Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2021-20590

Summary
Assigner-Mitsubishi
Assigner Org ID-e0f77b61-78fd-4786-b3fb-1ee347a748ad
Published At-22 Apr, 2021 | 18:54
Updated At-03 Aug, 2024 | 17:45
Rejected At-
Credits

Improper authentication vulnerability in GOT2000 series GT27 model VNC server versions 01.39.010 and prior, GOT2000 series GT25 model VNC server versions 01.39.010 and prior, GOT2000 series GT21 model GT2107-WTBD VNC server versions 01.40.000 and prior, GOT2000 series GT21 model GT2107-WTSD VNC server versions 01.40.000 and prior, GOT SIMPLE series GS21 model GS2110-WTBD-N VNC server versions 01.40.000 and prior and GOT SIMPLE series GS21 model GS2107-WTBD-N VNC server versions 01.40.000 and prior allows a remote unauthenticated attacker to gain unauthorized access via specially crafted packets when the "VNC server" function is used.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Mitsubishi
Assigner Org ID:e0f77b61-78fd-4786-b3fb-1ee347a748ad
Published At:22 Apr, 2021 | 18:54
Updated At:03 Aug, 2024 | 17:45
Rejected At:
▼CVE Numbering Authority (CNA)

Improper authentication vulnerability in GOT2000 series GT27 model VNC server versions 01.39.010 and prior, GOT2000 series GT25 model VNC server versions 01.39.010 and prior, GOT2000 series GT21 model GT2107-WTBD VNC server versions 01.40.000 and prior, GOT2000 series GT21 model GT2107-WTSD VNC server versions 01.40.000 and prior, GOT SIMPLE series GS21 model GS2110-WTBD-N VNC server versions 01.40.000 and prior and GOT SIMPLE series GS21 model GS2107-WTBD-N VNC server versions 01.40.000 and prior allows a remote unauthenticated attacker to gain unauthorized access via specially crafted packets when the "VNC server" function is used.

Affected Products
Vendor
n/a
Product
GOT2000 series GT27 model
Versions
Affected
  • VNC server version 01.39.010 and prior
Vendor
n/a
Product
GOT2000 series GT25 model
Versions
Affected
  • VNC server version 01.39.010 and prior
Vendor
n/a
Product
GOT2000 series GT21 model GT2107-WTBD
Versions
Affected
  • VNC server version 01.40.000 and prior
Vendor
n/a
Product
GOT2000 series GT21 model GT2107-WTSD
Versions
Affected
  • VNC server version 01.40.000 and prior
Vendor
n/a
Product
GOT SIMPLE series GS21 model GS2110-WTBD-N
Versions
Affected
  • VNC server version 01.40.000 and prior
Vendor
n/a
Product
GOT SIMPLE series GS21 model GS2107-WTBD-N
Versions
Affected
  • VNC server version 01.40.000 and prior
Problem Types
TypeCWE IDDescription
textN/AImproper authentication
Type: text
CWE ID: N/A
Description: Improper authentication
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-001_en.pdf
x_refsource_CONFIRM
https://jvn.jp/vu/JVNVU97615777/index.html
x_refsource_CONFIRM
Hyperlink: https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-001_en.pdf
Resource:
x_refsource_CONFIRM
Hyperlink: https://jvn.jp/vu/JVNVU97615777/index.html
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-001_en.pdf
x_refsource_CONFIRM
x_transferred
https://jvn.jp/vu/JVNVU97615777/index.html
x_refsource_CONFIRM
x_transferred
Hyperlink: https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-001_en.pdf
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://jvn.jp/vu/JVNVU97615777/index.html
Resource:
x_refsource_CONFIRM
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp
Published At:22 Apr, 2021 | 19:15
Updated At:07 Nov, 2023 | 03:29

Improper authentication vulnerability in GOT2000 series GT27 model VNC server versions 01.39.010 and prior, GOT2000 series GT25 model VNC server versions 01.39.010 and prior, GOT2000 series GT21 model GT2107-WTBD VNC server versions 01.40.000 and prior, GOT2000 series GT21 model GT2107-WTSD VNC server versions 01.40.000 and prior, GOT SIMPLE series GS21 model GS2110-WTBD-N VNC server versions 01.40.000 and prior and GOT SIMPLE series GS21 model GS2107-WTBD-N VNC server versions 01.40.000 and prior allows a remote unauthenticated attacker to gain unauthorized access via specially crafted packets when the "VNC server" function is used.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Primary2.04.3MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
Type: Primary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Type: Primary
Version: 2.0
Base score: 4.3
Base severity: MEDIUM
Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N
CPE Matches

Mitsubishi Electric Corporation
mitsubishielectric
>>got2000_gt27_firmware>>Versions up to 01.39.010(inclusive)
cpe:2.3:o:mitsubishielectric:got2000_gt27_firmware:*:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>got2000_gt27>>-
cpe:2.3:h:mitsubishielectric:got2000_gt27:-:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>got2000_gt25_firmware>>Versions up to 01.39.010(inclusive)
cpe:2.3:o:mitsubishielectric:got2000_gt25_firmware:*:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>got2000_gt25>>-
cpe:2.3:h:mitsubishielectric:got2000_gt25:-:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>gt2107-wtbd_firmware>>Versions up to 01.40.000(inclusive)
cpe:2.3:o:mitsubishielectric:gt2107-wtbd_firmware:*:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>gt2107-wtbd>>-
cpe:2.3:h:mitsubishielectric:gt2107-wtbd:-:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>gt2107-wtsd_firmware>>Versions up to 01.40.000(inclusive)
cpe:2.3:o:mitsubishielectric:gt2107-wtsd_firmware:*:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>gt2107-wtsd>>-
cpe:2.3:h:mitsubishielectric:gt2107-wtsd:-:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>gs2110-wtbd-n_firmware>>Versions up to 01.40.000(inclusive)
cpe:2.3:o:mitsubishielectric:gs2110-wtbd-n_firmware:*:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>gs2110-wtbd-n>>-
cpe:2.3:h:mitsubishielectric:gs2110-wtbd-n:-:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>gs2107-wtbd-n_firmware>>Versions up to 01.40.000(inclusive)
cpe:2.3:o:mitsubishielectric:gs2107-wtbd-n_firmware:*:*:*:*:*:*:*:*
Mitsubishi Electric Corporation
mitsubishielectric
>>gs2107-wtbd-n>>-
cpe:2.3:h:mitsubishielectric:gs2107-wtbd-n:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-287Primarynvd@nist.gov
CWE ID: CWE-287
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://jvn.jp/vu/JVNVU97615777/index.htmlMitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp
N/A
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-001_en.pdfMitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp
N/A
Hyperlink: https://jvn.jp/vu/JVNVU97615777/index.html
Source: Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp
Resource: N/A
Hyperlink: https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2021-001_en.pdf
Source: Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

147Records found

CVE-2023-1618
Matching Score-8
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-8
Assigner-Mitsubishi Electric Corporation
CVSS Score-7.5||HIGH
EPSS-0.13% / 33.69%
||
7 Day CHG~0.00%
Published-19 May, 2023 | 04:19
Updated-12 Feb, 2025 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authentication Bypass Vulnerability in MELSEC WS Series Ethernet Interface Module

Active Debug Code vulnerability in Mitsubishi Electric Corporation MELSEC WS Series WS0-GETH00200 Serial number 2310 **** and prior allows a remote unauthenticated attacker to bypass authentication and illegally log into the affected module by connecting to it via telnet which is hidden function and is enabled by default when shipped from the factory. As a result, a remote attacker with unauthorized login can reset the module, and if certain conditions are met, he/she can disclose or tamper with the module's configuration or rewrite the firmware.

Action-Not Available
Vendor-Mitsubishi Electric Corporation
Product-melsec_ws0-geth00200melsec_ws0-geth00200_firmwareMELSEC WS Series WS0-GETH00200
CWE ID-CWE-489
Active Debug Code
CWE ID-CWE-1188
Initialization of a Resource with an Insecure Default
CVE-2023-6942
Matching Score-8
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-8
Assigner-Mitsubishi Electric Corporation
CVSS Score-7.5||HIGH
EPSS-0.53% / 66.44%
||
7 Day CHG~0.00%
Published-30 Jan, 2024 | 09:06
Updated-29 May, 2025 | 15:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Missing Authentication for Critical Function vulnerability in Mitsubishi Electric Corporation EZSocket versions 3.0 to 5.92, GT Designer3 Version1(GOT1000) versions 1.325P and prior, GT Designer3 Version1(GOT2000) versions 1.320J and prior, GX Works2 versions 1.11M and later, GX Works3 versions 1.106L and prior, MELSOFT Navigator versions 1.04E to 2.102G, MT Works2 versions 1.190Y and prior, MX Component versions 4.00A to 5.007H and MX OPC Server DA/UA all versions allows a remote unauthenticated attacker to bypass authentication by sending specially crafted packets and connect to the products illegally.

Action-Not Available
Vendor-Mitsubishi Electric Corporation
Product-gx_works2got1000got2000mt_works2ezsocketmc_works64gx_works3melsoft_navigatorfr_configurator2mx_componentMX OPC Server DA/UAMT Works2MX ComponentEZSocketGX Works2GT Designer3 Version1(GOT1000)GX Works3MELSOFT NavigatorGT Designer3 Version1(GOT2000)
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-6374
Matching Score-8
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-8
Assigner-Mitsubishi Electric Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.34% / 55.68%
||
7 Day CHG~0.00%
Published-30 Jan, 2024 | 09:00
Updated-09 Jun, 2025 | 18:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Authentication Bypass by Capture-replay vulnerability in Mitsubishi Electric Corporation MELSEC WS Series WS0-GETH00200 all serial numbers allows a remote unauthenticated attacker to bypass authentication by capture-replay attack and illegally login to the affected module. As a result, the remote attacker who has logged in illegally may be able to disclose or tamper with the programs and parameters in the modules.

Action-Not Available
Vendor-Mitsubishi Electric Corporation
Product-melsec_ws0-geth00200melsec_ws0-geth00200_firmwareMELSEC WS Series WS0-GETH00200
CWE ID-CWE-294
Authentication Bypass by Capture-replay
CVE-2018-16061
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.28% / 50.69%
||
7 Day CHG~0.00%
Published-15 Oct, 2021 | 19:04
Updated-11 Sep, 2024 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mitsubishi Electric Europe B.V. SmartRTU devices allow XSS via the username parameter or PATH_INFO to login.php.

Action-Not Available
Vendor-n/aMitsubishi Electric Corporation
Product-smartrtusmartrtu_firmwaren/a
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-20601
Matching Score-8
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-8
Assigner-Mitsubishi Electric Corporation
CVSS Score-7.5||HIGH
EPSS-0.37% / 57.82%
||
7 Day CHG~0.00%
Published-23 Nov, 2021 | 14:42
Updated-03 Aug, 2024 | 17:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation vulnerability in GOT2000 series GT27 model all versions, GOT2000 series GT25 model all versions, GOT2000 series GT23 model all versions, GOT2000 series GT21 model all versions, GOT SIMPLE series GS21 model all versions, and GT SoftGOT2000 all versions allows an remote unauthenticated attacker to write a value that exceeds the configured input range limit by sending a malicious packet to rewrite the device value. As a result, the system operation may be affected, such as malfunction.

Action-Not Available
Vendor-n/aMitsubishi Electric Corporation
Product-got2000_gt2715-xtbd_firmwaregot2000_gt2510-vtwd_firmwaregot2000_gt2715-xtbdgot2000_gt2103-pmbd_firmwaregot2000_gt2510-vtbd_firmwaregot2000_gt2705-vtbdgot2000_gt2103-pmblsgot2000_gt2507-wtbdgot2000_gt2708-vtbd_firmwaregot2000_gt2715-xtbagot2000_gt2710-vtbd_firmwaregot2000_gt2712-stba_firmwaregot2000_gt2505hs-vtbdgot2000_gt2510-vtwagot2000_gt2712-stbd_firmwaregot_simple_gs2110-wtbd_firmwaregot2000_gt2512-stbd_firmwaregot2000_gt2710-vtwd_firmwaregot2000_gt2705-vtbd_firmwaregot2000_gt2508-vtwd_firmwaregot2000_gt2710-vtbdgot2000_gt2512-wxtsd_firmwaregot2000_gt2710-stbdgot2000_gt2107-wtbd_firmwaregot2000_gt2512-stba_firmwaregot2000_gt2103-pmbdgot2000_gt2507t-wtsd_firmwaregot2000_gt2507-wtbd_firmwaregot2000_gt2508-vtwa_firmwaregot2000_gt2712-stwdgot2000_gt2710-stbagot2000_gt2710-vtba_firmwaregot2000_gt2507-wtsdgot2000_gt2103-pmbds2_firmwaregot2000_gt2708-stbdgot2000_gt2508-vtbdgot2000_gt2512-wxtbdgot2000_gt2710-stba_firmwaregot2000_gt2103-pmbls_firmwaregot_simple_gs2107-wtbd_firmwaregot2000_gt2512-stbagot2000_gt2712-stwagot2000_gt2505-vtbd_firmwaregot2000_gt2708-stba_firmwaregot2000_gt2510-vtbdgot2000_gt2508-vtbd_firmwaregot2000_gt2712-stwa_firmwaregot2000_gt2512-wxtbd_firmwaregot2000_gt2510-vtba_firmwaregot2000_gt2512-stbdgot2000_gt2508-vtbagot2000_gt2308-vtbdgot2000_gt2508-vtba_firmwaregot2000_gt2310-vtbd_firmwaregt_softgot2000got2000_gt2104-rtbd_firmwaregot2000_gt2715-xtba_firmwaregot2000_gt2104-rtbdgot2000_gt2510-vtbagot2000_gt2310-vtba_firmwaregot2000_gt2308-vtbd_firmwaregot2000_gt2506hs-vtbdgot2000_gt2508-vtwdgot2000_gt2505hs-vtbd_firmwaregot2000_gt2510-wxtsdgot2000_gt2308-vtbagot2000_gt2712-stbagot2000_gt2510-wxtsd_firmwaregot2000_gt2510-vtwa_firmwaregot2000_gt2710-stbd_firmwaregot2000_gt2103-pmbds_firmwaregot2000_gt2512-wxtsdgot2000_gt2708-vtbdgot2000_gt2510-vtwdgot2000_gt2710-vtwa_firmwaregot2000_gt2708-vtbagot2000_gt2510-wxtbd_firmwaregot2000_gt2310-vtbagot2000_gt2712-stbdgot2000_gt2708-vtba_firmwaregot_simple_gs2110-wtbdgot2000_gt2310-vtbdgot2000_gt2308-vtba_firmwaregot2000_gt2507t-wtsdgot2000_gt2710-vtwdgot2000_gt2107-wtbdgot_simple_gs2107-wtbdgot2000_gt2708-stbd_firmwaregot2000_gt2510-wxtbdgot2000_gt2103-pmbdsgot2000_gt2103-pmbds2got2000_gt2710-vtbagot2000_gt2505-vtbdgot2000_gt2507-wtsd_firmwaregot2000_gt2708-stbagot2000_gt2506hs-vtbd_firmwaregot2000_gt2710-vtwagot2000_gt2712-stwd_firmwaregot2000_gt2508-vtwaGOT2000 series GT27 model; GOT2000 series GT25 model; GOT2000 series GT23 model; GOT2000 series GT21 model; GOT SIMPLE series GS21 model; GT SoftGOT2000
CWE ID-CWE-20
Improper Input Validation
CVE-2022-33323
Matching Score-8
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-8
Assigner-Mitsubishi Electric Corporation
CVSS Score-7.5||HIGH
EPSS-0.39% / 59.28%
||
7 Day CHG~0.00%
Published-02 Feb, 2023 | 05:49
Updated-26 Mar, 2025 | 18:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authentication Bypass Vulnerability in Robot Controller of MELFA SD/SQ series and F-series

Active Debug Code vulnerability in robot controller of Mitsubishi Electric Corporation industrial robot MELFA SD/SQ Series and MELFA F-Series allows a remote unauthenticated attacker to gain unauthorized access by authentication bypass through an unauthorized telnet login. As for the affected model names, controller types and firmware versions, see the Mitsubishi Electric's advisory which is listed in [References] section.

