Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2019-6543

Summary
Assigner-icscert
Assigner Org ID-7d14cffa-0d7d-4270-9dc0-52cabd5a23a6
Published At-13 Feb, 2019 | 01:00
Updated At-16 Sep, 2024 | 18:14
Rejected At-
Credits

AVEVA Software, LLC InduSoft Web Studio prior to Version 8.1 SP3 and InTouch Edge HMI (formerly InTouch Machine Edition) prior to Version 2017 Update. Code is executed under the program runtime privileges, which could lead to the compromise of the machine.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:icscert
Assigner Org ID:7d14cffa-0d7d-4270-9dc0-52cabd5a23a6
Published At:13 Feb, 2019 | 01:00
Updated At:16 Sep, 2024 | 18:14
Rejected At:
▼CVE Numbering Authority (CNA)

AVEVA Software, LLC InduSoft Web Studio prior to Version 8.1 SP3 and InTouch Edge HMI (formerly InTouch Machine Edition) prior to Version 2017 Update. Code is executed under the program runtime privileges, which could lead to the compromise of the machine.

Affected Products
Vendor
ICS-CERT
Product
AVEVA Software, LLC InduSoft Web Studio prior to Version 8.1 SP3 and InTouch Edge HMI (formerly InTouch Machine Edition) prior to Version 2017 Update
Versions
Affected
  • AVEVA Software, LLC InduSoft Web Studio prior to Version 8.1 SP3 and InTouch Edge HMI (formerly InTouch Machine Edition) prior to Version 2017 Update
Problem Types
TypeCWE IDDescription
CWECWE-306MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306
Type: CWE
CWE ID: CWE-306
Description: MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://ics-cert.us-cert.gov/advisories/ICSA-19-036-01
x_refsource_MISC
https://www.exploit-db.com/exploits/46342/
exploit
x_refsource_EXPLOIT-DB
https://www.tenable.com/security/research/tra-2019-04
x_refsource_MISC
Hyperlink: https://ics-cert.us-cert.gov/advisories/ICSA-19-036-01
Resource:
x_refsource_MISC
Hyperlink: https://www.exploit-db.com/exploits/46342/
Resource:
exploit
x_refsource_EXPLOIT-DB
Hyperlink: https://www.tenable.com/security/research/tra-2019-04
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://ics-cert.us-cert.gov/advisories/ICSA-19-036-01
x_refsource_MISC
x_transferred
https://www.exploit-db.com/exploits/46342/
exploit
x_refsource_EXPLOIT-DB
x_transferred
https://www.tenable.com/security/research/tra-2019-04
x_refsource_MISC
x_transferred
Hyperlink: https://ics-cert.us-cert.gov/advisories/ICSA-19-036-01
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://www.exploit-db.com/exploits/46342/
Resource:
exploit
x_refsource_EXPLOIT-DB
x_transferred
Hyperlink: https://www.tenable.com/security/research/tra-2019-04
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:ics-cert@hq.dhs.gov
Published At:13 Feb, 2019 | 01:29
Updated At:30 Nov, 2022 | 22:23

AVEVA Software, LLC InduSoft Web Studio prior to Version 8.1 SP3 and InTouch Edge HMI (formerly InTouch Machine Edition) prior to Version 2017 Update. Code is executed under the program runtime privileges, which could lead to the compromise of the machine.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Primary2.010.0HIGH
AV:N/AC:L/Au:N/C:C/I:C/A:C
Type: Primary
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 10.0
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

AVEVA
aveva
>>indusoft_web_studio>>6.1
cpe:2.3:a:aveva:indusoft_web_studio:6.1:sp5:*:*:*:*:*:*
AVEVA
aveva
>>indusoft_web_studio>>6.1
cpe:2.3:a:aveva:indusoft_web_studio:6.1:sp6_p3:*:*:*:*:*:*
AVEVA
aveva
>>indusoft_web_studio>>7.1
cpe:2.3:a:aveva:indusoft_web_studio:7.1:*:*:*:*:*:*:*
AVEVA
aveva
>>indusoft_web_studio>>7.1
cpe:2.3:a:aveva:indusoft_web_studio:7.1:sp1:*:*:*:*:*:*
AVEVA
aveva
>>indusoft_web_studio>>7.1
cpe:2.3:a:aveva:indusoft_web_studio:7.1:sp2:*:*:*:*:*:*
AVEVA
aveva
>>indusoft_web_studio>>7.1
cpe:2.3:a:aveva:indusoft_web_studio:7.1:sp3:*:*:*:*:*:*
AVEVA
aveva
>>indusoft_web_studio>>7.1
cpe:2.3:a:aveva:indusoft_web_studio:7.1:sp3_p1:*:*:*:*:*:*
AVEVA
aveva
>>indusoft_web_studio>>7.1
cpe:2.3:a:aveva:indusoft_web_studio:7.1:sp3_p2:*:*:*:*:*:*
AVEVA
aveva
>>indusoft_web_studio>>7.1
cpe:2.3:a:aveva:indusoft_web_studio:7.1:sp3_p3:*:*:*:*:*:*
AVEVA
aveva
>>indusoft_web_studio>>7.1
cpe:2.3:a:aveva:indusoft_web_studio:7.1:sp3_p4:*:*:*:*:*:*
AVEVA
aveva
>>indusoft_web_studio>>7.1
cpe:2.3:a:aveva:indusoft_web_studio:7.1:sp3_p5:*:*:*:*:*:*
AVEVA
aveva
>>indusoft_web_studio>>7.1
cpe:2.3:a:aveva:indusoft_web_studio:7.1:sp3_p6:*:*:*:*:*:*
AVEVA
aveva
>>indusoft_web_studio>>7.1
cpe:2.3:a:aveva:indusoft_web_studio:7.1:sp3_p7:*:*:*:*:*:*
AVEVA
aveva
>>indusoft_web_studio>>7.1
cpe:2.3:a:aveva:indusoft_web_studio:7.1:sp3_p8:*:*:*:*:*:*
AVEVA
aveva
>>indusoft_web_studio>>7.1
cpe:2.3:a:aveva:indusoft_web_studio:7.1:sp3_p9:*:*:*:*:*:*
AVEVA
aveva
>>indusoft_web_studio>>8.0
cpe:2.3:a:aveva:indusoft_web_studio:8.0:*:*:*:*:*:*:*
AVEVA
aveva
>>indusoft_web_studio>>8.0
cpe:2.3:a:aveva:indusoft_web_studio:8.0:p1:*:*:*:*:*:*
AVEVA
aveva
>>indusoft_web_studio>>8.0
cpe:2.3:a:aveva:indusoft_web_studio:8.0:p2:*:*:*:*:*:*
AVEVA
aveva
>>indusoft_web_studio>>8.0
cpe:2.3:a:aveva:indusoft_web_studio:8.0:p3:*:*:*:*:*:*
AVEVA
aveva
>>indusoft_web_studio>>8.0
cpe:2.3:a:aveva:indusoft_web_studio:8.0:sp1:*:*:*:*:*:*
AVEVA
aveva
>>indusoft_web_studio>>8.0
cpe:2.3:a:aveva:indusoft_web_studio:8.0:sp1_p1:*:*:*:*:*:*
AVEVA
aveva
>>indusoft_web_studio>>8.0
cpe:2.3:a:aveva:indusoft_web_studio:8.0:sp2:*:*:*:*:*:*
AVEVA
aveva
>>indusoft_web_studio>>8.0
cpe:2.3:a:aveva:indusoft_web_studio:8.0:sp2_p1:*:*:*:*:*:*
AVEVA
aveva
>>indusoft_web_studio>>8.1
cpe:2.3:a:aveva:indusoft_web_studio:8.1:*:*:*:*:*:*:*
AVEVA
aveva
>>indusoft_web_studio>>8.1
cpe:2.3:a:aveva:indusoft_web_studio:8.1:p1:*:*:*:*:*:*
AVEVA
aveva
>>indusoft_web_studio>>8.1
cpe:2.3:a:aveva:indusoft_web_studio:8.1:sp1:*:*:*:*:*:*
AVEVA
aveva
>>indusoft_web_studio>>8.1
cpe:2.3:a:aveva:indusoft_web_studio:8.1:sp1_p1:*:*:*:*:*:*
AVEVA
aveva
>>indusoft_web_studio>>8.1
cpe:2.3:a:aveva:indusoft_web_studio:8.1:sp2:*:*:*:*:*:*
AVEVA
aveva
>>intouch_machine_edition_2014>>r2
cpe:2.3:a:aveva:intouch_machine_edition_2014:r2:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-306Primarynvd@nist.gov
CWE-306Secondaryics-cert@hq.dhs.gov
CWE ID: CWE-306
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-306
Type: Secondary
Source: ics-cert@hq.dhs.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://ics-cert.us-cert.gov/advisories/ICSA-19-036-01ics-cert@hq.dhs.gov
Third Party Advisory
US Government Resource
https://www.exploit-db.com/exploits/46342/ics-cert@hq.dhs.gov
Exploit
Third Party Advisory
VDB Entry
https://www.tenable.com/security/research/tra-2019-04ics-cert@hq.dhs.gov
Third Party Advisory
Hyperlink: https://ics-cert.us-cert.gov/advisories/ICSA-19-036-01
Source: ics-cert@hq.dhs.gov
Resource:
Third Party Advisory
US Government Resource
Hyperlink: https://www.exploit-db.com/exploits/46342/
Source: ics-cert@hq.dhs.gov
Resource:
Exploit
Third Party Advisory
VDB Entry
Hyperlink: https://www.tenable.com/security/research/tra-2019-04
Source: ics-cert@hq.dhs.gov
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

