Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2020-7378

Summary
Assigner-rapid7
Assigner Org ID-9974b330-7714-4307-a722-5648477acda7
Published At-24 Nov, 2020 | 16:35
Updated At-16 Sep, 2024 | 20:37
Rejected At-
Credits

CRIXP OpenCRX Unverified Password Change

CRIXP OpenCRX version 4.30 and 5.0-20200717 and prior suffers from an unverified password change vulnerability. An attacker who is able to connect to the affected OpenCRX instance can change the password of any user, including admin-Standard, to any chosen value. This issue was resolved in version 5.0-20200904, released September 4, 2020.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:rapid7
Assigner Org ID:9974b330-7714-4307-a722-5648477acda7
Published At:24 Nov, 2020 | 16:35
Updated At:16 Sep, 2024 | 20:37
Rejected At:
▼CVE Numbering Authority (CNA)
CRIXP OpenCRX Unverified Password Change

CRIXP OpenCRX version 4.30 and 5.0-20200717 and prior suffers from an unverified password change vulnerability. An attacker who is able to connect to the affected OpenCRX instance can change the password of any user, including admin-Standard, to any chosen value. This issue was resolved in version 5.0-20200904, released September 4, 2020.

Affected Products
Vendor
CRIXP
Product
OpenCRX
Versions
Affected
  • From 4.30 through 4.30 (custom)
  • From 5.0-20200717 through 5.0-20200717 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-620CWE-620 Unverified Password Change
Type: CWE
CWE ID: CWE-620
Description: CWE-620 Unverified Password Change
Metrics
VersionBase scoreBase severityVector
3.19.1CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Version: 3.1
Base score: 9.1
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Users should update to 5.0-20200904 or later. If an update is infeasible, users should disable the RequestPasswordReset.jsp wizard.

Configurations

Workarounds

Exploits

Credits

This issue was discovered and reported by Trevor Christiansen of Rapid7 in accordance with Rapid7's standard vulnerability disclosure policy.
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://blog.rapid7.com/2020/11/24/cve-2020-7378-opencrx-unverified-password-change/
x_refsource_MISC
Hyperlink: https://blog.rapid7.com/2020/11/24/cve-2020-7378-opencrx-unverified-password-change/
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://blog.rapid7.com/2020/11/24/cve-2020-7378-opencrx-unverified-password-change/
x_refsource_MISC
x_transferred
Hyperlink: https://blog.rapid7.com/2020/11/24/cve-2020-7378-opencrx-unverified-password-change/
Resource:
x_refsource_MISC
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@rapid7.com
Published At:24 Nov, 2020 | 17:15
Updated At:07 Dec, 2020 | 21:26

CRIXP OpenCRX version 4.30 and 5.0-20200717 and prior suffers from an unverified password change vulnerability. An attacker who is able to connect to the affected OpenCRX instance can change the password of any user, including admin-Standard, to any chosen value. This issue was resolved in version 5.0-20200904, released September 4, 2020.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.19.1CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Secondary3.19.1CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Primary2.06.4MEDIUM
AV:N/AC:L/Au:N/C:P/I:P/A:N
Type: Primary
Version: 3.1
Base score: 9.1
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Type: Secondary
Version: 3.1
Base score: 9.1
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Type: Primary
Version: 2.0
Base score: 6.4
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:N
CPE Matches

opencrx
opencrx
>>opencrx>>Versions up to 4.3.0(inclusive)
cpe:2.3:a:opencrx:opencrx:*:*:*:*:*:*:*:*
opencrx
opencrx
>>opencrx>>5.0
cpe:2.3:a:opencrx:opencrx:5.0:20200714:*:*:*:*:*:*
opencrx
opencrx
>>opencrx>>5.0
cpe:2.3:a:opencrx:opencrx:5.0:20200715:*:*:*:*:*:*
opencrx
opencrx
>>opencrx>>5.0
cpe:2.3:a:opencrx:opencrx:5.0:20200717:*:*:*:*:*:*
opencrx
opencrx
>>opencrx>>5.0.0
cpe:2.3:a:opencrx:opencrx:5.0.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-287Primarynvd@nist.gov
CWE-620Secondarycve@rapid7.com
CWE ID: CWE-287
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-620
Type: Secondary
Source: cve@rapid7.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://blog.rapid7.com/2020/11/24/cve-2020-7378-opencrx-unverified-password-change/cve@rapid7.com
Exploit
Third Party Advisory
Hyperlink: https://blog.rapid7.com/2020/11/24/cve-2020-7378-opencrx-unverified-password-change/
Source: cve@rapid7.com
Resource:
Exploit
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

164Records found

CVE-2008-0895
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.38% / 59.09%
||
7 Day CHG~0.00%
Published-22 Feb, 2008 | 21:00
Updated-07 Aug, 2024 | 08:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

BEA WebLogic Server and WebLogic Express 6.1 through 10.0 allows remote attackers to bypass authentication for application servlets via crafted request headers.

Action-Not Available
Vendor-n/aBEA Systems, Inc.
Product-weblogic_servern/a
CWE ID-CWE-287
Improper Authentication
CVE-2019-14880
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-4.8||MEDIUM
EPSS-0.20% / 42.21%
||
7 Day CHG~0.00%
Published-31 Mar, 2020 | 15:11
Updated-05 Aug, 2024 | 00:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability was found in Moodle versions 3.7 before 3.7.3, 3.6 before 3.6.7, 3.5 before 3.5.9 and earlier. OAuth 2 providers who do not verify users' email address changes require additional verification during sign-up to reduce the risk of account compromise.

Action-Not Available
Vendor-[UNKNOWN]Moodle Pty Ltd
Product-moodlemoodle
CWE ID-CWE-287
Improper Authentication
CVE-2019-14870
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-5.4||MEDIUM
EPSS-4.67% / 89.10%
||
7 Day CHG~0.00%
Published-10 Dec, 2019 | 00:00
Updated-05 Aug, 2024 | 00:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

All Samba versions 4.x.x before 4.9.17, 4.10.x before 4.10.11 and 4.11.x before 4.11.3 have an issue, where the S4U (MS-SFU) Kerberos delegation model includes a feature allowing for a subset of clients to be opted out of constrained delegation in any way, either S4U2Self or regular Kerberos authentication, by forcing all tickets for these clients to be non-forwardable. In AD this is implemented by a user attribute delegation_not_allowed (aka not-delegated), which translates to disallow-forwardable. However the Samba AD DC does not do that for S4U2Self and does set the forwardable flag even if the impersonated client has the not-delegated flag set.

Action-Not Available
Vendor-Canonical Ltd.Debian GNU/LinuxopenSUSESambaFedora ProjectRed Hat, Inc.
Product-ubuntu_linuxdebian_linuxsambafedoraleapsamba
CWE ID-CWE-285
Improper Authorization
CWE ID-CWE-287
Improper Authentication
CVE-2022-41436
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.54% / 67.09%
||
7 Day CHG~0.00%
Published-14 Oct, 2022 | 00:00
Updated-14 May, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in OXHOO TP50 OXH1.50 allows unauthenticated attackers to access the administrative panel via browsing to the URL http://device_ip/index1.html.

Action-Not Available
Vendor-oxhoon/a
Product-tp50_firmwaretp50n/a
CWE ID-CWE-287
Improper Authentication
CVE-2008-0476
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.30% / 52.84%
||
7 Day CHG~0.00%
Published-29 Jan, 2008 | 19:00
Updated-07 Aug, 2024 | 07:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ManageEngine Applications Manager 8.1 build 8100 does not check authentication for monitorType.do and unspecified other pages, which allows remote attackers to obtain sensitive information and change settings via unspecified vectors. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.

Action-Not Available
Vendor-n/aManageEngine (Zoho Corporation Pvt. Ltd.)
Product-applications_managern/a
CWE ID-CWE-287
Improper Authentication
CVE-2008-0408
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.59% / 68.85%
||
7 Day CHG~0.00%
Published-28 Jan, 2008 | 23:00
Updated-07 Aug, 2024 | 07:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HTTP File Server (HFS) before 2.2c allows remote attackers to append arbitrary text to the log file by using the base64 representation of this text during HTTP Basic Authentication.

Action-Not Available
Vendor-hfsn/a
Product-http_file_servern/a
CWE ID-CWE-287
Improper Authentication
CVE-2025-58443
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.9||CRITICAL
EPSS-10.24% / 93.00%
||
7 Day CHG+1.41%
Published-06 Sep, 2025 | 20:04
Updated-29 Sep, 2025 | 13:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FOG's authentication bypass leads to full SQL DB dump

FOG is a free open-source cloning/imaging/rescue suite/inventory management system. Versions 1.5.10.1673 and below contain an authentication bypass vulnerability. It is possible for an attacker to perform an unauthenticated DB dump where they could pull a full SQL DB without credentials. A fix is expected to be released 9/15/2025. To address this vulnerability immediately, upgrade to the latest version of either the dev-branch or working-1.6 branch. This will patch the issue for users concerned about immediate exposure. See the FOG Project documentation for step-by-step upgrade instructions: https://docs.fogproject.org/en/latest/install-fog-server#choosing-a-fog-version.