Action-Not Available
Vendor-Mitsubishi Electric Corporation
Product-rv-7frh-6sdh35_firmwarerh-12sqh55rh-20fh85_firmwarerv-4flrh-6sdh35rv-2sqbrh-3fh35_firmwarerv-6sdrv-6sdl_firmwarerv-2frh-20sqh85rv-7fll_firmwarerh-12sdh70rh-12fh85rv-6sdlrh-3fh45rv-7fllrh-6fh55rh-6sdh55_firmwarerv-12sdrh-6fh35_firmwarerv-12sqlrv-13fl_firmwarerh-6fh45_firmwarerv-6sq_firmwarerh-3sdhrrh-6sqh35_firmwarerv-2f_firmwarerh-20fh100rh-12sdh85_firmwarerh-6sqh45rv-12sq_firmwarerv-3sdrv-12sqrh-3fh45_firmwarerh-12fh70_firmwarerv-13f_firmwarerv-12sd_firmwarerv-13frh-20fh100_firmwarerh-6sdh55rh-3fh55rh-6sdh45rv-3sd_firmwarerv-12sdlrh-6fh55_firmwarerh-3sqhrrh-3sqhr_firmwarerv-3sq_firmwarerv-4frv-2sdb_firmwarerv-3sqj_firmwarerv-20frh-12sqh55_firmwarerh-12sqh70rv-7flrh-12sdh55rh-20sdh85_firmwarerh-12fh55_firmwarerv-4f_firmwarerh-20sdh100_firmwarerh-6sqh35rv-13flrv-12sdl_firmwarerh-6fh35rv-20f_firmwarerv-3sdj_firmwarerh-6sqh45_firmwarerh-3sdhr_firmwarerh-6sqh55rv-7f_firmwarerh-12sdh85rh-6sdh45_firmwarerh-20sdh85rh-12sqh70_firmwarerh-20sqh85_firmwarerv-7fl_firmwarerh-12sqh85rh-12fh85_firmwarerh-12sdh55_firmwarerv-3sqjrh-20fh85rh-12sdh70_firmwarerh-3fh55_firmwarerv-6sql_firmwarerv-12sql_firmwarerv-3sqrv-2sqb_firmwarerv-6sqlrv-2sdbrh-12fh55rh-6sqh55_firmwarerh-12sqh85_firmwarerh-20sdh100rv-6sqrv-4fl_firmwarerh-12fh70rv-3sdjrv-6sd_firmwarerh-3fh35rh-6fh45MELFA SD/SQ Series Controller CR1QA-721 of RV-3SQBMELFA F Series Controller CR760-35VD-1 of RV-50F-DMELFA SD/SQ Series Controller CR2DA-781 of RH-3SDHR3515CMELFA SD/SQ Series Controller CR1QA-761 of RH-6SQH3517MMELFA SD/SQ Series Controller CR2DA-751 of RH-20SDH8535MELFA SD/SQ Series Controller CR1DA-761 of RH-6SDH5520MELFA SD/SQ Series Controller CR1DA-721 of RV-3SD-SMMELFA F Series Controller CR750-07VQ-1 of RV-7F-Q-SH04MELFA SD/SQ Series Controller CR1DA-761 of RH-6SDH3517MMELFA SD/SQ Series Controller CR1QA-761 of RH-6SQH4532MELFA F Series Controller CR751-07VLQ-0 of RV-7FLLC-1QMELFA F Series Controller CR751-07VQ-0 of RV-7F-1Q-SH05MELFA F Series Controller CR750-07VQ-1 of RV-7FL-QMELFA SD/SQ Series Controller CR2QA-711 of RV-6SQLMELFA SD/SQ Series Controller CR2QA-751 of RH-20SQH8545MELFA F Series Controller CR751-04VQ-0 of RV-4FL-1Q-SH05MELFA F Series Controller CR751-04VQ-0 of RV-4F-1Q-SH04MELFA F Series Controller CR751-20VQ-0 of RV-20F-1Q-SH03MELFA F Series Controller CR750-04VD1-1 of RV-4F-D1MELFA F Series Controller CR751-04VQ-0 of RV-4F-1QMELFA F Series Controller CR750-07VLD-1 of RV-7FLL-D-SH02MELFA F Series Controller CR750-04VQ-1 of RV-4FL-Q-SH03MELFA F Series Controller CR751-04VQ-0 of RV-4FL-1Q-SH04MELFA F Series Controller CR751-20VQ-0 of RV-20F-1Q-SH04MELFA F Series Controller CR751-13VD-0 of RV-13FLM-1DMELFA SD/SQ Series Controller CR1QA-761 of RH-6SQH3527MMELFA F Series Controller CR750-07VQ-1 of RV-7F-Q-SH02MELFA SD/SQ Series Controller CR2DA-711 of RV-6SDCMELFA F Series Controller CR750-20VQ-1 of RV-20FM-QMELFA SD/SQ Series Controller CR2DA-751 of RH-20SDH10038MMELFA F Series Controller CR751-20VD-0 of RV-20FC-1DMELFA F Series Controller CR750-07VLD-1 of RV-7FLLM-DMELFA SD/SQ Series Controller CR2DA-741 of RH-12SDH8538CMELFA F Series Controller CR751-04VD-0 of RV-4F-1D-SH05MELFA SD/SQ Series Controller CR1DA-761 of RH-6SDH3532MELFA F Series Controller CR750-04VQ-1 of RV-4FLC-QMELFA F Series Controller CR751-13VD-0 of RV-13F-1D-SH03MELFA F Series Controller CR750-07VLD-1 of RV-7FLL-D-SH05MELFA F Series Controller CR760-35VQ-1 of RV-50FM-QMELFA SD/SQ Series Controller CR1QA-761 of RH-6SQH4517CMELFA F Series Controller CR750-07VD-1 of RV-7F-D-SH05MELFA F Series Controller CR750-07VLQ-1 of RV-7FLL-Q-SH03MELFA SD/SQ Series Controller CR2QA-741 of RH-12SQH7030CMELFA F Series Controller CR750-02VQ-1 of RV-2FLB-QMELFA SD/SQ Series Controller CR1DA-721 of RV-3SDBMELFA F Series Controller CR750-04VQ-1 of RV-4FLM-QMELFA F Series Controller CR750-04VQ-1 of RV-4FL-Q-SH04MELFA F Series Controller CR750-07VLQ-1 of RV-7FLL-Q-SH04MELFA F Series Controller CR751-07VQ-0 of RV-7FL-1Q-SH04MELFA SD/SQ Series Controller CR2DA-741 of RH-12SDH8535MELFA F Series Controller CR751-07VLD-0 of RV-7FLL-1D-SH03MELFA SD/SQ Series Controller CR2DA-751 of RH-20SDH10035MELFA SD/SQ Series Controller CR2QA-751 of RH-18SQH8530CMELFA SD/SQ Series Controller CR1QA-772 of RV-2SQBMELFA F Series Controller CR750-04VD-1 of RV-4F-D-SH02MELFA F Series Controller CR751-13VQ-0 of RV-13FM-1QMELFA F Series Controller CR751-07VD-0 of RV-7FL-1D-SH04MELFA F Series Controller CR751-13VQ-0 of RV-13F-1Q-SH04MELFA SD/SQ Series Controller CR2DA-781 of RH-3SDHR3515MELFA F Series Controller CR750-07VD-1 of RV-7FL-D-SH05MELFA F Series Controller CR750-13VD-1 of RV-13F-D-SH03MELFA F Series Controller CR751-07VQ-0 of RV-7F-1Q-SH04MELFA F Series Controller CR751-07VD-0 of RV-7F-1D-SH02MELFA F Series Controller CR751-20VD-0 of RV-20F-1DMELFA F Series Controller CR750-13VQ-1 of RV-13F-Q-SH04MELFA F Series Controller CR760-35VD-1 of RV-50FM-DMELFA SD/SQ Series Controller CR2QA-751 of RH-20SQH8538CMELFA SD/SQ Series Controller CR1DA-761 of RH-6SDH4527CMELFA SD/SQ Series Controller CR3Q-701M of RV-12SQMELFA SD/SQ Series Controller CR2DA-741 of RH-12SDH7030CMELFA F Series Controller CR750-07VD-1 of RV-7FL-D-SH02MELFA F Series Controller CR751-04VD-0 of RV-4FM-1DMELFA F Series Controller CR750-07VD-1 of RV-7FL-D-SH03MELFA F Series Controller CR751-07VLQ-0 of RV-7FLL-1Q-SH01MELFA F Series Controller CR751-04VD-0 of RV-4F-1D-SH03MELFA SD/SQ Series Controller CR3D-701M of RV-12SDMELFA F Series Controller CR750-04VQ-1 of RV-4FL-QMELFA F Series Controller CR751-20VD-0 of RV-20F-1D-SH05MELFA SD/SQ Series Controller CR1DA-731 of RV-3SDJCMELFA SD/SQ Series Controller CR1DA-761 of RH-6SDH4532MELFA F Series Controller CR750-04VD-1 of RV-4FC-DMELFA F Series Controller CR751-04VQ-0 of RV-4F-1Q-SH05MELFA F Series Controller CR750-07VLD-1 of RV-7FLLC-DMELFA F Series Controller CR750-07VLQ-1 of RV-7FLL-QMELFA F Series Controller CR751-04VQ-0 of RV-4FL-1Q-SH03MELFA F Series Controller CR750-13VQ-1 of RV-13FL-Q-SH01MELFA F Series Controller CR750-04VD-1 of RV-4F-D-SH01MELFA SD/SQ Series Controller CR3Q-711M of RV-6SQLC-SMMELFA F Series Controller CR750-20HD-1 of RV-20F-D-SH04MELFA SD/SQ Series Controller CR1QA-761 of RH-6SQH3517CMELFA SD/SQ Series Controller CR2QA-751 of RH-18SQH8535MELFA F Series Controller CR750-20HD-1 of RV-20F-D-SH03MELFA F Series Controller CR750-07VLQ-1 of RV-7FLL-Q-SH05MELFA F Series Controller CR751-13VD-0 of RV-13FL-1DMELFA F Series Controller CR751-20VD-0 of RV-20F-1D-SH02MELFA SD/SQ Series Controller CR1QA-761 of RH-6SQH3527CMELFA F Series Controller CR751-02VQ-0 of RV-2FB-1QMELFA F Series Controller CR751-13VQ-0 of RV-13FLM-1QMELFA F Series Controller CR750-04VD-1 of RV-4FLC-DMELFA F Series Controller CR750-07VLQ-1 of RV-7FLL-Q-SH01MELFA F Series Controller CR751-04VQ-0 of RV-4FLC-1QMELFA F Series Controller CR750-20VQ-1 of RV-20F-Q-SH02MELFA F Series Controller CR750-20HD-1 of RV-20FC-DMELFA F Series Controller CR750-20VQ-1 of RV-20FC-QMELFA F Series Controller CR760-35VQ-1 of RV-35FM-QMELFA SD/SQ Series Controller CR2QA-741 of RH-12SQH5538CMELFA F Series Controller CR751-04VQ-0 of RV-4F-1Q-SH01MELFA SD/SQ Series Controller CR2DA-781 of RH-3SDHR3515WMELFA F Series Controller CR750-13VQ-1 of RV-13F-Q-SH02MELFA F Series Controller CR750-20VQ-1 of RV-20F-QMELFA F Series Controller CR750-13VD-1 of RV-13FM-DMELFA SD/SQ Series Controller CR2DA-751 of RH-18SDH8530CMELFA SD/SQ Series Controller CR1DA-761 of RH-6SDH5517CMELFA SD/SQ Series Controller CR1DA-731 of RV-3SDBCMELFA F Series Controller CR751-07VD-0 of RV-7FL-1D-SH01MELFA F Series Controller CR750-07VD-1 of RV-7F-D-SH01MELFA F Series Controller CR751-20VQ-0 of RV-20F-1Q-SH02MELFA F Series Controller CR750-13VQ-1 of RV-13FC-QMELFA F Series Controller CR751-02VD-0 of RV-2FLB-1DMELFA SD/SQ Series Controller CR2DA-751 of RH-20SDH8545MELFA F Series Controller CR750-07VQ-1 of RV-7FLC-QMELFA F Series Controller CR760-35VD-1 of RV-35F-DMELFA SD/SQ Series Controller CR2QA-741 of RH-12SQH8535MELFA SD/SQ Series Controller CR1QA-761 of RH-6SQH5517MMELFA F Series Controller CR750-04VQ-1 of RV-4F-Q-SH04MELFA F Series Controller CR751-04VQ-0 of RV-4F-1Q-SH02MELFA SD/SQ Series Controller CR2QA-751 of RH-20SQH10045MELFA F Series Controller CR750-13VD-1 of RV-13F-D-SH05MELFA SD/SQ Series Controller CR2QA-741 of RH-12SQH5545MELFA F Series Controller CR751-13VD-0 of RV-13FL-1D-SH02MELFA F Series Controller CR751-20VD-0 of RV-20FM-1DMELFA F Series Controller CR750-13VQ-1 of RV-13FL-Q-SH03MELFA SD/SQ Series Controller CR2QA-741 of RH-12SQH7038MMELFA F Series Controller CR751-13VD-0 of RV-13FLC-1DMELFA F Series Controller CR750-07VQ-1 of RV-7F-Q-SH01MELFA F Series Controller CR750-07VQ-1 of RV-7FM-QMELFA F Series Controller CR751-07VQ-0 of RV-7FC-1QMELFA SD/SQ Series Controller CR3D-711M of RV-6SDLC-SMMELFA F Series Controller CR750-07VQ-1 of RV-7F-Q-SH03MELFA F Series Controller CR760-35VQ-1 of RV-35F-QMELFA F Series Controller CR750-13VQ-1 of RV-13F-Q-SH03MELFA SD/SQ Series Controller CR1DA-731 of RV-3SDJB-SMMELFA F Series Controller CR751-20VQ-0 of RV-20F-1Q-SH01MELFA F Series Controller CR750-07VD-1 of RV-7FL-D-SH01MELFA SD/SQ Series Controller CR1QA-761 of RH-6SQH4527MMELFA F Series Controller CR751-04VQ-0 of RV-4FL-1QMELFA F Series Controller CR750-07VQ-1 of RV-7FL-Q-SH04MELFA F Series Controller CR751-04VD-0 of RV-4FL-1D-SH05MELFA F Series Controller CR750-04VQ-1 of RV-4FC-QMELFA F Series Controller CR750-20HD-1 of RV-20F-D-SH05MELFA F Series Controller CR751-07VQ-0 of RV-7FL-1Q-SH03MELFA F Series Controller CR750-04VQ-1 of RV-4FM-QMELFA F Series Controller CR750-07VD-1 of RV-7FLC-DMELFA SD/SQ Series Controller CR2QA-711 of RV-6SQCMELFA SD/SQ Series Controller CR2DA-751 of RH-20SDH8530MMELFA F Series Controller CR750-07VD-1 of RV-7F-DMELFA F Series Controller CR750-20VQ-1 of RV-20F-Q-SH01MELFA SD/SQ Series Controller CR2DA-741 of RH-12SDH5535MELFA SD/SQ Series Controller CR2QA-711 of RV-6SQLCMELFA F Series Controller CR750-07VQ-1 of RV-7F-QMELFA F Series Controller CR750-04VD-1 of RV-4F-D-SH03MELFA F Series Controller CR750-07VQ-1 of RV-7FLM-QMELFA F Series Controller CR751-07VQ-0 of RV-7FLC-1QMELFA F Series Controller CR751-07VLQ-0 of RV-7FLL-1Q-SH03MELFA F Series Controller CR751-07VD-0 of RV-7FC-1DMELFA F Series Controller CR751-07VLQ-0 of RV-7FLL-1Q-SH02MELFA SD/SQ Series Controller CR2DA-751 of RH-12SDH7038MMELFA F Series Controller CR750-02VQ-1 of RV-2FB-QMELFA F Series Controller CR751-07VD-0 of RV-7FL-1D-SH03MELFA F Series Controller CR750-07VD-1 of RV-7FM-DMELFA SD/SQ Series Controller CR1DA-761 of RH-6SDH3517M-SMMELFA F Series Controller CR751-04VD-0 of RV-4FL-1D-SH02MELFA F Series Controller CR751-07VD-0 of RV-7FL-1DMELFA SD/SQ Series Controller CR2QA-741 of RH-12SQH5530MMELFA F Series Controller CR750-13VD-1 of RV-13FL-DMELFA F Series Controller CR750-20VQ-1 of RV-20F-Q-SH05MELFA F Series Controller CR751-20VQ-0 of RV-20FC-1QMELFA F Series Controller CR750-13VQ-1 of RV-13FLM-QMELFA SD/SQ Series Controller CR1DA-761 of RH-6SDH4517MMELFA SD/SQ Series Controller CR2DA-741 of RH-12SDH7038CMELFA F Series Controller CR751-07VD-0 of RV-7F-1DMELFA F Series Controller CR751-07VD-0 of RV-7F-1D-SH04MELFA F Series Controller CR751-20VQ-0 of RV-20F-1QMELFA F Series Controller CR751-13VQ-0 of RV-13FL-1QMELFA SD/SQ Series Controller CR1DA-731 of RV-3SDJBMELFA F Series Controller CR751-02VQ-0 of RV-2FL-1QMELFA SD/SQ Series Controller CR1QA-721 of RV-3SQBCMELFA SD/SQ Series Controller CR3Q-711M of RV-6SQC-SMMELFA SD/SQ Series Controller CR1QA-761 of RH-6SQH3520MELFA SD/SQ Series Controller CR2QA-741 of RH-12SQH7030MMELFA F Series Controller CR751-04VQ-0 of RV-4FLM-1QMELFA F Series Controller CR750-07VQ-1 of RV-7FL-Q-SH01MELFA F Series Controller CR750-04VD-1 of RV-4FL-DMELFA F Series Controller CR751-04VD-0 of RV-4F-1DMELFA SD/SQ Series Controller CR2DA-741 of RH-12SDH8545MELFA F Series Controller CR751-04VD-0 of RV-4FC-1DMELFA F Series Controller CR750-13VD-1 of RV-13FL-D-SH05MELFA F Series Controller CR750-04VD-1 of RV-4F-D-SH04MELFA SD/SQ Series Controller CR2DA-751 of RH-20SDH10030CMELFA SD/SQ Series Controller CR2DA-751 of RH-20SDH10030MMELFA F Series Controller CR751-04VD-0 of RV-4FLC-1DMELFA F Series Controller CR751-02VD-0 of RV-2FB-1DMELFA F Series Controller CR750-13VD-1 of RV-13FL-D-SH03MELFA F Series Controller CR750-07VLD-1 of RV-7FLL-D-SH03MELFA F Series Controller CR751-02VQ-0 of RV-2F-1QMELFA F Series Controller CR750-02VD-1 of RV-2FB-DMELFA F Series Controller CR751-04VQ-0 of RV-4FC-1QMELFA F Series Controller CR760-35VQ-1 of RV-50F-QMELFA F Series Controller CR750-20HD-1 of RV-20F-D-SH02MELFA SD/SQ Series Controller CR2DA-741 of RH-12SDH8530MMELFA SD/SQ Series Controller CR1DA-761 of RH-6SDH3527CMELFA F Series Controller CR751-13VQ-0 of RV-13F-1QMELFA F Series Controller CR751-04VD-0 of RV-4F-1D-SH04MELFA F Series Controller CR750-13VQ-1 of RV-13F-QMELFA SD/SQ Series Controller CR2DA-751 of RH-12SDH8538MMELFA SD/SQ Series Controller CR2QA-741 of RH-12SQH8530CMELFA F Series