Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2020-10376

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-11 Mar, 2020 | 13:35
Updated At-04 Aug, 2024 | 10:58
Rejected At-
Credits

Technicolor TC7337NET 08.89.17.23.03 devices allow remote attackers to discover passwords by sniffing the network for an "Authorization: Basic" HTTP header.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:11 Mar, 2020 | 13:35
Updated At:04 Aug, 2024 | 10:58
Rejected At:
▼CVE Numbering Authority (CNA)

Technicolor TC7337NET 08.89.17.23.03 devices allow remote attackers to discover passwords by sniffing the network for an "Authorization: Basic" HTTP header.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://medium.com/%40felipeagromao/remote-control-cve-2020-10376-fed7b6b934e3
x_refsource_MISC
Hyperlink: https://medium.com/%40felipeagromao/remote-control-cve-2020-10376-fed7b6b934e3
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://medium.com/%40felipeagromao/remote-control-cve-2020-10376-fed7b6b934e3
x_refsource_MISC
x_transferred
Hyperlink: https://medium.com/%40felipeagromao/remote-control-cve-2020-10376-fed7b6b934e3
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:11 Mar, 2020 | 14:15
Updated At:07 Nov, 2023 | 03:14

Technicolor TC7337NET 08.89.17.23.03 devices allow remote attackers to discover passwords by sniffing the network for an "Authorization: Basic" HTTP header.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Primary2.05.0MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:N
Type: Primary
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 5.0
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N
CPE Matches

technicolor
technicolor
>>tc7337net_firmware>>08.89.17.23.03
cpe:2.3:o:technicolor:tc7337net_firmware:08.89.17.23.03:*:*:*:*:*:*:*
technicolor
technicolor
>>tc7337net>>-
cpe:2.3:h:technicolor:tc7337net:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-319Primarynvd@nist.gov
CWE ID: CWE-319
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://medium.com/%40felipeagromao/remote-control-cve-2020-10376-fed7b6b934e3cve@mitre.org
N/A
Hyperlink: https://medium.com/%40felipeagromao/remote-control-cve-2020-10376-fed7b6b934e3
Source: cve@mitre.org
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

198Records found

CVE-2019-3992
Matching Score-4
Assigner-Tenable Network Security, Inc.
ShareView Details
Matching Score-4
Assigner-Tenable Network Security, Inc.
CVSS Score-7.5||HIGH
EPSS-4.03% / 88.02%
||
7 Day CHG~0.00%
Published-17 Dec, 2019 | 21:55
Updated-04 Aug, 2024 | 19:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ELOG 3.1.4-57bea22 and below is affected by an information disclosure vulnerability. A remote unauthenticated attacker can access the server's configuration file by sending an HTTP GET request. Amongst the configuration data, the attacker may gain access to valid admin usernames and, in older versions of ELOG, passwords.

Action-Not Available
Vendor-elog_projectn/aFedora Project
Product-elogfedoraELOG
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2021-22703
Matching Score-4
Assigner-Schneider Electric
ShareView Details
Matching Score-4
Assigner-Schneider Electric
CVSS Score-7.5||HIGH
EPSS-0.16% / 37.33%
||
7 Day CHG~0.00%
Published-19 Feb, 2021 | 15:14
Updated-03 Aug, 2024 | 18:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A CWE-319: Cleartext transmission of sensitive information vulnerability exists in PowerLogic ION7400, ION7650, ION83xx/84xx/85xx/8600, ION8650, ION8800, ION9000 and PM800 (see notification for affected versions), that could cause disclosure of user credentials when a malicious actor intercepts HTTP network traffic between a user and the device.

Action-Not Available
Vendor-n/a
Product-powerlogic_ion8650powerlogic_ion8400_firmwarepowerlogic_pm8000_firmwarepowerlogic_pm8000powerlogic_ion8300_firmwarepowerlogic_ion7400_firmwarepowerlogic_ion7650_firmwarepowerlogic_ion8800powerlogic_ion8600powerlogic_ion8500_firmwarepowerlogic_ion8300powerlogic_ion8500powerlogic_ion8600_firmwarepowerlogic_ion9000_firmwarepowerlogic_ion9000powerlogic_ion8400powerlogic_ion8800_firmwarepowerlogic_ion7400powerlogic_ion7650powerlogic_ion8650_firmwarePowerLogic ION7400, ION7650, ION83xx/84xx/85xx/8600, ION8650, ION8800, ION9000 and PM800 (see notification for affected versions)
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2019-4280
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.13% / 33.63%
||
7 Day CHG~0.00%
Published-30 Sep, 2019 | 15:20
Updated-17 Sep, 2024 | 03:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Sterling File Gateway 2.2.0.0 through 6.0.1.0 displays sensitive information in HTTP requests which could be used in further attacks against the system. IBM X-Force ID: 160503.

Action-Not Available
Vendor-IBM Corporation
Product-sterling_file_gatewaySterling File Gateway
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2021-20992
Matching Score-4
Assigner-CERT@VDE
ShareView Details
Matching Score-4
Assigner-CERT@VDE
CVSS Score-8.1||HIGH
EPSS-1.20% / 78.08%
||
7 Day CHG~0.00%
Published-19 Apr, 2021 | 14:05
Updated-17 Sep, 2024 | 02:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Fibaro Home Center Unencrypted management interface

In Fibaro Home Center 2 and Lite devices in all versions provide a web based management interface over unencrypted HTTP protocol. Communication between the user and the device can be eavesdropped to hijack sessions, tokens and passwords.

Action-Not Available
Vendor-fibaroFibar Group S.A
Product-home_center_2_firmwarehome_center_2home_center_lite_firmwarehome_center_liteFibaro Home Center
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2021-20409
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.07% / 21.59%
||
7 Day CHG~0.00%
Published-12 Feb, 2021 | 16:35
Updated-16 Sep, 2024 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Security Verify Information Queue information disclosure

IBM Security Verify Information Queue 1.0.6 and 1.0.7 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 196188.

Action-Not Available
Vendor-IBM CorporationLinux Kernel Organization, Inc
Product-security_verify_information_queuelinux_kernelSecurity Verify Information Queue
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2017-12310
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-0.29% / 51.81%
||
7 Day CHG~0.00%
Published-27 Mar, 2018 | 09:00
Updated-02 Dec, 2024 | 20:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the auto discovery phase of Cisco Spark Hybrid Calendar Service could allow an unauthenticated, remote attacker to view sensitive information in the unencrypted headers of an HTTP method request. The attacker could use this information to conduct additional reconnaissance attacks leading to the disclosure of sensitive customer data. The vulnerability exists in the auto discovery phase because an unencrypted HTTP request is made due to requirements for implementing the Hybrid Calendar service. An attacker could exploit this vulnerability by monitoring the unencrypted traffic on the network. An exploit could allow the attacker to access sensitive customer data belonging to Office365 users, such as email and calendar events. Cisco Bug IDs: CSCvg35593.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-spark_hybrid_calendar_serviceCisco Spark Hybrid Calendar Service
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2005-3140
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.47% / 63.62%
||
7 Day CHG~0.00%
Published-05 Oct, 2005 | 04:00
Updated-03 Apr, 2025 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Procom NetFORCE 800 4.02 M10 Build 20 and possibly other versions sends the NIS password map (passwd.nis) as a file attachment in diagnostic e-mail messages, which allows remote attackers to obtain the cleartext NIS password hashes.

Action-Not Available
Vendor-procomn/a
Product-netforce_800netforce_800_firmwaren/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2020-7907
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.00% / 0.05%
||
7 Day CHG~0.00%
Published-21 Feb, 2020 | 20:37
Updated-04 Aug, 2024 | 09:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the JetBrains Scala plugin before 2019.2.1, some artefact dependencies were resolved over unencrypted connections.

Action-Not Available
Vendor-n/aJetBrains s.r.o.
Product-scalan/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2020-7984
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.66% / 70.07%
||
7 Day CHG~0.00%
Published-26 Jan, 2020 | 20:04
Updated-04 Aug, 2024 | 09:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SolarWinds N-central before 12.1 SP1 HF5 and 12.2 before SP1 HF2 allows remote attackers to retrieve cleartext domain admin credentials from the Agent & Probe settings, and obtain other sensitive information. The attacker can use a customer ID to self register and read any aspects of the agent/appliance configuration.

Action-Not Available
Vendor-n/aSolarWinds Worldwide, LLC.
Product-n-centraln/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2020-8506
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.21% / 43.20%
||
7 Day CHG~0.00%
Published-05 Feb, 2020 | 15:19
Updated-04 Aug, 2024 | 10:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Global TV application 2.3.2 for Android and 4.7.5 for iOS sends Unencrypted Analytics.

Action-Not Available
Vendor-corusentn/a
Product-global_tvn/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2020-6997
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.5||HIGH
EPSS-0.15% / 35.93%
||
7 Day CHG~0.00%
Published-24 Mar, 2020 | 20:31
Updated-04 Aug, 2024 | 09:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Moxa EDS-G516E Series firmware, Version 5.2 or lower, sensitive information is transmitted over some web applications in cleartext.

Action-Not Available
Vendor-n/aMoxa Inc.
Product-eds-g516e_firmwareeds-g516eeds-510e_firmwareeds-510eMoxa EDS-G516E Series firmware, Version 5.2 or lower
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2019-19889
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.18% / 40.24%
||
7 Day CHG~0.00%
Published-18 Dec, 2019 | 18:52
Updated-05 Aug, 2024 | 02:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on Humax Wireless Voice Gateway HGB10R-2 20160817_1855 devices. The attacker can discover admin credentials in the backup file, aka backupsettings.conf.

