/42\/50vgk-sc1_firmwaremsz-ln25\/35\/50\/60vg2b-et3msz-ef22\/25\/35\/42\/50vgks-et2msz-ln25\/35\/50\/60vgv-a1_firmwaremsz-ef22\/25\/35\/42\/50vgks-et1_firmwaremsz-ap25\/35\/42\/50vgk-e8_firmwaremsz-ap25\/35\/42\/50\/60\/71vgk-er3_firmwaremsz-ay25\/35\/42\/50vgk-et1_firmwaremsz-ef18\/22\/25\/35\/42\/50vgkb-e2_firmwaremsz-ay25\/35\/42\/50vgk-er1_firmwaremsz-ln18\/25\/35\/50\/60vg2v-e1msz-ef22\/25\/35\/42\/50vgkw-er2_firmwaremsz-ln25\/35\/50vg2w-en2msz-ln25\/35\/50\/60vg2r-et2_firmwaremsz-ln25\/35\/50\/60vg2w-et3msz-fx20\/25vfkmsz-ef22\/25\/35\/42\/50vgks-er2mac-568ifb3-e_firmwaremsz-ap25\/35\/42\/50vgk-en3_firmwaremsz-ap25\/35\/42\/50vgk-e1mac-559if-e1msz-ln25\/35\/50\/60vg2b-et2_firmwaremsz-ln18\/25\/35\/50\/60vg2r-e1_firmwaremsz-ef22\/25\/35\/42\/50vgkw-et2mac-507if-e_firmwaremsz-ln18\/25\/35\/50\/60vgv-e1_firmwaremsz-ay25\/35\/42\/50vgk-e6msz-ln18\/25\/35\/50\/60vg2r-e3_firmwaremsz-ay25\/35\/42\/50vgkp-sc1_firmwaremsz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-e2msz-ef22\/25\/35\/42\/50vgkw-a1_firmwaremsz-ln18\/25\/35\/50vg2w-sc1msz-ln18\/25\/35\/50\/60vg2v-et1msz-ln25\/35\/50\/60vg2b-er2_firmwaremac-568ifb2-emsz-ef22\/25\/35\/42\/50vgks-a1msz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-et2mac-587if2-emsz-ay25\/35\/42\/50vgk-er1msz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-er2_firmwaremac-567ifb2-e_firmwaremsz-ln25\/35\/50\/60vgb-er1msz-rw25\/35\/50vg-e1_firmwaremsz-ln25\/35\/50\/60vgr-a1_firmwaremsz-ef18\/22\/25\/35\/42\/50vgkb-e2msz-ln25\/35\/50\/60vg2v-a1_firmwaremsz-ap60\/71vgk-er1_firmwaremsz-ef22\/25\/35\/42\/50vgkb-et1msz-ln25\/35\/50vg2v-sc1_firmwaremsz-bt20\/25\/35\/50vgk-et2msz-ap25\/35\/42\/50vgk-et1s-mac-702if-fmfz-xt50\/60vfkmsz-ap25\/35\/42\/50vgk-en1msz-ln25\/35\/50vg2b-en2msz-ef22\/25\/35\/42\/50vgkb-et1_firmwaremsz-bt20\/25\/35\/50vgk-e1_firmwaremac-558if-e1_firmwaremsz-ap25\/35\/42\/50vgk-en2_firmwaremac-567ifb2-emsz-ap25\/35\/42\/50vgk-e8msz-ln25\/35\/50\/60vg2b-er1_firmwaremsz-ln25\/35\/50\/60vgv-er1_firmwaremsz-ln18\/25\/35\/50\/60vg2v-e2_firmwaremsz-ky09\/12\/18vfkmsz-ef18\/22\/25\/35\/42\/50vgkw-e2_firmwaremac-567ifb-e_firmwaremsz-ef22\/25\/35\/42\/50vgks-er2_firmwaremsz-ln18\/25\/35\/50\/60vg2b-e1msz-ln25\/35\/50vg2r-en2ma-ew85s-uk_firmwaremsz-wx18\/20\/25vfkmsz-hr25\/35\/42\/50\/60\/71vfk-e1_firmwaremac-576if-e1_firmwaremsz-ln25\/35\/50\/60vg2v-er2msz-ap25\/35\/42\/50vgk-en2msz-ln18\/25\/35\/50\/60vg2v-e2msz-ln18\/25\/35\/50\/60vg2w-e3_firmwaremsz-bt20\/25\/35\/50vgk-er1_firmwares-mac-002ifs-mac-702if-bmsz-ln25\/35\/50vg2b-sc1msz-ln18\/25\/35\/50\/60vg2r-e2msz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-er2msz-eza09\/12vak_firmwaremsz-rw25\/35\/50vg-er1_firmwaremsz-ln18\/25\/35\/50\/60vg2b-e3_firmwaremsz-ft25\/35\/50vgk-sc2msz-ln25\/35\/50vg2v-sc1msz-ln18\/25\/35\/50\/60vg2r-e1msz-ap22\/25\/35\/42\/50\/61\/70\/80vgkd-a1pac-wf010-e_firmwaremac-568ifb-e_firmwaremsz-ln18\/25\/35\/50vg2r-en1mfz-gxt50\/60\/73vfkmsz-ft20\/25vfk_firmwaremsz-bt20\/25\/35\/50vgk-et3_firmwaremsz-ay25\/35\/42\/50vgkp-er1msz-zy09\/12\/18vfks-mac-906if_firmwares-mac-906ifmsz-ef18\/22\/25\/35\/42\/50vgkw-e2mac-557if-e1_firmwaremsz-ay25\/35\/42\/50vgkp-sc1mac-568if-e_firmwaremsz-ln25\/35\/50\/60vg2w-et3_firmwaremsz-ln25\/35\/50\/60vg2v-et3msz-zt09\/12\/18vakmsz-bt20\/25\/35\/50vgk-et2_firmwaremsz-bt20\/25\/35\/50vgk-e3_firmwaremsz-ln18\/25\/35\/50\/60vg2w-e2msz-bt20\/25\/35\/50vgk-er1msz-hr25\/35\/42\/50vfk-e6msz-ay25\/35\/42\/50vgkp-e6msz-ln25\/35\/50vg2b-sc1_firmwaremac-568if-emsz-ft25\/35\/50vgk-sc1msy-gp10\/13\/15\/18\/20\/24vfk-sg1msz-fx20\/25vfk_firmwaremsz-ln18\/25\/35\/50\/60vg2w-et2_firmwaremsz-eza09\/12vakmsz-ln25\/35\/50vg2r-sc1_firmwaremsz-bt20\/25\/35\/50vgk-er2msz-bt20\/25\/35\/50vgk-e1msz-ln25\/35\/50\/60vg2v-er3msz-ln18\/25\/35\/50vg2w-sc1_firmwaremsz-bt20\/25\/35\/50vgk-et1msz-ap25\/35\/42\/50\/60\/71vgk-e3_firmwaremsz-ln18\/25\/35\/50\/60vg2w-et1_firmwaremsz-ap25\/35\/42\/50vgk-e1_firmwaremac-568ifb-emsz-ln25\/35\/50\/60vg2r-er2mac-588if-e_firmwaremsz-ap25\/35\/42\/50vgk-e6msz-ef22\/25\/35\/42\/50vgkw-a1msz-ap22\/25\/35\/42\/50\/60\/71\/80vgkd-a2msz-ln25\/35\/50\/60vg2v-et2msz-ln25\/35\/50vg2r-sc1msz-ln25\/35\/50\/60vgw-er1msz-ln18\/25\/35\/50\/60vg2w-e2_firmwaremsz-ln18\/25\/35\/50\/60vg2b-et1_firmwaremac-558if-e1mac-558if-emsz-ln25\/35\/50\/60vgb-a1ma-ew85s-emsz-ln18\/25\/35\/50\/60vg2w-e3msz-ln25\/35\/50\/60vg2r-er3_firmwaremsz-ln25\/35\/50\/60vg2v-er2_firmwaremsz-ap25\/35\/42\/50vgk-e7msz-ef18\/22\/25\/35\/42\/50vgks-e1_firmwaremsz-ef22\/25\/35\/42\/50vgkw-et1mac-587if-emsz-ln25\/35\/50\/60vg2r-er1mac-559if-e1_firmwaremsz-ln18\/25\/35\/50\/60vg2b-e2_firmwaremsz-ln25\/35\/50\/60vg2b-er2mac-566ifb-emsz-ef22\/25\/35\/42\/50vgkb-et2msz-ln18\/25\/35\/50\/60vg2b-e3msz-rw25\/35\/50vg-et1msz-ap25\/35\/42\/50\/60\/71vgk-et3msz-ay25\/35\/42\/50vgk-sc1msz-ln18\/25\/35\/50\/60vg2w-et2msz-ap25\/35\/42\/50vgk-en3msz-hr25\/35\/42\/50\/60\/71vfk-er1msz-ef22\/25\/35\/42\/50vgkb-a1_firmwaremsz-ap25\/35\/42\/50\/60\/71vgk-er3msz-ln25\/35\/50\/60vg2b-er3msz-ln25\/35\/50\/60vg2b-et2msz-ef22\/25\/35\/42\/50vgkw-er1_firmwaremsz-ay25\/35\/42\/50vgkp-et1msz-ap25\/35\/42\/50vgk-er1_firmwaremac-568ifb2-e_firmwaremsz-ln25\/35\/50\/60vg2b-er1ma-ew85s-e_firmwaremfz-gxt50\/60\/73vfk_firmwaremac-557if-emsz-ln25\/35\/50\/60vg2r-et3_firmwares-mac-702if-f_firmwaremsz-zt09\/12\/18vak_firmwaremsz-ln18\/25\/35\/50\/60vg2r-e3msz-ln25\/35\/50\/60vg2v-et3_firmwaremsz-ay25\/35\/42\/50vgkp-e6_firmwaremsz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-et2_firmwaremsz-ln25\/35\/50\/60vg2w-er3msz-ln25\/35\/50\/60vg2r-et3msz-ln25\/35\/50\/60vg2r-et2s-mac-905if_firmwaremsz-ln25\/35\/50\/60vg2v-a1msz-ln25\/35\/50vg2b-en2_firmwaremsz-ln25\/35\/50\/60vg2w-er3_firmwares-mac-002if_firmwaremsz-exa09\/12vak_firmwaremsz-ln25\/35\/50\/60vg2b-a2_firmwaremsz-gzt09\/12\/18vakmsz-ln25\/35\/50\/60vgr-er1msz-ap60\/71vgk-er1msz-ln25\/35\/50vg2r-en2_firmwaremsz-bt20\/25\/35\/50vgk-er2_firmwaremsz-ft25\/35\/50vgk-e2msz-ln25\/35\/50\/60vg2v-et2_firmwaremsz