Controller CR751-07VQ-0 of RV-7F-1QMELFA F Series Controller CR760-35VQ-1 of RV-70FM-QMELFA SD/SQ Series Controller CR2DA-711 of RV-6SDLCMELFA F Series Controller CR750-04VD1-1 of RV-4FLC-D1MELFA F Series Controller CR751-07VLD-0 of RV-7FLLM-1DMELFA SD/SQ Series Controller CR2QA-781 of RH-3SQHR3515MMELFA F Series Controller CR751-07VQ-0 of RV-7FL-1Q-SH01MELFA F Series Controller CR750-07VQ-1 of RV-7FL-Q-SH03MELFA SD/SQ Series Controller CR1QA-731 of RV-3SQJMELFA F Series Controller CR750-07VQ-1 of RV-7F-Q-SH05MELFA F Series Controller CR750-13VD-1 of RV-13F-D-SH01MELFA F Series Controller CR750-04VD-1 of RV-4FLM-DMELFA SD/SQ Series Controller CR1DA-761 of RH-6SDH4520MELFA F Series Controller CR750-04VD-1 of RV-4FL-D-SH03MELFA SD/SQ Series Controller CR2QA-741 of RH-12SQH7038CMELFA F Series Controller CR751-13VD-0 of RV-13F-1D-SH01MELFA SD/SQ Series Controller CR1QA-761 of RH-6SQH5532MELFA F Series Controller CR750-04VD-1 of RV-4FL-D-SH01MELFA F Series Controller CR751-07VQ-0 of RV-7FLM-1QMELFA F Series Controller CR750-07VD-1 of RV-7FL-D-SH04MELFA SD/SQ Series Controller CR1DA-761 of RH-6SDH4527MMELFA SD/SQ Series Controller CR1DA-761 of RH-6SDH5527CMELFA F Series Controller CR751-07VQ-0 of RV-7F-1Q-SH01MELFA F Series Controller CR751-07VLD-0 of RV-7FLL-1D-SH05MELFA F Series Controller CR750-13VD-1 of RV-13FL-D-SH01MELFA SD/SQ Series Controller CR1DA-731 of RV-3SDJMELFA SD/SQ Series Controller CR1DA-761 of RH-6SDH5517MMELFA SD/SQ Series Controller CR1QA-721 of RV-3SQ-SMMELFA SD/SQ Series Controller CR1DA-761 of RH-6SDH3520MELFA F Series Controller CR751-07VD-0 of RV-7F-1D-SH05MELFA F Series Controller CR751-02VD-0 of RV-2F-1DMELFA SD/SQ Series Controller CR2QA-741 of RH-12SQH8545MELFA SD/SQ Series Controller CR1QA-721 of RV-3SQCMELFA F Series Controller CR751-13VQ-0 of RV-13F-1Q-SH05MELFA SD/SQ Series Controller CR1DA-761 of RH-6SDH3517CMELFA F Series Controller CR751-07VLD-0 of RV-7FLLC-1DMELFA F Series Controller CR750-13VD-1 of RV-13FL-D-SH04MELFA F Series Controller CR751-13VQ-0 of RV-13FL-1Q-SH01MELFA F Series Controller CR751-20VQ-0 of RV-20FM-1QMELFA F Series Controller CR750-07VD-1 of RV-7FC-DMELFA SD/SQ Series Controller CR1QA-731 of RV-3SQJB-SMMELFA F Series Controller CR760-35VD-1 of RV-70F-DMELFA F Series Controller CR750-07VLQ-1 of RV-7FLLM-QMELFA SD/SQ Series Controller CR2QA-751 of RH-20SQH10030MMELFA SD/SQ Series Controller CR2DA-711 of RV-6SDLMELFA SD/SQ Series Controller CR2QA-751 of RH-20SQH8538MMELFA SD/SQ Series Controller CR1DA-731 of RV-3SDJ-SMMELFA F Series Controller CR751-04VQ-0 of RV-4FM-1QMELFA F Series Controller CR751-20VQ-0 of RV-20F-1Q-SH05MELFA F Series Controller CR751-07VD-0 of RV-7FM-1DMELFA F Series Controller CR751-13VD-0 of RV-13F-1D-SH05MELFA SD/SQ Series Controller CR3D-701M of RV-12SDLMELFA F Series Controller CR750-04VD-1 of RV-4FM-DMELFA F Series Controller CR751-04VD-0 of RV-4FLM-1DMELFA SD/SQ Series Controller CR3D-711M of RV-6SDC-SMMELFA F Series Controller CR751-07VLD-0 of RV-7FLL-1DMELFA F Series Controller CR750-07VLD-1 of RV-7FLL-D-SH01MELFA SD/SQ Series Controller CR2QA-751 of RH-20SQH10038CMELFA F Series Controller CR750-02VQ-1 of RV-2FL-QMELFA F Series Controller CR750-13VQ-1 of RV-13FL-Q-SH02MELFA SD/SQ Series Controller CR1QA-761 of RH-6SQH4527CMELFA F Series Controller CR750-04VQ-1 of RV-4F-Q-SH02MELFA SD/SQ Series Controller CR2DA-741 of RH-12SDH7035MELFA F Series Controller CR751-07VLQ-0 of RV-7FLLM-1QMELFA F Series Controller CR750-07VD-1 of RV-7FLM-DMELFA F Series Controller CR750-02VD-1 of RV-2FL-DMELFA F Series Controller CR751-04VD-0 of RV-4FL-1D-SH04MELFA SD/SQ Series Controller CR2DA-751 of RH-12SDH5538MMELFA SD/SQ Series Controller CR2DA-741 of RH-12SDH5538CMELFA F Series Controller CR751-20VD-0 of RV-20F-1D-SH04MELFA SD/SQ Series Controller CR2DA-751 of RH-12SDH8530CMELFA F Series Controller CR750-04VD-1 of RV-4F-DMELFA F Series Controller CR750-13VD-1 of RV-13F-DMELFA F Series Controller CR751-07VLD-0 of RV-7FLL-1D-SH02MELFA F Series Controller CR750-07VQ-1 of RV-7FL-Q-SH05MELFA F Series Controller CR750-07VD-1 of RV-7F-D-SH03MELFA SD/SQ Series Controller CR1DA-731 of RV-3SDJBCMELFA F Series Controller CR750-04VQ-1 of RV-4FL-Q-SH02MELFA F Series Controller CR751-04VD-0 of RV-4FL-1D-SH01MELFA SD/SQ Series Controller CR1QA-761 of RH-6SQH5517CMELFA F Series Controller CR751-07VD-0 of RV-7FL-1D-SH05MELFA F Series Controller CR751-07VLD-0 of RV-7FLL-1D-SH01MELFA F Series Controller CR750-04VQ-1 of RV-4F-Q-SH01MELFA F Series Controller CR750-07VQ-1 of RV-7FC-QMELFA SD/SQ Series Controller CR1DA-761 of RH-6SDH3527MMELFA SD/SQ Series Controller CR2DA-751 of RH-20SDH10045MELFA F Series Controller CR750-13VQ-1 of RV-13FL-QMELFA F Series Controller CR750-07VD-1 of RV-7FL-DMELFA F Series Controller CR751-13VD-0 of RV-13FL-1D-SH05MELFA F Series Controller CR751-07VLQ-0 of RV-7FLL-1QMELFA SD/SQ Series Controller CR2QA-741 of RH-12SQH5535MELFA SD/SQ Series Controller CR2DA-741 of RH-12SDH7045MELFA F Series Controller CR750-07VLQ-1 of RV-7FLLC-QMELFA F Series Controller CR750-20HD-1 of RV-20F-D-SH01MELFA F Series Controller CR750-07VLD-1 of RV-7FLL-DMELFA SD/SQ Series Controller CR1QA-731 of RV-3SQJCMELFA F Series Controller CR751-13VQ-0 of RV-13F-1Q-SH01MELFA SD/SQ Series Controller CR2DA-751 of RH-20SDH8538MMELFA SD/SQ Series Controller CR2QA-751 of RH-20SQH10038MMELFA F Series Controller CR750-13VD-1 of RV-13FL-D-SH02MELFA F Series Controller CR750-13VQ-1 of RV-13FL-Q-SH04MELFA SD/SQ Series Controller CR2DA-741 of RH-12SDH5530CMELFA F Series Controller CR750-04VD1-1 of RV-4FL-D1MELFA F Series Controller CR750-02VD-1 of RV-2FLB-DMELFA F Series Controller CR760-35VQ-1 of RV-70F-QMELFA F Series Controller CR750-13VQ-1 of RV-13FLC-QMELFA F Series Controller CR750-13VD-1 of RV-13FC-DMELFA F Series Controller CR751-07VD-0 of RV-7F-1D-SH01MELFA SD/SQ Series Controller CR1DA-721 of RV-3SDMELFA F Series Controller CR750-02VD-1 of RV-2F-DMELFA F Series Controller CR751-04VD-0 of RV-4FL-1DMELFA SD/SQ Series Controller CR2DA-751 of RH-20SDH8538CMELFA F Series Controller CR750-20HD-1 of RV-20F-DMELFA F Series Controller CR750-13VQ-1 of RV-13FL-Q-SH05MELFA F Series Controller CR751-04VD-0 of RV-4F-1D-SH02MELFA SD/SQ Series Controller CR2QA-711 of RV-6SQMELFA F Series Controller CR751-13VD-0 of RV-13FL-1D-SH04MELFA SD/SQ Series Controller CR2QA-741 of RH-12SQH5530CMELFA SD/SQ Series Controller CR1QA-731 of RV-3SQJBMELFA SD/SQ Series Controller CR1DA-761 of RH-6SDH5527MMELFA F Series Controller CR750-07VD-1 of RV-7F-D-SH04MELFA F Series Controller CR751-13VD-0 of RV-13FM-1DMELFA F Series Controller CR751-13VD-0 of RV-13F-1DMELFA SD/SQ Series Controller CR2QA-751 of RH-20SQH8530MMELFA SD/SQ Series Controller CR1QA-721 of RV-3SQMELFA SD/SQ Series Controller CR2DA-751 of RH-18SDH8535MELFA F Series Controller CR750-04VQ-1 of RV-4F-Q-SH05MELFA SD/SQ Series Controller CR1QA-761 of RH-6SQH4517MMELFA SD/SQ Series Controller CR2DA-711 of RV-6SDMELFA F Series Controller CR751-13VQ-0 of RV-13FC-1QMELFA F Series Controller CR750-04VD-1 of RV-4F-D-SH05MELFA F Series Controller CR750-04VQ-1 of RV-4F-QMELFA SD/SQ Series Controller CR1QA-761 of RH-6SQH5527MMELFA SD/SQ Series Controller CR1QA-772 of RV-2SQMELFA F Series Controller CR751-07VQ-0 of RV-7F-1Q-SH02MELFA SD/SQ Series Controller CR1QA-731 of RV-3SQJBCMELFA SD/SQ Series Controller CR1DA-761 of RH-6SDH5517M-SMMELFA SD/SQ Series Controller CR3Q-711M of RV-6SQL-SMMELFA SD/SQ Series Controller CR2QA-751 of RH-20SQH8535MELFA F Series Controller CR750-20VQ-1 of RV-20F-Q-SH03MELFA SD/SQ Series Controller CR2DA-751 of RH-20SDH10038CMELFA SD/SQ Series Controller CR1DA-771 of RV-2SDMELFA SD/SQ Series Controller CR2DA-751 of RH-18SDH8530MMELFA F Series Controller CR750-04VD-1 of RV-4FL-D-SH02MELFA SD/SQ Series Controller CR2QA-741 of RH-12SQH5538MMELFA F Series Controller CR751-07VLD-0 of RV-7FLL-1D-SH04MELFA SD/SQ Series Controller CR1DA-761 of RH-6SDH5532MELFA F Series Controller CR751-04VQ-0 of RV-4FL-1Q-SH01MELFA F Series Controller CR750-20HD-1 of RV-20FM-DMELFA SD/SQ Series Controller CR2QA-751 of RH-20SQH8530CMELFA SD/SQ Series Controller CR2QA-741 of RH-12SQH7045MELFA F Series Controller CR750-02VQ-1 of RV-2F-QMELFA SD/SQ Series Controller CR3D-701 of RV-12SDCMELFA F Series Controller CR751-04VD-0 of RV-4F-1D-SH01MELFA SD/SQ Series Controller CR2QA-751 of RH-20SQH10035MELFA SD/SQ Series Controller CR2QA-741 of RH-12SQH8538MMELFA F Series Controller CR751-13VD-0 of RV-13FL-1D-SH01MELFA F Series Controller CR751-13VD-0 of RV-13FC-1DMELFA F Series Controller CR751-07VQ-0 of RV-7FM-1QMELFA F Series Controller CR751-13VD-0 of RV-13FL-1D-SH03MELFA F Series Controller CR751-13VD-0 of RV-13F-1D-SH04MELFA SD/SQ Series Controller CR1QA-761 of RH-6SQH4520MELFA SD/SQ Series Controller CR2QA-781 of RH-3SQHR3515MELFA F Series Controller CR750-13VD-1 of RV-13FLM-DMELFA SD/SQ Series Controller CR2QA-751 of RH-18SQH8530MMELFA F Series Controller CR751-13VQ-0 of RV-13F-1Q-SH03MELFA SD/SQ Series Controller CR1DA-761 of RH-6SDH4517CMELFA SD/SQ Series Controller CR3D-701 of RV-12SDLCMELFA SD/SQ Series Controller CR2QA-741 of RH-12SQH7035MELFA SD/SQ Series Controller CR2QA-751 of RH-20SQH10030CMELFA F Series Controller CR750-13VQ-1 of RV-13FM-QMELFA F Series Controller CR751-07VLQ-0 of RV-7FLL-1Q-SH05MELFA F Series Controller CR751-20VD-0 of RV-20F-1D-SH03MELFA SD/SQ Series Controller CR1QA-761 of RH-6SQH5527CMELFA SD/SQ Series Controller CR3Q-701 of RV-12SQCMELFA F Series Controller CR751-20VD-0 of RV-20F-1D-SH01MELFA F Series Controller CR751-07VQ-0 of RV-7FL-1Q-SH05MELFA SD/SQ Series Controller CR1DA-771 of RV-2SDBMELFA F Series Controller CR750-13VD-1 of RV-13F-D-SH04MELFA F Series Controller CR750-07VLD-1 of RV-7FLL-D-SH04MELFA F Series Controller CR751-13VQ-0 of RV-13FL-1Q-SH05MELFA SD/SQ Series Controller CR2DA-741 of RH-12SDH7030MMELFA F Series Controller CR751-13VQ-0 of RV-13FLC-1QMELFA F Series Controller CR750-13VD-1 of RV-13F-D-SH02MELFA F Series Controller CR751-13VD-0 of RV-13F-1D-SH02MELFA SD/SQ Series Controller CR1DA-721 of RV-3SDCMELFA F Series Controller CR750-04VQ-1 of RV-4FL-Q-SH01MELFA F Series Controller CR751-07VQ-0 of RV-7FL-1Q-SH02MELFA F Series Controller CR750-04VQ-1 of RV-4FL-Q-SH05MELFA F Series Controller CR760-35VD-1 of RV-70FM-DMELFA F Series Controller CR750-04VD-1 of RV-4FL-D-SH05MELFA F Series Controller CR751-07VD-0 of RV-7FL-1D-SH02MELFA SD/SQ Series Controller CR2QA-741 of RH-12SQH8530MMELFA F Series Controller CR751-07VD-0 of RV-7FLM-1DMELFA F Series Controller CR751-04VD-0 of RV-4FL-1D-SH03MELFA F Series Controller CR750-04VD-1 of RV-4FL-D-SH04MELFA SD/SQ Series Controller CR3Q-701 of RV-12SQLCMELFA F Series Controller CR751-04VQ-0 of RV-4F-1Q-SH03MELFA SD/SQ Series Controller CR1QA-761 of RH-6SQH5520MELFA F Series Controller CR751-07VD-0 of RV-7F-1D-SH03MELFA F Series Controller CR751-13VQ-0 of RV-13F-1Q-SH02MELFA F Series Controller CR750-07VD-1 of RV-7F-D-SH02MELFA F Series Controller CR751-04VQ-0 of RV-4FL-1Q-SH02MELFA SD/SQ Series Controller CR3Q-701M of RV-12SQLMELFA SD/SQ Series Controller CR2DA-741 of RH-12SDH5530MMELFA SD/SQ Series Controller CR2QA-741 of RH-12SQH8538CMELFA SD/SQ Series Controller CR1QA-761 of RH-6SQH3532MELFA SD/SQ Series Controller CR2DA-741 of RH-12SDH5545MELFA F Series Controller CR750-13VQ-1 of RV-13F-Q-SH01MELFA F Series Controller CR751-13VQ-0 of RV-13FL-1Q-SH03MELFA F Series Controller CR750-07VLQ-1 of RV-7FLL-Q-SH02MELFA F Series Controller CR751-07VLQ-0 of RV-7FLL-1Q-SH04MELFA F Series Controller CR750-20VQ-1 of RV-20F-Q-SH04MELFA F Series Controller CR751-13VQ-0 of RV-13FL-1Q-SH04MELFA SD/SQ Series Controller CR3Q-711M of RV-6SQ-SMMELFA F Series Controller CR750-13VD-1 of RV-13FLC-DMELFA F Series Controller CR750-04VQ-1 of RV-4F-Q-SH03MELFA SD/SQ Series Controller CR1QA-721 of RV-3SQB-SMMELFA SD/SQ Series Controller CR2QA-781 of RH-3SQHR3515CMELFA SD/SQ Series Controller CR2DA-751 of RH-20SDH8530CMELFA F Series Controller CR751-07VQ-0 of RV-7FL-1QMELFA F Series Controller CR751-13VQ-0 of RV-13FL-1Q-SH02MELFA SD/SQ Series Controller CR1DA-721 of RV-3SDB-SMMELFA SD/SQ Series Controller CR1QA-731 of RV-3SQJ-SMMELFA F Series Controller CR750-13VQ-1 of RV-13F-Q-SH05MELFA F Series Controller CR750-07VQ-1 of RV-7FL-Q-SH02MELFA F Series Controller CR751-07VQ-0 of RV-7F-1Q-SH03MELFA F Series Controller CR760-35VD-1 of RV-35FM-D
CWE ID-CWE-489
Active Debug Code
CVE-2020-5596
Matching Score-8
Assigner-JPCERT/CC
ShareView Details
Matching Score-8
Assigner-JPCERT/CC
CVSS Score-7.5||HIGH
EPSS-0.14% / 35.42%
||
7 Day CHG~0.00%
Published-07 Jul, 2020 | 08:05
Updated-04 Aug, 2024 | 08:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TCP/IP function included in the firmware of Mitsubishi Electric GOT2000 series (CoreOS with version -Y and earlier installed in GT27 Model, GT25 Model, and GT23 Model) does not properly manage sessions, which may allow a remote attacker to stop the network functions of the products or execute a malicious program via a specially crafted packet.