457Records found

CVE-2023-42770
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-10||CRITICAL
EPSS-0.11% / 29.79%
||
7 Day CHG~0.00%
Published-21 Nov, 2023 | 00:14
Updated-11 Jun, 2025 | 14:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Red Lion Controls Sixnet RTU Authentication Bypass Using An Alternative Path Or Channel

Red Lion SixTRAK and VersaTRAK Series RTUs with authenticated users enabled (UDR-A) any Sixnet UDR message will meet an authentication challenge over UDP/IP. When the same message is received over TCP/IP the RTU will simply accept the message with no authentication challenge.

Action-Not Available
Vendor-redlioncontrolsRed Lion Controls
Product-vt-ipm2m-113-d_firmwarevt-mipm-245-d_firmwarevt-ipm2m-213-dvt-mipm-135-d_firmwarevt-mipm-135-dst-ipm-6350st-ipm-6350_firmwarest-ipm-8460_firmwarevt-mipm-245-dvt-ipm2m-213-d_firmwarest-ipm-8460vt-ipm2m-113-dVT-mIPm-135-DVT-IPm2m-213-DST-IPm-8460ST-IPm-6350VT-IPm2m-113-DVT-mIPm-245-D
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-42783
Matching Score-4
Assigner-Government Technology Agency of Singapore Cyber Security Group (GovTech CSG)
ShareView Details
Matching Score-4
Assigner-Government Technology Agency of Singapore Cyber Security Group (GovTech CSG)
CVSS Score-9.8||CRITICAL
EPSS-0.66% / 70.29%
||
7 Day CHG~0.00%
Published-23 Nov, 2021 | 21:37
Updated-04 Aug, 2024 | 03:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing Authentication in debug_post_set.cgi in D-Link DWR-932C E1 Firmware 1.0.0.4

Missing Authentication for Critical Function vulnerability in debug_post_set.cgi of D-Link DWR-932C E1 firmware allows an unauthenticated attacker to execute administrative actions.

Action-Not Available
Vendor-D-Link Corporation
Product-dwr-932c_e1_firmwaredwr-932cDWR-932C E1
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-43832
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-10||CRITICAL
EPSS-1.81% / 82.11%
||
7 Day CHG~0.00%
Published-04 Jan, 2022 | 19:20
Updated-23 Apr, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Access Control in spinnaker

Spinnaker is an open source, multi-cloud continuous delivery platform. Spinnaker has improper permissions allowing pipeline creation & execution. This lets an arbitrary user with access to the gate endpoint to create a pipeline and execute it without authentication. If users haven't setup Role-based access control (RBAC) with-in spinnaker, this enables remote execution and access to deploy almost any resources on any account. Patches are available on the latest releases of the supported branches and users are advised to upgrade as soon as possible. Users unable to upgrade should enable RBAC on ALL accounts and applications. This mitigates the ability of a pipeline to affect any accounts. Block application access unless permission are enabled. Users should make sure ALL application creation is restricted via appropriate wildcards.

Action-Not Available
Vendor-spinnakerThe Linux Foundation
Product-spinnakerspinnaker
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-41351
Matching Score-4
Assigner-TWCERT/CC
ShareView Details
Matching Score-4
Assigner-TWCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-0.09% / 25.68%
||
7 Day CHG~0.00%
Published-03 Nov, 2023 | 05:41
Updated-04 Sep, 2024 | 20:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Chunghwa Telecom NOKIA G-040W-Q - Broken Access Control

Chunghwa Telecom NOKIA G-040W-Q has a vulnerability of authentication bypass, which allows an unauthenticated remote attacker to bypass the authentication mechanism to log in to the device by an alternative URL. This makes it possible for unauthenticated remote attackers to log in as any existing users, such as an administrator, to perform arbitrary system operations or disrupt service.

Action-Not Available
Vendor-Chunghwa TelecomNokia Corporation
Product-g-040w-qg-040w-q_firmwareNOKIA G-040W-Qg-040w-q_firmware
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-41266
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-8.6||HIGH
EPSS-80.00% / 99.07%
||
7 Day CHG~0.00%
Published-15 Nov, 2021 | 20:20
Updated-04 Aug, 2024 | 03:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authentication bypass issue in the Operator Console

Minio console is a graphical user interface for the for MinIO operator. Minio itself is a multi-cloud object storage project. Affected versions are subject to an authentication bypass issue in the Operator Console when an external IDP is enabled. All users on release v0.12.2 and before are affected and are advised to update to 0.12.3 or newer. Users unable to upgrade should add automountServiceAccountToken: false to the operator-console deployment in Kubernetes so no service account token will get mounted inside the pod, then disable the external identity provider authentication by unset the CONSOLE_IDP_URL, CONSOLE_IDP_CLIENT_ID, CONSOLE_IDP_SECRET and CONSOLE_IDP_CALLBACK environment variable and instead use the Kubernetes service account token.

Action-Not Available
Vendor-minminio
Product-minio_consoleconsole
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-41418
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.30% / 52.77%
||
7 Day CHG~0.00%
Published-15 Jun, 2022 | 19:40
Updated-04 Aug, 2024 | 03:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

AriaNg v0.1.0~v1.2.2 is affected by an incorrect access control vulnerability through not authenticating visitors' access rights.

Action-Not Available
Vendor-ariang_projectn/a
Product-ariangn/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-36669
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.22% / 44.14%
||
7 Day CHG~0.00%
Published-18 Jul, 2023 | 00:00
Updated-28 Oct, 2024 | 18:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Missing Authentication for a Critical Function within the Kratos NGC Indoor Unit (IDU) before 11.4 allows remote attackers to obtain arbitrary control of the IDU/ODU system. Any attacker with layer-3 network access to the IDU can impersonate the Touch Panel Unit (TPU) within the IDU by sending crafted TCP requests to the IDU.