Action-Not Available
Vendor-humaxdigitaln/a
Product-hgb10r-02_firmwarehgb10r-02n/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2019-19898
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.17% / 38.40%
||
7 Day CHG~0.00%
Published-23 Jan, 2020 | 20:54
Updated-05 Aug, 2024 | 02:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In IXP EasyInstall 6.2.13723, there are cleartext credentials in network communication on TCP port 20050 when using the Administrator console remotely.

Action-Not Available
Vendor-ixpdatan/a
Product-easyinstalln/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2019-20061
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.21% / 43.91%
||
7 Day CHG~0.00%
Published-10 Feb, 2020 | 12:19
Updated-05 Aug, 2024 | 02:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The user-introduction email in MFScripts YetiShare v3.5.2 through v4.5.4 may leak the (system-picked) password if this email is sent in cleartext. In other words, the user is not allowed to choose their own initial password.

Action-Not Available
Vendor-mfscriptsn/a
Product-yetisharen/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2023-6248
Matching Score-4
Assigner-Automotive Security Research Group (ASRG)
ShareView Details
Matching Score-4
Assigner-Automotive Security Research Group (ASRG)
CVSS Score-10||CRITICAL
EPSS-3.21% / 86.52%
||
7 Day CHG~0.00%
Published-21 Nov, 2023 | 21:49
Updated-17 Oct, 2024 | 18:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Data leakage and arbitrary remote code execution in Syrus cloud devices

The Syrus4 IoT gateway utilizes an unsecured MQTT server to download and execute arbitrary commands, allowing a remote unauthenticated attacker to execute code on any Syrus4 device connected to the cloud service. The MQTT server also leaks the location, video and diagnostic data from each connected device. An attacker who knows the IP address of the server is able to connect and perform the following operations: * Get location data of the vehicle the device is connected to * Send CAN bus messages via the ECU module ( https://syrus.digitalcomtech.com/docs/ecu-1 https://syrus.digitalcomtech.com/docs/ecu-1 ) * Immobilize the vehicle via the safe-immobilizer module ( https://syrus.digitalcomtech.com/docs/system-tools#safe-immobilization https://syrus.digitalcomtech.com/docs/system-tools#safe-immobilization ) * Get live video through the connected video camera * Send audio messages to the driver ( https://syrus.digitalcomtech.com/docs/system-tools#apx-tts https://syrus.digitalcomtech.com/docs/system-tools#apx-tts )

Action-Not Available
Vendor-digitalcomtechDigital Communications Technologiesdigitalcomtech
Product-syrus_4g_iot_telematics_gatewaysyrus_4g_iot_telematics_gateway_firmwareSyrus4 IoT Telematics Gatewaysyrus_4g_iot_telematics_gateway_firmware
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-94
Improper Control of Generation of Code ('Code Injection')
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2019-19967
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.15% / 35.84%
||
7 Day CHG~0.00%
Published-25 Dec, 2019 | 21:20
Updated-05 Aug, 2024 | 02:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Administration page on Connect Box EuroDOCSIS 3.0 Voice Gateway CH7465LG-NCIP-6.12.18.25-2p6-NOSH devices accepts a cleartext password in a POST request on port 80, as demonstrated by the Password field to the xml/setter.xml URI.

Action-Not Available
Vendor-upcn/a
Product-connect_box_eurodocsisconnect_box_eurodocsis_firmwaren/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2019-19890
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.17% / 38.40%
||
7 Day CHG~0.00%
Published-18 Dec, 2019 | 18:53
Updated-05 Aug, 2024 | 02:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on Humax Wireless Voice Gateway HGB10R-2 20160817_1855 devices. Admin credentials are sent over cleartext HTTP.

Action-Not Available
Vendor-humaxdigitaln/a
Product-hgb10r-02_firmwarehgb10r-02n/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2019-18852
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.82% / 73.40%
||
7 Day CHG~0.00%
Published-11 Nov, 2019 | 13:42
Updated-05 Aug, 2024 | 02:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Certain D-Link devices have a hardcoded Alphanetworks user account with TELNET access because of /etc/config/image_sign or /etc/alpha_config/image_sign. This affects DIR-600 B1 V2.01 for WW, DIR-890L A1 v1.03, DIR-615 J1 v100 (for DCN), DIR-645 A1 v1.03, DIR-815 A1 v1.01, DIR-823 A1 v1.01, and DIR-842 C1 v3.00.

Action-Not Available
Vendor-n/aD-Link Corporation
Product-dir-600_b1dir-645_a1dir-823_a1dir-615_j1dir-815_a1_firmwaredir-815_a1dir-823_a1_firmwaredir-890l_a1_firmwaredir-842_c1dir-842_c1_firmwaredir-645_a1_firmwaredir-615_j1_firmwaredir-890l_a1dir-600_b1_firmwaren/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2019-19251
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.15% / 36.29%
||
7 Day CHG~0.00%
Published-10 Dec, 2019 | 14:26
Updated-05 Aug, 2024 | 02:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Last.fm desktop app (Last.fm Scrobbler) through 2.1.39 on macOS makes HTTP requests that include an API key without the use of SSL/TLS. Although there is an Enable SSL option, it is disabled by default, and cleartext requests are made as soon as the app starts.

Action-Not Available
Vendor-last.fmn/a
Product-last.fm_desktopn/a
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2022-33321
Matching Score-4
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-4
Assigner-Mitsubishi Electric Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.58% / 67.92%
||
7 Day CHG~0.00%
Published-08 Nov, 2022 | 00:00
Updated-01 May, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cleartext Transmission of Sensitive Information vulnerability due to the use of Basic Authentication for HTTP connections in Mitsubishi Electric consumer electronics products (PHOTOVOLTAIC COLOR MONITOR ECO-GUIDE, HEMS adapter, Wi-Fi Interface, Air Conditioning, Induction hob, Mitsubishi Electric HEMS Energy Measurement Unit, Refrigerator, Remote control with Wi-Fi Interface, BATHROOM THERMO VENTILATOR, Rice cooker, Mitsubishi Electric HEMS control adapter, Energy Recovery Ventilator, Smart Switch, Ventilating Fan, Range hood fan, Energy Measurement Unit and Air Purifier) allows a remote unauthenticated attacker to disclose information in the products or cause a denial of service (DoS) condition as a result by sniffing credential information (username and password). The wide range of models/versions of Mitsubishi Electric consumer electronics products are affected by this vulnerability. As for the affected product models/versions, see the Mitsubishi Electric's advisory which is listed in [References] section.