Action-Not Available
Vendor-Mitsubishi Electric Corporation
Product-got2000_gt27got2000_gt23coreosgot2000_gt25GOT2000 series GT27, GT25, and GT23
CWE ID-CWE-384
Session Fixation
CVE-2022-23127
Matching Score-8
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-8
Assigner-Mitsubishi Electric Corporation
CVSS Score-6.1||MEDIUM
EPSS-0.30% / 52.97%
||
7 Day CHG~0.00%
Published-21 Jan, 2022 | 18:17
Updated-03 Aug, 2024 | 03:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cross-site Scripting vulnerability in Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior and ICONICS MobileHMI versions 10.96.2 and prior allows a remote unauthenticated attacker to gain authentication information of an MC Works64 or MobileHMI and perform any operation using the acquired authentication information, by injecting a malicious script in the URL of a monitoring screen delivered from the MC Works64 server or MobileHMI server to an application for mobile devices and leading a legitimate user to access this URL.

Action-Not Available
Vendor-iconicsn/aMitsubishi Electric Corporation
Product-mobilehmimc_works64Mitsubishi Electric MC Works64; ICONICS MobileHMI
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2023-2846
Matching Score-8
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-8
Assigner-Mitsubishi Electric Corporation
CVSS Score-7.5||HIGH
EPSS-0.09% / 25.58%
||
7 Day CHG~0.00%
Published-30 Jun, 2023 | 04:05
Updated-05 Mar, 2025 | 18:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authentication Bypass Vulnerability in MELSEC-F Series main module

Authentication Bypass by Capture-replay vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series main modules allows a remote unauthenticated attacker to cancel the password/keyword setting and login to the affected products by sending specially crafted packets.