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-e2_firmwaremsz-rw25\/35\/50vg-er1msz-ay25\/35\/42\/50vgkp-et1_firmwaremsz-ln18\/25\/35\/50\/60vgr-e1_firmwaremsz-ln18\/25\/35\/50\/60vg2b-e2msz-ef22\/25\/35\/42\/50vgkw-er2msz-ln18\/25\/35\/50\/60vg2v-et1_firmwaremsz-ef18\/22\/25\/35\/42\/50vgkb-e1_firmwaremsz-ap25\/35\/42\/50vgk-en1_firmwaremsz-ef22\/25\/35\/42\/50vgkb-er1_firmwaremsz-ft25\/35\/50vgk-sc1_firmwaremsz-ln25\/35\/50\/60vgv-er1msz-ln25\/35\/50\/60vgr-er1_firmwaremsz-ln18\/25\/35\/50\/60vg2w-er2_firmwaremsz-ln18\/25\/35\/50\/60vg2w-e1msz-ef18\/22\/25\/35\/42\/50vgkw-e1_firmwaremsz-ap22\/25\/35\/42\/50\/60\/71\/80vgkd-a2_firmwares-mac-702if-b_firmwaremsz-ln25\/35\/50\/60vg2b-a2msz-ef18\/22\/25\/35\/42\/50vgkb-e1msz-ft25\/35\/50vgk-et1pac-whs01wf-epac-wf010-ema-ew85s-ukmsz-ap25\/35\/42\/50\/60\/71vgk-e3msz-ay25\/35\/42\/50vgk-e6_firmwaremsz-ln18\/25\/35\/50vg2b-en1_firmwaremsz-ef22\/25\/35\/42\/50vgks-et1mac-588if-emsz-ln25\/35\/50\/60vg2r-a1Air Conditioning MSZ-LN25/35/50/60VG2B-ER1Air Conditioning MSZ-AY25/35/42/50VGKP-ER1Air Conditioning MSZ-EF18/22/25/35/42/50VGKW-E1BATHROOM THERMO VENTILATOR V-143BZL2-HMWi-Fi Interface MAC-576IF-E1Air Conditioning MSZ-LN18/25/35/50/60VG2W-E3Air Conditioning MSZ-LN25/35/50/60VG2V-ER2Air Conditioning MSZ-LN25/35/50/60VG2R-ER2Remote control with Wi-Fi Interface RMCB-D6SE-TWi-Fi Interface PAC-WF010-EAir Conditioning MSZ-LN25/35/50/60VG2V-ET3Air Conditioning MSZ-LN18/25/35/50/60VG2B-E3Ventilating Fan VD-15ZFVC5-HMWi-Fi Interface GT-RA1Air Conditioning MSZ-LN18/25/35/50/60VGV-E1Ventilating Fan V-18ZMVC2-HMWi-Fi Interface S-MAC-702IF-FHEMS adapter MAC-894IFWi-Fi Interface MAC-558IF-E1Energy Recovery Ventilator VL-20ZMH3-R-HMAir Conditioning MSZ-GZT09/12/18VAKAir Conditioning MSZ-LN25/35/50/60VG2R-A2Mitsubishi Electric HEMS control adapter P-HM04WAPHOTOVOLTAIC COLOR MONITOR ECO-GUIDE PV-DR006L-IFU-GW-YAir Conditioning MSZ-LN18/25/35/50/60VG2W-ET1Air Conditioning MSZ-EF22/25/35/42/50VGKW-ET2Air Conditioning MSZ-LN25/35/50/60VG2R-ER3Air Conditioning MSZ-FT20/25VFKAir Conditioning MSZ-LN25/35/50VG2R-EN2Ventilating Fan VD-18ZFVC3-HMAir Conditioning MSZ-FD40/56/63/71/8022SRemote control with Wi-Fi Interface RMCB-H6SE-TAir Conditioning MSZ-AP60/71VGK-E1Ventilating Fan VD-15ZFVC3-HMAir Conditioning MSZ-ZW22/25/28/36/40/56/63/71/80/9020(S)Air Conditioning MSZ-AP22/25/35/42/50/60/71/80VGKD-A2Wi-Fi Interface MAC-558IF-EAir Conditioning MSZ-AY25/35/42/50VGK-E6Air Conditioning MSZ-LN18/25/35/50/60VG2R-E3Wi-Fi Interface MAC-567IFB2-EAir Conditioning MSZ-LN18/25/35/50/60VG2W-E1PHOTOVOLTAIC COLOR MONITOR ECO-GUIDE PV-DR006L-IFU-MRC-MRefrigerator MR-WXD52/60/70GAir Conditioning MSZ-LN25/35/50/60VG2W-ER3Air Conditioning MSZ-KY09/12/18VFKAir Conditioning MSZ-AP25/35/42/50/60/71VGK-ER3Air Conditioning MSZ-BT20/25/35/50VGK-ER2Air Conditioning MSZ-AP15/20/25/35/42/50/60/71VGK-ER2Air Conditioning MSZ-AP25/35/42/50VGK-EN2Air Conditioning MSZ-ZXV22/25/28/36/40/56/63/71/80/9021(S)Air Conditioning