Action-Not Available
Vendor-kratosdefensen/akratosdefense
Product-ngc_indoor_unit_firmwarengc_indoor_unitn/angc_indoor_unit
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-37415
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-89.33% / 99.52%
||
7 Day CHG~0.00%
Published-01 Sep, 2021 | 05:29
Updated-30 Jul, 2025 | 01:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2021-12-15||Apply updates per vendor instructions.

Zoho ManageEngine ServiceDesk Plus before 11302 is vulnerable to authentication bypass that allows a few REST-API URLs without authentication.

Action-Not Available
Vendor-n/aZoho Corporation Pvt. Ltd.
Product-manageengine_servicedesk_plusn/aManageEngine ServiceDesk Plus (SDP)
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-37265
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.8||CRITICAL
EPSS-90.19% / 99.57%
||
7 Day CHG~0.00%
Published-17 Jul, 2023 | 20:59
Updated-07 Apr, 2025 | 13:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Incorrect identification of source IP addresses in CasaOS

CasaOS is an open-source Personal Cloud system. Due to a lack of IP address verification an unauthenticated attackers can execute arbitrary commands as `root` on CasaOS instances. The problem was addressed by improving the detection of client IP addresses in `391dd7f`. This patch is part of CasaOS 0.4.4. Users should upgrade to CasaOS 0.4.4. If they can't, they should temporarily restrict access to CasaOS to untrusted users, for instance by not exposing it publicly.

Action-Not Available
Vendor-icewhaleIceWhaleTechicewhale
Product-casaoscasaos-gatewayCasaOS-Gatewaycasaos-gateway
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-38540
Matching Score-4
Assigner-Apache Software Foundation
ShareView Details
Matching Score-4
Assigner-Apache Software Foundation
CVSS Score-9.8||CRITICAL
EPSS-89.91% / 99.55%
||
7 Day CHG~0.00%
Published-09 Sep, 2021 | 15:05
Updated-04 Aug, 2024 | 01:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apache Airflow: Variable Import endpoint missed authentication check

The variable import endpoint was not protected by authentication in Airflow >=2.0.0, <2.1.3. This allowed unauthenticated users to hit that endpoint to add/modify Airflow variables used in DAGs, potentially resulting in a denial of service, information disclosure or remote code execution. This issue affects Apache Airflow >=2.0.0, <2.1.3.

Action-Not Available
Vendor-The Apache Software Foundation
Product-airflowApache Airflow
CWE ID-CWE-269
Improper Privilege Management
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-26347
Matching Score-4
Assigner-Nozomi Networks Inc.
ShareView Details
Matching Score-4
Assigner-Nozomi Networks Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.18% / 40.41%
||
7 Day CHG~0.00%
Published-12 Feb, 2025 | 13:27
Updated-17 Feb, 2025 | 10:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A CWE-306 "Missing Authentication for Critical Function" in maxprofile/menu/routes.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an unauthenticated remote attacker to edit user permissions via crafted HTTP requests.

Action-Not Available
Vendor-Q-Free
Product-MaxTime
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-37843
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.91% / 74.86%
||
7 Day CHG~0.00%
Published-02 Aug, 2021 | 18:47
Updated-04 Aug, 2024 | 01:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The resolution SAML SSO apps for Atlassian products allow a remote attacker to login to a user account when only the username is known (i.e., no other authentication is provided). The fixed versions are for Jira: 3.6.6.1, 4.0.12, 5.0.5; for Confluence 3.6.6, 4.0.12, 5.0.5; for Bitbucket 2.5.9, 3.6.6, 4.0.12, 5.0.5; for Bamboo 2.5.9, 3.6.6, 4.0.12, 5.0.5; and for Fisheye 2.5.9.

Action-Not Available
Vendor-n/aAtlassian
Product-saml_single_sign_onn/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-27214
Matching Score-4
Assigner-HackerOne
ShareView Details
Matching Score-4
Assigner-HackerOne
CVSS Score-9.8||CRITICAL
EPSS-0.06% / 18.96%
||
7 Day CHG+0.01%
Published-21 Aug, 2025 | 00:01
Updated-22 Aug, 2025 | 18:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Missing Authentication for Critical Function vulnerability in the UniFi Connect EV Station Pro may allow a malicious actor with physical or adjacent access to perform an unauthorized factory reset. Affected Products: UniFi Connect EV Station Pro (Version 1.5.18 and earlier) Mitigation: Update UniFi Connect EV Station Pro to Version 1.5.27 or later

Action-Not Available
Vendor-Ubiquiti Inc.
Product-UniFi Connect EV Station Pro
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-38412
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.6||CRITICAL
EPSS-0.16% / 36.99%
||
7 Day CHG~0.00%
Published-17 Sep, 2021 | 19:07
Updated-17 Sep, 2024 | 00:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Digi PortServer TS 16 Improper Authentication

Properly formatted POST requests to multiple resources on the HTTP and HTTPS web servers of the Digi PortServer TS 16 Rack device do not require authentication or authentication tokens. This vulnerability could allow an attacker to enable the SNMP service and manipulate the community strings to achieve further control in.

Action-Not Available
Vendor-digiDigi International
Product-portserver_ts_16_firmwareportserver_ts_16PortServer TS 16
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-38457
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.8||CRITICAL
EPSS-0.27% / 50.48%
||
7 Day CHG~0.00%
Published-22 Oct, 2021 | 11:23
Updated-16 Sep, 2024 | 21:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
AUVESY Versiondog

The server permits communication without any authentication procedure, allowing the attacker to initiate a session with the server without providing any form of authentication.

Action-Not Available
Vendor-auvesyAUVESY
Product-versiondogVersiondog
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-26344
Matching Score-4
Assigner-Nozomi Networks Inc.
ShareView Details
Matching Score-4
Assigner-Nozomi Networks Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.19% / 40.96%
||
7 Day CHG~0.00%
Published-12 Feb, 2025 | 13:27
Updated-18 Feb, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A CWE-306 "Missing Authentication for Critical Function" in maxprofile/guest-mode/routes.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an unauthenticated remote attacker to enable passwordless guest mode via crafted HTTP requests.

Action-Not Available
Vendor-Q-Free
Product-MaxTime
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-24865
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-10||CRITICAL
EPSS-64.09% / 98.36%
||
7 Day CHG~0.00%
Published-13 Feb, 2025 | 21:29
Updated-04 Mar, 2025 | 20:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
mySCADA myPRO Manager Missing Authentication for Critical Function

The administrative web interface of mySCADA myPRO Manager can be accessed without authentication which could allow an unauthorized attacker to retrieve sensitive information and upload files without the associated password.

Action-Not Available
Vendor-myscadamySCADA
Product-mypromyPRO Manager
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-36124
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.54% / 66.67%
||
7 Day CHG~0.00%
Published-13 Jul, 2021 | 13:57
Updated-04 Aug, 2024 | 00:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Echo ShareCare 8.15.5. It does not perform authentication or authorization checks when accessing a subset of sensitive resources, leading to the ability for unauthenticated users to access pages that are vulnerable to attacks such as SQL injection.

Action-Not Available
Vendor-echobhn/a
Product-sharecaren/a
CWE ID-CWE-862
Missing Authorization
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-36888
Matching Score-4
Assigner-Patchstack
ShareView Details
Matching Score-4
Assigner-Patchstack
CVSS Score-9.8||CRITICAL
EPSS-1.09% / 77.07%
||
7 Day CHG~0.00%
Published-15 Dec, 2021 | 18:06
Updated-28 Mar, 2025 | 16:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WordPress Image Hover Effects Ultimate plugin <= 9.6.1 - Unauthenticated Arbitrary Options Update leading to full website compromise

Unauthenticated Arbitrary Options Update vulnerability leading to full website compromise discovered in Image Hover Effects Ultimate (versions <= 9.6.1) WordPress plugin.