Action-Not Available
Vendor-Mitsubishi Electric Corporation
Product-fx3g-40mt\/es_firmwarefx3uc-16mt\/d-p4_firmwarefx3u-48mr\/dsfx3u-48mt\/es-afx3u-32mr\/es-afx3u-48mr\/ds_firmwarefx3u-128mr\/es-afx3u-80mt\/dss_firmwarefx3uc-32mt-lt-2_firmwarefx3u-16mt\/dss_firmwarefx3s-10mt\/es_firmwarefx3s-10mt\/dssfx3u-32mr\/dsfx3u-128mt\/es-afx3u-32mt\/dsfx3g-24mt\/es_firmwarefx3s-20mt\/dsfx3u-80mt\/esfx3s-14mt\/dssfx3s-10mt\/dss_firmwarefx3sa-10mr-cmfx3g-14mr\/es-a_firmwarefx3u-16mr\/es-afx3uc-16mt\/dfx3g-24mt\/essfx3ge-24mr\/es_firmwarefx3s-20mt\/dss_firmwarefx3s-30mt\/ess-2ad_firmwarefx3u-64mt\/essfx3uc-32mt\/dss_firmwarefx3u-128mt\/es_firmwarefx3s-20mt\/es_firmwarefx3u-80mr\/es-afx3g-40mt\/ess_firmwarefx3u-32ms\/es_firmwarefx3g-40mt\/essfx3s-10mt\/ess_firmwarefx3u-64mr\/ua1_firmwarefx3g-24mt\/dss_firmwarefx3s-20mt\/esfx3u-32mr\/ua1fx3u-128mr\/es_firmwarefx3uc-16mt\/d_firmwarefx3s-10mt\/esfx3u-32mr\/ds_firmwarefx3g-14mt\/essfx3u-16mt\/esfx3ga-40mt-cm_firmwarefx3g-60mr\/es-a_firmwarefx3s-14mr\/ds_firmwarefx3ge-40mr\/esfx3ge-40mr\/dsfx3s-30mt\/es_firmwarefx3u-32mt\/es_firmwarefx3u-16mr\/ds_firmwarefx3s-14mt\/esfx3uc-64mt\/dss_firmwarefx3ge-24mr\/esfx3u-32mr\/es-a_firmwarefx3u-80mt\/dsfx3u-32mt\/es-afx3ge-24mt\/essfx3uc-96mt\/dss_firmwarefx3sa-14mt-cm_firmwarefx3ge-24mr\/ds_firmwarefx3g-60mr\/dsfx3g-40mr\/dsfx3g-14mr\/es-afx3u-16mt\/es_firmwarefx3ga-40mt-cmfx3s-20mr\/ds_firmwarefx3ge-40mr\/es_firmwarefx3ge-24mt\/dss_firmwarefx3u-16mr\/dsfx3s-10mr\/es_firmwarefx3sa-30mr-cm_firmwarefx3ge-40mt\/essfx3sa-20mt-cmfx3uc-96mt\/d_firmwarefx3uc-16mr\/ds-t_firmwarefx3sa-20mr-cm_firmwarefx3g-24mt\/es-a_firmwarefx3u-128mr\/es-a_firmwarefx3g-14mr\/dsfx3g-60mt\/es-a_firmwarefx3u-32mt\/ess_firmwarefx3u-80mr\/ds_firmwarefx3ga-60mt-cmfx3s-14mt\/essfx3uc-32mt\/dssfx3uc-16mr\/ds-tfx3u-16mt\/es-a_firmwarefx3u-32mt\/dss_firmwarefx3g-24mt\/ds_firmwarefx3g-40mr\/es-a_firmwarefx3s-10mr\/dsfx3uc-16mt\/d-p4fx3u-48mt\/ds_firmwarefx3uc-16mt\/dss-p4fx3u-64mt\/es_firmwarefx3sa-14mr-cmfx3u-16mr\/esfx3u-48mr\/esfx3uc-32mt-ltfx3sa-30mr-cmfx3s-30mt\/ds_firmwarefx3u-48mt\/dssfx3g-24mt\/ess_firmwarefx3u-80mt\/es-a_firmwarefx3u-80mt\/es-afx3g-60mt\/essfx3uc-16mr\/d-t_firmwarefx3u-80mr\/dsfx3s-10mt\/dsfx3u-16mt\/ess_firmwarefx3u-64mt\/ds_firmwarefx3u-64mr\/ds_firmwarefx3u-48mr\/es_firmwarefx3uc-64mt\/dfx3u-64ms\/esfx3s-14mt\/es_firmwarefx3ge-40mr\/ds_firmwarefx3g-60mt\/esfx3g-40mt\/dssfx3g-60mt\/es_firmwarefx3u-48mr\/es-a_firmwarefx3ge-24mt\/es_firmwarefx3s-30mt\/dssfx3u-128mr\/esfx3g-14mt\/ds_firmwarefx3u-48mt\/essfx3u-64mr\/es-a_firmwarefx3gc-32mt\/dssfx3u-16mt\/es-afx3u-64mr\/es-afx3g-40mt\/dss_firmwarefx3u-64mt\/dss_firmwarefx3ge-24mr\/dsfx3sa-10mr-cm_firmwarefx3sa-14mt-cmfx3u-64mt\/dssfx3ge-24mt\/esfx3ge-24mt\/ds_firmwarefx3ge-40mt\/ess_firmwarefx3s-30mr\/ds_firmwarefx3g-14mt\/ess_firmwarefx3u-48mt\/esfx3g-14mt\/es-a_firmwarefx3u-80mr\/es_firmwarefx3u-48mt\/dsfx3g-24mr\/dsfx3s-10mt\/ds_firmwarefx3s-14mr\/dsfx3s-20mr\/dsfx3ge-24mt\/dssfx3uc-16mt\/dssfx3ge-40mt\/dssfx3ga-40mr-cmfx3u-32mt\/es-a_firmwarefx3s-30mr\/dsfx3sa-30mt-cm_firmwarefx3s-20mt\/ess_firmwarefx3s-30mt\/es-2adfx3u-32mr\/esfx3s-20mt\/ds_firmwarefx3s-30mt\/esfx3g-40mt\/es-a_firmwarefx3sa-10mt-cm_firmwarefx3u-48mt\/es-a_firmwarefx3g-14mr\/ds_firmwarefx3sa-20mr-cmfx3g-14mt\/dsfx3g-60mr\/ds_firmwarefx3s-30mt\/essfx3g-24mt\/dssfx3ge-40mt\/esfx3s-14mt\/dss_firmwarefx3s-30mt\/ess-2adfx3s-14mt\/dsfx3g-40mr\/es_firmwarefx3uc-32mt\/dfx3uc-96mt\/dfx3u-64mt\/dsfx3u-48mt\/ess_firmwarefx3u-80mt\/ds_firmwarefx3u-64ms\/es_firmwarefx3ga-60mt-cm_firmwarefx3g-24mt\/es-afx3g-14mr\/es_firmwarefx3ge-24mt\/dsfx3u-80mr\/es-a_firmwarefx3sa-20mt-cm_firmwarefx3s-30mr\/esfx3s-14mt\/ess_firmwarefx3u-128mt\/ess_firmwarefx3u-80mt\/ess_firmwarefx3s-30mt\/dsfx3s-30mt\/dss_firmwarefx3uc-32mt\/d_firmwarefx3s-30mt\/ess_firmwarefx3g-60mr\/es-afx3g-14mt\/es-afx3u-64mt\/ess_firmwarefx3s-20mr\/esfx3ge-40mt\/dss_firmwarefx3u-32ms\/esfx3u-48mt\/dss_firmwarefx3ga-24mt-cm_firmwarefx3u-64mr\/es_firmwarefx3s-14mr\/esfx3uc-16mr\/d-tfx3uc-16mt\/dss_firmwarefx3u-32mr\/es_firmwarefx3g-40mt\/esfx3u-64mr\/esfx3g-40mr\/ds_firmwarefx3g-40mt\/ds_firmwarefx3g-60mr\/es_firmwarefx3u-128mt\/es-a_firmwarefx3g-14mt\/dssfx3u-48mr\/es-afx3uc-64mt\/dssfx3g-14mt\/esfx3u-32mt\/esfx3u-32mr\/ua1_firmwarefx3ge-24mt\/ess_firmwarefx3g-24mr\/es-afx3g-14mr\/esfx3g-24mr\/ds_firmwarefx3ga-60mr-cmfx3ge-40mt\/ds_firmwarefx3u-64mr\/dsfx3s-30mt\/es-2ad_firmwarefx3u-80mt\/es_firmwarefx3u-128mt\/esfx3g-40mt\/dsfx3uc-16mt\/dss-p4_firmwarefx3g-60mr\/esfx3g-24mt\/dsfx3u-64mt\/esfx3s-10mt\/essfx3s-10mr\/ds_firmwarefx3g-40mr\/es-afx3u-32mt\/dssfx3u-64mr\/ua1fx3gc-32mt\/dss_firmwarefx3u-80mt\/essfx3u-16mt\/dsfx3u-16mt\/ds_firmwarefx3s-30mr\/es-2ad_firmwarefx3g-60mt\/dss_firmwarefx3g-24mt\/esfx3sa-30mt-cmfx3u-16mt\/dssfx3s-20mt\/essfx3uc-32mt-lt-2fx3g-60mt\/dssfx3ga-60mr-cm_firmwarefx3gc-32mt\/dfx3g-40mt\/es-afx3s-30mr\/es_firmwarefx3u-128mt\/essfx3s-20mt\/dssfx3g-40mr\/esfx3s-14mt\/ds_firmwarefx3u-80mt\/dssfx3ga-24mt-cmfx3ga-24mr-cm_firmwarefx3gc-32mt\/d_firmwarefx3sa-10mt-cmfx3u-48mt\/es_firmwarefx3ga-24mr-cmfx3g-24mr\/es-a_firmwarefx3u-32mt\/ds_firmwarefx3ge-40mt\/dsfx3ga-40mr-cm_firmwarefx3ge-40mt\/es_firmwarefx3u-64mt\/es-afx3u-16mt\/essfx3u-64mt\/es-a_firmwarefx3g-14mt\/dss_firmwarefx3g-60mt\/ess_firmwarefx3g-14mt\/es_firmwarefx3sa-14mr-cm_firmwarefx3g-24mr\/es_firmwarefx3u-16mr\/es_firmwarefx3s-14mr\/es_firmwarefx3uc-64mt\/d_firmwarefx3uc-32mt-lt_firmwarefx3uc-96mt\/dssfx3g-24mr\/esfx3g-60mt\/dsfx3u-80mr\/esfx3u-16mr\/es-a_firmwarefx3g-60mt\/es-afx3g-60mt\/ds_firmwarefx3s-10mr\/esfx3s-20mr\/es_firmwarefx3s-30mr\/es-2adfx3u-32mt\/essMELSEC-F Series FX3UC-64MT/DSSMELSEC-F Series FX3U-80MT/ES-AMELSEC-F Series FX3GE-24MR/DSMELSEC-F Series FX3UC-32MT-LT-2MELSEC-F Series FX3G-14MR/ES-AMELSEC-F Series FX3U-64MS/ESMELSEC-F Series FX3G-40MR/ESMELSEC-F Series FX3U-48MT/DSMELSEC-F Series FX3GE-24MT/ESSMELSEC-F Series FX3U-64MT/ESMELSEC-F Series FX3GA-40MR-CMMELSEC-F Series FX3U-16MT/DSSMELSEC-F Series FX3U-32MT/DSMELSEC-F Series FX3U-64MT/ESSMELSEC-F Series FX3U-16MT/DSMELSEC-F Series FX3G-24MT/ESSMELSEC-F Series FX3S-30MT/ESS-2ADMELSEC-F Series FX3U-64MR/ES-AMELSEC-F Series FX3GA-24MR-CMMELSEC-F Series FX3UC-16MT/D-P4MELSEC-F Series FX3U-48MR/ESMELSEC-F Series FX3U-16MR/DSMELSEC-F Series FX3G-24MT/DSMELSEC-F Series FX3S-14MR/DSMELSEC-F Series FX3UC-64MT/DMELSEC-F Series FX3S-30MT/DSSMELSEC-F Series FX3U-128MR/ESMELSEC-F Series FX3S-20MR/DSMELSEC-F Series FX3SA-30MR-CMMELSEC-F Series FX3G-14MT/ESMELSEC-F Series FX3S-30MR/DSMELSEC-F Series FX3U-64MT/ES-AMELSEC-F Series FX3G-14MT/DSMELSEC-F Series FX3GA-60MR-CMMELSEC-F Series FX3S-30MR/ES-2ADMELSEC-F Series FX3S-30MT/ESSMELSEC-F Series FX3G-40MT/ESMELSEC-F Series FX3UC-16MR/D-TMELSEC-F Series FX3U-16MT/ESSMELSEC-F Series FX3G-14MR/ESMELSEC-F Series FX3SA-14MR-CMMELSEC-F Series FX3UC-32MT-LTMELSEC-F Series FX3GA-60MT-CMMELSEC-F Series FX3G-60MT/ESSMELSEC-F Series FX3U-80MT/DSSMELSEC-F Series FX3S-30MR/ESMELSEC-F Series FX3S-20MT/ESMELSEC-F Series FX3U-16MT/ES-AMELSEC-F Series FX3U-64MT/DSMELSEC-F Series FX3G-40MT/DSMELSEC-F Series FX3U-32MT/ESSMELSEC-F Series FX3GE-40MR/DSMELSEC-F Series FX3S-30MT/ES-2ADMELSEC-F Series FX3S-10MR/DSMELSEC-F Series FX3U-80MT/ESMELSEC-F Series FX3G-40MT/ESSMELSEC-F Series FX3U-80MT/DSMELSEC-F Series FX3U-32MR/ES-AMELSEC-F Series FX3U-128MT/ES-AMELSEC-F Series FX3UC-32MT/DSSMELSEC-F Series FX3U-16MR/ESMELSEC-F Series FX3U-128MR/ES-AMELSEC-F Series FX3UC-96MT/DMELSEC-F Series FX3G-60MT/ES-AMELSEC-F Series FX3S-20MR/ESMELSEC-F Series FX3G-40MR/ES-AMELSEC-F Series FX3GA-40MT-CMMELSEC-F Series FX3GE-40MT/DSMELSEC-F Series FX3G-40MT/DSSMELSEC-F Series FX3U-48MR/DSMELSEC-F Series FX3UC-16MT/DMELSEC-F Series FX3G-14MR/DSMELSEC-F Series FX3U-128MT/ESSMELSEC-F Series FX3G-24MR/ES-AMELSEC-F Series FX3S-20MT/ESSMELSEC-F Series FX3SA-14MT-CMMELSEC-F Series FX3G-40MT/ES-AMELSEC-F Series FX3GE-40MR/ESMELSEC-F Series FX3S-10MT/ESSMELSEC-F Series FX3U-128MT/ESMELSEC-F Series FX3U-64MR/ESMELSEC-F Series FX3GE-24MT/DSMELSEC-F Series FX3U-32MT/DSSMELSEC-F Series FX3S-14MR/ESMELSEC-F Series FX3S-14MT/DSSMELSEC-F Series FX3S-20MT/DSMELSEC-F Series FX3U-16MR/ES-AMELSEC-F Series FX3UC-16MT/DSS-P4MELSEC-F Series FX3U-64MR/DSMELSEC-F Series FX3U-48MT/DSSMELSEC-F Series FX3GE-40MT/ESSMELSEC-F Series FX3G-24MT/ESMELSEC-F Series FX3SA-20MR-CMMELSEC-F Series FX3GA-24MT-CMMELSEC-F Series FX3G-14MT/ESSMELSEC-F Series FX3UC-96MT/DSSMELSEC-F Series FX3S-10MR/ESMELSEC-F Series FX3GE-40MT/ESMELSEC-F Series FX3G-60MT/ESMELSEC-F Series FX3U-32MS/ESMELSEC-F Series FX3GE-40MT/DSSMELSEC-F Series FX3U-48MT/ES-AMELSEC-F Series FX3SA-30MT-CMMELSEC-F Series FX3G-24MR/ESMELSEC-F Series FX3G-60MT/DSMELSEC-F Series FX3U-64MR/UA1MELSEC-F Series FX3S-30MT/DSMELSEC-F Series FX3G-14MT/ES-AMELSEC-F Series FX3S-10MT/DSSMELSEC-F Series FX3U-48MT/ESSMELSEC-F Series FX3U-32MT/ES-AMELSEC-F Series FX3U-32MR/DSMELSEC-F Series FX3S-20MT/DSSMELSEC-F Series FX3GE-24MT/ESMELSEC-F Series FX3U-32MT/ESMELSEC-F Series FX3S-14MT/DSMELSEC-F Series FX3SA-10MR-CMMELSEC-F Series FX3S-14MT/ESSMELSEC-F Series FX3G-40MR/DSMELSEC-F Series FX3GE-24MR/ESMELSEC-F Series FX3U-32MR/UA1MELSEC-F Series FX3G-24MR/DSMELSEC-F Series FX3G-60MR/ESMELSEC-F Series FX3S-10MT/ESMELSEC-F Series FX3G-60MR/DSMELSEC-F Series FX3S-30MT/ESMELSEC-F Series FX3UC-32MT/DMELSEC-F Series FX3SA-20MT-CMMELSEC-F Series FX3GC-32MT/DMELSEC-F Series FX3UC-16MT/DSSMELSEC-F Series FX3U-48MR/ES-AMELSEC-F Series FX3G-60MR/ES-AMELSEC-F Series FX3SA-10MT-CMMELSEC-F Series FX3U-80MR/DSMELSEC-F Series FX3U-16MT/ESMELSEC-F Series FX3U-80MT/ESSMELSEC-F Series FX3S-10MT/DSMELSEC-F Series FX3U-80MR/ESMELSEC-F Series FX3S-14MT/ESMELSEC-F Series FX3UC-16MR/DS-TMELSEC-F Series FX3G-24MT/DSSMELSEC-F Series FX3GC-32MT/DSSMELSEC-F Series FX3U-48MT/ESMELSEC-F Series FX3G-14MT/DSSMELSEC-F Series FX3G-24MT/ES-AMELSEC-F Series FX3U-32MR/ESMELSEC-F Series FX3GE-24MT/DSSMELSEC-F Series FX3G-60MT/DSSMELSEC-F Series FX3U-80MR/ES-AMELSEC-F Series FX3U-64MT/DSS
CWE ID-CWE-294
Authentication Bypass by Capture-replay
CVE-2020-5598
Matching Score-8
Assigner-JPCERT/CC
ShareView Details
Matching Score-8
Assigner-JPCERT/CC
CVSS Score-7.5||HIGH
EPSS-0.14% / 34.79%
||
7 Day CHG~0.00%
Published-07 Jul, 2020 | 08:05
Updated-04 Aug, 2024 | 08:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TCP/IP function included in the firmware of Mitsubishi Electric GOT2000 series (CoreOS with version -Y and earlier installed in GT27 Model, GT25 Model, and GT23 Model) contains an improper access control vulnerability, which may which may allow a remote attacker tobypass access restriction and stop the network functions of the products or execute a malicious program via a specially crafted packet.