MSZ-AY25/35/42/50VGK-ER1Wi-Fi Interface GT-HR1Smart Switch P-1600SWRCWi-Fi Interface MAC-895IFAir Conditioning MSZ-LN18/25/35/50/60VG2V-E1Air Purifier MA-EW85S-EAir Conditioning MSZ-LN18/25/35/50/60VG2B-E2Air Conditioning MSZ-LN25/35/50/60VG2V-A2Air Conditioning MSZ-LN18/25/35/50/60VG2V-E3Wi-Fi Interface MAC-567IFB-EVentilating Fan V-150CRL-D-HMAir Conditioning MSZ-EF22/25/35/42/50VGKW-A1BATHROOM THERMO VENTILATOR V-141BZ-HM-SYHAir Conditioning MSZ-LN18/25/35/50/60VG2W-ER2Air Conditioning MSZ-AP22/25/35/42/50/61/70/80VGKD-A1Energy Measurement Unit HM-EM02Air Conditioning MSZ-BT20/25/35/50VGK-ET2Wi-Fi Interface MAC-888IFEnergy Measurement Unit HM-EM03-EHEMS adapter HM-01A-CSRange hood fan V-6047S-HMAir Conditioning MSZ-EM22/25/28/36/40/56/63/71/80/9020E8(S)Air Conditioning MSZ-EF18/22/25/35/42/50VGKS-E1Air Conditioning MSZ-EF18/22/25/35/42/50VGKB-E2Wi-Fi Interface MAC-900IFAir Conditioning MSZ-LN25/35/50VG2B-SC1BATHROOM THERMO VENTILATOR V-141BZ-HM-SLAir Conditioning MSZ-AP25/35/42/50VGK-E6Air Conditioning MSZ-EF18/22/25/35/42/50VGKB-E1Air Conditioning MSZ-EF18/22/25/35/42/50VGKS-E2HEMS adapter GT-HEM3BATHROOM THERMO VENTILATOR V-243BZL-HMWi-Fi Interface PAC-SK43MLAir Conditioning MSZ-BT20/25/35/50VGK-ET1HEMS adapter P-HM03WAAir Conditioning MSZ-EF22/25/35/42/50VGKW-ER2Wi-Fi Interface S-MAC-702IF-ZAir Conditioning MSZ-LN25/35/50/60VG2R-ET3BATHROOM THERMO VENTILATOR WD-240DK-RCAir Conditioning MSZ-BT20/25/35/50VGK-ER1PHOTOVOLTAIC COLOR MONITOR ECO-GUIDE PV-DR006L-IFU-GW-MAir Conditioning MSZ-LN18/25/35/50VG2V-EN1Air Conditioning MSZ-EF22/25/35/42/50VGKB-ET2Air Purifier MA-EW85S-UKHEMS adapter HM-02A-REFAir Conditioning MSZ-AP25/35/42/50VGK-E8Air Conditioning MSZ-LN25/35/50/60VGB-ER1Energy Recovery Ventilator VL-200ZMHSV3-RCHEMS adapter GT-HEM3-MWi-Fi Interface MAC-559IF-E1HEMS adapter GT-HEM3-EAir Conditioning MSZ-LN25/35/50/60VG2B-A1HEMS adapter GT-HEM5-EAir Conditioning MSZ-LN25/35/50/60VG2B-ET2Wi-Fi Interface MAC-587IF-EAir Conditioning MSZ-AY25/35/42/50VGKP-ET1Wi-Fi Interface PAC-WHS01WF-EAir Conditioning MSZ-RW25/35/50VG-ET1Air Conditioning MSZ-LN18/25/35/50/60VG2R-E2Air Conditioning MSZ-FZ40/56/63/71/80/9020SAir Conditioning MSZ-EF22/25/35/42/50VGKB-A1PHOTOVOLTAIC COLOR MONITOR ECO-GUIDE PV-DR006L-SET-MAir Conditioning MSZ-AP25/35/42/50VGK-ER1Range hood fan V-904S-HMWi-Fi Interface S-MAC-905IFWi-Fi Interface MAC-507IF-EWi-Fi Interface S-MAC-002IFAir Conditioning MSZ-FT25/35/50VGK-SC2Wi-Fi Interface MAC-568IFB-EInduction hob G32M-HAir Conditioning MSZ-LN25/35/50VG2V-EN2Air Conditioning MSY-GP10/13/15/18/20/24VFK-SG1Air Conditioning MSZ-FT25/35/50VGK-ET1Air Conditioning MSZ-LN18/25/35/50/60VG2V-ET1Air Conditioning MSZ-LN25/35/50/60VG2R-A1Air Conditioning MSZ-LN18/25/35/50VG2R-EN1Refrigerator MR-MXD50/57GHEMS adapter GT-HEM1Air Conditioning MSZ-AP25/35/42/50VGK-ET1Air Conditioning MSZ-RW25/35/50VG-SC1Air Conditioning MSZ-ZD25/28/40/56/63/71/8022(S)Air Conditioning MSXY-FP05/07/10/13/18/20/24VGK-SG1Air Conditioning MSZ-LN25/35/50VG2B-EN2Air