Action-Not Available
Vendor-fogprojectFOGProject
Product-fogprojectfogproject
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2022-39289
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.1||CRITICAL
EPSS-0.35% / 57.22%
||
7 Day CHG~0.00%
Published-07 Oct, 2022 | 00:00
Updated-22 Apr, 2025 | 17:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Database log access in ZoneMinder

ZoneMinder is a free, open source Closed-circuit television software application. In affected versions the ZoneMinder API Exposes Database Log contents to user without privileges, allows insertion, modification, deletion of logs without System Privileges. Users are advised yo upgrade as soon as possible. Users unable to upgrade should disable database logging.

Action-Not Available
Vendor-zoneminderZoneMinder
Product-zoneminderzoneminder
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-862
Missing Authorization
CVE-2008-0210
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-1.88% / 82.82%
||
7 Day CHG~0.00%
Published-10 Jan, 2008 | 00:00
Updated-07 Aug, 2024 | 07:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Uebimiau Webmail 2.7.10 and 2.7.2 does not protect authentication state variables from being set through HTTP requests, which allows remote attackers to bypass authentication via a sess[auth]=1 parameter settting. NOTE: this can be leveraged to conduct directory traversal attacks without authentication by using CVE-2008-0140.

Action-Not Available
Vendor-uebimiaun/a
Product-webmailn/a
CWE ID-CWE-287
Improper Authentication
CVE-2020-6091
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-9.8||CRITICAL
EPSS-0.35% / 57.13%
||
7 Day CHG~0.00%
Published-22 May, 2020 | 13:53
Updated-04 Aug, 2024 | 08:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An exploitable authentication bypass vulnerability exists in the ESPON Web Control functionality of Epson EB-1470Ui MAIN: 98009273ESWWV107 MAIN2: 8X7325WWV303. A specially crafted series of HTTP requests can cause authentication bypass resulting in information disclosure. An attacker can send an HTTP request to trigger this vulnerability.

Action-Not Available
Vendor-epsonn/a
Product-eb-1470uieb-1470ui_firmwareEpson
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CWE ID-CWE-287
Improper Authentication
CVE-2007-5855
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.41% / 61.17%
||
7 Day CHG~0.00%
Published-19 Dec, 2007 | 21:00
Updated-07 Aug, 2024 | 15:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mail in Apple Mac OS X 10.4.11 and 10.5.1, when an SMTP account has been set up using Account Assistant, can use plaintext authentication even when MD5 Challenge-Response authentication is available, which makes it easier for remote attackers to sniff account activity.

Action-Not Available
Vendor-n/aApple Inc.
Product-mac_os_xn/a
CWE ID-CWE-287
Improper Authentication
CVE-2022-39355
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.1||CRITICAL
EPSS-0.36% / 57.35%
||
7 Day CHG~0.00%
Published-26 Oct, 2022 | 00:00
Updated-23 Apr, 2025 | 16:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Discourse Patreon vulnerable to improper validation of email during Patreon authentication

Discourse Patreon enables syncronization between Discourse Groups and Patreon rewards. On sites with Patreon login enabled, an improper authentication vulnerability could be used to take control of a victim's forum account. This vulnerability is patched in commit number 846d012151514b35ce42a1636c7d70f6dcee879e of the discourse-patreon plugin. Out of an abundance of caution, any Discourse accounts which have logged in with an unverified-email Patreon account will be logged out and asked to verify their email address on their next login. As a workaround, disable the patreon integration and log out all users with associated Patreon accounts.

Action-Not Available
Vendor-Civilized Discourse Construction Kit, Inc.
Product-patreondiscourse-patreon
CWE ID-CWE-287
Improper Authentication
CVE-2021-26070
Matching Score-4
Assigner-Atlassian
ShareView Details
Matching Score-4
Assigner-Atlassian
CVSS Score-7.2||HIGH
EPSS-0.38% / 59.04%
||
7 Day CHG~0.00%
Published-22 Mar, 2021 | 04:40
Updated-16 Sep, 2024 | 19:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Affected versions of Atlassian Jira Server and Data Center allow remote attackers to evade behind-the-firewall protection of app-linked resources via a Broken Authentication vulnerability in the `makeRequest` gadget resource. The affected versions are before version 8.13.3, and from version 8.14.0 before 8.14.1.

Action-Not Available
Vendor-Atlassian
Product-data_centerjira_serverjiraJira ServerJira Data Center
CWE ID-CWE-287
Improper Authentication
CVE-2025-49591
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.4||HIGH
EPSS-0.18% / 38.99%
||
7 Day CHG~0.00%
Published-18 Jun, 2025 | 22:15
Updated-11 Aug, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CryptPad 2FA Bypass Vulnerability

CryptPad is a collaboration suite. Prior to version 2025.3.0, enforcement of Two-Factor Authentication (2FA) in CryptPad can be trivially bypassed, due to weak implementation of access controls. An attacker that compromises a user's credentials can gain access to the victim's account, even if the victim has 2FA set up. This is due to 2FA not being enforced if the path parameter is not 44 characters long, which can be bypassed by simply URL encoding a single character in the path. This issue has been patched in version 2025.3.0.

Action-Not Available
Vendor-cryptpadXWiki SAS
Product-cryptpadcryptpad
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-287
Improper Authentication
CVE-2018-15479
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.19% / 40.93%
||
7 Day CHG~0.00%
Published-30 Aug, 2018 | 17:00
Updated-05 Aug, 2024 | 09:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in myStrom WiFi Switch V1 before 2.66, WiFi Switch V2 before 3.80, WiFi Switch EU before 3.80, WiFi Bulb before 2.58, WiFi LED Strip before 3.80, WiFi Button before 2.73, and WiFi Button Plus before 2.73. Devices did not authenticate themselves to the cloud in device to cloud communication. This lack of device authentication allowed an attacker to impersonate any device by guessing or learning their MAC address.

Action-Not Available
Vendor-mystromn/a
Product-wifi_switchwifi_buttonwifi_switch_eu_firmwarewifi_bulbwifi_button_plus_firmwarewifi_button_firmwarewifi_led_stripwifi_switch_firmwarewifi_led_strip_firmwarewifi_bulb_firmwarewifi_button_pluswifi_switch_eun/a
CWE ID-CWE-287
Improper Authentication
CVE-2018-15485
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-1.13% / 77.99%
||
7 Day CHG~0.00%
Published-07 Sep, 2018 | 22:00
Updated-05 Aug, 2024 | 09:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on KONE Group Controller (KGC) devices before 4.6.5. FTP does not require authentication or authorization, aka KONE-03.

Action-Not Available
Vendor-konen/a
Product-group_controller_firmwaregroup_controllern/a
CWE ID-CWE-287
Improper Authentication
CVE-2022-34372
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-9.8||CRITICAL
EPSS-1.86% / 82.73%
||
7 Day CHG~0.00%
Published-01 Sep, 2022 | 18:45
Updated-17 Sep, 2024 | 01:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell PowerProtect Cyber Recovery versions before 19.11.0.2 contain an authentication bypass vulnerability. A remote unauthenticated attacker may potentially access and interact with the docker registry API leading to an authentication bypass. The attacker may potentially alter the docker images leading to a loss of integrity and confidentiality

Action-Not Available
Vendor-Dell Inc.
Product-powerprotect_cyber_recoveryCyber Recovery
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CWE ID-CWE-287
Improper Authentication
CVE-2015-0670
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.53% / 66.82%
||
7 Day CHG~0.00%
Published-21 Mar, 2015 | 01:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The default configuration of Cisco Small Business IP phones SPA 300 7.5.5 and SPA 500 7.5.5 does not properly support authentication, which allows remote attackers to read audio-stream data or originate telephone calls via a crafted XML request, aka Bug ID CSCuo52482.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-spa_508g_8-line_ip_phonespa_525g2_5-line_ip_phonespa_509g_12-line_ip_phonespa500_firmwarespa_525g_5-line_ip_phonespa_512g_1-line_ip_phonespa_301_1_line_ip_phonespa_302dkitspa_514g_4-line_ip_phonespa_502g_1-line_ip_phonespa_504g_4-line_ip_phonespa_303_3_line_ip_phonespa300_firmwarespa_501g_8-line_ip_phonespa_302dn/a
CWE ID-CWE-287
Improper Authentication
CVE-2022-31013
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.1||CRITICAL
EPSS-0.50% / 65.29%
||
7 Day CHG~0.00%
Published-31 May, 2022 | 22:35
Updated-23 Apr, 2025 | 18:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authentication bypass in Vartalap chat-server

Chat Server is the chat server for Vartalap, an open-source messaging application. Versions 2.3.2 until 2.6.0 suffer from a bug in validating the access token, resulting in authentication bypass. The function `this.authProvider.verifyAccessKey` is an async function, as the code is not using `await` to wait for the verification result. Every time the function responds back with success, along with an unhandled exception if the token is invalid. A patch is available in version 2.6.0.