Action-Not Available
Vendor-Mitsubishi Electric Corporation
Product-got2000_gt27got2000_gt23coreosgot2000_gt25GOT2000 series GT27, GT25, and GT23
CVE-2024-1573
Matching Score-6
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-6
Assigner-Mitsubishi Electric Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.24% / 47.41%
||
7 Day CHG+0.11%
Published-04 Jul, 2024 | 08:59
Updated-01 Aug, 2024 | 18:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper Authentication vulnerability in the mobile monitoring feature of ICONICS GENESIS64 versions 10.97 to 10.97.2, Mitsubishi Electric GENESIS64 versions 10.97 to 10.97.2 and Mitsubishi Electric MC Works64 all versions allows a remote unauthenticated attacker to bypass proper authentication and log in to the system when all of the following conditions are met: * Active Directory is used in the security setting. * “Automatic log in” option is enabled in the security setting. * The IcoAnyGlass IIS Application Pool is running under an Active Directory Domain Account. * The IcoAnyGlass IIS Application Pool account is included in GENESIS64TM and MC Works64 Security and has permission to log in.

Action-Not Available
Vendor-ICONICSiconicsMitsubishi Electric Corporation
Product-GENESIS64MC Works64genesis64mc_works64
CWE ID-CWE-287
Improper Authentication
CVE-2023-4562
Matching Score-6
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-6
Assigner-Mitsubishi Electric Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.23% / 45.92%
||
7 Day CHG~0.00%
Published-13 Oct, 2023 | 01:26
Updated-27 Feb, 2025 | 20:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Information Disclosure, Information Tampering and Authentication Bypass Vulnerability in MELSEC-F Series main module

Improper Authentication vulnerability in Mitsubishi Electric Corporation MELSEC-F Series main modules allows a remote unauthenticated attacker to obtain sequence programs from the product or write malicious sequence programs or improper data in the product without authentication by sending illegitimate messages.

Action-Not Available
Vendor-Mitsubishi Electric Corporation
Product-fx3g-40mt\/es_firmwarefx3g-60_mt\/dss_firmwarefx3uc-16mt\/d-p4_firmwarefx3u-48mr\/dsfx3u-48mt\/es-afx3u-32mr\/es-afx3u-48mr\/ds_firmwarefx3u-128mr\/es-afx3u-80mt\/dss_firmwarefx3uc-32mt-lt-2_firmwarefx3u-16mt\/dss_firmwarefx3s-10mt\/es_firmwarefx3g-4da-adp_firmwarefx3s-10mt\/dssfx3u-32mr\/dsfx3u-128mt\/es-afx3g-4da-pnk-adpfx3g-24mt\/es_firmwarefx3s-20mt\/dsfx3u-32mt\/dsfx3g-40_mt\/es_firmwarefx3u-80mt\/esfx3s-14mt\/dssfx3u-enet-p502_firmwarefx3g-14_mt\/dssfx3s-10mt\/dss_firmwarefx3sa-10mr-cmfx3gc_firmwarefx3g-14mr\/es-a_firmwarefx3u-16mr\/es-afx3g-4da-pnk-adp_firmwarefx3g-232adp\(-mb\)fx3uc-16mt\/dfx3s-30mt\/ess-2ad_firmwarefx3g-232adp\(-mb\)_firmwarefx3ge-24mr\/es_firmwarefx3g-24mt\/essfx3s-20mt\/dss_firmwarefx3u-64mt\/essfx3uc-32mt\/dss_firmwarefx3u-128mt\/es_firmwarefx3s-20mt\/es_firmwarefx3g-14_mr\/ds_firmwarefx3s-10mt\/ess_firmwarefx3g-40mt\/ess_firmwarefx3u-80mr\/es-afx3g-40mt\/essfx3u-32ms\/es_firmwarefx3u-64mr\/ua1_firmwarefx3g-24mt\/dss_firmwarefx3g-40_mt\/dss_firmwarefx3s-20mt\/esfx3u-32mr\/ua1fx3u-128mr\/es_firmwarefx3uc-16mt\/d_firmwarefx3s-10mt\/esfx3u-32mr\/ds_firmwarefx3g-14mt\/essfx3u-16mt\/esfx3ga-40mt-cm_firmwarefx3g-cnv-adp_firmwarefx3g-60mr\/es-a_firmwarefx3s-14mr\/ds_firmwarefx3ge-40mr\/dsfx3ge-40mr\/esfx3s-30mt\/es_firmwarefx3u-32mt\/es_firmwarefx3u-16mr\/ds_firmwarefx3s-14mt\/esfx3uc_firmwarefx3uc-64mt\/dss_firmwarefx3ge-24mr\/esfx3u-32mr\/es-a_firmwarefx3u-80mt\/dsfx3u-32mt\/es-afx3g-40_mt\/ds_firmwarefx3ge-24mt\/essfx3uc-96mt\/dss_firmwarefx3g-14_mr\/dsfx3ge-24mr\/ds_firmwarefx3sa-14mt-cm_firmwarefx3gcfx3g-60_mr\/ds_firmwarefx3g-60mr\/dsfx3g-14mr\/es-afx3g-40mr\/dsfx3u-16mt\/es_firmwarefx3ga-40mt-cmfx3s-20mr\/ds_firmwarefx3ge-24mt\/dss_firmwarefx3ge-40mr\/es_firmwarefx3u-16mr\/dsfx3s-10mr\/es_firmwarefx3g-60_mt\/dsfx3ucfx3sa-30mr-cm_firmwarefx3ge-40mt\/essfx3sa-20mt-cmfx3uc-16mr\/ds-t_firmwarefx3uc-96mt\/d_firmwarefx3sa-20mr-cm_firmwarefx3g-24mt\/es-a_firmwarefx3g-14mr\/dsfx3s-14mt\/essfx3u-128mr\/es-a_firmwarefx3ga-60mt-cmfx3g-60mt\/es-a_firmwarefx3u-32mt\/ess_firmwarefx3u-80mr\/ds_firmwarefx3g-14_mt\/ess_firmwarefx3uc-32mt\/dssfx3uc-16mr\/ds-tfx3g-4ad-adpfx3u-16mt\/es-a_firmwarefx3u-32mt\/dss_firmwarefx3g-24mt\/ds_firmwarefx3s-10mr\/dsfx3g-40mr\/es-a_firmwarefx3uc-16mt\/d-p4fx3g-60_mt\/ess_firmwarefx3u-48mt\/ds_firmwarefx3g-24_mr\/dsfx3g-24_mt\/dsfx3g-4ad-ptw-adpfx3g-60_mt\/essfx3uc-16mt\/dss-p4fx3u-64mt\/es_firmwarefx3sa-14mr-cmfx3u-16mr\/esfx3u-48mr\/esfx3uc-32mt-ltfx3sa-30mr-cmfx3s-30mt\/ds_firmwarefx3g-40_mr\/dsfx3u-48mt\/dssfx3g-24mt\/ess_firmwarefx3u-80mt\/es-a_firmwarefx3u-80mt\/es-afx3g-60mt\/essfx3uc-16mr\/d-t_firmwarefx3u-80mr\/dsfx3s-10mt\/dsfx3u-16mt\/ess_firmwarefx3u-64mt\/ds_firmwarefx3u-48mr\/es_firmwarefx3u-64mr\/ds_firmwarefx3uc-64mt\/dfx3g-60_mt\/esfx3u-64ms\/esfx3g-24_mt\/ds_firmwarefx3s-14mt\/es_firmwarefx3ge-40mr\/ds_firmwarefx3g-60mt\/esfx3g-40_mt\/dsfx3g-14_mr\/esfx3g-24_mt\/dss_firmwarefx3g-24_mt\/es_firmwarefx3g-60_mr\/es_firmwarefx3g-40mt\/dssfx3ge-24mt\/es_firmwarefx3u-48mr\/es-a_firmwarefx3g-60mt\/es_firmwarefx3s-30mt\/dssfx3u-128mr\/esfx3g-14mt\/ds_firmwarefx3u-64mr\/es-a_firmwarefx3gc-32mt\/dssfx3u-48mt\/essfx3u-16mt\/es-afx3u-64mr\/es-afx3g-40mt\/dss_firmwarefx3u-enet-p502fx3g-485adp\(-mb\)_firmwarefx3u-64mt\/dss_firmwarefx3ge-24mr\/dsfx3sa-10mr-cm_firmwarefx3sa-14mt-cmfx3u-64mt\/dssfx3g-60_mr\/dsfx3g-60_mr\/esfx3ge-24mt\/esfx3ge-24mt\/ds_firmwarefx3ge-40mt\/ess_firmwarefx3s-30mr\/ds_firmwarefx3g-3a-adp_firmwarefx3g-14mt\/ess_firmwarefx3g-14mt\/es-a_firmwarefx3u-48mt\/esfx3u-80mr\/es_firmwarefx3g-24mr\/dsfx3u-48mt\/dsfx3s-10mt\/ds_firmwarefx3s-14mr\/dsfx3g-60_mt\/es_firmwarefx3g-40_mt\/dssfx3s-20mr\/dsfx3ge-24mt\/dssfx3g-32_mt\/dss_firmwarefx3ga-40mr-cmfx3ge-40mt\/dssfx3uc-16mt\/dssfx3u-32mt\/es-a_firmwarefx3s-30mr\/dsfx3u-enet_firmwarefx3g-14_mt\/dss_firmwarefx3g-60_mt\/ds_firmwarefx3sa-30mt-cm_firmwarefx3g-4ad-pt-adpfx3s-20mt\/ess_firmwarefx3s-30mt\/es-2adfx3u-32mr\/esfx3s-20mt\/ds_firmwarefx3s-30mt\/esfx3g-14_mt\/dsfx3g-24_mt\/ess_firmwarefx3g-40mt\/es-a_firmwarefx3sa-10mt-cm_firmwarefx3u-48mt\/es-a_firmwarefx3g-14mr\/ds_firmwarefx3sa-20mr-cmfx3g-14mt\/dsfx3g-60mr\/ds_firmwarefx3s-30mt\/essfx3g-24mt\/dssfx3g-24_mt\/essfx3u-enet-l_firmwarefx3s-14mt\/dss_firmwarefx3ge-40mt\/esfx3s-30mt\/ess-2adfx3g-14_mt\/es_firmwarefx3s-14mt\/dsfx3g-40mr\/es_firmwarefx3uc-32mt\/dfx3uc-96mt\/dfx3g-40_mr\/es_firmwarefx3u-64mt\/dsfx3u-48mt\/ess_firmwarefx3u-80mt\/ds_firmwarefx3g-24_mr\/ds_firmwarefx3ga-60mt-cm_firmwarefx3g-14_mt\/ds_firmwarefx3g-24mt\/es-afx3u-64ms\/es_firmwarefx3g-14mr\/es_firmwarefx3ge-24mt\/dsfx3u-80mr\/es-a_firmwarefx3sa-20mt-cm_firmwarefx3g-14_mr\/es_firmwarefx3s-30mr\/esfx3s-14mt\/ess_firmwarefx3s-30mt\/dss_firmwarefx3u-128mt\/ess_firmwarefx3s-30mt\/dsfx3u-80mt\/ess_firmwarefx3uc-32mt\/d_firmwarefx3s-30mt\/ess_firmwarefx3g-60mr\/es-afx3g-14mt\/es-afx3u-64mt\/ess_firmwarefx3g-4ad-adp_firmwarefx3s-20mr\/esfx3ge-40mt\/dss_firmwarefx3g-4ad-tc-adpfx3u-32ms\/esfx3u-enetfx3ga-24mt-cm_firmwarefx3u-48mt\/dss_firmwarefx3u-64mr\/es_firmwarefx3s-14mr\/esfx3uc-16mr\/d-tfx3uc-16mt\/dss_firmwarefx3g-14_mt\/essfx3u-32mr\/es_firmwarefx3g-40mt\/esfx3u-64mr\/esfx3g-40mr\/ds_firmwarefx3g-3a-adpfx3g-60mr\/es_firmwarefx3g-40mt\/ds_firmwarefx3g-4ad-pt-adp_firmwarefx3u-128mt\/es-a_firmwarefx3g-14mt\/dssfx3u-48mr\/es-afx3uc-64mt\/dssfx3g-14mt\/esfx3u-32mt\/esfx3g-24_mr\/es_firmwarefx3u-32mr\/ua1_firmwarefx3ge-24mt\/ess_firmwarefx3g-32_mt\/dssfx3g-40_mt\/esfx3g-24mr\/es-afx3g-cnv-adpfx3g-14mr\/esfx3g-4ad-ptw-adp_firmwarefx3ga-60mr-cmfx3g-24mr\/ds_firmwarefx3ge-40mt\/ds_firmwarefx3g-40_mr\/ds_firmwarefx3u-64mr\/dsfx3s-30mt\/es-2ad_firmwarefx3u-80mt\/es_firmwarefx3u-128mt\/esfx3g-40mt\/dsfx3g-40_mr\/esfx3uc-16mt\/dss-p4_firmwarefx3g-60mr\/esfx3g-24mt\/dsfx3u-64mt\/esfx3s-10mt\/essfx3s-10mr\/ds_firmwarefx3g-40mr\/es-afx3u-32mt\/dssfx3u-64mr\/ua1fx3gc-32mt\/dss_firmwarefx3u-80mt\/essfx3s-30mr\/es-2ad_firmwarefx3u-16mt\/ds_firmwarefx3u-16mt\/dsfx3g-60mt\/dss_firmwarefx3g-24mt\/esfx3sa-30mt-cmfx3u-16mt\/dssfx3s-20mt\/essfx3g-60mt\/dssfx3uc-32mt-lt-2fx3ga-60mr-cm_firmwarefx3gc-32mt\/dfx3g-40mt\/es-afx3s-30mr\/es_firmwarefx3g-485adp\(-mb\)fx3u-128mt\/essfx3s-20mt\/dssfx3g-24_mt\/dssfx3g-40mr\/esfx3g-4ad-tc-adp_firmwarefx3s-14mt\/ds_firmwarefx3g-60_mt\/dssfx3u-80mt\/dssfx3ga-24mt-cmfx3sa-10mt-cmfx3ga-24mr-cm_firmwarefx3gc-32mt\/d_firmwarefx3u-48mt\/es_firmwarefx3ga-24mr-cmfx3g-24mr\/es-a_firmwarefx3u-32mt\/ds_firmwarefx3ge-40mt\/dsfx3g-24_mr\/esfx3g-40_mt\/ess_firmwarefx3g-24_mt\/esfx3ga-40mr-cm_firmwarefx3ge-40mt\/es_firmwarefx3u-64mt\/es-afx3u-16mt\/essfx3g-4da-adpfx3u-64mt\/es-a_firmwarefx3g-14mt\/dss_firmwarefx3g-60mt\/ess_firmwarefx3g-14mt\/es_firmwarefx3sa-14mr-cm_firmwarefx3g-24mr\/es_firmwarefx3u-16mr\/es_firmwarefx3s-14mr\/es_firmwarefx3g-40_mt\/essfx3uc-64mt\/d_firmwarefx3uc-32mt-lt_firmwarefx3uc-96mt\/dssfx3g-24mr\/esfx3g-60mt\/dsfx3u-80mr\/esfx3u-16mr\/es-a_firmwarefx3g-60mt\/es-afx3g-14_mt\/esfx3g-60mt\/ds_firmwarefx3s-10mr\/esfx3s-20mr\/es_firmwarefx3s-30mr\/es-2adfx3u-enet-lfx3u-32mt\/essMELSEC-F Series FX3U-80MT/ES-AMELSEC-F Series FX3UC-16MT/DMELSEC-F Series FX3U-48MR/ES-AMELSEC-F Series FX3U-128MR/ES-AMELSEC-F Series FX3U-80MT/ESMELSEC-F Series FX3S-10MR/ESMELSEC-F Series FX3U-128MT/DSMELSEC-F Series FX3U-64MR/UA1MELSEC-F Series FX3U-80MR/ESMELSEC-F Series FX3U-80MT/ESSMELSEC-F Series FX3SA-30MR-CMMELSEC-F Series FX3U-16MT/ESMELSEC-F Series FX3G-24MT/ESMELSEC-F Series FX3U-32MR/DSMELSEC-F Series FX3U-48MR/ESMELSEC-F Series FX3U-32MR/UA1MELSEC-F Series FX3GA-60MR-CMMELSEC-F Series FX3GE-40MT/DSMELSEC-F Series FX3G-60MT/ESMELSEC-F Series FX3G-40MT/DSMELSEC-F Series FX3G-24MT/DSMELSEC-F Series FX3GA-40MR-CMMELSEC-F Series FX3GA-60MT-CMMELSEC-F Series FX3G-40MR/ESMELSEC-F Series FX3U-64MT/ESSMELSEC-F Series FX3UC-64MT/DSSMELSEC-F Series FX3S-10MT/DSMELSEC-F Series FX3U-128MT/ESMELSEC-F Series FX3G-24MR/ESMELSEC-F Series FX3G-24MR/ES-AMELSEC-F Series FX3U-80MR/ES-AMELSEC-F Series FX3G-14MR/ES-AMELSEC-F Series FX3U-48MT/ES-AMELSEC-F Series FX3S-14MT/ESMELSEC-F Series FX3U-32MR/ESMELSEC-F Series FX3G-14MT/DSMELSEC-F Series FX3G-40MT/ES-AMELSEC-F Series FX3SA-14MT-CMMELSEC-F Series FX3GE-40MR/ESMELSEC-F Series FX3U-128MT/ESSMELSEC-F Series FX3S-14MR/ESMELSEC-F Series FX3G-60MR/ESMELSEC-F Series FX3GE-24MT/DSSMELSEC-F Series FX3U-80MT/DSSMELSEC-F Series FX3GE-40MT/DSSMELSEC-F Series FX3U-48MT/ESSMELSEC-F Series FX3SA-10MT-CMMELSEC-F Series FX3U-32MT/DSMELSEC-F Series FX3U-16MT/DSSMELSEC-F Series FX3S-14MT/DSMELSEC-F Series FX3G-40MR/ES-AMELSEC-F Series FX3S-30MT/DSMELSEC-F Series FX3UC-32MT/DMELSEC-F Series FX3U-64MR/DSMELSEC-F Series FX3GE-40MT/ESSMELSEC-F Series FX3S-10MT/ESSMELSEC-F Series FX3G-24MT/ESSMELSEC-F Series FX3S-20MR/ESMELSEC-F Series FX3SA-20MT-CMMELSEC-F Series FX3S-30MT/DSSMELSEC-F Series FX3G-14MT/ESMELSEC-F Series FX3SA-20MR-CMMELSEC-F Series FX3GE-24MT/DSMELSEC-F Series FX3G-60MT/ES-AMELSEC-F Series FX3G-24MT/DSSMELSEC-F Series FX3U-16MR/ES-AMELSEC-F Series FX3U-48MT/ESMELSEC-F Series FX3G-60MT/DSMELSEC-F Series FX3UC-32MT/DSSMELSEC-F Series FX3UC-16MR/DS-TMELSEC-F Series FX3U-64MS/ESMELSEC-F Series FX3S-30MR/DSMELSEC-F Series FX3S-20MR/DSMELSEC-F Series FX3S-20MT/ESMELSEC-F Series FX3UC-32MT-LTMELSEC-F Series FX3G-60MR/DSMELSEC-F Series FX3UC-16MT/D-P4MELSEC-F Series FX3U-32MT/ESSMELSEC-F Series FX3G-24MR/DSMELSEC-F Series FX3U-48MR/DSMELSEC-F Series FX3U-128MR/ESMELSEC-F Series FX3S-30MT/ESMELSEC-F Series FX3S-10MR/DSMELSEC-F Series FX3U-64MT/DSMELSEC-F Series FX3G-60MT/ESSMELSEC-F Series FX3S-10MT/ESMELSEC-F Series FX3U-64MR/ESMELSEC-F Series FX3G-14MT/ESSMELSEC-F Series FX3U-64MT/DSSMELSEC-F Series FX3U-32MS/ESMELSEC-F Series FX3S-20MT/ESSMELSEC-F Series FX3UC-96MT/DMELSEC-F Series FX3G-60MT/DSSMELSEC-F Series FX3U-32MT/DSSMELSEC-F Series FX3U-64MT/ESMELSEC-F Series FX3SA-14MR-CMMELSEC-F Series FX3U-32MT/ES-AMELSEC-F Series FX3U-80MT/DSMELSEC-F Series FX3U-64MT/ES-AMELSEC-F Series FX3U-128MT/ES-AMELSEC-F Series FX3GE-24MR/ESMELSEC-F Series FX3U-128MR/DSMELSEC-F Series FX3U-64MR/ES-AMELSEC-F Series FX3U-48MT/DSSMELSEC-F Series FX3U-16MR/DSMELSEC-F Series FX3G-60MR/ES-AMELSEC-F Series FX3S-20MT/DSSMELSEC-F Series FX3U-128MT/DSSMELSEC-F Series FX3S-30MR/ESMELSEC-F Series FX3U-48MT/DSMELSEC-F Series FX3GA-24MR-CMMELSEC-F Series FX3S-30MT/ESSMELSEC-F Series FX3UC-96MT/DSSMELSEC-F Series FX3G-14MR/ESMELSEC-F Series FX3SA-30MT-CMMELSEC-F Series FX3U-16MR/ESMELSEC-F Series FX3UC-16MT/DSS-P4MELSEC-F Series FX3GE-40MT/ESMELSEC-F Series FX3G-14MR/DSMELSEC-F Series FX3U-32MR/ES-AMELSEC-F Series FX3U-16MT/ESSMELSEC-F Series FX3U-80MR/DSMELSEC-F Series FX3S-30MR/ES-2ADMELSEC-F Series FX3GA-40MT-CMMELSEC-F Series FX3G-40MT/DSSMELSEC-F Series FX3GC-32MT/DMELSEC-F Series FX3UC-16MT/DSSMELSEC-F Series FX3GE-24MT/ESSMELSEC-F Series FX3GE-24MR/DSMELSEC-F Series FX3G-40MR/DSMELSEC-F Series FX3SA-10MR-CMMELSEC-F Series FX3S-20MT/DSMELSEC-F Series FX3G-14MT/DSSMELSEC-F Series FX3G-24MT/ES-AMELSEC-F Series FX3U-16MT/DSMELSEC-F Series FX3G-14MT/ES-AMELSEC-F Series FX3S-14MT/DSSMELSEC-F Series FX3G-40MT/ESMELSEC-F Series FX3S-30MT/ES-2ADMELSEC-F Series FX3GC-32MT/DSSMELSEC-F Series FX3S-10MT/DSSMELSEC-F Series FX3UC-16MR/D-TMELSEC-F Series FX3GE-40MR/DSMELSEC-F Series FX3GE-24MT/ESMELSEC-F Series FX3UC-32MT-LT-2MELSEC-F Series FX3U-16MT/ES-AMELSEC-F Series FX3S-14MT/ESSMELSEC-F Series FX3S-14MR/DSMELSEC-F Series FX3UC-64MT/DMELSEC-F Series FX3S-30MT/ESS-2ADMELSEC-F Series FX3G-40MT/ESSMELSEC-F Series FX3GA-24MT-CMMELSEC-F Series FX3U-32MT/ES
CWE ID-CWE-287
Improper Authentication
CVE-2022-25157
Matching Score-6
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-6
Assigner-Mitsubishi Electric Corporation
CVSS Score-9.1||CRITICAL
EPSS-0.69% / 70.89%
||
7 Day CHG~0.00%
Published-01 Apr, 2022 | 22:17
Updated-03 Aug, 2024 | 04:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use of Password Hash Instead of Password for Authentication vulnerability in Mitsubishi Electric MELSEC iQ-F series FX5U(C) CPU all versions, Mitsubishi Electric MELSEC iQ-F series FX5UJ CPU all versions, Mitsubishi Electric MELSEC iQ-R series R00/01/02CPU all versions, Mitsubishi Electric MELSEC iQ-R series R04/08/16/32/120(EN)CPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120SFCPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PCPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PSFCPU all versions, Mitsubishi Electric MELSEC iQ-R series R16/32/64MTCPU all versions, Mitsubishi Electric MELSEC iQ-R series RJ71C24(-R2/R4) all versions, Mitsubishi Electric MELSEC iQ-R series RJ71EN71 all versions, Mitsubishi Electric MELSEC iQ-R series RJ71GF11-T2 all versions, Mitsubishi Electric MELSEC iQ-R series RJ71GP21(S)-SX all versions, Mitsubishi Electric MELSEC iQ-R series RJ72GF15-T2 all versions, Mitsubishi Electric MELSEC Q series Q03UDECPU all versions, Mitsubishi Electric MELSEC Q series Q04/06/10/13/20/26/50/100UDEHCPU all versions, Mitsubishi Electric MELSEC Q series Q03/04/06/13/26UDVCPU all versions, Mitsubishi Electric MELSEC Q series Q04/06/13/26UDPVCPU all versions, Mitsubishi Electric MELSEC Q series QJ71C24N(-R2/R4) all versions, Mitsubishi Electric MELSEC Q series QJ71E71-100 all versions, Mitsubishi Electric MELSEC L series L02/06/26CPU(-P) all versions, Mitsubishi Electric MELSEC L series L26CPU-(P)BT all versions, Mitsubishi Electric MELSEC L series LJ71C24(-R2) all versions, Mitsubishi Electric MELSEC L series LJ71E71-100 all versions and Mitsubishi Electric MELSEC L series LJ72GF15-T2 all versions allows a remote unauthenticated attacker to disclose or tamper with the information in the product by using an eavesdropped password hash.