Action-Not Available
Vendor-blockseraBiplob Adhikari (Oxilab Development)
Product-image_hover_effectsImage Hover Effects Ultimate (WordPress plugin)
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-35830
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-1.50% / 80.43%
||
7 Day CHG~0.00%
Published-29 Jun, 2023 | 00:00
Updated-27 Nov, 2024 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

STW (aka Sensor-Technik Wiedemann) TCG-4 Connectivity Module DeploymentPackage_v3.03r0-Impala and DeploymentPackage_v3.04r2-Jellyfish and TCG-4lite Connectivity Module DeploymentPackage_v3.04r2-Jellyfish allow an attacker to gain full remote access with root privileges without the need for authentication, giving an attacker arbitrary remote code execution over LTE / 4G network via SMS.

Action-Not Available
Vendor-stw-mobile-machinesn/astw-mobile-machines
Product-tcg-4tcg-4litetcg-4lite_firmwaretcg-4_firmwaren/atcg-4tcg-4lite
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-26341
Matching Score-4
Assigner-Nozomi Networks Inc.
ShareView Details
Matching Score-4
Assigner-Nozomi Networks Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.19% / 40.96%
||
7 Day CHG~0.00%
Published-12 Feb, 2025 | 13:27
Updated-17 Feb, 2025 | 10:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A CWE-306 "Missing Authentication for Critical Function" in maxprofile/accounts/routes.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an unauthenticated remote attacker to reset arbitrary user passwords via crafted HTTP requests.

Action-Not Available
Vendor-Q-Free
Product-MaxTime
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-26345
Matching Score-4
Assigner-Nozomi Networks Inc.
ShareView Details
Matching Score-4
Assigner-Nozomi Networks Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.16% / 37.63%
||
7 Day CHG~0.00%
Published-12 Feb, 2025 | 13:27
Updated-18 Feb, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A CWE-306 "Missing Authentication for Critical Function" in maxprofile/menu/routes.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an unauthenticated remote attacker to edit user group permissions via crafted HTTP requests.

Action-Not Available
Vendor-Q-Free
Product-MaxTime
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-35854
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-3.96% / 87.91%
||
7 Day CHG~0.00%
Published-20 Jun, 2023 | 00:00
Updated-02 Aug, 2024 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Zoho ManageEngine ADSelfService Plus through 6113 has an authentication bypass that can be exploited to steal the domain controller session token for identity spoofing, thereby achieving the privileges of the domain controller administrator. NOTE: the vendor's perspective is that they have "found no evidence or detail of a security vulnerability."

Action-Not Available
Vendor-n/aZoho Corporation Pvt. Ltd.
Product-manageengine_adselfservice_plusn/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2020-10625
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.8||CRITICAL
EPSS-0.25% / 47.91%
||
7 Day CHG~0.00%
Published-09 Apr, 2020 | 13:06
Updated-04 Aug, 2024 | 11:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

WebAccess/NMS (versions prior to 3.0.2) allows an unauthenticated remote user to create a new admin account.

Action-Not Available
Vendor-n/aAdvantech (Advantech Co., Ltd.)
Product-webaccess\/nmsWebAccess/NMS
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2020-10282
Matching Score-4
Assigner-Alias Robotics S.L.
ShareView Details
Matching Score-4
Assigner-Alias Robotics S.L.
CVSS Score-9.8||CRITICAL
EPSS-0.44% / 62.37%
||
7 Day CHG~0.00%
Published-03 Jul, 2020 | 14:30
Updated-16 Sep, 2024 | 17:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
RVD#3316: No authentication in MAVLink protocol

The Micro Air Vehicle Link (MAVLink) protocol presents no authentication mechanism on its version 1.0 (nor authorization) whichs leads to a variety of attacks including identity spoofing, unauthorized access, PITM attacks and more. According to literature, version 2.0 optionally allows for package signing which mitigates this flaw. Another source mentions that MAVLink 2.0 only provides a simple authentication system based on HMAC. This implies that the flying system overall should add the same symmetric key into all devices of network. If not the case, this may cause a security issue, that if one of the devices and its symmetric key are compromised, the whole authentication system is not reliable.

Action-Not Available
Vendor-dronecodeunspecified
Product-micro_air_vehicle_linkMAVLink
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2020-10038
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-9.8||CRITICAL
EPSS-0.39% / 59.39%
||
7 Day CHG~0.00%
Published-14 Jul, 2020 | 13:18
Updated-04 Aug, 2024 | 10:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SICAM MMU (All versions < V2.05), SICAM SGU (All versions), SICAM T (All versions < V2.18). An attacker with access to the device's web server might be able to execute administrative commands without authentication.

Action-Not Available
Vendor-Siemens AG
Product-sicam_t_firmwaresicam_mmusicam_sgu_firmwaresicam_mmu_firmwaresicam_sgusicam_tSICAM TSICAM MMUSICAM SGU
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-33553
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.04% / 10.69%
||
7 Day CHG~0.00%
Published-07 Jun, 2023 | 00:00
Updated-07 Jan, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in Planet Technologies WDRT-1800AX v1.01-CP21 allows attackers to bypass authentication and escalate privileges to root via manipulation of the LoginStatus cookie.

Action-Not Available
Vendor-planetn/a
Product-wdrt-1800axwdrt-1800ax_firmwaren/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CWE ID-CWE-287
Improper Authentication
CVE-2023-34060
Matching Score-4
Assigner-VMware by Broadcom
ShareView Details
Matching Score-4
Assigner-VMware by Broadcom
CVSS Score-9.8||CRITICAL
EPSS-0.07% / 20.86%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 20:20
Updated-07 Jan, 2025 | 19:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

VMware Cloud Director Appliance contains an authentication bypass vulnerability in case VMware Cloud Director Appliance was upgraded to 10.5 from an older version. On an upgraded version of VMware Cloud Director Appliance 10.5, a malicious actor with network access to the appliance can bypass login restrictions when authenticating on port 22 (ssh) or port 5480 (appliance management console) . This bypass is not present on port 443 (VCD provider and tenant login). On a new installation of VMware Cloud Director Appliance 10.5, the bypass is not present. VMware Cloud Director Appliance is impacted since it uses an affected version of sssd from the underlying Photon OS. The sssd issue is no longer present in versions of Photon OS that ship with sssd-2.8.1-11 or higher (Photon OS 3) or sssd-2.8.2-9 or higher (Photon OS 4 and 5).

Action-Not Available
Vendor-n/aVMware (Broadcom Inc.)
Product-photon_oscloud_directorVMware Cloud Director Appliance (VCD Appliance)
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2019-9201
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-2.01% / 82.97%
||
7 Day CHG~0.00%
Published-26 Feb, 2019 | 23:00
Updated-16 Sep, 2024 | 18:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple Phoenix Contact devices allow remote attackers to establish TCP sessions to port 1962 and obtain sensitive information or make changes, as demonstrated by using the Create Backup feature to traverse all directories.

Action-Not Available
Vendor-n/aPhoenix Contact GmbH & Co. KG
Product-ilc_151_eth\/xc_firmwareilc_171_eth_2tx_firmwareilc_171_eth_2txilc_151_eth\/xcilc_131_eth\/xc_firmwareilc_131_eth\/xcilc_191_me\/anilc_191_eth_2txilc_191_eth_2tx_firmwareaxc_1050ilc_191_me\/an_firmwareilc_131_eth_firmwareilc_131_ethilc_151_eth_firmwareaxc_1050_firmwareilc_151_ethn/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-31411
Matching Score-4
Assigner-SICK AG
ShareView Details
Matching Score-4
Assigner-SICK AG
CVSS Score-9.8||CRITICAL
EPSS-0.17% / 37.98%
||
7 Day CHG~0.00%
Published-19 Jun, 2023 | 14:59
Updated-09 Dec, 2024 | 21:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A remote unprivileged attacker can modify and access configuration settings on the EventCam App due to the absence of API authentication. The lack of authentication in the API allows the attacker to potentially compromise the functionality of the EventCam App.