Action-Not Available
Vendor-chat_server_projectramank775
Product-chat_serverchat-server
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-20
Improper Input Validation
CVE-2025-47275
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.1||CRITICAL
EPSS-0.03% / 6.98%
||
7 Day CHG~0.00%
Published-15 May, 2025 | 21:13
Updated-22 May, 2025 | 20:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Brute Force Authentication Tags of CookieStore Sessions in Auth0-PHP SDK

Auth0-PHP provides the PHP SDK for Auth0 Authentication and Management APIs. Starting in version 8.0.0-BETA1 and prior to version 8.14.0, session cookies of applications using the Auth0-PHP SDK configured with CookieStore have authentication tags that can be brute forced, which may result in unauthorized access. Certain pre-conditions are required to be vulnerable to this issue: Applications using the Auth0-PHP SDK, or the Auth0/symfony, Auth0/laravel-auth0, and Auth0/wordpress SDKs that rely on the Auth0-PHP SDK; and session storage configured with CookieStore. Upgrade Auth0/Auth0-PHP to v8.14.0 to receive a patch. As an additional precautionary measure, rotating cookie encryption keys is recommended. Note that once updated, any previous session cookies will be rejected.

Action-Not Available
Vendor-auth0
Product-auth0-PHP
CWE ID-CWE-287
Improper Authentication
CVE-2014-5412
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-6.4||MEDIUM
EPSS-0.54% / 67.07%
||
7 Day CHG~0.00%
Published-18 Sep, 2014 | 10:00
Updated-04 Nov, 2025 | 23:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Schneider Electric SCADA Expert ClearSCADA Improper Authentication

Schneider Electric StruxureWare SCADA Expert ClearSCADA 2010 R3 through 2014 R1 allows remote attackers to read database records by leveraging access to the guest account.

Action-Not Available
Vendor-Schneider Electric SEAVEVA
Product-clearscadascada_expert_clearscadaClearSCADASCADA Expert ClearSCADA
CWE ID-CWE-287
Improper Authentication
CVE-2018-18571
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.34% / 55.85%
||
7 Day CHG~0.00%
Published-05 Jun, 2019 | 14:53
Updated-05 Aug, 2024 | 11:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An Incorrect Access Control vulnerability has been identified in Citrix XenMobile Server 10.8.0 before Rolling Patch 6 and 10.9.0 before Rolling Patch 3. An attacker can impersonate and take actions on behalf of any Mobile Application Management (MAM) enrolled device.

Action-Not Available
Vendor-n/aCitrix (Cloud Software Group, Inc.)
Product-xenmobile_servern/a
CWE ID-CWE-287
Improper Authentication
CVE-2020-4167
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.13% / 32.12%
||
7 Day CHG~0.00%
Published-27 Aug, 2020 | 12:40
Updated-17 Sep, 2024 | 01:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Security Guardium Insights 2.0.1 could allow an attacker to obtain sensitive information or perform unauthorized actions due to improper authenciation mechanisms. IBM X-Force ID: 174403.

Action-Not Available
Vendor-IBM Corporation
Product-security_guardium_insightsSecurity Guardium Insights
CWE ID-CWE-287
Improper Authentication
CVE-2014-3895
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-6.4||MEDIUM
EPSS-0.30% / 53.29%
||
7 Day CHG~0.00%
Published-29 Jul, 2014 | 20:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The I-O DATA TS-WLCAM camera with firmware 1.06 and earlier, TS-WLCAM/V camera with firmware 1.06 and earlier, TS-WPTCAM camera with firmware 1.08 and earlier, TS-PTCAM camera with firmware 1.08 and earlier, TS-PTCAM/POE camera with firmware 1.08 and earlier, and TS-WLC2 camera with firmware 1.02 and earlier allow remote attackers to bypass authentication, and consequently obtain sensitive credential and configuration data, via unspecified vectors.

Action-Not Available
Vendor-iodatan/a
Product-ts-wlc2_camera_firmwarets-wlcam\/v_camerats-wptcam_camerats-ptcam\/poe_camera_firmwarets-ptcam_camera_firmwarets-wptcam_camera_firmwarets-ptcam\/poe_camerats-wlcam_camera_firmwarets-wlcam\/v_camera_firmwarets-wlc2_camerats-ptcam_camerats-wlcam_cameran/a
CWE ID-CWE-287
Improper Authentication
CVE-2025-45583
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.05% / 16.17%
||
7 Day CHG+0.01%
Published-12 Sep, 2025 | 00:00
Updated-16 Oct, 2025 | 15:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect access control in the FTP protocol of Audi UTR 2.0 Universal Traffic Recorder 2.0 allows attackers to authenticate into the service using any combination of username and password.

Action-Not Available
Vendor-audin/a
Product-universal_traffic_recorderuniversal_traffic_recorder_firmwaren/a
CWE ID-CWE-287
Improper Authentication
CVE-2018-10933
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-9.1||CRITICAL
EPSS-78.33% / 99.00%
||
7 Day CHG~0.00%
Published-17 Oct, 2018 | 12:00
Updated-05 Aug, 2024 | 07:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability was found in libssh's server-side state machine before versions 0.7.6 and 0.8.4. A malicious client could create channels without first performing authentication, resulting in unauthorized access.

Action-Not Available
Vendor-libssh[UNKNOWN]Red Hat, Inc.Oracle CorporationNetApp, Inc.Canonical Ltd.Debian GNU/Linux
Product-ubuntu_linuxdebian_linuxenterprise_linuxstorage_automation_storeoncommand_workflow_automationoncommand_unified_managerlibsshmysql_workbenchsnapcenterlibssh
CWE ID-CWE-592
DEPRECATED: Authentication Bypass Issues
CWE ID-CWE-287
Improper Authentication
CVE-2023-25957
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-9.1||CRITICAL
EPSS-0.05% / 16.31%
||
7 Day CHG~0.00%
Published-14 Mar, 2023 | 09:31
Updated-27 Feb, 2025 | 15:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in Mendix SAML (Mendix 7 compatible) (All versions >= V1.16.4 < V1.17.3), Mendix SAML (Mendix 8 compatible) (All versions >= V2.2.0 < V2.3.0), Mendix SAML (Mendix 9 latest compatible, New Track) (All versions >= V3.1.9 < V3.3.1), Mendix SAML (Mendix 9 latest compatible, Upgrade Track) (All versions >= V3.1.8 < V3.3.0), Mendix SAML (Mendix 9.6 compatible, New Track) (All versions >= V3.1.9 < V3.2.7), Mendix SAML (Mendix 9.6 compatible, Upgrade Track) (All versions >= V3.1.8 < V3.2.6). The affected versions of the module insufficiently verify the SAML assertions. This could allow unauthenticated remote attackers to bypass authentication and get access to the application. For compatibility reasons, fix versions still contain this issue, but only when the recommended, default configuration option `'Use Encryption'` is disabled.

Action-Not Available
Vendor-mendixSiemens AG
Product-samlMendix SAML (Mendix 9 latest compatible, New Track)Mendix SAML (Mendix 8 compatible)Mendix SAML (Mendix 9 latest compatible, Upgrade Track)Mendix SAML (Mendix 9.6 compatible, New Track)Mendix SAML (Mendix 9.6 compatible, Upgrade Track)Mendix SAML (Mendix 7 compatible)
CWE ID-CWE-303
Incorrect Implementation of Authentication Algorithm
CWE ID-CWE-287
Improper Authentication
CVE-2017-9625
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-8.2||HIGH
EPSS-1.34% / 79.77%
||
7 Day CHG~0.00%
Published-17 Oct, 2017 | 22:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An Improper Authentication issue was discovered in Envitech EnviDAS Ultimate Versions prior to v1.0.0.5. The web application lacks proper authentication which could allow an attacker to view information and modify settings or execute code remotely.

Action-Not Available
Vendor-envitechn/a
Product-envidas_ultimateEnvitech Ltd. EnviDAS Ultimate
CWE ID-CWE-287
Improper Authentication
CVE-2014-2338
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.32% / 54.20%
||
7 Day CHG~0.00%
Published-16 Apr, 2014 | 18:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IKEv2 in strongSwan 4.0.7 before 5.1.3 allows remote attackers to bypass authentication by rekeying an IKE_SA during (1) initiation or (2) re-authentication, which triggers the IKE_SA state to be set to established.

Action-Not Available
Vendor-strongswann/a
Product-strongswann/a
CWE ID-CWE-287
Improper Authentication
CVE-2020-26214
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.1||CRITICAL
EPSS-88.24% / 99.47%
||
7 Day CHG~0.00%
Published-06 Nov, 2020 | 17:50
Updated-04 Aug, 2024 | 15:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
LDAP authentication bypass in Alerta

In Alerta before version 8.1.0, users may be able to bypass LDAP authentication if they provide an empty password when Alerta server is configure to use LDAP as the authorization provider. Only deployments where LDAP servers are configured to allow unauthenticated authentication mechanism for anonymous authorization are affected. A fix has been implemented in version 8.1.0 that returns HTTP 401 Unauthorized response for any authentication attempts where the password field is empty. As a workaround LDAP administrators can disallow unauthenticated bind requests by clients.