Conditioning MSZ-EF22/25/35/42/50VGKB-ET1Wi-Fi Interface MAC-559IF-EAir Conditioning MSZ-EF22/25/35/42/50VGKS-ER2Air Conditioning MSZ-LN25/35/50/60VG2V-ER1BATHROOM THERMO VENTILATOR V-143BZL-HMRange hood fan V-754S-HMAir Conditioning MSZ-LN25/35/50/60VG2R-ET2Air Conditioning MSZ-AY25/35/42/50VGKP-SC1Energy Recovery Ventilator VL-20ZMH3-L-HMMitsubishi Electric HEMS Energy Measurement Unit HM-EM02Remote control with Wi-Fi Interface RMCB-F6SE-THEMS adapter HM-02A-CSAir Conditioning MSZ-BT20/25/35/50VGK-E2Wi-Fi Interface GT-RA2Air Conditioning MSZ-EZA09/12VAKWi-Fi Interface S-MAC-702IF-BAir Conditioning MSZ-LN25/35/50/60VGV-A1Ventilating Fan VD-15ZFVC2-HMHEMS adapter HM-01A-EXAir Conditioning MSZ-HR25/35/42/50VFK-E6Air Conditioning MSZ-ZY09/12/18VFKAir Conditioning MSZ-LN25/35/50/60VG2W-ET3Air Conditioning MSZ-LN18/25/35/50/60VG2B-E1Air Conditioning MSZ-AP60/71VGK-ER1Air Conditioning MSZ-AY25/35/42/50VGK-ET1HEMS adapter HM-W002-ACBAir Conditioning MSZ-LN18/25/35/50/60VG2B-ET1Air Conditioning MSZ-AP25/35/42/50VGK-E1Air Conditioning MSZ-LN25/35/50/60VG2B-ER3Air Conditioning MSZ-LN25/35/50/60VG2B-A2Air Conditioning MSZ-AP60/71VGK-ET1PHOTOVOLTAIC COLOR MONITOR ECO-GUIDE PV-DR006L-IFU-MRC-YSmart Switch P-10SWRCAir Conditioning MSZ-RW25/35/50VG-ER1HEMS adapter HM-W002-ACPHOTOVOLTAIC COLOR MONITOR ECO-GUIDE PV-DR006L-SET-YAir Conditioning MSZ-LN25/35/50/60VG2V-ET2Wi-Fi Interface MAC-568IF-EAir Conditioning MSZ-AP25/35/42/50VGK-E7Air Conditioning MSZ-LN18/25/35/50/60VGR-E1Air Conditioning MSZ-HR25/35/42/50/60/71VFK-ER1Air Conditioning MSZ-LN25/35/50/60VGR-A1Wi-Fi Interface MAC-568IFB3-EAir Conditioning MSZ-AP15/20/25/35/42/50/60/71VGK-ET2Air Conditioning MSZ-LN18/25/35/50/60VG2R-E1Induction hob G32MS-HAir Conditioning MSZ-LN18/25/35/50/60VG2W-ER1Air Conditioning MSZ-EF22/25/35/42/50VGKS-A1Wi-Fi Interface MAC-588IF-EAir Conditioning MSZ-EF22/25/35/42/50VGKS-ER1Air Conditioning MSZ-ZW22/25/28/36/40/56/63/71/80/9021(S)Ventilating Fan VD-18ZFVC2-HMEnergy Recovery Ventilator VL-11ZFHV-HMAir Conditioning MSZ-LN25/35/50/60VG2R-ER1Air Conditioning MSZ-LN18/25/35/50/60VG2W-ET2Air Conditioning MSZ-RW25/35/50VG-E1Air Conditioning MSZ-HXV25/28/40/56/63/71/8022SAir Conditioning MSZ-EF22/25/35/42/50VGKB-ER2Air Conditioning MSZ-BT20/25/35/50VGK-ET3HEMS adapter GT-HEM2Rice cooker NJ-AWBX10Refrigerator MR-WZ55/61HAir Conditioning MSZ-EM22/25/28/36/40/56/63/71/80E2(S)Air Conditioning MSZ-FZV40/56/63/71/80/9020SHEMS adapter HM-WF001Air Conditioning MSZ-LN18/25/35/50VG2W-SC1BATHROOM THERMO VENTILATOR WD-240DK2-RCAir Conditioning MSZ-LN25/35/50/60VGV-ER1BATHROOM THERMO VENTILATOR V-241BZ5-RCAir Conditioning MSZ-EF18/22/25/35/42/50VGKW-E2Air Conditioning MFZ-GXT50/60/73VFKAir Conditioning MSZ-LN18/25/35/50/60VGB-E1Air Conditioning MSZ-LN18/25/35/50/60VG2W-E2Air Conditioning MSZ-EM22/25/28/36/40/56/63/71/80/90E3(S)HEMS adapter GT-HEM4-EAir Conditioning MSZ-HR25/35/42/50/60/71VFK-ET1Air Conditioning MSZ-LN18/25/35/50/60VG2R-ET1Smart Switch P-04SWRCBATHROOM THERMO