Action-Not Available
Vendor-Mitsubishi Electric Corporation
Product-msz-ln18\/25\/35\/50\/60vgw-e1_firmwaremsz-ef22\/25\/35\/42\/50vgkw-et2_firmwaremsz-ef22\/25\/35\/42\/50vgkb-er1msz-ef22\/25\/35\/42\/50vgkb-a1msz-ln25\/35\/50\/60vg2r-er1_firmwaremac-559if-emac-576if-e1msz-bt20\/25\/35\/50vgk-et1_firmwaremac-566ifb-e_firmwaremsz-hr25\/35\/42\/50\/60\/71vfk-et1_firmwaremsz-ln25\/35\/50\/60vg2v-er3_firmwaremac-559if-e_firmwaremsz-ef22\/25\/35\/42\/50vgkw-er1msz-ln18\/25\/35\/50\/60vg2w-er1msz-ln18\/25\/35\/50\/60vg2w-er2msz-ln18\/25\/35\/50\/60vg2r-et1_firmwaremsz-zy09\/12\/18vfk_firmwaremsz-ap25\/35\/42\/50\/60\/71vgk-et3_firmwaremsz-ft25\/35\/50vgk-sc2_firmwaremac-557if-e_firmwaremsz-bt20\/25\/35\/50vgk-et3msz-ap25\/35\/42\/50vgk-e6_firmwaremsz-ft25\/35\/50vgk-e2_firmwaremsz-ln18\/25\/35\/50\/60vg2v-e3_firmwaremsz-ln18\/25\/35\/50\/60vgv-e1msxy-fp05\/07\/10\/13\/18\/20\/24vgk-sg1msz-bt20\/25\/35\/50vgk-e2msz-ln18\/25\/35\/50vg2b-en1msz-gzy09\/12\/18vfk_firmwaremsz-ln25\/35\/50\/60vg2r-er3msz-ef18\/22\/25\/35\/42\/50vgks-e1msz-ln25\/35\/50\/60vg2r-a2msz-ln25\/35\/50vg2w-en2_firmwaremsz-ap60\/71vgk-et1msz-ln18\/25\/35\/50\/60vgb-e1_firmwaremsz-ln18\/25\/35\/50\/60vg2w-er1_firmwaremsz-bt20\/25\/35\/50vgk-e3msz-ft25\/35\/50vgk-e1_firmwaremsz-ln18\/25\/35\/50\/60vg2w-e1_firmwaremsz-ln25\/35\/50\/60vg2r-a1_firmwaremsz-ln25\/35\/50\/60vgb-er1_firmwaremsz-ef18\/22\/25\/35\/42\/50vgks-e2_firmwaremsz-rw25\/35\/50vg-et1_firmwaremac-558if-e_firmwaremac-568ifb3-emsz-ln18\/25\/35\/50\/60vg2r-et1msz-ln18\/25\/35\/50\/60vgw-e1msz-ef22\/25\/35\/42\/50vgkb-et2_firmwaremac-587if-e_firmwaremsz-ln25\/35\/50\/60vg2b-et3_firmwaremsz-ln25\/35\/50vg2v-en2_firmwaremsz-ef18\/22\/25\/35\/42\/50vgkw-e1msz-ln25\/35\/50\/60vgw-er1_firmwaremsz-ln18\/25\/35\/50\/60vg2w-et1mac-507if-emsz-rw25\/35\/50vg-sc1msz-ef22\/25\/35\/42\/50vgkb-er2_firmwaremsz-ln25\/35\/50\/60vg2v-a2msz-rw25\/35\/50vg-sc1_firmwaremsz-ln18\/25\/35\/50\/60vg2b-et1msz-ap25\/35\/42\/50vgk-e7_firmwaremsz-ln18\/25\/35\/50vg2w-en1_firmwaremsz-ln18\/25\/35\/50\/60vgb-e1msz-gzt09\/12\/18vak_firmwaremsz-ln18\/25\/35\/50\/60vg2v-e3msz-ap25\/35\/42\/50vgk-er1mac-567ifb-emsz-ln18\/25\/35\/50\/60vg2r-e2_firmwaremsz-ln25\/35\/50\/60vg2r-a2_firmwaremsz-ln18\/25\/35\/50\/60vg2b-e1_firmwaremsz-ef22\/25\/35\/42\/50vgks-et2_firmwaremsz-ln25\/35\/50\/60vg2r-er2_firmwaremsy-gp10\/13\/15\/18\/20\/24vfk-sg1_firmwaremsz-rw25\/35\/50vg-e1msz-ln18\/25\/35\/50\/60vg2v-e1_firmwaremsz-ln25\/35\/50\/60vgb-a1_firmwaremsz-bt20\/25\/35\/50vgk-e2_firmwaremsz-ap22\/25\/35\/42\/50\/61\/70\/80vgkd-a1_firmwaremsz-ln25\/35\/50\/60vg2b-a1_firmwaremsz-ft25\/35\/50vgk-et1_firmwaremsz-gzy09\/12\/18vfkmsz-exa09\/12vakmsz-ay25\/35\/42\/50vgk-e1msz-ln25\/35\/50\/60vg2v-er1msxy-fp05\/07\/10\/13\/18\/20\/24vgk-sg1_firmwaremsz-hr25\/35\/42\/50\/60\/71vfk-er1_firmwares-mac-702if-zmsz-ap60\/71vgk-e1msz-ef18\/22\/25\/35\/42\/50vgks-e2pac-whs01wf-e_firmwaremsz-ln18\/25\/35\/50vg2r-en1_firmwares-mac-905ifmsz-ap25\/35\/42\/50vgk-et1_firmwaremsz-ft25\/35\/50vgk-e1msz-ap60\/71vgk-et1_firmwaremsz-ef22\/25\/35\/42\/50vgks-a1_firmwaremsz-ay25\/35\/42\/50vgk-et1msz-ln18\/25\/35\/50\/60vgr-e1msz-ln18\/25\/35\/50vg2w-en1msz-ln25\/35\/50\/60vg2v-er1_firmwaremsz-ef22\/25\/35\/42\/50vgks-er1msz-ef22\/25\/35\/42\/50vgkw-et1_firmwaremsz-ef22\/25\/35\/42\/50vgks-er1_firmwaremsz-ef22\/25\/35\/42\/50vgkb-er2msz-hr25\/35\/42\/50vfk-e6_firmwaremsz-ln18\/25\/35\/50vg2v-en1_firmwaremsz-ln25\/35\/50\/60vg2v-a2_firmwaremsz-ln25\/35\/50\/60vg2b-a1msz-ft20\/25vfkmfz-xt50\/60vfk_firmwaremsz-ln25\/35\/50\/60vg2b-er3_firmwaremsz-ay25\/35\/42\/50vgkp-er1_firmwaremsz-ln18\/25\/35\/50vg2v-en1msz-hr25\/35\/42\/50\/60\/71vfk-e1mac-557if-e1msz-hr25\/35\/42\/50\/60\/71vfk-et1msz-ln25\/35\/50\/60vgv-a1msz-ay25\/35\/42\/50vgk-e1_firmwaremsz-ky09\/12\/18vfk_firmwaremsz-ln25\/35\/50\/60vgr-a1msz-wx18\/20\/25vfk_firmwares-mac-702if-z_firmwaremsz-ln25\/35\/50vg2v-en2msz-ap60\/71vgk-e1_firmwaremac-587if2-e_firmwaremsz-ay25\/35\/42\/50vgk-sc1_firmwaremsz-ln25\/35\/50\/60vg2b-et3msz-ef22\/25\/35\/42\/50vgks-et2msz-ln25\/35\/50\/60vgv-a1_firmwaremsz-ef22\/25\/35\/42\/50vgks-et1_firmwaremsz-ap25\/35\/42\/50vgk-e8_firmwaremsz-ap25\/35\/42\/50\/60\/71vgk-er3_firmwaremsz-ay25\/35\/42\/50vgk-et1_firmwaremsz-ef18\/22\/25\/35\/42\/50vgkb-e2_firmwaremsz-ay25\/35\/42\/50vgk-er1_firmwaremsz-ln18\/25\/35\/50\/60vg2v-e1msz-ef22\/25\/35\/42\/50vgkw-er2_firmwaremsz-ln25\/35\/50vg2w-en2msz-ln25\/35\/50\/60vg2r-et2_firmwaremsz-ln25\/35\/50\/60vg2w-et3msz-fx20\/25vfkmsz-ef22\/25\/35\/42\/50vgks-er2mac-568ifb3-e_firmwaremsz-ap25\/35\/42\/50vgk-en3_firmwaremsz-ap25\/35\/42\/50vgk-e1mac-559if-e1msz-ln25\/35\/50\/60vg2b-et2_firmwaremsz-ln18\/25\/35\/50\/60vg2r-e1_firmwaremsz-ef22\/25\/35\/42\/50vgkw-et2mac-507if-e_firmwaremsz-ln18\/25\/35\/50\/60vgv-e1_firmwaremsz-ay25\/35\/42\/50vgk-e6msz-ln18\/25\/35\/50\/60vg2r-e3_firmwaremsz-ay25\/35\/42\/50vgkp-sc1_firmwaremsz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-e2msz-ef22\/25\/35\/42\/50vgkw-a1_firmwaremsz-ln18\/25\/35\/50vg2w-sc1msz-ln18\/25\/35\/50\/60vg2v-et1msz-ln25\/35\/50\/60vg2b-er2_firmwaremac-568ifb2-emsz-ef22\/25\/35\/42\/50vgks-a1msz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-et2mac-587if2-emsz-ay25\/35\/42\/50vgk-er1msz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-er2_firmwaremac-567ifb2-e_firmwaremsz-ln25\/35\/50\/60vgb-er1msz-rw25\/35\/50vg-e1_firmwaremsz-ln25\/35\/50\/60vgr-a1_firmwaremsz-ef18\/22\/25\/35\/42\/50vgkb-e2msz-ln25\/35\/50\/60vg2v-a1_firmwaremsz-ap60\/71vgk-er1_firmwaremsz-ef22\/25\/35\/42\/50vgkb-et1msz-ln25\/35\/50vg2v-sc1_firmwaremsz-bt20\/25\/35\/50vgk-et2msz-ap25\/35\/42\/50vgk-et1s-mac-702if-fmfz-xt50\/60vfkmsz-ap25\/35\/42\/50vgk-en1msz-ln25\/35\/50vg2b-en2msz-ef22\/25\/35\/42\/50vgkb-et1_firmwaremsz-bt20\/25\/35\/50vgk-e1_firmwaremac-558if-e1_firmwaremsz-ap25\/35\/42\/50vgk-en2_firmwaremac-567ifb2-emsz-ap25\/35\/42\/50vgk-e8msz-ln25\/35\/50\/60vg2b-er1_firmwaremsz-ln25\/35\/50\/60vgv-er1_firmwaremsz-ln18\/25\/35\/50\/60vg2v-e2_firmwaremsz-ky09\/12\/18vfkmsz-ef18\/22\/25\/35\/42\/50vgkw-e2_firmwaremac-567ifb-e_firmwaremsz-ef22\/25\/35\/42\/50vgks-er2_firmwaremsz-ln18\/25\/35\/50\/60vg2b-e1msz-ln25\/35\/50vg2r-en2ma-ew85s-uk_firmwaremsz-wx18\/20\/25vfkmsz-hr25\/35\/42\/50\/60\/71vfk-e1_firmwaremac-576if-e1_firmwaremsz-ln25\/35\/50\/60vg2v-er2msz-ap25\/35\/42\/50vgk-en2msz-ln18\/25\/35\/50\/60vg2v-e2msz-ln18\/25\/35\/50\/60vg2w-e3_firmwaremsz-bt20\/25\/35\/50vgk-er1_firmwares-mac-002ifs-mac-702if-bmsz-ln25\/35\/50vg2b-sc1msz-ln18\/25\/35\/50\/60vg2r-e2msz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-er2msz-eza09\/12vak_firmwaremsz-rw25\/35\/50vg-er1_firmwaremsz-ln18\/25\/35\/50\/60vg2b-e3_firmwaremsz-ft25\/35\/50vgk-sc2msz-ln25\/35\/50vg2v-sc1msz-ln18\/25\/35\/50\/60vg2r-e1msz-ap22\/25\/35\/42\/50\/61\/70\/80vgkd-a1pac-wf010-e_firmwaremac-568ifb-e_firmwaremsz-ln18\/25\/35\/50vg2r-en1mfz-gxt50\/60\/73vfkmsz-ft20\/25vfk_firmwaremsz-bt20\/25\/35\/50vgk-et3_firmwaremsz-ay25\/35\/42\/50vgkp-er1msz-zy09\/12\/18vfks-mac-906if_firmwares-mac-906ifmsz-ef18\/22\/25\/35\/42\/50vgkw-e2mac-557if-e1_firmwaremsz-ay25\/35\/42\/50vgkp-sc1mac-568if-e_firmwaremsz-ln25\/35\/50\/60vg2w-et3_firmwaremsz-ln25\/35\/50\/60vg2v-et3msz-zt09\/12\/18vakmsz-bt20\/25\/35\/50vgk-et2_firmwaremsz-bt20\/25\/