Action-Not Available
Vendor-alerta_projectalerta
Product-alertaalerta
CWE ID-CWE-287
Improper Authentication
CVE-2013-6828
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.24% / 47.12%
||
7 Day CHG~0.00%
Published-20 Nov, 2013 | 11:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

admin/management.html in PineApp Mail-SeCure allows remote attackers to bypass authentication and perform a sys_usermng operation via the it parameter.

Action-Not Available
Vendor-pineappn/a
Product-mail-securen/a
CWE ID-CWE-287
Improper Authentication
CVE-2014-0138
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.68% / 71.08%
||
7 Day CHG~0.00%
Published-15 Apr, 2014 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The default configuration in cURL and libcurl 7.10.6 before 7.36.0 re-uses (1) SCP, (2) SFTP, (3) POP3, (4) POP3S, (5) IMAP, (6) IMAPS, (7) SMTP, (8) SMTPS, (9) LDAP, and (10) LDAPS connections, which might allow context-dependent attackers to connect as other users via a request, a similar issue to CVE-2014-0015.

Action-Not Available
Vendor-n/aDebian GNU/LinuxCURL
Product-debian_linuxcurllibcurln/a
CWE ID-CWE-287
Improper Authentication
CVE-2022-26034
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-9.1||CRITICAL
EPSS-0.28% / 51.14%
||
7 Day CHG~0.00%
Published-15 Apr, 2022 | 01:45
Updated-03 Aug, 2024 | 04:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authentication vulnerability in the communication protocol provided by AD (Automation Design) server of CENTUM VP R6.01.10 to R6.09.00, CENTUM VP Small R6.01.10 to R6.09.00, CENTUM VP Basic R6.01.10 to R6.09.00, and B/M9000 VP R8.01.01 to R8.03.01 allows an attacker to use the functions provided by AD server. This may lead to leakage or tampering of data managed by AD server.

Action-Not Available
Vendor-yokogawaYokogawa Electric Corporation
Product-b\/m9000_vpcentum_vpCENTUM VP series with VP6E5000(AD Suite Engineering ServerFunction) installed and B/M9000 VP
CWE ID-CWE-287
Improper Authentication
CVE-2013-4454
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-9.1||CRITICAL
EPSS-0.63% / 69.97%
||
7 Day CHG~0.00%
Published-18 Feb, 2020 | 13:23
Updated-06 Aug, 2024 | 16:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

WordPress Portable phpMyAdmin Plugin 1.4.1 has Multiple Security Bypass Vulnerabilities

Action-Not Available
Vendor-getbutterflyPortable phpMyAdmin Plugin authors
Product-portable-phpmyadminPortable phpMyAdmin Plugin
CWE ID-CWE-287
Improper Authentication
CVE-2013-4462
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-9.1||CRITICAL
EPSS-1.19% / 78.52%
||
7 Day CHG~0.00%
Published-27 Jan, 2020 | 14:09
Updated-06 Aug, 2024 | 16:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

WordPress Portable phpMyAdmin Plugin has an authentication bypass vulnerability

Action-Not Available
Vendor-portable_phpmyadmin_projectPortable phpMyAdmin Plugin authors
Product-portable_phpmyadminPortable phpMyAdmin Plugin
CWE ID-CWE-287
Improper Authentication
CVE-2013-4966
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.4||MEDIUM
EPSS-0.22% / 44.78%
||
7 Day CHG~0.00%
Published-07 Mar, 2014 | 20:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The master external node classification script in Puppet Enterprise before 3.2.0 does not verify the identity of consoles, which allows remote attackers to create arbitrary classifications on the master by spoofing a console.

Action-Not Available
Vendor-n/aPerforce Software, Inc. ("Puppet")
Product-puppet_enterprisen/a
CWE ID-CWE-287
Improper Authentication
CVE-2025-24895
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.1||CRITICAL
EPSS-0.23% / 45.94%
||
7 Day CHG~0.00%
Published-18 Feb, 2025 | 18:39
Updated-18 Feb, 2025 | 19:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SAML Response Signature Verification Bypass in CIE.AspNetCore.Authentication

CIE.AspNetCore.Authentication is an AspNetCore Remote Authenticator for CIE 3.0. Authentication using Spid and CIE is based on the SAML2 standard which provides two entities: 1. Identity Provider (IDP): the system that authenticates users and provides identity information (SAML affirmation) to the Service Provider, in essence, is responsible for the management of the credentials and identity of users; 2. Service Provider (SP): the system that provides a service to the user and relies on the Identity Provider to authenticate the user, receives SAML assertions from the IdP to grant access to resources. The library cie-aspnetcore refers to the second entity, the SP, and implements the validation logic of SAML assertions within SAML responses. In affected versions there is no guarantee that the first signature refers to the root object, it follows that if an attacker injects an item signed as the first element, all other signatures will not be verified. The only requirement is to have an XML element legitimately signed by the IdP, a condition that is easily met using the IdP's public metadata. An attacker could create an arbitrary SAML response that would be accepted by SPs using vulnerable SDKs, allowing him to impersonate any Spid and/or CIE user. This issue has been addressed in version 2.1.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability.

Action-Not Available
Vendor-italia
Product-cie-aspnetcore
CWE ID-CWE-287
Improper Authentication
CVE-2022-24976
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.14% / 34.75%
||
7 Day CHG~0.00%
Published-13 Feb, 2022 | 06:20
Updated-03 Aug, 2024 | 04:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Atheme IRC Services before 7.2.12, when used in conjunction with InspIRCd, allows authentication bypass by ending an IRC handshake at a certain point during a challenge-response login sequence.

Action-Not Available
Vendor-athemen/a
Product-athemen/a
CWE ID-CWE-287
Improper Authentication
CVE-2022-24882
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.1||CRITICAL
EPSS-1.11% / 77.83%
||
7 Day CHG~0.00%
Published-26 Apr, 2022 | 00:00
Updated-03 Nov, 2025 | 21:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Server side NTLM does not properly check parameters in FreeRDP

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP). In versions prior to 2.7.0, NT LAN Manager (NTLM) authentication does not properly abort when someone provides and empty password value. This issue affects FreeRDP based RDP Server implementations. RDP clients are not affected. The vulnerability is patched in FreeRDP 2.7.0. There are currently no known workarounds.

Action-Not Available
Vendor-FreeRDPFedora Project
Product-fedorafreerdpextra_packages_for_enterprise_linuxFreeRDP
CWE ID-CWE-287
Improper Authentication
CVE-2022-25157
Matching Score-4
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-4
Assigner-Mitsubishi Electric Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.74% / 72.52%
||
7 Day CHG~0.00%
Published-01 Apr, 2022 | 22:17
Updated-03 Aug, 2024 | 04:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use of Password Hash Instead of Password for Authentication vulnerability in Mitsubishi Electric MELSEC iQ-F series FX5U(C) CPU all versions, Mitsubishi Electric MELSEC iQ-F series FX5UJ CPU all versions, Mitsubishi Electric MELSEC iQ-R series R00/01/02CPU all versions, Mitsubishi Electric MELSEC iQ-R series R04/08/16/32/120(EN)CPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120SFCPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PCPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PSFCPU all versions, Mitsubishi Electric MELSEC iQ-R series R16/32/64MTCPU all versions, Mitsubishi Electric MELSEC iQ-R series RJ71C24(-R2/R4) all versions, Mitsubishi Electric MELSEC iQ-R series RJ71EN71 all versions, Mitsubishi Electric MELSEC iQ-R series RJ71GF11-T2 all versions, Mitsubishi Electric MELSEC iQ-R series RJ71GP21(S)-SX all versions, Mitsubishi Electric MELSEC iQ-R series RJ72GF15-T2 all versions, Mitsubishi Electric MELSEC Q series Q03UDECPU all versions, Mitsubishi Electric MELSEC Q series Q04/06/10/13/20/26/50/100UDEHCPU all versions, Mitsubishi Electric MELSEC Q series Q03/04/06/13/26UDVCPU all versions, Mitsubishi Electric MELSEC Q series Q04/06/13/26UDPVCPU all versions, Mitsubishi Electric MELSEC Q series QJ71C24N(-R2/R4) all versions, Mitsubishi Electric MELSEC Q series QJ71E71-100 all versions, Mitsubishi Electric MELSEC L series L02/06/26CPU(-P) all versions, Mitsubishi Electric MELSEC L series L26CPU-(P)BT all versions, Mitsubishi Electric MELSEC L series LJ71C24(-R2) all versions, Mitsubishi Electric MELSEC L series LJ71E71-100 all versions and Mitsubishi Electric MELSEC L series LJ72GF15-T2 all versions allows a remote unauthenticated attacker to disclose or tamper with the information in the product by using an eavesdropped password hash.