Action-Not Available
Vendor-SICK AG
Product-sick_eventcam_appEventCam App
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2019-5617
Matching Score-4
Assigner-Rapid7, Inc.
ShareView Details
Matching Score-4
Assigner-Rapid7, Inc.
CVSS Score-10||CRITICAL
EPSS-1.91% / 82.58%
||
7 Day CHG~0.00%
Published-06 Nov, 2019 | 18:30
Updated-17 Sep, 2024 | 02:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
C4G BLIS Improper Access Control

Computing For Good's Basic Laboratory Information System (also known as C4G BLIS) version 3.4 and earlier suffers from an instance of CWE-284, "Improper Access Control." As a result, an unauthenticated user may change the password of any administrator-level user.

Action-Not Available
Vendor-gatechComputing For Good
Product-computing_for_good\'s_basic_laboratory_information_systemBasic Laboratory Information System
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-31143
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.11% / 30.72%
||
7 Day CHG~0.00%
Published-09 May, 2023 | 14:59
Updated-28 Jan, 2025 | 16:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Mage terminal user authentication not working properly

mage-ai is an open-source data pipeline tool for transforming and integrating data. Those who use Mage starting in version 0.8.34 and prior to 0.8.72 with user authentication enabled may be affected by a vulnerability. The terminal could be accessed by users who are not signed in or do not have editor permissions. Version 0.8.72 contains a fix for this issue.

Action-Not Available
Vendor-magemage-ai
Product-mage-aimage-ai
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2019-5620
Matching Score-4
Assigner-Rapid7, Inc.
ShareView Details
Matching Score-4
Assigner-Rapid7, Inc.
CVSS Score-9.8||CRITICAL
EPSS-77.23% / 98.93%
||
7 Day CHG~0.00%
Published-29 Apr, 2020 | 22:15
Updated-17 Sep, 2024 | 03:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ABB MicroSCADA Pro SYS600 Missing Authentication for Critical Function

ABB MicroSCADA Pro SYS600 version 9.3 suffers from an instance of CWE-306: Missing Authentication for Critical Function.

Action-Not Available
Vendor-Hitachi Energy Ltd.Microsoft CorporationABB
Product-microscada_pro_sys600windows_7windows_xpMicroSCADA Pro SYS600
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-29411
Matching Score-4
Assigner-Schneider Electric
ShareView Details
Matching Score-4
Assigner-Schneider Electric
CVSS Score-9.8||CRITICAL
EPSS-5.99% / 90.33%
||
7 Day CHG~0.00%
Published-18 Apr, 2023 | 20:49
Updated-05 Feb, 2025 | 21:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A CWE-306: Missing Authentication for Critical Function vulnerability exists that could allow changes to administrative credentials, leading to potential remote code execution without requiring prior authentication on the Java RMI interface.

Action-Not Available
Vendor-Microsoft CorporationSchneider Electric SE
Product-windows_server_2016apc_easy_ups_online_monitoring_softwareeasy_ups_online_monitoring_softwarewindows_11windows_10windows_server_2022windows_server_2019Schneider Electric Easy UPS Online Monitoring Software (Windows 10, 11 Windows Server 2016, 2019, 2022)APC Easy UPS Online Monitoring Software (Windows 10, 11 Windows Server 2016, 2019, 2022)
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2019-5504
Matching Score-4
Assigner-NetApp, Inc.
ShareView Details
Matching Score-4
Assigner-NetApp, Inc.
CVSS Score-9.8||CRITICAL
EPSS-1.24% / 78.45%
||
7 Day CHG~0.00%
Published-24 Sep, 2019 | 19:53
Updated-04 Aug, 2024 | 20:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ONTAP Select Deploy administration utility versions 2.12 & 2.12.1 ship with an HTTP service bound to the network allowing unauthenticated remote attackers to perform administrative actions.

Action-Not Available
Vendor-n/aNetApp, Inc.
Product-ontap_select_deploy_administration_utilityONTAP Select Deploy administration utility
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-28697
Matching Score-4
Assigner-TWCERT/CC
ShareView Details
Matching Score-4
Assigner-TWCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-0.39% / 59.36%
||
7 Day CHG~0.00%
Published-27 Apr, 2023 | 00:00
Updated-31 Jan, 2025 | 18:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Moxa MiiNePort E1 - Broken Access Control

Moxa MiiNePort E1 has a vulnerability of insufficient access control. An unauthenticated remote user can exploit this vulnerability to perform arbitrary system operation or disrupt service.

Action-Not Available
Vendor-Moxa Inc.
Product-miineport_e1_firmwaremiineport_e1MiiNePort E1
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-27396
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-1.54% / 80.67%
||
7 Day CHG~0.00%
Published-19 Jun, 2023 | 00:00
Updated-24 Dec, 2024 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

FINS (Factory Interface Network Service) is a message communication protocol, which is designed to be used in closed FA (Factory Automation) networks, and is used in FA networks composed of OMRON products. Multiple OMRON products that implement FINS protocol contain following security issues -- (1)Plaintext communication, and (2)No authentication required. When FINS messages are intercepted, the contents may be retrieved. When arbitrary FINS messages are injected, any commands may be executed on, or the system information may be retrieved from, the affected device. Affected products and versions are as follows: SYSMAC CS-series CPU Units, all versions, SYSMAC CJ-series CPU Units, all versions, SYSMAC CP-series CPU Units, all versions, SYSMAC NJ-series CPU Units, all versions, SYSMAC NX1P-series CPU Units, all versions, SYSMAC NX102-series CPU Units, all versions, and SYSMAC NX7 Database Connection CPU Units (Ver.1.16 or later)