35\/50vgk-e3_firmwaremsz-ln18\/25\/35\/50\/60vg2w-e2msz-bt20\/25\/35\/50vgk-er1msz-hr25\/35\/42\/50vfk-e6msz-ay25\/35\/42\/50vgkp-e6msz-ln25\/35\/50vg2b-sc1_firmwaremac-568if-emsz-ft25\/35\/50vgk-sc1msy-gp10\/13\/15\/18\/20\/24vfk-sg1msz-fx20\/25vfk_firmwaremsz-ln18\/25\/35\/50\/60vg2w-et2_firmwaremsz-eza09\/12vakmsz-ln25\/35\/50vg2r-sc1_firmwaremsz-bt20\/25\/35\/50vgk-er2msz-bt20\/25\/35\/50vgk-e1msz-ln25\/35\/50\/60vg2v-er3msz-ln18\/25\/35\/50vg2w-sc1_firmwaremsz-bt20\/25\/35\/50vgk-et1msz-ap25\/35\/42\/50\/60\/71vgk-e3_firmwaremsz-ln18\/25\/35\/50\/60vg2w-et1_firmwaremsz-ap25\/35\/42\/50vgk-e1_firmwaremac-568ifb-emsz-ln25\/35\/50\/60vg2r-er2mac-588if-e_firmwaremsz-ap25\/35\/42\/50vgk-e6msz-ef22\/25\/35\/42\/50vgkw-a1msz-ap22\/25\/35\/42\/50\/60\/71\/80vgkd-a2msz-ln25\/35\/50\/60vg2v-et2msz-ln25\/35\/50vg2r-sc1msz-ln25\/35\/50\/60vgw-er1msz-ln18\/25\/35\/50\/60vg2w-e2_firmwaremsz-ln18\/25\/35\/50\/60vg2b-et1_firmwaremac-558if-e1mac-558if-emsz-ln25\/35\/50\/60vgb-a1ma-ew85s-emsz-ln18\/25\/35\/50\/60vg2w-e3msz-ln25\/35\/50\/60vg2r-er3_firmwaremsz-ln25\/35\/50\/60vg2v-er2_firmwaremsz-ap25\/35\/42\/50vgk-e7msz-ef18\/22\/25\/35\/42\/50vgks-e1_firmwaremsz-ef22\/25\/35\/42\/50vgkw-et1mac-587if-emsz-ln25\/35\/50\/60vg2r-er1mac-559if-e1_firmwaremsz-ln18\/25\/35\/50\/60vg2b-e2_firmwaremsz-ln25\/35\/50\/60vg2b-er2mac-566ifb-emsz-ef22\/25\/35\/42\/50vgkb-et2msz-ln18\/25\/35\/50\/60vg2b-e3msz-rw25\/35\/50vg-et1msz-ap25\/35\/42\/50\/60\/71vgk-et3msz-ay25\/35\/42\/50vgk-sc1msz-ln18\/25\/35\/50\/60vg2w-et2msz-ap25\/35\/42\/50vgk-en3msz-hr25\/35\/42\/50\/60\/71vfk-er1msz-ef22\/25\/35\/42\/50vgkb-a1_firmwaremsz-ap25\/35\/42\/50\/60\/71vgk-er3msz-ln25\/35\/50\/60vg2b-er3msz-ln25\/35\/50\/60vg2b-et2msz-ef22\/25\/35\/42\/50vgkw-er1_firmwaremsz-ay25\/35\/42\/50vgkp-et1msz-ap25\/35\/42\/50vgk-er1_firmwaremac-568ifb2-e_firmwaremsz-ln25\/35\/50\/60vg2b-er1ma-ew85s-e_firmwaremfz-gxt50\/60\/73vfk_firmwaremac-557if-emsz-ln25\/35\/50\/60vg2r-et3_firmwares-mac-702if-f_firmwaremsz-zt09\/12\/18vak_firmwaremsz-ln18\/25\/35\/50\/60vg2r-e3msz-ln25\/35\/50\/60vg2v-et3_firmwaremsz-ay25\/35\/42\/50vgkp-e6_firmwaremsz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-et2_firmwaremsz-ln25\/35\/50\/60vg2w-er3msz-ln25\/35\/50\/60vg2r-et3msz-ln25\/35\/50\/60vg2r-et2s-mac-905if_firmwaremsz-ln25\/35\/50\/60vg2v-a1msz-ln25\/35\/50vg2b-en2_firmwaremsz-ln25\/35\/50\/60vg2w-er3_firmwares-mac-002if_firmwaremsz-exa09\/12vak_firmwaremsz-ln25\/35\/50\/60vg2b-a2_firmwaremsz-gzt09\/12\/18vakmsz-ln25\/35\/50\/60vgr-er1msz-ap60\/71vgk-er1msz-ln25\/35\/50vg2r-en2_firmwaremsz-bt20\/25\/35\/50vgk-er2_firmwaremsz-ft25\/35\/50vgk-e2msz-ln25\/35\/50\/60vg2v-et2_firmwaremsz-ap15\/20\/25\/35\/42\/50\/60\/71vgk-e2_firmwaremsz-rw25\/35\/50vg-er1msz-ay25\/35\/42\/50vgkp-et1_firmwaremsz-ln18\/25\/35\/50\/60vgr-e1_firmwaremsz-ln18\/25\/35\/50\/60vg2b-e2msz-ef22\/25\/35\/42\/50vgkw-er2msz-ln18\/25\/35\/50\/60vg2v-et1_firmwaremsz-ef18\/22\/25\/35\/42\/50vgkb-e1_firmwaremsz-ap25\/35\/42\/50vgk-en1_firmwaremsz-ef22\/25\/35\/42\/50vgkb-er1_firmwaremsz-ft25\/35\/50vgk-sc1_firmwaremsz-ln25\/35\/50\/60vgv-er1msz-ln25\/35\/50\/60vgr-er1_firmwaremsz-ln18\/25\/35\/50\/60vg2w-er2_firmwaremsz-ln18\/25\/35\/50\/60vg2w-e1msz-ef18\/22\/25\/35\/42\/50vgkw-e1_firmwaremsz-ap22\/25\/35\/42\/50\/60\/71\/80vgkd-a2_firmwares-mac-702if-b_firmwaremsz-ln25\/35\/50\/60vg2b-a2msz-ef18\/22\/25\/35\/42\/50vgkb-e1msz-ft25\/35\/50vgk-et1pac-whs01wf-epac-wf010-ema-ew85s-ukmsz-ap25\/35\/42\/50\/60\/71vgk-e3msz-ay25\/35\/42\/50vgk-e6_firmwaremsz-ln18\/25\/35\/50vg2b-en1_firmwaremsz-ef22\/25\/35\/42\/50vgks-et1mac-588if-emsz-ln25\/35\/50\/60vg2r-a1Air Conditioning MSZ-LN25/35/50/60VG2B-ER1Air Conditioning MSZ-AY25/35/42/50VGKP-ER1Air Conditioning MSZ-EF18/22/25/35/42/50VGKW-E1BATHROOM THERMO VENTILATOR V-143BZL2-HMWi-Fi Interface MAC-576IF-E1Air Conditioning MSZ-LN18/25/35/50/60VG2W-E3Air Conditioning MSZ-LN25/35/50/60VG2V-ER2Air Conditioning MSZ-LN25/35/50/60VG2R-ER2Remote control with Wi-Fi Interface RMCB-D6SE-TWi-Fi Interface PAC-WF010-EAir Conditioning MSZ-LN25/35/50/60VG2V-ET3Air Conditioning MSZ-LN18/25/35/50/60VG2B-E3Ventilating Fan VD-15ZFVC5-HMWi-Fi Interface GT-RA1Air Conditioning MSZ-LN18/25/35/50/60VGV-E1Ventilating Fan V-18ZMVC2-HMWi-Fi Interface S-MAC-702IF-FHEMS adapter MAC-894IFWi-Fi Interface MAC-558IF-E1Energy Recovery Ventilator VL-20ZMH3-R-HMAir Conditioning MSZ-GZT09/12/18VAKAir Conditioning MSZ-LN25/35/50/60VG2R-A2Mitsubishi Electric HEMS control adapter P-HM04WAPHOTOVOLTAIC COLOR MONITOR ECO-GUIDE PV-DR006L-IFU-GW-YAir Conditioning MSZ-LN18/25/35/50/60VG2W-ET1Air Conditioning MSZ-EF22/25/35/42/50VGKW-ET2Air Conditioning MSZ-LN25/35/50/60VG2R-ER3Air Conditioning MSZ-FT20/25VFKAir Conditioning MSZ-LN25/35/50VG2R-EN2Ventilating Fan VD-18ZFVC3-HMAir Conditioning MSZ-FD40/56/63/71/8022SRemote control with Wi-Fi Interface RMCB-H6SE-TAir Conditioning MSZ-AP60/71VGK-E1Ventilating Fan VD-15ZFVC3-HMAir Conditioning MSZ-ZW22/25/28/36/40/56/63/71/80/9020(S)Air Conditioning MSZ-AP22/25/35/42/50/60/71/80VGKD-A2Wi-Fi Interface MAC-558IF-EAir Conditioning MSZ-AY25/35/42/50VGK-E6Air Conditioning MSZ-LN18/25/35/50/60VG2R-E3Wi-Fi Interface MAC-567IFB2-EAir Conditioning MSZ-LN18/25/35/50/60VG2W-E1PHOTOVOLTAIC COLOR MONITOR ECO-GUIDE PV-DR006L-IFU-MRC-MRefrigerator MR-WXD52/60/70GAir Conditioning MSZ-LN25/35/50/60VG2W-ER3Air Conditioning MSZ-KY09/12/18VFKAir Conditioning MSZ-AP25/35/42/50/60/71VGK-ER3Air Conditioning MSZ-BT20/25/35/50VGK-ER2Air Conditioning MSZ-AP15/20/25/35/42/50/60/71VGK-ER2Air Conditioning MSZ-AP25/35/42/50VGK-EN2Air Conditioning MSZ-ZXV22/25/28/36/40/56/63/71/80/9021(S)Air Conditioning MSZ-AY25/35/42/50VGK-ER1Wi-Fi Interface GT-HR1Smart Switch P-1600SWRCWi-Fi Interface MAC-895IFAir Conditioning MSZ-LN18/25/35/50/60VG2V-E1Air Purifier MA-EW85S-EAir Conditioning MSZ-LN18/25/35/50/60VG2B-E2Air Conditioning MSZ-LN25/35/50/60VG2V-A2Air Conditioning MSZ-LN18/25/35/50/60VG2V-E3Wi-Fi Interface MAC-567IFB-EVentilating Fan V-150CRL-D-HMAir Conditioning MSZ-EF22/25/35/42/50VGKW-A1BATHROOM THERMO VENTILATOR V-141BZ-HM-SYHAir Conditioning MSZ-LN18/25/35/50/60VG2W-ER2Air Conditioning MSZ-AP22/25/35/42/50/61/70/80VGKD-A1Energy Measurement Unit HM-EM02Air Conditioning MSZ-BT20/25/35/50VGK-ET2Wi-Fi Interface MAC-888IFEnergy Measurement Unit HM-EM03-EHEMS adapter HM-01A-CSRange hood fan V-6047S-HMAir Conditioning MSZ-EM22/25/28/36/40/56/63/71/80/9020E8(S)Air Conditioning MSZ-EF18/22/25/35/42/50VGKS-E1Air Conditioning MSZ-EF18/22/25/35/42/50VGKB-E2Wi-Fi Interface MAC-900IFAir Conditioning MSZ-LN25/35/50VG2B-SC1BATHROOM THERMO VENTILATOR V-141BZ-HM-SLAir Conditioning MSZ-AP25/35/42/50VGK-E6Air Conditioning MSZ-EF18/22/25/35/42/50VGKB-E1Air Conditioning MSZ-EF18/22/25/35/42/50VGKS-E2HEMS adapter GT-HEM3BATHROOM THERMO VENTILATOR V-243BZL-HMWi-Fi Interface PAC-SK43MLAir Conditioning MSZ-BT20/25/35/50VGK-ET1HEMS adapter P-HM03WAAir Conditioning MSZ-EF22/25/35/42/50VGKW-ER2Wi-Fi Interface S-MAC-702IF-ZAir Conditioning MSZ-LN25/35/50/60VG2R-ET3BATHROOM THERMO VENTILATOR WD-240DK-RCAir Conditioning MSZ-BT20/25/35/50VGK-ER1PHOTOVOLTAIC COLOR MONITOR ECO-GUIDE PV-DR006L-IFU-GW-MAir Conditioning MSZ-LN18/25/35/50VG2V-EN1Air Conditioning MSZ-EF22/25/35/42/50VGKB-ET2Air Purifier MA-EW85S-UKHEMS adapter HM-02A-REFAir