Action-Not Available
Vendor-n/aMitsubishi Electric Corporation
Product-fx5uj-24mt\/essfx5uc-32mt\/dss_firmwarefx5uj-24mt\/es_firmwarefx5uj-60mr\/es_firmwarefx5uj_firmwarefx5uj-60mt\/esfx5uj-60mt\/essfx5uc-32mt\/dss-tsfx5ucfx5uc-32mt\/dfx5uj-40mt\/es_firmwarefx5uj-60mt\/es_firmwarefx5uj-24mt\/ess_firmwarefx5uc-32mt\/ds-tsfx5ujfx5uc_firmwarefx5uj-60mr\/esfx5uj-60mt\/ess_firmwarefx5uj-24mr\/esfx5uc-32mr\/ds-ts_firmwarefx5uj-40mt\/ess_firmwarefx5uc-32mr\/ds-tsfx5uc-32mt\/dssfx5uj-40mr\/es_firmwarefx5uc-32mt\/ds-ts_firmwarefx5uj-24mr\/es_firmwarefx5uj-40mt\/essfx5uj-40mt\/esfx5uj-24mt\/esfx5uj-40mr\/esfx5uc-32mt\/dss-ts_firmwarefx5uc-32mt\/d_firmwareMitsubishi Electric MELSEC iQ-F series FX5U(C) CPU; Mitsubishi Electric MELSEC iQ-F series FX5UJ CPU; Mitsubishi Electric MELSEC iQ-R series R00/01/02CPU; Mitsubishi Electric MELSEC iQ-R series R04/08/16/32/120(EN)CPU; Mitsubishi Electric MELSEC iQ-R series R08/16/32/120SFCPU; Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PCPU; Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PSFCPU; Mitsubishi Electric MELSEC iQ-R series R16/32/64MTCPU; Mitsubishi Electric MELSEC iQ-R series RJ71C24(-R2/R4); Mitsubishi Electric MELSEC iQ-R series RJ71EN71; Mitsubishi Electric MELSEC iQ-R series RJ71GF11-T2; Mitsubishi Electric MELSEC iQ-R series RJ71GP21(S)-SX; Mitsubishi Electric MELSEC iQ-R series RJ72GF15-T2; Mitsubishi Electric MELSEC Q series Q03UDECPU; Mitsubishi Electric MELSEC Q series Q04/06/10/13/20/26/50/100UDEHCPU; Mitsubishi Electric MELSEC Q series Q03/04/06/13/26UDVCPU; Mitsubishi Electric MELSEC Q series Q04/06/13/26UDPVCPU; Mitsubishi Electric MELSEC Q series QJ71C24N(-R2/R4); Mitsubishi Electric MELSEC Q series QJ71E71-100; Mitsubishi Electric MELSEC L series L02/06/26CPU(-P); Mitsubishi Electric MELSEC L series L26CPU-(P)BT; Mitsubishi Electric MELSEC L series LJ71C24(-R2); Mitsubishi Electric MELSEC L series LJ71E71-100; Mitsubishi Electric MELSEC L series LJ72GF15-T2
CWE ID-CWE-287
Improper Authentication
CVE-2023-4562
Matching Score-4
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-4
Assigner-Mitsubishi Electric Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.23% / 45.76%
||
7 Day CHG~0.00%
Published-13 Oct, 2023 | 01:26
Updated-27 Feb, 2025 | 20:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Information Disclosure, Information Tampering and Authentication Bypass Vulnerability in MELSEC-F Series main module

Improper Authentication vulnerability in Mitsubishi Electric Corporation MELSEC-F Series main modules allows a remote unauthenticated attacker to obtain sequence programs from the product or write malicious sequence programs or improper data in the product without authentication by sending illegitimate messages.