Action-Not Available
Vendor-omronOMRON Corporation
Product-nx1p2-1040dt_firmwarenx701-1620_firmwarenj501-5300cp1e-e10dt-d_firmwarecp1e-e40sdr-a_firmwarecj2h-cpu64_firmwarecp1e-n40s1dt-d_firmwarecp1w-20edt_firmwarecs1w-etn21cp2w-cifd2cp1w-ext01_firmwarecp2e-s30dt-d_firmwarecp1w-40edrcp2e-n30dt-dcp1l-el20dr-dcp1h-x40dr-acp2e-n20dt-d_firmwarecs1w-clk_firmwarenx102-1000cp1e-n20dt-acp2w-cifd3_firmwarecp1w-mad42_firmwarecp1h-xa40dr-a_firmwarecp1w-16ercp1l-l14dt-a_firmwarecp1l-m30dr-acp1l-l20dt-acp2w-cifd2_firmwarenx1p2-1140dt1cp1e-n60s1dr-a_firmwarecp1w-20edtcp1w-ts002cp2e-n60dr-acp1l-em40dt1-dcj2m-cpu32cp1e-n40sdt-dcp1e-n30sdr-acp1e-n14dt-acp2e-s60dt-d_firmwarecp2e-s40dt-d_firmwarecp1w-ts102cs1w-ncf71cp1e-n20dr-acp1l-m40dr-dcp2e-n40dr-d_firmwarecp2e-e14dr-a_firmwarecp1w-40edt_firmwarecp2e-e60dr-a_firmwarenj501-r400_firmwarecp1l-l20dt1-dnj501-1300_firmwarecp1l-l14dr-dcp1e-n30s1dr-a_firmwarecp1w-dam01cp1h-x40dt-d_firmwarecp1e-n40sdr-acj2m-cpu15_firmwarecp2e-s40dt1-dcp2e-n14dr-dcp1e-n20dr-dcp1w-cif11_firmwarecp2e-s30dr-a_firmwarecp1e-e14sdr-a_firmwarecj2m-cpu12_firmwarecp1e-n30dt-dnj501-r400cp1e-n30s1dt-d_firmwarecj2h-cpu67-eip_firmwarecp2e-n20dt-a_firmwarecp1w-srt21nj101-9020cs1w-clkcp1e-e20sdr-acj2h-cpu68-eipcp2e-n30dr-acp2e-s60dt1-d_firmwarenj501-r320cp1l-m30dt-d_firmwarecp2e-n30dt-a_firmwarecp1l-m30dt-a_firmwarecp2e-s30dt1-dcp1e-n60dr-d_firmwarecj2m-cpu33_firmwarecp1l-l20dr-a_firmwarecs1w-nc471nx1p2-1040dt1cp1w-ts001cp2e-n60dt1-d_firmwarecp1w-ad042cp2e-e40dr-a_firmwarecp1e-n60sdt-dcp1e-n14dt1-dcp2e-n14dr-d_firmwarecs1w-nc471_firmwarecp2e-n60dt-d_firmwarecp2e-e40dr-acp1w-8ercp1l-l14dr-d_firmwarenx102-1000_firmwarecp1e-n60s1dt1-d_firmwarecp2e-n14dt-acp1e-n60dt-a_firmwarecp2e-s60dr-acp1e-n20dt1-dnx102-1100_firmwarecp1w-20edr1_firmwarecp1w-ad041_firmwarecp1e-n60sdr-anj501-1320_firmwarecp2e-n20dt-acp1e-e10dt-dcp1e-n30dt1-a_firmwarecp1w-mab221_firmwarecp1e-e20dr-a_firmwarecs1w-spu01-v2_firmwarecp1e-n60dr-dcp1l-em40dt1-d_firmwarecp1l-l20dr-d_firmwarenj501-4400cp2e-e60dr-acp2e-n60dr-d_firmwarecp1e-n14dt1-a_firmwarecp1l-em40dr-d_firmwarecp1e-n40dt1-a_firmwarecp1w-cif01cp1e-n14dt-dcp2e-n40dt-dnj-pd3001_firmwarecs1w-nc271_firmwarenx1p2-1140dtcp1w-mad42cp2e-s30dt-dcj2m-cpu12cp1e-n40s1dt1-dnj501-4310cp1e-n20dt-dcp1l-m30dt1-d_firmwarecp1e-e14dr-a_firmwarecp1l-l10dt-dcp1e-n14dr-acs1w-drm21-v1_firmwarenj501-4300_firmwarecp1e-n14dt-a_firmwarecp1w-ad042_firmwarenj501-4500_firmwarecj2h-cpu64cp1w-srt21_firmwarecp1w-20edt1cp1e-n60dt1-d_firmwarecp1w-ts101_firmwarecp2e-n40dr-dcp1w-16er_firmwarecp2e-e20dr-acp1e-n20dt-a_firmwarenx102-1100cp1l-em30dt1-d_firmwarecp1e-na20dt1-dcp1e-n40dt1-dcp1l-em30dt1-dcp1l-m30dr-dnx1p2-1040dt1_firmwarecp1l-l10dt-d_firmwarecp1w-16et1_firmwarecp2w-cifd1cp1w-mad44_firmwarecj2m-md211cp1w-ts101cp1w-40edr_firmwarecp1e-n40sdt-d_firmwarenx701-1720_firmwarecp1l-m60dr-dcp1w-8et1_firmwarecp1w-me05m_firmwarecp1w-mad11_firmwarecp1e-n14dt1-d_firmwarecp1e-n60dt1-dcs1w-spu02-v2_firmwarecj2m-cpu34cp2e-n14dt-d_firmwarecp1w-8edcj2m-cpu31_firmwarecp1w-cif41cp1w-40edtcp1h-xa40dt-dcp1l-m60dt1-d_firmwarecp1e-n40sdt1-d_firmwarecp1l-l10dt1-dcp1l-m60dt1-dcp1e-e60sdr-a_firmwarecp2e-n30dr-a_firmwarecp1e-n40dr-a_firmwarecj2m-cpu11cp1w-32etcp1e-n40dt-acp1e-n14dr-a_firmwarecp1e-e10dt1-dcj2m-md212_firmwarecp1w-40edt1nj501-r500nj501-1320nj501-1340_firmwarenj301-1200_firmwarenx102-1020nx102-9000cp2e-n60dr-dcp2e-n20dr-dcp1w-ts003_firmwarecp2e-n14dt1-d_firmwarecp1h-xa40dt1-dcp1l-m60dr-d_firmwarecp2e-n14dt-dcs1w-drm21-v1cp2e-n20dr-anx102-1220cp1e-n40sdr-a_firmwarenx102-1200_firmwarecp1l-m40dt-dcp1w-16et_firmwarenx1p2-9024dt_firmwarecp2e-n40dt-d_firmwarecp1e-n40sdt1-dcp1e-n40s1dr-acp2e-s40dt-dcp1e-e40dr-acp1e-n30s1dt1-dcp1l-m30dt1-dnx1p2-1140dt1_firmwarenj501-1400_firmwarecp1w-mab221nj501-1500_firmwarecp2e-s40dr-a_firmwarecs1w-eip21_firmwarecp1l-m30dt-dcp1e-e10dt-anj501-1420cp1w-32er_firmwarenx701-1720nj501-4320cp1w-cif12-v1cp1l-m60dr-a_firmwarecp1h-x40dt1-d_firmwarecp1w-8et_firmwarenx102-9000_firmwarenj501-1520nx102-1120_firmwarecp2e-e30dr-a_firmwarecp1l-m30dr-a_firmwarecp2e-n40dt1-d_firmwarecp1e-n60dt1-a_firmwarenj501-4300cp1l-m30dt-anj101-1000_firmwarecj2m-cpu13_firmwarenj101-9020_firmwarecs1w-fln22_firmwarecp1h-x40dt-dcp1e-e60sdr-acp1w-da042cp1e-n30dr-d_firmwarecp1e-n30sdt1-dcp1l-el20dr-d_firmwarecp1e-n40s1dt-dcp2e-n60dr-a_firmwarenx1p2-9024dt1cp1e-n30sdt-d_firmwarecp1e-e40sdr-acp1w-mad11cp2e-n20dr-d_firmwarecp1e-n30s1dt1-d_firmwarecp1e-n20dt-d_firmwarecp1e-n60s1dt-d_firmwarecp1l-m40dr-acp1e-n40s1dt1-d_firmwarecj2h-cpu67-eipcp1l-l20dr-dcp1l-l14dr-anj501-r300cp1l-el20dt-dcp1e-n40dr-dcs1w-nc271cp2e-n60dt-acj2h-cpu66-eipcp1e-n30s1dr-acp1e-n60sdt-d_firmwarenx1p2-9024dtnj501-1420_firmwarecp1l-l20dt1-d_firmwarecp1l-m40dt1-dcj2m-cpu14_firmwarecp1l-m60dt-dcp1l-em30dt-d_firmwarecp1l-l10dr-a_firmwarecj2h-cpu66_firmwarecp1e-e30sdr-acp1e-n30sdr-a_firmwarecp1e-n20dt1-acp1e-n20dr-a_firmwarecp1w-me05mcp1e-n30dt-d_firmwarenx1p2-1140dt_firmwarenx1p2-1040dtnx102-1020_firmwarenj501-4310_firmwarecj2m-cpu13cs1w-spu01-v2cp1w-ts102_firmwarecp1w-cn811cp1h-xa40dt1-d_firmwarecp1w-16etnj501-r520cp1e-n30dt1-d_firmwarecp2e-n14dt-a_firmwarecp1h-x40dt1-dnj501-4320_firmwarecs1w-spu02-v2nj501-4400_firmwarecp1w-da042_firmwarecj2m-cpu11_firmwarecp1l-m60dt-a_firmwarecp1e-n40dt-dnx102-9020cp1l-l10dr-acp1l-m40dr-d_firmwarecp1w-ts004cp1h-y20dt-dcp2e-s30dt1-d_firmwarenx102-1200cp1e-n40dr-acp1w-dam01_firmwarecp2e-n20dr-a_firmwarecp1l-el20dt1-d_firmwarenx1p2-9024dt1_firmwarenj101-9000_firmwarecp2w-cifd3cp2e-s60dr-a_firmwarecp1w-40edt1_firmwarecp1l-em40dt-d_firmwarecp1w-20edt1_firmwarecp1e-n14dr-d_firmwarecp1e-n20dt1-d_firmwarecp1e-n30s1dt-dnj501-5300_firmwarecp2e-n14dt1-dcp1e-n40dt-d_firmwarenj101-1020cp2e-s40dr-acj2m-cpu33cp1h-xa40dt-d_firmwarecj2h-cpu65-eipcp2e-n40dt-acp1e-n30dt1-dcp1l-m40dr-a_firmwarecs1w-ncf71_firmwarecp1e-e10dt-a_firmwarecp1e-e14dr-acp2e-e30dr-acp1l-l14dt-dcp1e-e10dt1-a_firmwarecp1e-n30dr-anj501-1340cj2m-cpu32_firmwarecp1e-n20dr-d_firmwarecp1l-l10dt-a_firmwarecj2h-cpu66-eip_firmwarecp1w-cif12-v1_firmwarecj2h-cpu64-eipcp1e-e30dr-a_firmwarecp1l-l10dt1-d_firmwarecp2e-e20dr-a_firmwarecp1l-l14dr-a_firmwarecp1w-adb21cj2m-cpu35_firmwarecp1w-8etcp1l-em30dr-d_firmwarecp1e-e10dr-dcp1e-n60dr-acp1w-ad041cp1e-n40dt-a_firmwarecp2e-n30dt-acp1l-l20dt-d_firmwarecp1h-x40dr-a_firmwarecp2e-n40dt1-dcp1w-da021_firmwarecp2e-n30dt1-dcj2m-cpu31cp2e-n40dr-a_firmwarecp1e-n40dr-d_firmwarecp1e-na20dt1-d_firmwarecp1w-20edr1cp1e-n30sdt-dcp2e-s40dt1-d_firmwarecp1l-l14dt1-dcj2h-cpu65_firmwarecj2h-cpu68cp1e-e10dt1-d_firmwarenj501-r300_firmwarecj2h-cpu68_firmwarecp1l-l10dt-acp1w-ext01nj501-r320_firmwarecp1e-na20dt-d_firmwarecj2m-cpu15cp1w-adb21_firmwarecp1w-16et1cp1l-em30dt-dcp1e-n14dt-d_firmwarecp1e-n30dr-a_firmwarecp1e-e10dt1-anj501-1300cp1w-mad44cp1w-cif41_firmwarenx102-1120cs1w-etn21_firmwarecp1e-e10dr-d_firmwarecp1w-da041_firmwarecp1h-xa40dr-anj-pa3001_firmwarenx102-9020_firmwarecp1e-n30dt-anj101-1000cp2e-n20dt1-dcp1l-l14dt-anj-pd3001cp2e-n14dr-acp2e-n30dt1-d_firmwarecp1e-na20dr-acp1w-dab21vcp1e-n60dt1-acj2m-cpu35cp1e-e10dr-acp1l-l14dt1-d_firmwarecj2h-cpu68-eip_firmwarecj2h-cpu67cp2e-n60dt-a_firmwarecp1l-em30dr-dcj2m-md212nj501-1500cp1l-l10dr-dcp2e-s60dt1-dcp1e-e20sdr-a_firmwarenj501-1400cp1w-dab21v_firmwarecp1l-em40dt-dcj2h-cpu64-eip_firmwarecp2e-n14dr-a_firmwarecp1w-ts002_firmwarecp1w-32ercp1e-e30sdr-a_firmwarecp1e-n60s1dt1-dcp1e-n14dt1-acp1e-n60dt-d_firmwarecp1e-e40dr-a_firmwarecp1l-l14dt-d_firmwarecp2e-n60dt-dcp1e-e20dr-anj-pa3001cp1w-8ed_firmwarenx102-1220_firmwarecp2e-e14dr-acp1l-m60dr-acp1l-m40dt1-d_firmwarenj301-1100cp1h-y20dt-d_firmwarecp1l-el20dt-d_firmwarecp1w-ts004_firmwarenj101-9000cp2e-n40dt-a_firmwarecp1l-m60dt-acj2h-cpu65-eip_firmwarecp2e-n40dr-acp1e-e30dr-acp1e-n30dt1-anj501-r520_firmwarecp1l-m40dt-a_firmwarecp2e-n30dr-dcp1w-32et_firmwarecp1e-n14dr-dcp1e-n60s1dt-dcp1w-8er_firmwarecp1e-n30sdt1-d_firmwarenj101-1020_firmwarecp1w-8et1cp1e-n60sdt1-d_firmwarecp2e-n30dt-d_firmwarecj2h-cpu67_firmwarecp2e-n60dt1-dcp1e-n30dt-a_firmwarecp1e-na20dr-a_firmwarecp2e-n20dt-dcp1l-m40dt-d_firmwarecp1l-l20dt-dnj501-r420_firmwarenj501-r420cj2h-cpu66nj501-4500cp1e-n60sdr-a_firmwarecp1e-n60sdt1-dcp1l-l20dt-a_firmwarecp1e-n40dt1-d_firmwarecj2h-cpu65cp1e-na20dt-dcp1w-cif11cp1e-n60dr-a_firmwarecp1e-n40s1dr-a_firmwarecp1l-l20dr-acs1w-eip21nj501-r500_firmwarecp1e-n60dt-acp1e-n60s1dr-acp2e-n20dt1-d_firmwarecp2e-s30dr-acp1w-da041cs1w-fln22cp2e-n30dr-d_firmwarecp1e-n30dr-dcp2e-s60dt-dcp1w-cn811_firmwarenj301-1100_firmwarecp1e-e14sdr-acp1l-em40dr-dcp2w-cifd1_firmwarecp1l-el20dt1-dcp1w-cif01_firmwarecj2m-cpu14cj2m-md211_firmwarecp1w-32et1_firmwarecj2m-cpu34_firmwarecp1e-n40dt1-acp1l-l10dr-d_firmwarecp1l-m30dr-d_firmwarecp1w-ts001_firmwarecp1w-32et1nj301-1200cp1w-da021cp1e-n20dt1-a_firmwarenj501-1520_firmwarecp1l-m40dt-acp1e-n60dt-dnx701-1620cp1w-ts003cp1l-m60dt-d_firmwarecp1e-e10dr-a_firmwareMultiple OMRON products which implement FINS protocol
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2019-19104
Matching Score-4
Assigner-Asea Brown Boveri Ltd. (ABB)
ShareView Details
Matching Score-4
Assigner-Asea Brown Boveri Ltd. (ABB)
CVSS Score-9.1||CRITICAL
EPSS-0.24% / 47.25%
||
7 Day CHG~0.00%
Published-22 Apr, 2020 | 14:31
Updated-05 Aug, 2024 | 02:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ABB/Busch-Jaeger Telephone Gateway TG/S 3.2 Improper Authentication and Access Control