Action-Not Available
Vendor-n/aMitsubishi Electric Corporation
Product-fx5uj-24mt\/essfx5uc-32mt\/dss_firmwarefx5uj-24mt\/es_firmwarefx5uj-60mr\/es_firmwarefx5uj_firmwarefx5uj-60mt\/esfx5uj-60mt\/essfx5uc-32mt\/dss-tsfx5ucfx5uc-32mt\/dfx5uj-40mt\/es_firmwarefx5uj-60mt\/es_firmwarefx5uj-24mt\/ess_firmwarefx5uc-32mt\/ds-tsfx5ujfx5uc_firmwarefx5uj-60mr\/esfx5uj-60mt\/ess_firmwarefx5uj-24mr\/esfx5uc-32mr\/ds-ts_firmwarefx5uj-40mt\/ess_firmwarefx5uc-32mr\/ds-tsfx5uc-32mt\/dssfx5uj-40mr\/es_firmwarefx5uc-32mt\/ds-ts_firmwarefx5uj-24mr\/es_firmwarefx5uj-40mt\/essfx5uj-40mt\/esfx5uj-24mt\/esfx5uj-40mr\/esfx5uc-32mt\/dss-ts_firmwarefx5uc-32mt\/d_firmwareMitsubishi Electric MELSEC iQ-F series FX5U(C) CPU; Mitsubishi Electric MELSEC iQ-F series FX5UJ CPU; Mitsubishi Electric MELSEC iQ-R series R00/01/02CPU; Mitsubishi Electric MELSEC iQ-R series R04/08/16/32/120(EN)CPU; Mitsubishi Electric MELSEC iQ-R series R08/16/32/120SFCPU; Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PCPU; Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PSFCPU; Mitsubishi Electric MELSEC iQ-R series R16/32/64MTCPU; Mitsubishi Electric MELSEC iQ-R series RJ71C24(-R2/R4); Mitsubishi Electric MELSEC iQ-R series RJ71EN71; Mitsubishi Electric MELSEC iQ-R series RJ71GF11-T2; Mitsubishi Electric MELSEC iQ-R series RJ71GP21(S)-SX; Mitsubishi Electric MELSEC iQ-R series RJ72GF15-T2; Mitsubishi Electric MELSEC Q series Q03UDECPU; Mitsubishi Electric MELSEC Q series Q04/06/10/13/20/26/50/100UDEHCPU; Mitsubishi Electric MELSEC Q series Q03/04/06/13/26UDVCPU; Mitsubishi Electric MELSEC Q series Q04/06/13/26UDPVCPU; Mitsubishi Electric MELSEC Q series QJ71C24N(-R2/R4); Mitsubishi Electric MELSEC Q series QJ71E71-100; Mitsubishi Electric MELSEC L series L02/06/26CPU(-P); Mitsubishi Electric MELSEC L series L26CPU-(P)BT; Mitsubishi Electric MELSEC L series LJ71C24(-R2); Mitsubishi Electric MELSEC L series LJ71E71-100; Mitsubishi Electric MELSEC L series LJ72GF15-T2
CWE ID-CWE-287
Improper Authentication
CVE-2022-25155
Matching Score-6
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-6
Assigner-Mitsubishi Electric Corporation
CVSS Score-8.1||HIGH
EPSS-0.69% / 70.79%
||
7 Day CHG~0.00%
Published-01 Apr, 2022 | 22:17
Updated-03 Aug, 2024 | 04:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Use of Password Hash Instead of Password for Authentication vulnerability in Mitsubishi Electric MELSEC iQ-F series FX5U(C) CPU all versions, Mitsubishi Electric MELSEC iQ-F series FX5UJ CPU all versions, Mitsubishi Electric MELSEC iQ-R series R00/01/02CPU all versions, Mitsubishi Electric MELSEC iQ-R series R04/08/16/32/120(EN)CPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120SFCPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PCPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PSFCPU all versions, Mitsubishi Electric MELSEC iQ-R series RJ71GN11-T2 all versions, Mitsubishi Electric MELSEC iQ-R series RJ71GN11-EIP all versions, Mitsubishi Electric MELSEC iQ-R series RJ71C24(-R2/R4) all versions, Mitsubishi Electric MELSEC iQ-R series RJ71EN71 all versions, Mitsubishi Electric MELSEC iQ-R series RJ72GF15-T2 all versions, Mitsubishi Electric MELSEC Q series Q03UDECPU all versions, Mitsubishi Electric MELSEC Q series Q04/06/10/13/20/26/50/100UDEHCPU all versions, Mitsubishi Electric MELSEC Q series Q03/04/06/13/26UDVCPU all versions, Mitsubishi Electric MELSEC Q series Q04/06/13/26UDPVCPU all versions, Mitsubishi Electric MELSEC Q series QJ71C24N(-R2/R4) all versions, Mitsubishi Electric MELSEC Q series QJ71E71-100 all versions, Mitsubishi Electric MELSEC Q series QJ72BR15 all versions, Mitsubishi Electric MELSEC Q series QJ72LP25(-25/G/GE) all versions, Mitsubishi Electric MELSEC L series L02/06/26CPU(-P) all versions, Mitsubishi Electric MELSEC L series L26CPU-(P)BT all versions, Mitsubishi Electric MELSEC L series LJ71C24(-R2) all versions, Mitsubishi Electric MELSEC L series LJ71E71-100 all versions and Mitsubishi Electric MELSEC L series LJ72GF15-T2 all versions allows a remote unauthenticated attacker to login to the product by replaying an eavesdropped password hash.