VENTILATOR V-241BZ-RCAir Conditioning MSZ-LN25/35/50/60VG2V-A1HEMS adapter VEZ-HM01WA Air Conditioning MSZ-EM22/25/28/36/40/56/63/71/80/9021E9(S)Air Conditioning MSZ-FZ40/56/63/71/80/9021SAir Conditioning MSZ-AP25/35/42/50VGK-EN1Air Conditioning MSZ-LN25/35/50VG2V-SC1Ventilating Fan V-18ZMVC3-HMVentilating Fan VD-18ZFVC5-HMAir Conditioning MSZ-FT25/35/50VGK-E1Air Conditioning MSZ-LN25/35/50/60VG2B-ET3Wi-Fi Interface MAC-884IFAir Conditioning MSZ-AP25/35/42/50/60/71VGK-E3Wi-Fi Interface MAC-557IF-E1Air Conditioning MSZ-FT25/35/50VGK-E2Air Conditioning MSZ-BT20/25/35/50VGK-E3HEMS adapter GT-HEM4Wi-Fi Interface MAC-557IF-ERefrigerator MR-MZ54/60HAir Conditioning MSZ-EF22/25/35/42/50VGKB-ER1Air Conditioning MSZ-FZV40/56/63/71/80/9021SInduction hob CS-PT31HNWSR-HMitsubishi Electric HEMS Energy Measurement Unit HM-EM03-WAir Conditioning MSZ-EF22/25/35/42/50VGKW-ET1Air Conditioning MSZ-LN25/35/50/60VGR-ER1Air Conditioning MSZ-LN25/35/50VG2W-EN2Air Conditioning MSZ-FX20/25VFKAir Conditioning MSZ-LN25/35/50/60VG2V-ER3HEMS adapter P-01HMAAir Conditioning MSZ-AY25/35/42/50VGK-SC1Air Conditioning MSZ-AP25/35/42/50VGK-EN3Air Conditioning MFZ-XT50/60VFKAir Conditioning MSZ-ZT09/12/18VAKHEMS adapter HM-01A-VEHAir Conditioning MSZ-BT20/25/35/50VGK-E1Air Conditioning MSZ-WX18/20/25VFKAir Conditioning MSZ-AP15/20/25/35/42/50/60/71VGK-E2Wi-Fi Interface MAC-587IF2-EAir Conditioning MSZ-AP25/35/42/50/60/71VGK-ET3Air Conditioning MSZ-VXV40/56/63/71/8022SAir Conditioning MSZ-LN25/35/50VG2R-SC1Air Conditioning MSZ-LN25/35/50/60VG2B-ER2Air Conditioning MSZ-EF22/25/35/42/50VGKW-ER1Air Conditioning MSZ-LN25/35/50/60VGB-A1Air Conditioning MSZ-EXA09/12VAKAir Conditioning MSZ-GZY09/12/18VFKAir Conditioning MSZ-LN18/25/35/50VG2W-EN1Air Conditioning MSZ-HR25/35/42/50/60/71VFK-E1Wi-Fi Interface MAC-568IFB2-EAir Conditioning MSZ-LN25/35/50/60VGW-ER1Air Conditioning MSZ-ZXV22/25/28/36/40/56/63/71/80/9020(S)Air Conditioning MSZ-EF22/25/35/42/50VGKS-ET1HEMS adapter P-HM02WAHEMS adapter HM-02A-VEHAir Conditioning MSZ-LN18/25/35/50VG2B-EN1Air Conditioning MSZ-AY25/35/42/50VGK-E1Air Conditioning MSZ-EF22/25/35/42/50VGKS-ET2Air Conditioning MSZ-LN18/25/35/50/60VG2V-E2BATHROOM THERMO VENTILATOR V-243BZL2-HMAir Conditioning MSZ-FT25/35/50VGK-SC1BATHROOM THERMO VENTILATOR V-141BZ-HM-YHAir Conditioning MSZ-AY25/35/42/50VGKP-E6Air Conditioning MSZ-LN18/25/35/50/60VGW-E1Wi-Fi Interface P-WA01Wi-Fi Interface MAC-566IFB-EWi-Fi Interface S-MAC-906IF
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2023-32328
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-7.5||HIGH
EPSS-0.03% / 5.57%
||
7 Day CHG~0.00%
Published-07 Feb, 2024 | 16:07
Updated-17 Jun, 2025 | 21:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Security Verify Access information disclosure

IBM Security Verify Access 10.0.0.0 through 10.0.6.1 uses insecure protocols in some instances that could allow an attacker on the network to take control of the server. IBM X-Force Id: 254957.

Action-Not Available