Conditioning MSZ-AP25/35/42/50VGK-E8Air Conditioning MSZ-LN25/35/50/60VGB-ER1Energy Recovery Ventilator VL-200ZMHSV3-RCHEMS adapter GT-HEM3-MWi-Fi Interface MAC-559IF-E1HEMS adapter GT-HEM3-EAir Conditioning MSZ-LN25/35/50/60VG2B-A1HEMS adapter GT-HEM5-EAir Conditioning MSZ-LN25/35/50/60VG2B-ET2Wi-Fi Interface MAC-587IF-EAir Conditioning MSZ-AY25/35/42/50VGKP-ET1Wi-Fi Interface PAC-WHS01WF-EAir Conditioning MSZ-RW25/35/50VG-ET1Air Conditioning MSZ-LN18/25/35/50/60VG2R-E2Air Conditioning MSZ-FZ40/56/63/71/80/9020SAir Conditioning MSZ-EF22/25/35/42/50VGKB-A1PHOTOVOLTAIC COLOR MONITOR ECO-GUIDE PV-DR006L-SET-MAir Conditioning MSZ-AP25/35/42/50VGK-ER1Range hood fan V-904S-HMWi-Fi Interface S-MAC-905IFWi-Fi Interface MAC-507IF-EWi-Fi Interface S-MAC-002IFAir Conditioning MSZ-FT25/35/50VGK-SC2Wi-Fi Interface MAC-568IFB-EInduction hob G32M-HAir Conditioning MSZ-LN25/35/50VG2V-EN2Air Conditioning MSY-GP10/13/15/18/20/24VFK-SG1Air Conditioning MSZ-FT25/35/50VGK-ET1Air Conditioning MSZ-LN18/25/35/50/60VG2V-ET1Air Conditioning MSZ-LN25/35/50/60VG2R-A1Air Conditioning MSZ-LN18/25/35/50VG2R-EN1Refrigerator MR-MXD50/57GHEMS adapter GT-HEM1Air Conditioning MSZ-AP25/35/42/50VGK-ET1Air Conditioning MSZ-RW25/35/50VG-SC1Air Conditioning MSZ-ZD25/28/40/56/63/71/8022(S)Air Conditioning MSXY-FP05/07/10/13/18/20/24VGK-SG1Air Conditioning MSZ-LN25/35/50VG2B-EN2Air Conditioning MSZ-EF22/25/35/42/50VGKB-ET1Wi-Fi Interface MAC-559IF-EAir Conditioning MSZ-EF22/25/35/42/50VGKS-ER2Air Conditioning MSZ-LN25/35/50/60VG2V-ER1BATHROOM THERMO VENTILATOR V-143BZL-HMRange hood fan V-754S-HMAir Conditioning MSZ-LN25/35/50/60VG2R-ET2Air Conditioning MSZ-AY25/35/42/50VGKP-SC1Energy Recovery Ventilator VL-20ZMH3-L-HMMitsubishi Electric HEMS Energy Measurement Unit HM-EM02Remote control with Wi-Fi Interface RMCB-F6SE-THEMS adapter HM-02A-CSAir Conditioning MSZ-BT20/25/35/50VGK-E2Wi-Fi Interface GT-RA2Air Conditioning MSZ-EZA09/12VAKWi-Fi Interface S-MAC-702IF-BAir Conditioning MSZ-LN25/35/50/60VGV-A1Ventilating Fan VD-15ZFVC2-HMHEMS adapter HM-01A-EXAir Conditioning MSZ-HR25/35/42/50VFK-E6Air Conditioning MSZ-ZY09/12/18VFKAir Conditioning MSZ-LN25/35/50/60VG2W-ET3Air Conditioning MSZ-LN18/25/35/50/60VG2B-E1Air Conditioning MSZ-AP60/71VGK-ER1Air Conditioning MSZ-AY25/35/42/50VGK-ET1HEMS adapter HM-W002-ACBAir Conditioning MSZ-LN18/25/35/50/60VG2B-ET1Air Conditioning MSZ-AP25/35/42/50VGK-E1Air Conditioning MSZ-LN25/35/50/60VG2B-ER3Air Conditioning MSZ-LN25/35/50/60VG2B-A2Air Conditioning MSZ-AP60/71VGK-ET1PHOTOVOLTAIC COLOR MONITOR ECO-GUIDE PV-DR006L-IFU-MRC-YSmart Switch P-10SWRCAir Conditioning MSZ-RW25/35/50VG-ER1HEMS adapter HM-W002-ACPHOTOVOLTAIC COLOR MONITOR ECO-GUIDE PV-DR006L-SET-YAir Conditioning MSZ-LN25/35/50/60VG2V-ET2Wi-Fi Interface MAC-568IF-EAir Conditioning MSZ-AP25/35/42/50VGK-E7Air Conditioning MSZ-LN18/25/35/50/60VGR-E1Air Conditioning MSZ-HR25/35/42/50/60/71VFK-ER1Air Conditioning MSZ-LN25/35/50/60VGR-A1Wi-Fi Interface MAC-568IFB3-EAir Conditioning MSZ-AP15/20/25/35/42/50/60/71VGK-ET2Air Conditioning MSZ-LN18/25/35/50/60VG2R-E1Induction hob G32MS-HAir Conditioning MSZ-LN18/25/35/50/60VG2W-ER1Air Conditioning MSZ-EF22/25/35/42/50VGKS-A1Wi-Fi Interface MAC-588IF-EAir Conditioning MSZ-EF22/25/35/42/50VGKS-ER1Air Conditioning MSZ-ZW22/25/28/36/40/56/63/71/80/9021(S)Ventilating Fan VD-18ZFVC2-HMEnergy Recovery Ventilator VL-11ZFHV-HMAir Conditioning MSZ-LN25/35/50/60VG2R-ER1Air Conditioning MSZ-LN18/25/35/50/60VG2W-ET2Air Conditioning MSZ-RW25/35/50VG-E1Air Conditioning MSZ-HXV25/28/40/56/63/71/8022SAir Conditioning MSZ-EF22/25/35/42/50VGKB-ER2Air Conditioning MSZ-BT20/25/35/50VGK-ET3HEMS adapter GT-HEM2Rice cooker NJ-AWBX10Refrigerator MR-WZ55/61HAir Conditioning MSZ-EM22/25/28/36/40/56/63/71/80E2(S)Air Conditioning MSZ-FZV40/56/63/71/80/9020SHEMS adapter HM-WF001Air Conditioning MSZ-LN18/25/35/50VG2W-SC1BATHROOM THERMO VENTILATOR WD-240DK2-RCAir Conditioning MSZ-LN25/35/50/60VGV-ER1BATHROOM THERMO VENTILATOR V-241BZ5-RCAir Conditioning MSZ-EF18/22/25/35/42/50VGKW-E2Air Conditioning MFZ-GXT50/60/73VFKAir Conditioning MSZ-LN18/25/35/50/60VGB-E1Air Conditioning MSZ-LN18/25/35/50/60VG2W-E2Air Conditioning MSZ-EM22/25/28/36/40/56/63/71/80/90E3(S)HEMS adapter GT-HEM4-EAir Conditioning MSZ-HR25/35/42/50/60/71VFK-ET1Air Conditioning MSZ-LN18/25/35/50/60VG2R-ET1Smart Switch P-04SWRCBATHROOM THERMO VENTILATOR V-241BZ-RCAir Conditioning MSZ-LN25/35/50/60VG2V-A1HEMS adapter VEZ-HM01WA Air Conditioning MSZ-EM22/25/28/36/40/56/63/71/80/9021E9(S)Air Conditioning MSZ-FZ40/56/63/71/80/9021SAir Conditioning MSZ-AP25/35/42/50VGK-EN1Air Conditioning MSZ-LN25/35/50VG2V-SC1Ventilating Fan V-18ZMVC3-HMVentilating Fan VD-18ZFVC5-HMAir Conditioning MSZ-FT25/35/50VGK-E1Air Conditioning MSZ-LN25/35/50/60VG2B-ET3Wi-Fi Interface MAC-884IFAir Conditioning MSZ-AP25/35/42/50/60/71VGK-E3Wi-Fi Interface MAC-557IF-E1Air Conditioning MSZ-FT25/35/50VGK-E2Air Conditioning MSZ-BT20/25/35/50VGK-E3HEMS adapter GT-HEM4Wi-Fi Interface MAC-557IF-ERefrigerator MR-MZ54/60HAir Conditioning MSZ-EF22/25/35/42/50VGKB-ER1Air Conditioning MSZ-FZV40/56/63/71/80/9021SInduction hob CS-PT31HNWSR-HMitsubishi Electric HEMS Energy Measurement Unit HM-EM03-WAir Conditioning MSZ-EF22/25/35/42/50VGKW-ET1Air Conditioning MSZ-LN25/35/50/60VGR-ER1Air Conditioning MSZ-LN25/35/50VG2W-EN2Air Conditioning MSZ-FX20/25VFKAir Conditioning MSZ-LN25/35/50/60VG2V-ER3HEMS adapter P-01HMAAir Conditioning MSZ-AY25/35/42/50VGK-SC1Air Conditioning MSZ-AP25/35/42/50VGK-EN3Air Conditioning MFZ-XT50/60VFKAir Conditioning MSZ-ZT09/12/18VAKHEMS adapter HM-01A-VEHAir Conditioning MSZ-BT20/25/35/50VGK-E1Air Conditioning MSZ-WX18/20/25VFKAir Conditioning MSZ-AP15/20/25/35/42/50/60/71VGK-E2Wi-Fi Interface MAC-587IF2-EAir Conditioning MSZ-AP25/35/42/50/60/71VGK-ET3Air Conditioning MSZ-VXV40/56/63/71/8022SAir Conditioning MSZ-LN25/35/50VG2R-SC1Air Conditioning MSZ-LN25/35/50/60VG2B-ER2Air Conditioning MSZ-EF22/25/35/42/50VGKW-ER1Air Conditioning MSZ-LN25/35/50/60VGB-A1Air Conditioning MSZ-EXA09/12VAKAir Conditioning MSZ-GZY09/12/18VFKAir Conditioning MSZ-LN18/25/35/50VG2W-EN1Air Conditioning MSZ-HR25/35/42/50/60/71VFK-E1Wi-Fi Interface MAC-568IFB2-EAir Conditioning MSZ-LN25/35/50/60VGW-ER1Air Conditioning MSZ-ZXV22/25/28/36/40/56/63/71/80/9020(S)Air Conditioning MSZ-EF22/25/35/42/50VGKS-ET1HEMS adapter P-HM02WAHEMS adapter HM-02A-VEHAir Conditioning MSZ-LN18/25/35/50VG2B-EN1Air Conditioning MSZ-AY25/35/42/50VGK-E1Air Conditioning MSZ-EF22/25/35/42/50VGKS-ET2Air Conditioning MSZ-LN18/25/35/50/60VG2V-E2BATHROOM THERMO VENTILATOR V-243BZL2-HMAir Conditioning MSZ-FT25/35/50VGK-SC1BATHROOM THERMO VENTILATOR V-141BZ-HM-YHAir Conditioning MSZ-AY25/35/42/50VGKP-E6Air Conditioning MSZ-LN18/25/35/50/60VGW-E1Wi-Fi Interface P-WA01Wi-Fi Interface MAC-566IFB-EWi-Fi Interface S-MAC-906IF
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2019-18201
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.14% / 34.11%
||
7 Day CHG~0.00%
Published-24 Oct, 2019 | 14:19
Updated-05 Aug, 2024 | 01:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on Fujitsu Wireless Keyboard Set LX390 GK381 devices. Because of the lack of proper encryption of 2.4 GHz communication, an attacker is able to eavesdrop on sensitive data such as passwords.