Action-Not Available
Vendor-Mitsubishi Electric Corporation
Product-fx3g-40mt\/es_firmwarefx3g-60_mt\/dss_firmwarefx3uc-16mt\/d-p4_firmwarefx3u-48mr\/dsfx3u-48mt\/es-afx3u-32mr\/es-afx3u-48mr\/ds_firmwarefx3u-128mr\/es-afx3u-80mt\/dss_firmwarefx3uc-32mt-lt-2_firmwarefx3u-16mt\/dss_firmwarefx3s-10mt\/es_firmwarefx3g-4da-adp_firmwarefx3s-10mt\/dssfx3u-32mr\/dsfx3u-128mt\/es-afx3g-4da-pnk-adpfx3g-24mt\/es_firmwarefx3s-20mt\/dsfx3u-32mt\/dsfx3g-40_mt\/es_firmwarefx3u-80mt\/esfx3s-14mt\/dssfx3u-enet-p502_firmwarefx3g-14_mt\/dssfx3s-10mt\/dss_firmwarefx3sa-10mr-cmfx3gc_firmwarefx3g-14mr\/es-a_firmwarefx3u-16mr\/es-afx3g-4da-pnk-adp_firmwarefx3g-232adp\(-mb\)fx3uc-16mt\/dfx3s-30mt\/ess-2ad_firmwarefx3g-232adp\(-mb\)_firmwarefx3ge-24mr\/es_firmwarefx3g-24mt\/essfx3s-20mt\/dss_firmwarefx3u-64mt\/essfx3uc-32mt\/dss_firmwarefx3u-128mt\/es_firmwarefx3s-20mt\/es_firmwarefx3g-14_mr\/ds_firmwarefx3s-10mt\/ess_firmwarefx3g-40mt\/ess_firmwarefx3u-80mr\/es-afx3g-40mt\/essfx3u-32ms\/es_firmwarefx3u-64mr\/ua1_firmwarefx3g-24mt\/dss_firmwarefx3g-40_mt\/dss_firmwarefx3s-20mt\/esfx3u-32mr\/ua1fx3u-128mr\/es_firmwarefx3uc-16mt\/d_firmwarefx3s-10mt\/esfx3u-32mr\/ds_firmwarefx3g-14mt\/essfx3u-16mt\/esfx3ga-40mt-cm_firmwarefx3g-cnv-adp_firmwarefx3g-60mr\/es-a_firmwarefx3s-14mr\/ds_firmwarefx3ge-40mr\/dsfx3ge-40mr\/esfx3s-30mt\/es_firmwarefx3u-32mt\/es_firmwarefx3u-16mr\/ds_firmwarefx3s-14mt\/esfx3uc_firmwarefx3uc-64mt\/dss_firmwarefx3ge-24mr\/esfx3u-32mr\/es-a_firmwarefx3u-80mt\/dsfx3u-32mt\/es-afx3g-40_mt\/ds_firmwarefx3ge-24mt\/essfx3uc-96mt\/dss_firmwarefx3g-14_mr\/dsfx3ge-24mr\/ds_firmwarefx3sa-14mt-cm_firmwarefx3gcfx3g-60_mr\/ds_firmwarefx3g-60mr\/dsfx3g-14mr\/es-afx3g-40mr\/dsfx3u-16mt\/es_firmwarefx3ga-40mt-cmfx3s-20mr\/ds_firmwarefx3ge-24mt\/dss_firmwarefx3ge-40mr\/es_firmwarefx3u-16mr\/dsfx3s-10mr\/es_firmwarefx3g-60_mt\/dsfx3ucfx3sa-30mr-cm_firmwarefx3ge-40mt\/essfx3sa-20mt-cmfx3uc-16mr\/ds-t_firmwarefx3uc-96mt\/d_firmwarefx3sa-20mr-cm_firmwarefx3g-24mt\/es-a_firmwarefx3g-14mr\/dsfx3s-14mt\/essfx3u-128mr\/es-a_firmwarefx3ga-60mt-cmfx3g-60mt\/es-a_firmwarefx3u-32mt\/ess_firmwarefx3u-80mr\/ds_firmwarefx3g-14_mt\/ess_firmwarefx3uc-32mt\/dssfx3uc-16mr\/ds-tfx3g-4ad-adpfx3u-16mt\/es-a_firmwarefx3u-32mt\/dss_firmwarefx3g-24mt\/ds_firmwarefx3s-10mr\/dsfx3g-40mr\/es-a_firmwarefx3uc-16mt\/d-p4fx3g-60_mt\/ess_firmwarefx3u-48mt\/ds_firmwarefx3g-24_mr\/dsfx3g-24_mt\/dsfx3g-4ad-ptw-adpfx3g-60_mt\/essfx3uc-16mt\/dss-p4fx3u-64mt\/es_firmwarefx3sa-14mr-cmfx3u-16mr\/esfx3u-48mr\/esfx3uc-32mt-ltfx3sa-30mr-cmfx3s-30mt\/ds_firmwarefx3g-40_mr\/dsfx3u-48mt\/dssfx3g-24mt\/ess_firmwarefx3u-80mt\/es-a_firmwarefx3u-80mt\/es-afx3g-60mt\/essfx3uc-16mr\/d-t_firmwarefx3u-80mr\/dsfx3s-10mt\/dsfx3u-16mt\/ess_firmwarefx3u-64mt\/ds_firmwarefx3u-48mr\/es_firmwarefx3u-64mr\/ds_firmwarefx3uc-64mt\/dfx3g-60_mt\/esfx3u-64ms\/esfx3g-24_mt\/ds_firmwarefx3s-14mt\/es_firmwarefx3ge-40mr\/ds_firmwarefx3g-60mt\/esfx3g-40_mt\/dsfx3g-14_mr\/esfx3g-24_mt\/dss_firmwarefx3g-24_mt\/es_firmwarefx3g-60_mr\/es_firmwarefx3g-40mt\/dssfx3ge-24mt\/es_firmwarefx3u-48mr\/es-a_firmwarefx3g-60mt\/es_firmwarefx3s-30mt\/dssfx3u-128mr\/esfx3g-14mt\/ds_firmwarefx3u-64mr\/es-a_firmwarefx3gc-32mt\/dssfx3u-48mt\/essfx3u-16mt\/es-afx3u-64mr\/es-afx3g-40mt\/dss_firmwarefx3u-enet-p502fx3g-485adp\(-mb\)_firmwarefx3u-64mt\/dss_firmwarefx3ge-24mr\/dsfx3sa-10mr-cm_firmwarefx3sa-14mt-cmfx3u-64mt\/dssfx3g-60_mr\/dsfx3g-60_mr\/esfx3ge-24mt\/esfx3ge-24mt\/ds_firmwarefx3ge-40mt\/ess_firmwarefx3s-30mr\/ds_firmwarefx3g-3a-adp_firmwarefx3g-14mt\/ess_firmwarefx3g-14mt\/es-a_firmwarefx3u-48mt\/esfx3u-80mr\/es_firmwarefx3g-24mr\/dsfx3u-48mt\/dsfx3s-10mt\/ds_firmwarefx3s-14mr\/dsfx3g-60_mt\/es_firmwarefx3g-40_mt\/dssfx3s-20mr\/dsfx3ge-24mt\/dssfx3g-32_mt\/dss_firmwarefx3ga-40mr-cmfx3ge-40mt\/dssfx3uc-16mt\/dssfx3u-32mt\/es-a_firmwarefx3s-30mr\/dsfx3u-enet_firmwarefx3g-14_mt\/dss_firmwarefx3g-60_mt\/ds_firmwarefx3sa-30mt-cm_firmwarefx3g-4ad-pt-adpfx3s-20mt\/ess_firmwarefx3s-30mt\/es-2adfx3u-32mr\/esfx3s-20mt\/ds_firmwarefx3s-30mt\/esfx3g-14_mt\/dsfx3g-24_mt\/ess_firmwarefx3g-40mt\/es-a_firmwarefx3sa-10mt-cm_firmwarefx3u-48mt\/es-a_firmwarefx3g-14mr\/ds_firmwarefx3sa-20mr-cmfx3g-14mt\/dsfx3g-60mr\/ds_firmwarefx3s-30mt\/essfx3g-24mt\/dssfx3g-24_mt\/essfx3u-enet-l_firmwarefx3s-14mt\/dss_firmwarefx3ge-40mt\/esfx3s-30mt\/ess-2adfx3g-14_mt\/es_firmwarefx3s-14mt\/dsfx3g-40mr\/es_firmwarefx3uc-32mt\/dfx3uc-96mt\/dfx3g-40_mr\/es_firmwarefx3u-64mt\/dsfx3u-48mt\/ess_firmwarefx3u-80mt\/ds_firmwarefx3g-24_mr\/ds_firmwarefx3ga-60mt-cm_firmwarefx3g-14_mt\/ds_firmwarefx3g-24mt\/es-afx3u-64ms\/es_firmwarefx3g-14mr\/es_firmwarefx3ge-24mt\/dsfx3u-80mr\/es-a_firmwarefx3sa-20mt-cm_firmwarefx3g-14_mr\/es_firmwarefx3s-30mr\/esfx3s-14mt\/ess_firmwarefx3s-30mt\/dss_firmwarefx3u-128mt\/ess_firmwarefx3s-30mt\/dsfx3u-80mt\/ess_firmwarefx3uc-32mt\/d_firmwarefx3s-30mt\/ess_firmwarefx3g-60mr\/es-afx3g-14mt\/es-afx3u-64mt\/ess_firmwarefx3g-4ad-adp_firmwarefx3s-20mr\/esfx3ge-40mt\/dss_firmwarefx3g-4ad-tc-adpfx3u-32ms\/esfx3u-enetfx3ga-24mt-cm_firmwarefx3u-48mt\/dss_firmwarefx3u-64mr\/es_firmwarefx3s-14mr\/esfx3uc-16mr\/d-tfx3uc-16mt\/dss_firmwarefx3g-14_mt\/essfx3u-32mr\/es_firmwarefx3g-40mt\/esfx3u-64mr\/esfx3g-40mr\/ds_firmwarefx3g-3a-adpfx3g-60mr\/es_firmwarefx3g-40mt\/ds_firmwarefx3g-4ad-pt-adp_firmwarefx3u-128mt\/es-a_firmwarefx3g-14mt\/dssfx3u-48mr\/es-afx3uc-64mt\/dssfx3g-14mt\/esfx3u-32mt\/esfx3g-24_mr\/es_firmwarefx3u-32mr\/ua1_firmwarefx3ge-24mt\/ess_firmwarefx3g-32_mt\/dssfx3g-40_mt\/esfx3g-24mr\/es-afx3g-cnv-adpfx3g-14mr\/esfx3g-4ad-ptw-adp_firmwarefx3ga-60mr-cmfx3g-24mr\/ds_firmwarefx3ge-40mt\/ds_firmwarefx3g-40_mr\/ds_firmwarefx3u-64mr\/dsfx3s-30mt\/es-2ad_firmwarefx3u-80mt\/es_firmwarefx3u-128mt\/esfx3g-40mt\/dsfx3g-40_mr\/esfx3uc-16mt\/dss-p4_firmwarefx3g-60mr\/esfx3g-24mt\/dsfx3u-64mt\/esfx3s-10mt\/essfx3s-10mr\/ds_firmwarefx3g-40mr\/es-afx3u-32mt\/dssfx3u-64mr\/ua1fx3gc-32mt\/dss_firmwarefx3u-80mt\/essfx3s-30mr\/es-2ad_firmwarefx3u-16mt\/ds_firmwarefx3u-16mt\/dsfx3g-60mt\/dss_firmwarefx3g-24mt\/esfx3sa-30mt-cmfx3u-16mt\/dssfx3s-20mt\/essfx3g-60mt\/dssfx3uc-32mt-lt-2fx3ga-60mr-cm_firmwarefx3gc-32mt\/dfx3g-40mt\/es-afx3s-30mr\/es_firmwarefx3g-485adp\(-mb\)fx3u-128mt\/essfx3s-20mt\/dssfx3g-24_mt\/dssfx3g-40mr\/esfx3g-4ad-tc-adp_firmwarefx3s-14mt\/ds_firmwarefx3g-60_mt\/dssfx3u-80mt\/dssfx3ga-24mt-cmfx3sa-10mt-cmfx3ga-24mr-cm_firmwarefx3gc-32mt\/d_firmwarefx3u-48mt\/es_firmwarefx3ga-24mr-cmfx3g-24mr\/es-a_firmwarefx3u-32mt\/ds_firmwarefx3ge-40mt\/dsfx3g-24_mr\/esfx3g-40_mt\/ess_firmwarefx3g-24_mt\/esfx3ga-40mr-cm_firmwarefx3ge-40mt\/es_firmwarefx3u-64mt\/es-afx3u-16mt\/essfx3g-4da-adpfx3u-64mt\/es-a_firmwarefx3g-14mt\/dss_firmwarefx3g-60mt\/ess_firmwarefx3g-14mt\/es_firmwarefx3sa-14mr-cm_firmwarefx3g-24mr\/es_firmwarefx3u-16mr\/es_firmwarefx3s-14mr\/es_firmwarefx3g-40_mt\/essfx3uc-64mt\/d_firmwarefx3uc-32mt-lt_firmwarefx3uc-96mt\/dssfx3g-24mr\/esfx3g-60mt\/dsfx3u-80mr\/esfx3u-16mr\/es-a_firmwarefx3g-60mt\/es-afx3g-14_mt\/esfx3g-60mt\/ds_firmwarefx3s-10mr\/esfx3s-20mr\/es_firmwarefx3s-30mr\/es-2adfx3u-enet-lfx3u-32mt\/essMELSEC-F Series FX3U-80MT/ES-AMELSEC-F Series FX3UC-16MT/DMELSEC-F Series FX3U-48MR/ES-AMELSEC-F Series FX3U-128MR/ES-AMELSEC-F Series FX3U-80MT/ESMELSEC-F Series FX3S-10MR/ESMELSEC-F Series FX3U-128MT/DSMELSEC-F Series FX3U-64MR/UA1MELSEC-F Series FX3U-80MR/ESMELSEC-F Series FX3U-80MT/ESSMELSEC-F Series FX3SA-30MR-CMMELSEC-F Series FX3U-16MT/ESMELSEC-F Series FX3G-24MT/ESMELSEC-F Series FX3U-32MR/DSMELSEC-F Series FX3U-48MR/ESMELSEC-F Series FX3U-32MR/UA1MELSEC-F Series FX3GA-60MR-CMMELSEC-F Series FX3GE-40MT/DSMELSEC-F Series FX3G-60MT/ESMELSEC-F Series FX3G-40MT/DSMELSEC-F Series FX3G-24MT/DSMELSEC-F Series FX3GA-40MR-CMMELSEC-F Series FX3GA-60MT-CMMELSEC-F Series FX3G-40MR/ESMELSEC-F Series FX3U-64MT/ESSMELSEC-F Series FX3UC-64MT/DSSMELSEC-F Series FX3S-10MT/DSMELSEC-F Series FX3U-128MT/ESMELSEC-F Series FX3G-24MR/ESMELSEC-F Series FX3G-24MR/ES-AMELSEC-F Series FX3U-80MR/ES-AMELSEC-F Series FX3G-14MR/ES-AMELSEC-F Series FX3U-48MT/ES-AMELSEC-F Series FX3S-14MT/ESMELSEC-F Series FX3U-32MR/ESMELSEC-F Series FX3G-14MT/DSMELSEC-F Series FX3G-40MT/ES-AMELSEC-F Series FX3SA-14MT-CMMELSEC-F Series FX3GE-40MR/ESMELSEC-F Series FX3U-128MT/ESSMELSEC-F Series FX3S-14MR/ESMELSEC-F Series FX3G-60MR/ESMELSEC-F Series FX3GE-24MT/DSSMELSEC-F Series FX3U-80MT/DSSMELSEC-F Series FX3GE-40MT/DSSMELSEC-F Series FX3U-48MT/ESSMELSEC-F Series FX3SA-10MT-CMMELSEC-F Series FX3U-32MT/DSMELSEC-F Series FX3U-16MT/DSSMELSEC-F Series FX3S-14MT/DSMELSEC-F Series FX3G-40MR/ES-AMELSEC-F Series FX3S-30MT/DSMELSEC-F Series FX3UC-32MT/DMELSEC-F Series FX3U-64MR/DSMELSEC-F Series FX3GE-40MT/ESSMELSEC-F Series FX3S-10MT/ESSMELSEC-F Series FX3G-24MT/ESSMELSEC-F Series FX3S-20MR/ESMELSEC-F Series FX3SA-20MT-CMMELSEC-F Series FX3S-30MT/DSSMELSEC-F Series FX3G-14MT/ESMELSEC-F Series FX3SA-20MR-CMMELSEC-F Series FX3GE-24MT/DSMELSEC-F Series FX3G-60MT/ES-AMELSEC-F Series FX3G-24MT/DSSMELSEC-F Series FX3U-16MR/ES-AMELSEC-F Series FX3U-48MT/ESMELSEC-F Series FX3G-60MT/DSMELSEC-F Series FX3UC-32MT/DSSMELSEC-F Series FX3UC-16MR/DS-TMELSEC-F Series FX3U-64MS/ESMELSEC-F Series FX3S-30MR/DSMELSEC-F Series FX3S-20MR/DSMELSEC-F Series FX3S-20MT/ESMELSEC-F Series FX3UC-32MT-LTMELSEC-F Series FX3G-60MR/DSMELSEC-F Series FX3UC-16MT/D-P4MELSEC-F Series FX3U-32MT/ESSMELSEC-F Series FX3G-24MR/DSMELSEC-F Series FX3U-48MR/DSMELSEC-F Series FX3U-128MR/ESMELSEC-F Series FX3S-30MT/ESMELSEC-F Series FX3S-10MR/DSMELSEC-F Series FX3U-64MT/DSMELSEC-F Series FX3G-60MT/ESSMELSEC-F Series FX3S-10MT/ESMELSEC-F Series FX3U-64MR/ESMELSEC-F Series FX3G-14MT/ESSMELSEC-F Series FX3U-64MT/DSSMELSEC-F Series FX3U-32MS/ESMELSEC-F Series FX3S-20MT/ESSMELSEC-F Series FX3UC-96MT/DMELSEC-F Series FX3G-60MT/DSSMELSEC-F Series FX3U-32MT/DSSMELSEC-F Series FX3U-64MT/ESMELSEC-F Series FX3SA-14MR-CMMELSEC-F Series FX3U-32MT/ES-AMELSEC-F Series FX3U-80MT/DSMELSEC-F Series FX3U-64MT/ES-AMELSEC-F Series FX3U-128MT/ES-AMELSEC-F Series FX3GE-24MR/ESMELSEC-F Series FX3U-128MR/DSMELSEC-F Series FX3U-64MR/ES-AMELSEC-F Series FX3U-48MT/DSSMELSEC-F Series FX3U-16MR/DSMELSEC-F Series FX3G-60MR/ES-AMELSEC-F Series FX3S-20MT/DSSMELSEC-F Series FX3U-128MT/DSSMELSEC-F Series FX3S-30MR/ESMELSEC-F Series FX3U-48MT/DSMELSEC-F Series FX3GA-24MR-CMMELSEC-F Series FX3S-30MT/ESSMELSEC-F Series FX3UC-96MT/DSSMELSEC-F Series FX3G-14MR/ESMELSEC-F Series FX3SA-30MT-CMMELSEC-F Series FX3U-16MR/ESMELSEC-F Series FX3UC-16MT/DSS-P4MELSEC-F Series FX3GE-40MT/ESMELSEC-F Series FX3G-14MR/DSMELSEC-F Series FX3U-32MR/ES-AMELSEC-F Series FX3U-16MT/ESSMELSEC-F Series FX3U-80MR/DSMELSEC-F Series FX3S-30MR/ES-2ADMELSEC-F Series FX3GA-40MT-CMMELSEC-F Series FX3G-40MT/DSSMELSEC-F Series FX3GC-32MT/DMELSEC-F Series FX3UC-16MT/DSSMELSEC-F Series FX3GE-24MT/ESSMELSEC-F Series FX3GE-24MR/DSMELSEC-F Series FX3G-40MR/DSMELSEC-F Series FX3SA-10MR-CMMELSEC-F Series FX3S-20MT/DSMELSEC-F Series FX3G-14MT/DSSMELSEC-F Series FX3G-24MT/ES-AMELSEC-F Series FX3U-16MT/DSMELSEC-F Series FX3G-14MT/ES-AMELSEC-F Series FX3S-14MT/DSSMELSEC-F Series FX3G-40MT/ESMELSEC-F Series FX3S-30MT/ES-2ADMELSEC-F Series FX3GC-32MT/DSSMELSEC-F Series FX3S-10MT/DSSMELSEC-F Series FX3UC-16MR/D-TMELSEC-F Series FX3GE-40MR/DSMELSEC-F Series FX3GE-24MT/ESMELSEC-F Series FX3UC-32MT-LT-2MELSEC-F Series FX3U-16MT/ES-AMELSEC-F Series FX3S-14MT/ESSMELSEC-F Series FX3S-14MR/DSMELSEC-F Series FX3UC-64MT/DMELSEC-F Series FX3S-30MT/ESS-2ADMELSEC-F Series FX3G-40MT/ESSMELSEC-F Series FX3GA-24MT-CMMELSEC-F Series FX3U-32MT/ES
CWE ID-CWE-287
Improper Authentication
CVE-2023-44039
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.41% / 60.63%
||
7 Day CHG~0.00%
Published-03 Apr, 2024 | 00:00
Updated-16 Apr, 2025 | 15:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In VeridiumID before 3.5.0, the WebAuthn API allows an internal unauthenticated attacker (who can pass enrollment verifications and is allowed to enroll a FIDO key) to register their FIDO authenticator to a victim’s account and consequently take over the account.