Vendor-IBM Corporation
Product-security_verify_accessSecurity Verify Access ApplianceSecurity Verify Access Docker
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2024-45321
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.10% / 28.21%
||
7 Day CHG~0.00%
Published-27 Aug, 2024 | 00:00
Updated-05 Dec, 2024 | 18:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The App::cpanminus package through 1.7047 for Perl downloads code via insecure HTTP, enabling code execution for network attackers.

Action-Not Available
Vendor-app\n/aperl
Product-\n/acpanminus
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2023-30354
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.04% / 11.64%
||
7 Day CHG~0.00%
Published-10 May, 2023 | 00:00
Updated-27 Jan, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Shenzen Tenda Technology IP Camera CP3 V11.10.00.2211041355 does not defend against physical access to U-Boot via the UART: the Wi-Fi password is shown, and the hardcoded boot password can be inserted for console access.

Action-Not Available
Vendor-n/aTenda Technology Co., Ltd.
Product-cp3_firmwarecp3n/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2023-3028
Matching Score-4
Assigner-Automotive Security Research Group (ASRG)
ShareView Details
Matching Score-4
Assigner-Automotive Security Research Group (ASRG)
CVSS Score-8.6||HIGH
EPSS-0.03% / 6.01%
||
7 Day CHG~0.00%
Published-01 Jun, 2023 | 05:34
Updated-10 Jan, 2025 | 18:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper backend communication allows access and manipulation of the telemetry data

Insufficient authentication in the MQTT backend (broker) allows an attacker to access and even manipulate the telemetry data of the entire fleet of vehicles using the HopeChart HQT-401 telematics unit. Other models are possibly affected too. Multiple vulnerabilities were identified: - The MQTT backend does not require authentication, allowing unauthorized connections from an attacker. - The vehicles publish their telemetry data (e.g. GPS Location, speed, odometer, fuel, etc) as messages in public topics. The backend also sends commands to the vehicles as MQTT posts in public topics. As a result, an attacker can access the confidential data of the entire fleet that is managed by the backend. - The MQTT messages sent by the vehicles or the backend are not encrypted or authenticated. An attacker can create and post messages to impersonate a vehicle or the backend. The attacker could then, for example, send incorrect information to the backend about the vehicle's location. - The backend can inject data into a vehicle´s CAN bus by sending a specific MQTT message on a public topic. Because these messages are not authenticated or encrypted, an attacker could impersonate the backend, create a fake message and inject CAN data in any vehicle managed by the backend. The confirmed version is 201808021036, however further versions have been also identified as potentially impacted.