Action-Not Available
Vendor-n/aFujitsu Limited
Product-lx390_firmwarelx390n/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2019-18231
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.5||HIGH
EPSS-0.12% / 31.03%
||
7 Day CHG~0.00%
Published-17 Mar, 2021 | 18:12
Updated-05 Aug, 2024 | 01:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Advantech Spectre RT ERT351 Versions 5.1.3 and prior logins and passwords are transmitted in clear text form, which may allow an attacker to intercept the request.

Action-Not Available
Vendor-n/aAdvantech (Advantech Co., Ltd.)
Product-spectre_rt_ert351_firmwarespectre_rt_ert351Advantech Spectre RT ERT351
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2019-17218
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.15% / 35.84%
||
7 Day CHG~0.00%
Published-06 Oct, 2019 | 15:23
Updated-05 Aug, 2024 | 01:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on V-Zug Combi-Steam MSLQ devices before Ethernet R07 and before WLAN R05. By default, the communication to the web service is unencrypted via http. An attacker is able to intercept and sniff communication to the web service.

Action-Not Available
Vendor-vzugn/a
Product-combi-stream_mslq_firmwarecombi-stream_mslqn/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2019-16063
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.18% / 40.24%
||
7 Day CHG~0.00%
Published-19 Mar, 2020 | 22:21
Updated-05 Aug, 2024 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NETSAS Enigma NMS 65.0.0 and prior does not encrypt sensitive data rendered within web pages. It is possible for an attacker to expose unencrypted sensitive data.

Action-Not Available
Vendor-netsasn/a
Product-enigma_network_management_solutionn/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2019-15135
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.15% / 36.25%
||
7 Day CHG~0.00%
Published-18 Aug, 2019 | 15:43
Updated-05 Aug, 2024 | 00:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The handshake protocol in Object Management Group (OMG) DDS Security 1.1 sends cleartext information about all of the capabilities of a participant (including capabilities inapplicable to the current session), which makes it easier for attackers to discover potentially sensitive reachability information on a Data Distribution Service (DDS) network.

Action-Not Available
Vendor-omgn/a
Product-dds_securityn/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2019-16274
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.18% / 40.24%
||
7 Day CHG~0.00%
Published-06 Jan, 2020 | 19:52
Updated-05 Aug, 2024 | 01:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DTEN D5 before 1.3 and D7 before 1.3 devices transfer customer data files via unencrypted HTTP.