The web server in ABB Telephone Gateway TG/S 3.2 and Busch-Jaeger 6186/11 Telefon-Gateway allows access to different endpoints of the application without authenticating by accessing a specific uniform resource locator (URL) , violating the access-control (ACL) rules. This issue allows obtaining sensitive information that may aid in further attacks and privilege escalation.

Action-Not Available
Vendor-Busch-Jaeger (ABB)ABB
Product-6186\/11_firmware6186\/11tg\/s3.2tg\/s3.2_firmware6186/11 Telefon-Gateway TG/S 3.2 Telephone Gateway
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2019-18666
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-3.52% / 87.19%
||
7 Day CHG~0.00%
Published-15 May, 2020 | 17:18
Updated-05 Aug, 2024 | 01:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on D-Link DAP-1360 revision F devices. Remote attackers can start a telnet service without authorization via an undocumented HTTP request. Although this is the primary vulnerability, the impact depends on the firmware version. Versions 609EU through 613EUbeta were tested. Versions through 6.12b01 have weak root credentials, allowing an attacker to gain remote root access. After 6.12b01, the root credentials were changed but the telnet service can still be started without authorization.

Action-Not Available
Vendor-n/aD-Link Corporation
Product-dap-1360_revision_f_firmwaredap-1360_revision_fn/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2019-1895
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-9.8||CRITICAL
EPSS-2.38% / 84.39%
||
7 Day CHG~0.00%
Published-07 Aug, 2019 | 20:55
Updated-19 Nov, 2024 | 19:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Enterprise NFV Infrastructure Software VNC Authentication Bypass Vulnerability

A vulnerability in the Virtual Network Computing (VNC) console implementation of Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an unauthenticated, remote attacker to access the VNC console session of an administrative user on an affected device. The vulnerability is due to an insufficient authentication mechanism used to establish a VNC session. An attacker could exploit this vulnerability by intercepting an administrator VNC session request prior to login. A successful exploit could allow the attacker to watch the administrator console session or interact with it, allowing admin access to the affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-enterprise_network_function_virtualization_infrastructureCisco Enterprise NFV Infrastructure Software
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2019-18938
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-30.11% / 96.51%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 18:52
Updated-05 Aug, 2024 | 02:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

eQ-3 Homematic CCU2 2.47.20 and CCU3 3.47.18 with the E-Mail AddOn through 1.6.8.c installed allow Remote Code Execution by unauthenticated attackers with access to the web interface via the save.cgi script for payload upload and the testtcl.cgi script for its execution.

Action-Not Available
Vendor-hm_email_projecteq-3n/a
Product-homematic_ccu2_firmwarehm_emailhomematic_ccu3_firmwarehomematic_ccu3homematic_ccu2n/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2019-18465
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.02% / 3.27%
||
7 Day CHG~0.00%
Published-31 Oct, 2019 | 16:11
Updated-05 Aug, 2024 | 01:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Progress MOVEit Transfer 11.1 before 11.1.3, a vulnerability has been found that could allow an attacker to sign in without full credentials via the SSH (SFTP) interface. The vulnerability affects only certain SSH (SFTP) configurations, and is applicable only if the MySQL database is being used.

Action-Not Available
Vendor-n/aIpswitch, Inc.
Product-moveit_transfern/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2019-18284
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-9.8||CRITICAL
EPSS-0.39% / 59.24%
||
7 Day CHG~0.00%
Published-12 Dec, 2019 | 19:08
Updated-05 Aug, 2024 | 01:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SPPA-T3000 Application Server (All versions < Service Pack R8.2 SP2). The AdminService is available without authentication on the Application Server. An attacker can use methods exposed via this interface to receive password hashes of other users and to change user passwords. Please note that an attacker needs to have access to the Application Highway in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.

Action-Not Available
Vendor-Siemens AG
Product-sppa-t3000_application_serverSPPA-T3000 Application Server
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2019-17506
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-92.73% / 99.74%
||
7 Day CHG-0.18%
Published-11 Oct, 2019 | 19:29
Updated-05 Aug, 2024 | 01:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There are some web interfaces without authentication requirements on D-Link DIR-868L B1-2.03 and DIR-817LW A1-1.04 routers. An attacker can get the router's username and password (and other information) via a DEVICE.ACCOUNT value for SERVICES in conjunction with AUTHORIZED_GROUP=1%0a to getcfg.php. This could be used to control the router remotely.

Action-Not Available
Vendor-n/aD-Link Corporation
Product-dir-817lw_a1_firmwaredir-868l_b1dir-868l_b1_firmwaredir-817lw_a1n/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2019-18572
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-8.3||HIGH
EPSS-1.31% / 79.02%
||
7 Day CHG~0.00%
Published-18 Dec, 2019 | 20:50
Updated-16 Sep, 2024 | 22:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The RSA Identity Governance and Lifecycle and RSA Via Lifecycle and Governance products prior to 7.1.1 P03 contain an Improper Authentication vulnerability. A Java JMX agent running on the remote host is configured with plain text password authentication. An unauthenticated remote attacker can connect to the JMX agent and monitor and manage the Java application.

Action-Not Available
Vendor-Dell Inc.
Product-rsa_identity_governance_and_lifecycleRSA Identity Governance & Lifecycle
CWE ID-CWE-306
Missing Authentication for Critical Function
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2019-18939
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-37.14% / 97.04%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 18:53
Updated-05 Aug, 2024 | 02:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

eQ-3 Homematic CCU2 2.47.20 and CCU3 3.47.18 with the HM-Print AddOn through 1.2a installed allow Remote Code Execution by unauthenticated attackers with access to the web interface via the exec.cgi and exec1.cgi scripts, which execute TCL script content from an HTTP POST request.

Action-Not Available
Vendor-eq-3hm-print_projectn/a
Product-homematic_ccu2_firmwarehm-printhomematic_ccu3_firmwarehomematic_ccu3homematic_ccu2n/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2019-18925
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.34% / 55.83%
||
7 Day CHG~0.00%
Published-12 Nov, 2019 | 16:15
Updated-05 Aug, 2024 | 02:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Systematic IRIS WebForms 5.4 and its functionalities can be accessed and used without any form of authentication.

Action-Not Available
Vendor-systematicn/a
Product-iris_webformsn/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2019-16199
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-45.81% / 97.53%
||
7 Day CHG~0.00%
Published-17 Sep, 2019 | 20:53
Updated-05 Aug, 2024 | 01:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

eQ-3 Homematic CCU2 before 2.47.18 and CCU3 before 3.47.18 allow Remote Code Execution by unauthenticated attackers with access to the web interface via an HTTP POST request to certain URLs related to the ReGa core process.

Action-Not Available
Vendor-eq-3n/a
Product-homematic_ccu2_firmwarehomematic_ccu3_firmwarehomematic_ccu3homematic_ccu2n/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2019-16879
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.18% / 39.65%
||
7 Day CHG~0.00%
Published-14 Apr, 2020 | 16:39
Updated-05 Aug, 2024 | 01:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Synergy Systems & Solutions (SSS) HUSKY RTU 6049-E70, with firmware Versions 5.0 and prior, has a Missing Authentication for Critical Function (CWE-306) vulnerability. The affected product does not require authentication for TELNET access, which may allow an attacker to change configuration or perform other malicious activities.

Action-Not Available
Vendor-mysyngeryssn/a
Product-husky_rtu_6049-e70_firmwarehusky_rtu_6049-e70n/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-7503
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-9.8||CRITICAL
EPSS-3.44% / 87.03%
||
7 Day CHG~0.00%
Published-10 Aug, 2024 | 02:01
Updated-07 Feb, 2025 | 16:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WooCommerce - Social Login <= 2.7.5 - Authentication Bypass to Account Takeover

The WooCommerce - Social Login plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.7.5. This is due to the use of loose comparison of the activation code in the 'woo_slg_confirm_email_user' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the userID. This requires the email module to be enabled.

Action-Not Available
Vendor-WPWeb Elite
Product-woocommerce_social_loginWooCommerce - Social Loginwoocommerce_social_login
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CWE ID-CWE-306
Missing Authentication for Critical Function
  • Previous
  • 1
  • 2
  • ...
  • 7
  • 8
  • 9
  • 10
  • Next
Details not found