Action-Not Available
Vendor-hopechartHangzhou Hopechart IoT Technology Co., Ltd.
Product-hqt401hqt401_firmwareHQT401
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2020-5594
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-0.33% / 55.36%
||
7 Day CHG~0.00%
Published-23 Jun, 2020 | 07:35
Updated-04 Aug, 2024 | 08:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mitsubishi Electric MELSEC iQ-R, iQ-F, Q, L, and FX series CPU modules all versions contain a vulnerability that allows cleartext transmission of sensitive information between CPU modules and GX Works3 and/or GX Works2 via unspecified vectors.

Action-Not Available
Vendor-Mitsubishi Electric Corporation
Product-melsec-fxmelsec_iq-rmelsec-fx_firmwaremelsec-qmelsec-l_firmwaremelsec-lmelsec_iq-fmelsec_iq-r_firmwaremelsec-q_firmwaremelsec_iq-f_firmwareMELSEC iQ-R, iQ-F, Q, L, and FX series CPU modules
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2020-6195
Matching Score-4
Assigner-SAP SE
ShareView Details
Matching Score-4
Assigner-SAP SE
CVSS Score-6.4||MEDIUM
EPSS-0.19% / 41.53%
||
7 Day CHG~0.00%
Published-14 Apr, 2020 | 19:36
Updated-04 Aug, 2024 | 08:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SAP Business Objects Business Intelligence Platform (CMC), version 4.1, 4.2, shows cleartext password in the response, leading to Information Disclosure. It involves social engineering in order to gain access to system and If password is known, it would give administrative rights to the attacker to read/modify delete the data and rights within the system.

Action-Not Available
Vendor-SAP SE
Product-businessobjects_business_intelligence_platformSAP Business Objects Business Intelligence Platform
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2022-24117
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.06% / 20.15%
||
7 Day CHG~0.00%
Published-26 Dec, 2022 | 00:00
Updated-12 Apr, 2025 | 00:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Certain General Electric Renewable Energy products download firmware without an integrity check. This affects iNET and iNET II before 8.3.0, SD before 6.4.7, TD220X before 2.0.16, and TD220MAX before 1.2.6.

Action-Not Available
Vendor-gen/a
Product-inet_900_firmwaresd4sd9td220x_firmwaresd9_firmwareinet_ii_900sd1sd1_firmwaretd220maxinet_ii_900_firmwaresd2_firmwareinet_900sd4_firmwaretd220max_firmwaresd2td220xn/a
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2023-45799
Matching Score-4
Assigner-KrCERT/CC
ShareView Details
Matching Score-4
Assigner-KrCERT/CC
CVSS Score-7.2||HIGH
EPSS-0.05% / 15.43%
||
7 Day CHG~0.00%
Published-30 Oct, 2023 | 06:17
Updated-06 Sep, 2024 | 20:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
MLSoft TCO!stream Remote Code Execution Vulnerability

In MLSoft TCO!stream versions 8.0.22.1115 and below, a vulnerability exists due to insufficient permission validation. This allows an attacker to make the victim download and execute arbitrary files.

Action-Not Available
Vendor-mlsoftMLSoft
Product-tco\!streamTCO!stream
CWE ID-CWE-494
Download of Code Without Integrity Check
CVE-2019-15911
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.67% / 70.45%
||
7 Day CHG~0.00%
Published-20 Dec, 2019 | 16:03
Updated-05 Aug, 2024 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on ASUS HG100, MW100, WS-101, TS-101, AS-101, MS-101, DL-101 devices using ZigBee PRO. Because of insecure key transport in ZigBee communication, attackers can obtain sensitive information, cause the multiple denial of service attacks, take over smart home devices, and tamper with messages.

Action-Not Available
Vendor-n/aASUS (ASUSTeK Computer Inc.)
Product-ms-101_firmwarets-101_firmwarehg100ws-101_firmwarets-101dl-101_firmwarehg100_firmwaremw100_firmwaredl-101mw100as-101as-101_firmwarems-101ws-101n/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2022-21798
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.5||HIGH
EPSS-0.12% / 31.08%
||
7 Day CHG+0.01%
Published-25 Feb, 2022 | 18:10
Updated-16 Apr, 2025 | 18:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ICSA-22-053-02 GE Proficy CIMPLICITY-Cleartext

The affected product is vulnerable due to cleartext transmission of credentials seen in the CIMPLICITY network, which can be easily spoofed and used to log in to make operational changes to the system.

Action-Not Available
Vendor-geGeneral Electric
Product-cimplicityProficy CIMPLICITY
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
  • Previous
  • 1
  • 2
  • Next
Details not found