Action-Not Available
Vendor-dtenn/a
Product-d7d5_firmwared5d7_firmwaren/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2023-39245
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-9.8||CRITICAL
EPSS-0.30% / 52.95%
||
7 Day CHG~0.00%
Published-15 Feb, 2024 | 13:03
Updated-23 Jan, 2025 | 16:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DELL ESI (Enterprise Storage Integrator) for SAP LAMA, version 10.0, contains an information disclosure vulnerability in EHAC component. An remote unauthenticated attacker could potentially exploit this vulnerability by eavesdropping the network traffic to gain admin level credentials.

Action-Not Available
Vendor-Dell Inc.
Product-enterprise_storage_integrator_for_sap_landscape_managementESI (Enterprise Storage Integrator) for SAP LAMAenterprise_storage_integrator_for_sap_lama
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2019-16067
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.15% / 36.57%
||
7 Day CHG~0.00%
Published-19 Mar, 2020 | 17:56
Updated-05 Aug, 2024 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NETSAS Enigma NMS 65.0.0 and prior utilises basic authentication over HTTP for enforcing access control to the web application. The use of weak authentication transmitted over cleartext protocols can allow an attacker to steal username and password combinations by intercepting authentication traffic in transit.

Action-Not Available
Vendor-netsasn/a
Product-enigma_network_management_solutionn/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2019-16672
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.33% / 55.11%
||
7 Day CHG~0.00%
Published-06 Dec, 2019 | 17:07
Updated-05 Aug, 2024 | 01:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on Weidmueller IE-SW-VL05M 3.6.6 Build 16102415, IE-SW-VL08MT 3.5.2 Build 16102415, and IE-SW-PL10M 3.3.16 Build 16102416 devices. Sensitive Credentials data is transmitted in cleartext.

Action-Not Available
Vendor-weidmuellern/a
Product-ie-sw-pl18mt-2gc14tx2stie-sw-pl18mt-2gc14tx2st_firmwareie-sw-pl16mt-16tx_firmwareie-sw-pl10m-1gt-2gs-7tx_firmwareie-sw-pl08m-8txie-sw-vl05mt-3tx-2scie-sw-vl05mt-3tx-2sc_firmwareie-sw-pl18m-2gc14tx2scie-sw-vl05mt-5txie-sw-pl08m-6tx-2st_firmwareie-sw-vl08mt-6tx-2stie-sw-pl18m-2gc14tx2scsie-sw-pl08mt-8txie-sw-pl18mt-2gc14tx2scsie-sw-pl16mt-14tx-2stie-sw-vl05m-5txie-sw-pl16mt-16txie-sw-pl16mt-14tx-2sc_firmwareie-sw-pl18m-2gc14tx2scs_firmwareie-sw-pl08mt-6tx-2st_firmwareie-sw-pl16m-16tx_firmwareie-sw-vl08mt-6tx-2scsie-sw-pl10m-3gt-7tx_firmwareie-sw-vl05m-3tx-2sc_firmwareie-sw-pl08m-6tx-2sc_firmwareie-sw-pl08m-6tx-2stie-sw-pl08m-8tx_firmwareie-sw-pl08m-6tx-2scs_firmwareie-sw-pl09m-5gc-4gtie-sw-pl18m-2gc-16tx_firmwareie-sw-vl08mt-6tx-2sc_firmwareie-sw-pl09mt-5gc-4gtie-sw-vl05m-3tx-2st_firmwareie-sw-vl08mt-6tx-2scie-sw-pl18mt-2gc-16tx_firmwareie-sw-pl10m-3gt-7txie-sw-pl16m-16txie-sw-pl10mt-3gt-7txie-sw-pl08mt-6tx-2sc_firmwareie-sw-pl08mt-6tx-2scie-sw-pl18mt-2gc14tx2scs_firmwareie-sw-pl08mt-8tx_firmwareie-sw-pl18mt-2gc-16txie-sw-pl16m-14tx-2stie-sw-pl18m-2gc14tx2stie-sw-vl05mt-3tx-2st_firmwareie-sw-pl16m-14tx-2scie-sw-pl18m-2gc-16txie-sw-vl08mt-5tx-1sc-2scsie-sw-pl16mt-14tx-2st_firmwareie-sw-pl18m-2gc14tx2sc_firmwareie-sw-pl10mt-1gt-2gs-7tx_firmwareie-sw-pl08m-6tx-2scie-sw-pl08m-6tx-2scsie-sw-pl09m-5gc-4gt_firmwareie-sw-vl08mt-6tx-2st_firmwareie-sw-pl08mt-6tx-2stie-sw-pl16mt-14tx-2scie-sw-pl18m-2gc14tx2st_firmwareie-sw-vl08mt-5tx-3sc_firmwareie-sw-pl10mt-3gt-7tx_firmwareie-sw-pl18mt-2gc14tx2sc_firmwareie-sw-pl09mt-5gc-4gt_firmwareie-sw-pl16m-14tx-2sc_firmwareie-sw-vl05mt-5tx_firmwareie-sw-pl10m-1gt-2gs-7txie-sw-vl08mt-6tx-2scs_firmwareie-sw-pl10mt-1gt-2gs-7txie-sw-vl05m-3tx-2scie-sw-vl08mt-8tx_firmwareie-sw-pl18mt-2gc14tx2scie-sw-vl08mt-8txie-sw-pl08mt-6tx-2scsie-sw-pl16m-14tx-2st_firmwareie-sw-vl05mt-3tx-2stie-sw-vl08mt-5tx-3scie-sw-vl08mt-5tx-1sc-2scs_firmwareie-sw-vl05m-3tx-2stie-sw-pl08mt-6tx-2scs_firmwareie-sw-vl05m-5tx_firmwaren/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2019-12388
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.18% / 40.24%
||
7 Day CHG~0.00%
Published-02 Dec, 2019 | 16:40
Updated-04 Aug, 2024 | 23:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Anviz access control devices perform cleartext transmission of sensitive information (passwords/pins and names) when replying to query on port tcp/5010.

Action-Not Available
Vendor-anvizn/a
Product-anviz_firmwaren/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2019-12503
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.34% / 56.21%
||
7 Day CHG~0.00%
Published-02 Dec, 2019 | 16:57
Updated-04 Aug, 2024 | 23:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Due to unencrypted and unauthenticated data communication, the wireless barcode scanner Inateck BCST-60 is prone to keystroke injection attacks. Thus, an attacker is able to send arbitrary keystrokes to a victim's computer system, e.g., to install malware when the target system is unattended. In this way, an attacker can remotely take control over the victim's computer that is operated with an affected receiver of this device.

Action-Not Available
Vendor-inateckn/a
Product-bcst-60bcst-60_firmwaren/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2019-16568
Matching Score-4
Assigner-Jenkins Project
ShareView Details
Matching Score-4
Assigner-Jenkins Project
CVSS Score-5.3||MEDIUM
EPSS-0.03% / 5.68%
||
7 Day CHG~0.00%
Published-17 Dec, 2019 | 14:40
Updated-05 Aug, 2024 | 01:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Jenkins SCTMExecutor Plugin 2.2 and earlier transmits previously configured service credentials in plain text as part of the global configuration, as well as individual jobs' configurations.

Action-Not Available
Vendor-Jenkins
Product-sctmexecutorJenkins SCTMExecutor Plugin
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2023-33730
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-1.19% / 77.97%
||
7 Day CHG~0.00%
Published-31 May, 2023 | 00:00
Updated-10 Jan, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Privilege Escalation in the "GetUserCurrentPwd" function in Microworld Technologies eScan Management Console 14.0.1400.2281 allows any remote attacker to retrieve password of any admin or normal user in plain text format.

Action-Not Available
Vendor-escanavn/a
Product-escan_management_consolen/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2019-10435
Matching Score-4
Assigner-Jenkins Project
ShareView Details
Matching Score-4
Assigner-Jenkins Project
CVSS Score-7.5||HIGH
EPSS-0.06% / 19.84%
||
7 Day CHG~0.00%
Published-01 Oct, 2019 | 13:45
Updated-04 Aug, 2024 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Jenkins SourceGear Vault Plugin transmits configured credentials in plain text as part of job configuration forms, potentially resulting in their exposure.

Action-Not Available
Vendor-Jenkins
Product-sourcegear_vaultJenkins SourceGear Vault Plugin
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2019-15911
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.67% / 70.46%
||
7 Day CHG~0.00%
Published-20 Dec, 2019 | 16:03
Updated-05 Aug, 2024 | 01:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on ASUS HG100, MW100, WS-101, TS-101, AS-101, MS-101, DL-101 devices using ZigBee PRO. Because of insecure key transport in ZigBee communication, attackers can obtain sensitive information, cause the multiple denial of service attacks, take over smart home devices, and tamper with messages.

Action-Not Available
Vendor-n/aASUS (ASUSTeK Computer Inc.)
Product-ms-101_firmwarets-101_firmwarehg100ws-101_firmwarets-101dl-101_firmwarehg100_firmwaremw100_firmwaredl-101mw100as-101as-101_firmwarems-101ws-101n/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2019-10427
Matching Score-4
Assigner-Jenkins Project
ShareView Details
Matching Score-4
Assigner-Jenkins Project
CVSS Score-5.3||MEDIUM
EPSS-0.05% / 14.39%
||
7 Day CHG~0.00%
Published-25 Sep, 2019 | 15:05
Updated-04 Aug, 2024 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Jenkins Aqua MicroScanner Plugin 1.0.7 and earlier transmitted configured credentials in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure.