Action-Not Available
Vendor-veridiumidn/averidiumid
Product-veridiumadn/averidiumad
CWE ID-CWE-287
Improper Authentication
CVE-2018-1539
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-5.4||MEDIUM
EPSS-0.12% / 31.67%
||
7 Day CHG~0.00%
Published-25 Sep, 2018 | 16:00
Updated-16 Sep, 2024 | 23:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Rational Engineering Lifecycle Manager 5.0 through 5.02 and 6.0 through 6.0.6 could allow remote attackers to bypass authentication via a direct request or forced browsing to a page other than URL intended. IBM X-Force ID: 142561.

Action-Not Available
Vendor-IBM Corporation
Product-rational_engineering_lifecycle_managerRational Engineering Lifecycle Manager
CWE ID-CWE-287
Improper Authentication
CVE-2018-15152
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-9.06% / 92.47%
||
7 Day CHG~0.00%
Published-15 Aug, 2018 | 17:00
Updated-05 Aug, 2024 | 09:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Authentication bypass vulnerability in portal/account/register.php in versions of OpenEMR before 5.0.1.4 allows a remote attacker to access (1) portal/add_edit_event_user.php, (2) portal/find_appt_popup_user.php, (3) portal/get_allergies.php, (4) portal/get_amendments.php, (5) portal/get_lab_results.php, (6) portal/get_medications.php, (7) portal/get_patient_documents.php, (8) portal/get_problems.php, (9) portal/get_profile.php, (10) portal/portal_payment.php, (11) portal/messaging/messages.php, (12) portal/messaging/secure_chat.php, (13) portal/report/pat_ledger.php, (14) portal/report/portal_custom_report.php, or (15) portal/report/portal_patient_report.php without authenticating as a patient.

Action-Not Available
Vendor-n/aOpenEMR Foundation, Inc
Product-openemrn/a
CWE ID-CWE-287
Improper Authentication
CVE-2018-12472
Matching Score-4
Assigner-OpenText (formerly Micro Focus)
ShareView Details
Matching Score-4
Assigner-OpenText (formerly Micro Focus)
CVSS Score-7.3||HIGH
EPSS-0.38% / 58.89%
||
7 Day CHG~0.00%
Published-04 Oct, 2018 | 14:00
Updated-16 Sep, 2024 | 23:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authentication bypass in sibling check

A improper authentication using the HOST header in SUSE Linux SMT allows remote attackers to spoof a sibling server. Affected releases are SUSE Linux SMT: versions prior to 3.0.37.

Action-Not Available
Vendor-SUSE
Product-subscription_management_toolSMT
CWE ID-CWE-287
Improper Authentication
CVE-2023-6483
Matching Score-4
Assigner-Indian Computer Emergency Response Team (CERT-In)
ShareView Details
Matching Score-4
Assigner-Indian Computer Emergency Response Team (CERT-In)
CVSS Score-9.1||CRITICAL
EPSS-0.14% / 33.45%
||
7 Day CHG~0.00%
Published-18 Dec, 2023 | 08:04
Updated-07 May, 2025 | 20:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Authentication Vulnerability in ADiTaaS

The vulnerability exists in ADiTaaS (Allied Digital Integrated Tool-as-a-Service) version 5.1 due to an improper authentication vulnerability in the ADiTaaS backend API. An unauthenticated remote attacker could exploit this vulnerability by sending specially crafted HTTP requests to the vulnerable platform. Successful exploitation of this vulnerability could allow the attacker to gain full access to the customers’ data and completely compromise the targeted platform.

Action-Not Available
Vendor-aditaasADiTaaS
Product-allied_digital_integrated_tool-as-a-serviceAllied Digital Integrated Tool-as-a-Service
CWE ID-CWE-287
Improper Authentication
CVE-2018-0116
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.2||HIGH
EPSS-0.36% / 57.37%
||
7 Day CHG~0.00%
Published-08 Feb, 2018 | 07:00
Updated-02 Dec, 2024 | 21:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the RADIUS authentication module of Cisco Policy Suite could allow an unauthenticated, remote attacker to be authorized as a subscriber without providing a valid password; however, the attacker must provide a valid username. The vulnerability is due to incorrect RADIUS user credential validation. An attacker could exploit this vulnerability by attempting to access a Cisco Policy Suite domain configured with RADIUS authentication. An exploit could allow the attacker to be authorized as a subscriber without providing a valid password. This vulnerability affects the Cisco Policy Suite application running a release prior to 13.1.0 with Hotfix Patch 1 when RADIUS authentication is configured for a domain. Cisco Policy Suite Release 14.0.0 is also affected, as it includes vulnerable code, but RADIUS authentication is not officially supported in Cisco Policy Suite Releases 14.0.0 and later. Cisco Bug IDs: CSCvg40124.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-mobility_services_engineCisco Policy Suite
CWE ID-CWE-287
Improper Authentication
CVE-2023-5376
Matching Score-4
Assigner-CyberDanube
ShareView Details
Matching Score-4
Assigner-CyberDanube
CVSS Score-8.6||HIGH
EPSS-0.21% / 43.17%
||
7 Day CHG~0.00%
Published-09 Jan, 2024 | 09:44
Updated-08 Oct, 2025 | 10:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
TFTP Without Authentication

An Improper Authentication vulnerability in Korenix JetNet TFTP allows abuse of this service. This issue affects JetNet devices older than firmware version 2024/01.

Action-Not Available
Vendor-korenixKorenix
Product-jetnet_7628x-4f-eujetnet_4508jetnet_6528gf-2ac-us_firmwarejetnet_6910g-m12_hvdc_firmwarejetnet_5612g-4fjetnet_7628xp-4f-eu_firmwarejetnet_6628x-4f-eujetnet_4508-wjetnet_4508f-mw_firmwarejetnet_6528gf-2dc48jetnet_6828gf-ac-dc24-us_firmwarejetnet_6528gf-ac-eu_firmwarejetnet_7628xp-4f-usjetnet_4508if-s_firmwarejetnet_6528gf-2dc48_firmwarejetnet_4508if-m_firmwarejetnet_7628xp-4f-us_firmwarejetnet_7628xp-4f-eujetnet_4508f-sw_firmwarejetnet_4508f-swjetnet_4508f-mwjetnet_6828gf-2ac-aujetnet_6910g-m12_hvdcjetnet_6828gf-2dc48_firmwarejetnet_5612gp-4fjetnet_6528gf-2dc24_firmwarejetnet_4508i-w_firmwarejetnet_4508f-mjetnet_4508f-s_firmwarejetnet_6528gf-2ac-usjetnet_6828gf-2ac-eujetnet_5620g-4cjetnet_7714g-m12_hvdc_firmwarejetnet_6728g-24p-ac-2dc-usjetnet_5620g-4c_firmwarejetnet_4508if-swjetnet_6528gf-2dc24jetnet_6528gf-ac-eujetnet_5728g-24p-ac-2dc-eu_firmwarejetnet_6628xp-4f-us_firmwarejetnet_6728g-24p-ac-2dc-us_firmwarejetnet_6828gf-2dc24jetnet_4508if-sjetnet_5728g-24p-ac-2dc-us_firmwarejetnet_4508if-sw_firmwarejetnet_5612g-4f_firmwarejetnet_6628xp-4f-usjetnet_6828gf-ac-dc24-eujetnet_4508i-wjetnet_7628x-4f-eu_firmwarejetnet_7310g-v2jetnet_4508-w_firmwarejetnet_6828gf-ac-dc24-usjetnet_4508if-mwjetnet_6828gf-2ac-usjetnet_7714g-m12_hvdcjetnet_5728g-24p-ac-2dc-eujetnet_6828gf-2ac-au_firmwarejetnet_6828gf-ac-dc24-eu_firmwarejetnet_5612gp-4f_firmwarejetnet_6728g-24p-ac-2dc-eu_firmwarejetnet_6528gf-ac-usjetnet_6728g-24p-ac-2dc-eujetnet_6828gf-2dc24_firmwarejetnet_6828gf-ac-usjetnet_5310gjetnet_6628x-4f-eu_firmwarejetnet_5728g-24p-ac-2dc-usjetnet_4508if-mw_firmwarejetnet_7628x-4f-usjetnet_4508f-m_firmwarejetnet_4508_firmwarejetnet_6828gf-2ac-eu_firmwarejetnet_6828gf-ac-us_firmwarejetnet_5310g_firmwarejetnet_4508if-mjetnet_6828gf-2dc48jetnet_4508f-sjetnet_6528gf-2ac-eu_firmwarejetnet_6828gf-2ac-us_firmwarejetnet_6528gf-ac-us_firmwarejetnet_7310g-v2_firmwarejetnet_6528gf-2ac-eujetnet_7628x-4f-us_firmwareJetNet Series
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-30114
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.13% / 32.88%
||
7 Day CHG~0.00%
Published-18 Mar, 2025 | 00:00
Updated-22 May, 2025 | 19:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on the Forvia Hella HELLA Driving Recorder DR 820. Bypassing of Device Pairing can occur. The pairing mechanism relies solely on the connecting device's MAC address. By obtaining the MAC address through network scanning and spoofing it, an attacker can bypass the authentication process and gain full access to the dashcam's features without proper authorization.

Action-Not Available
Vendor-hellan/a
Product-dr_820dr_820_firmwaren/a
CWE ID-CWE-287
Improper Authentication
CVE-2017-9421
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.26% / 48.66%
||
7 Day CHG~0.00%
Published-24 May, 2018 | 13:00
Updated-05 Aug, 2024 | 17:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Authentication Bypass vulnerability in Accellion kiteworks before 2017.01.00 allows remote attackers to execute certain API calls on behalf of a web user using a gathered token via a POST request to /oauth/token.

Action-Not Available
Vendor-n/aAccellion (Kiteworks USA, LLC)
Product-kiteworksn/a
CWE ID-CWE-287
Improper Authentication
  • Previous
  • 1
  • 2
  • 3
  • 4
  • Next
Details not found