Action-Not Available
Vendor-Jenkins
Product-aqua_microscannerJenkins Aqua MicroScanner Plugin
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2023-32328
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-7.5||HIGH
EPSS-0.03% / 5.61%
||
7 Day CHG~0.00%
Published-07 Feb, 2024 | 16:07
Updated-17 Jun, 2025 | 21:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Security Verify Access information disclosure

IBM Security Verify Access 10.0.0.0 through 10.0.6.1 uses insecure protocols in some instances that could allow an attacker on the network to take control of the server. IBM X-Force Id: 254957.

Action-Not Available
Vendor-IBM Corporation
Product-security_verify_accessSecurity Verify Access ApplianceSecurity Verify Access Docker
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2019-10434
Matching Score-4
Assigner-Jenkins Project
ShareView Details
Matching Score-4
Assigner-Jenkins Project
CVSS Score-7.5||HIGH
EPSS-0.06% / 19.84%
||
7 Day CHG~0.00%
Published-01 Oct, 2019 | 13:45
Updated-04 Aug, 2024 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Jenkins LDAP Email Plugin transmits configured credentials in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure.

Action-Not Available
Vendor-Jenkins
Product-ldap_emailJenkins LDAP Email Plugin
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2017-1000024
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.25% / 47.81%
||
7 Day CHG~0.00%
Published-13 Jul, 2017 | 20:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Shotwell version 0.24.4 or earlier and 0.25.3 or earlier is vulnerable to an information disclosure in the web publishing plugins resulting in potential password and oauth token plaintext transmission

Action-Not Available
Vendor-n/aThe GNOME Project
Product-shotwelln/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2019-10412
Matching Score-4
Assigner-Jenkins Project
ShareView Details
Matching Score-4
Assigner-Jenkins Project
CVSS Score-7.5||HIGH
EPSS-0.09% / 25.97%
||
7 Day CHG~0.00%
Published-25 Sep, 2019 | 15:05
Updated-04 Aug, 2024 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Jenkins Inedo ProGet Plugin 1.2 and earlier transmitted configured credentials in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure.

Action-Not Available
Vendor-Jenkins
Product-inedo_progetJenkins Inedo ProGet Plugin
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2019-10428
Matching Score-4
Assigner-Jenkins Project
ShareView Details
Matching Score-4
Assigner-Jenkins Project
CVSS Score-7.5||HIGH
EPSS-0.09% / 25.97%
||
7 Day CHG~0.00%
Published-25 Sep, 2019 | 15:05
Updated-04 Aug, 2024 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Jenkins Aqua Security Scanner Plugin 3.0.17 and earlier transmitted configured credentials in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure.

Action-Not Available
Vendor-Jenkins
Product-aqua_security_scannerJenkins Aqua Security Scanner Plugin
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2020-6195
Matching Score-4
Assigner-SAP SE
ShareView Details
Matching Score-4
Assigner-SAP SE
CVSS Score-6.4||MEDIUM
EPSS-0.19% / 41.53%
||
7 Day CHG~0.00%
Published-14 Apr, 2020 | 19:36
Updated-04 Aug, 2024 | 08:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SAP Business Objects Business Intelligence Platform (CMC), version 4.1, 4.2, shows cleartext password in the response, leading to Information Disclosure. It involves social engineering in order to gain access to system and If password is known, it would give administrative rights to the attacker to read/modify delete the data and rights within the system.

Action-Not Available
Vendor-SAP SE
Product-businessobjects_business_intelligence_platformSAP Business Objects Business Intelligence Platform
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2023-3028
Matching Score-4
Assigner-Automotive Security Research Group (ASRG)
ShareView Details
Matching Score-4
Assigner-Automotive Security Research Group (ASRG)
CVSS Score-8.6||HIGH
EPSS-0.03% / 6.04%
||
7 Day CHG~0.00%
Published-01 Jun, 2023 | 05:34
Updated-10 Jan, 2025 | 18:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper backend communication allows access and manipulation of the telemetry data

Insufficient authentication in the MQTT backend (broker) allows an attacker to access and even manipulate the telemetry data of the entire fleet of vehicles using the HopeChart HQT-401 telematics unit. Other models are possibly affected too. Multiple vulnerabilities were identified: - The MQTT backend does not require authentication, allowing unauthorized connections from an attacker. - The vehicles publish their telemetry data (e.g. GPS Location, speed, odometer, fuel, etc) as messages in public topics. The backend also sends commands to the vehicles as MQTT posts in public topics. As a result, an attacker can access the confidential data of the entire fleet that is managed by the backend. - The MQTT messages sent by the vehicles or the backend are not encrypted or authenticated. An attacker can create and post messages to impersonate a vehicle or the backend. The attacker could then, for example, send incorrect information to the backend about the vehicle's location. - The backend can inject data into a vehicle´s CAN bus by sending a specific MQTT message on a public topic. Because these messages are not authenticated or encrypted, an attacker could impersonate the backend, create a fake message and inject CAN data in any vehicle managed by the backend. The confirmed version is 201808021036, however further versions have been also identified as potentially impacted.

Action-Not Available
Vendor-hopechartHangzhou Hopechart IoT Technology Co., Ltd.
Product-hqt401hqt401_firmwareHQT401
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2023-31410
Matching Score-4
Assigner-SICK AG
ShareView Details
Matching Score-4
Assigner-SICK AG
CVSS Score-9.8||CRITICAL
EPSS-0.07% / 20.80%
||
7 Day CHG~0.00%
Published-19 Jun, 2023 | 14:57
Updated-11 Dec, 2024 | 20:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A remote unprivileged attacker can intercept the communication via e.g. Man-In-The-Middle, due to the absence of Transport Layer Security (TLS) in the SICK EventCam App. This lack of encryption in the communication channel can lead to the unauthorized disclosure of sensitive information. The attacker can exploit this weakness to eavesdrop on the communication between the EventCam App and the Client, and potentially manipulate the data being transmitted.

Action-Not Available
Vendor-SICK AG
Product-sick_eventcam_appEventCam App
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2019-10411
Matching Score-4
Assigner-Jenkins Project
ShareView Details
Matching Score-4
Assigner-Jenkins Project
CVSS Score-7.5||HIGH
EPSS-0.09% / 25.97%
||
7 Day CHG~0.00%
Published-25 Sep, 2019 | 15:05
Updated-04 Aug, 2024 | 22:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Jenkins Inedo BuildMaster Plugin 2.4.0 and earlier transmitted configured credentials in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure.

Action-Not Available
Vendor-Jenkins
Product-inedo_buildmasterJenkins Inedo BuildMaster Plugin
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2019-0231
Matching Score-4
Assigner-Apache Software Foundation
ShareView Details
Matching Score-4
Assigner-Apache Software Foundation
CVSS Score-7.5||HIGH
EPSS-0.73% / 71.69%
||
7 Day CHG~0.00%
Published-01 Oct, 2019 | 19:39
Updated-13 Feb, 2025 | 16:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apache MINA SSLFilter security Issue

Handling of the close_notify SSL/TLS message does not lead to a connection closure, leading the server to retain the socket opened and to have the client potentially receive clear text messages afterward. Mitigation: 2.0.20 users should migrate to 2.0.21, 2.1.0 users should migrate to 2.1.1. This issue affects: Apache MINA.

Action-Not Available
Vendor-The Apache Software Foundation
Product-minaApache MINA
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2020-4695
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.10% / 27.62%
||
7 Day CHG~0.00%
Published-08 Mar, 2021 | 18:00
Updated-16 Sep, 2024 | 16:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM API Connect V10 is impacted by insecure communications during database replication. As the data replication happens over insecure communication channels, an attacker can view unencrypted data leading to a loss of confidentiality.

Action-Not Available
Vendor-IBM Corporation
Product-api_connectAPI Connect
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2018-7259
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.19% / 41.26%
||
7 Day CHG~0.00%
Published-20 Feb, 2018 | 00:00
Updated-05 Aug, 2024 | 06:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The FSX / P3Dv4 installer 2.0.1.231 for Flight Sim Labs A320-X sends a user's Google account credentials to http://installLog.flightsimlabs.com/LogHandler3.ashx if a pirated serial number has been entered, which allows remote attackers to obtain sensitive information, e.g., by sniffing the network for cleartext HTTP traffic. This behavior was removed in 2.0.1.232.

Action-Not Available
Vendor-flightsimlabsn/a
Product-a320-xn/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2021-36165
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.11% / 29.75%
||
7 Day CHG~0.00%
Published-28 Sep, 2021 | 09:26
Updated-04 Aug, 2024 | 00:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

RICON Industrial Cellular Router S9922L 16.10.3(3794) is affected by cleartext storage of sensitive information and sends username and password as base64.

Action-Not Available
Vendor-riconmobilen/a
Product-s9922l_firmwares9922ln/a
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2021-33883
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.12% / 31.45%
||
7 Day CHG~0.00%
Published-25 Aug, 2021 | 11:19
Updated-04 Aug, 2024 | 00:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Cleartext Transmission of Sensitive Information vulnerability in B. Braun SpaceCom2 prior to 012U000062 allows a remote attacker to obtain sensitive information by snooping on the network traffic. The exposed data includes critical values for a pump's internal configuration.

Action-Not Available
Vendor-n/aB. Braun
Product-spacecom2spacestation_8713142uinfusomat_large_volume_pump_871305un/a
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
  • Previous
  • 1
  • 2
  • 3
  • 4
  • Next
Details not found