Action-Not Available
Vendor-n/aMitsubishi Electric Corporation
Product-fx5uj-24mt\/essfx5uc-32mt\/dss_firmwarefx5uj-24mt\/es_firmwarefx5uj-60mr\/es_firmwarefx5uj_firmwarefx5uj-60mt\/esfx5uj-60mt\/essfx5uc-32mt\/dss-tsfx5ucfx5uc-32mt\/dfx5uj-40mt\/es_firmwarefx5uj-60mt\/es_firmwarefx5uj-24mt\/ess_firmwarefx5uc-32mt\/ds-tsfx5ujfx5uc_firmwarefx5uj-60mr\/esfx5uj-60mt\/ess_firmwarefx5uj-24mr\/esfx5uc-32mr\/ds-ts_firmwarefx5uj-40mt\/ess_firmwarefx5uc-32mr\/ds-tsfx5uc-32mt\/dssfx5uj-40mr\/es_firmwarefx5uc-32mt\/ds-ts_firmwarefx5uj-24mr\/es_firmwarefx5uj-40mt\/essfx5uj-40mt\/esfx5uj-24mt\/esfx5uj-40mr\/esfx5uc-32mt\/dss-ts_firmwarefx5uc-32mt\/d_firmwareMitsubishi Electric MELSEC iQ-F series FX5U(C) CPU; Mitsubishi Electric MELSEC iQ-F series FX5UJ CPU; Mitsubishi Electric MELSEC iQ-R series R00/01/02CPU; Mitsubishi Electric MELSEC iQ-R series R04/08/16/32/120(EN)CPU; Mitsubishi Electric MELSEC iQ-R series R08/16/32/120SFCPU; Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PCPU; Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PSFCPU; Mitsubishi Electric MELSEC iQ-R series RJ71GN11-T2; Mitsubishi Electric MELSEC iQ-R series RJ71GN11-EIP; Mitsubishi Electric MELSEC iQ-R series RJ71C24(-R2/R4); Mitsubishi Electric MELSEC iQ-R series RJ71EN71; Mitsubishi Electric MELSEC iQ-R series RJ72GF15-T2; Mitsubishi Electric MELSEC Q series Q03UDECPU; Mitsubishi Electric MELSEC Q series Q04/06/10/13/20/26/50/100UDEHCPU; Mitsubishi Electric MELSEC Q series Q03/04/06/13/26UDVCPU; Mitsubishi Electric MELSEC Q series Q04/06/13/26UDPVCPU; Mitsubishi Electric MELSEC Q series QJ71C24N(-R2/R4); Mitsubishi Electric MELSEC Q series QJ71E71-100; Mitsubishi Electric MELSEC Q series QJ72BR15; Mitsubishi Electric MELSEC Q series QJ72LP25(-25/G/GE); Mitsubishi Electric MELSEC L series L02/06/26CPU(-P); Mitsubishi Electric MELSEC L series L26CPU-(P)BT; Mitsubishi Electric MELSEC L series LJ71C24(-R2); Mitsubishi Electric MELSEC L series LJ71E71-100; Mitsubishi Electric MELSEC L series LJ72GF15-T2
CWE ID-CWE-287
Improper Authentication
CVE-2021-20598
Matching Score-6
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-6
Assigner-Mitsubishi Electric Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.47% / 63.69%
||
7 Day CHG~0.00%
Published-06 Aug, 2021 | 16:53
Updated-03 Aug, 2024 | 17:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Overly Restrictive Account Lockout Mechanism vulnerability in Mitsubishi Electric MELSEC iQ-R series CPU modules (R08/16/32/120SFCPU all versions, R08/16/32/120PSFCPU all versions) allows a remote unauthenticated attacker to lockout a legitimate user by continuously trying login with incorrect password.

Action-Not Available
Vendor-n/aMitsubishi Electric Corporation
Product-r08sfcpur120psfcpur08sfcpu_firmwarer32psfcpu_firmwarer120psfcpu_firmwarer16sfcpu_firmwarer32sfcpu_firmwarer32sfcpur08psfcpu_firmwarer16psfcpur08psfcpur120sfcpur16sfcpur32psfcpur120sfcpu_firmwarer16psfcpu_firmwareMELSEC iQ-R series CPU modules R08/16/32/120SFCPU; R08/16/32/120PSFCPU
CWE ID-CWE-287
Improper Authentication
CVE-2010-3471
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.24% / 46.37%
||
7 Day CHG~0.00%
Published-20 Sep, 2010 | 21:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Session fixation vulnerability in the Workplace (aka WP) component in IBM FileNet P8 Application Engine (P8AE) 4.0.2.x before 4.0.2.7-P8AE-FP007 allows remote attackers to hijack web sessions via unspecified vectors.

Action-Not Available
Vendor-n/aIBM Corporation
Product-filenet_p8_application_enginen/a
CWE ID-CWE-287
Improper Authentication
CVE-2018-9080
Matching Score-4
Assigner-Lenovo Group Ltd.
ShareView Details
Matching Score-4
Assigner-Lenovo Group Ltd.
CVSS Score-5.9||MEDIUM
EPSS-0.19% / 41.73%
||
7 Day CHG~0.00%
Published-28 Sep, 2018 | 20:00
Updated-05 Aug, 2024 | 07:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Iomega and LenovoEMC NAS Web UI Vulnerabilities

For some Iomega, Lenovo, LenovoEMC NAS devices versions 4.1.402.34662 and earlier, by setting the Iomega cookie to a known value before logging into the NAS's web application, the NAS will not provide the user a new cookie value. This allows an attacker who knows the cookie's value to compromise the user's session.

Action-Not Available
Vendor-Lenovo Group Limited
Product-px4-300r_firmwarestorcenter_px12-400rstorcenter_px2-300dpx4-400rstorcenter_ix4-300dpx4-300dstorcenter_px12-450r_firmwarepx6-300d_firmwarepx4-300d_firmwarepx4-300rix2ix4-300d_firmwarepx2-300dix4-300dstorcenter_px4-300d_firmwarepx4-400r_firmwareez_media_\&_backup_center_firmwarepx12-450rstorcenter_px2-300d_firmwarestorcenter_ix2storcenter_px4-300rpx2-300d_firmwareix2_firmwarepx6-300dstorcenter_ix4-300d_firmwarestorcenter_ix2-dl_firmwarestorcenter_px12-400r_firmwarestorcenter_px4-300r_firmwarepx4-400dstorcenter_ix2-dlstorcenter_px6-300dpx4-400d_firmwarestorcenter_px12-450rstorcenter_px6-300d_firmwarestorcenter_px4-300dpx12-400r_firmwareez_media_\&_backup_centerpx12-400rpx12-450r_firmwarestorcenter_ix2_firmwareLenovoEMCEZ Media and Backup CenterIomega StorCenter
CWE ID-CWE-287
Improper Authentication
CVE-2024-0822
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-7.5||HIGH
EPSS-0.05% / 16.36%
||
7 Day CHG~0.00%
Published-25 Jan, 2024 | 15:18
Updated-27 Aug, 2025 | 12:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Ovirt: authentication bypass

An authentication bypass vulnerability was found in overt-engine. This flaw allows the creation of users in the system without authentication due to a flaw in the CreateUserSession command.

Action-Not Available
Vendor-ovirtRed Hat, Inc.
Product-ovirt-engineRed Hat Virtualization Engine 4.4
CWE ID-CWE-1390
Weak Authentication
CWE ID-CWE-287
Improper Authentication
CVE-2009-4879
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.10% / 27.52%
||
7 Day CHG~0.00%
Published-26 May, 2010 | 18:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Identity Server in Novell Access Manager before 3.1 SP1 allows attackers with disabled Active Directory accounts to authenticate using X.509 authentication, which bypasses intended access restrictions.

Action-Not Available
Vendor-n/aNovell
Product-access_managern/a
CWE ID-CWE-287
Improper Authentication
CVE-2018-7340
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-7.7||HIGH
EPSS-0.13% / 33.27%
||
7 Day CHG~0.00%
Published-17 Apr, 2019 | 14:01
Updated-05 Aug, 2024 | 06:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Multiple SAML libraries may allow authentication bypass via incorrect XML canonicalization and DOM traversal

Duo Network Gateway 1.2.9 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.

Action-Not Available
Vendor-Duo SecurityCisco Systems, Inc.
Product-duo_network_gatewayDuo Network Gateway
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2022-48494
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-7.5||HIGH
EPSS-0.05% / 14.08%
||
7 Day CHG~0.00%
Published-19 Jun, 2023 | 00:00
Updated-17 Dec, 2024 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Vulnerability of lax app identity verification in the pre-authorization function.Successful exploitation of this vulnerability will cause malicious apps to become pre-authorized.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-emuiHarmonyOSEMUI
CWE ID-CWE-306
Missing Authentication for Critical Function
CWE ID-CWE-287
Improper Authentication
CVE-2018-5387
Matching Score-4
Assigner-CERT/CC
ShareView Details
Matching Score-4
Assigner-CERT/CC
CVSS Score-7.5||HIGH
EPSS-0.23% / 45.44%
||
7 Day CHG~0.00%
Published-24 Jul, 2018 | 15:00
Updated-16 Sep, 2024 | 22:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Wizkunde SAMLBase may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.

Action-Not Available
Vendor-wizkundeWizkunde
Product-samlbaseSAMLBase
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-347
Improper Verification of Cryptographic Signature
CVE-2023-0905
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-7.3||HIGH
EPSS-0.86% / 74.06%
||
7 Day CHG~0.00%
Published-18 Feb, 2023 | 07:39
Updated-02 Aug, 2024 | 05:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SourceCodester Employee Task Management System changePasswordForEmployee.php improper authentication

A vulnerability classified as critical has been found in SourceCodester Employee Task Management System 1.0. Affected is an unknown function of the file changePasswordForEmployee.php. The manipulation leads to improper authentication. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-221454 is the identifier assigned to this vulnerability.

Action-Not Available
Vendor-oretnom23SourceCodester
Product-employee_task_management_systemEmployee Task Management System
CWE ID-CWE-287
Improper Authentication
CVE-2018-7745
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-17.30% / 94.78%
||
7 Day CHG~0.00%
Published-07 Mar, 2018 | 17:00
Updated-05 Aug, 2024 | 06:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Western Bridge Cobub Razor 0.7.2. Authentication is not required for /index.php?/install/installation/createuserinfo requests, resulting in account creation.

Action-Not Available
Vendor-cobubn/a
Product-razorn/a
CWE ID-CWE-287
Improper Authentication
CVE-2021-37624
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.5||HIGH
EPSS-1.30% / 78.88%
||
7 Day CHG~0.00%
Published-25 Oct, 2021 | 16:10
Updated-04 Aug, 2024 | 01:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
FreeSWITCH does not authenticate SIP MESSAGE requests, leading to spam and message spoofing

FreeSWITCH is a Software Defined Telecom Stack enabling the digital transformation from proprietary telecom switches to a software implementation that runs on any commodity hardware. Prior to version 1.10.7, FreeSWITCH does not authenticate SIP MESSAGE requests, leading to spam and message spoofing. By default, SIP requests of the type MESSAGE (RFC 3428) are not authenticated in the affected versions of FreeSWITCH. MESSAGE requests are relayed to SIP user agents registered with the FreeSWITCH server without requiring any authentication. Although this behaviour can be changed by setting the `auth-messages` parameter to `true`, it is not the default setting. Abuse of this security issue allows attackers to send SIP MESSAGE messages to any SIP user agent that is registered with the server without requiring authentication. Additionally, since no authentication is required, chat messages can be spoofed to appear to come from trusted entities. Therefore, abuse can lead to spam and enable social engineering, phishing and similar attacks. This issue is patched in version 1.10.7. Maintainers recommend that this SIP message type is authenticated by default so that FreeSWITCH administrators do not need to be explicitly set the `auth-messages` parameter. When following such a recommendation, a new parameter can be introduced to explicitly disable authentication.

Action-Not Available
Vendor-freeswitchsignalwire
Product-freeswitchfreeswitch
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-37545
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.00% / 0.07%
||
7 Day CHG~0.00%
Published-06 Aug, 2021 | 13:24
Updated-04 Aug, 2024 | 01:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In JetBrains TeamCity before 2021.1.1, insufficient authentication checks for agent requests were made.

Action-Not Available
Vendor-n/aJetBrains s.r.o.
Product-teamcityn/a
CWE ID-CWE-287
Improper Authentication
CVE-2015-6926
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.27% / 49.79%
||
7 Day CHG~0.00%
Published-19 Jan, 2018 | 15:00
Updated-06 Aug, 2024 | 07:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The OpenID Single Sign-On authentication functionality in OXID eShop before 4.5.0 allows remote attackers to impersonate users via the email address in a crafted authentication token.

Action-Not Available
Vendor-oxid-esalesn/a
Product-eshopn/a
CWE ID-CWE-287
Improper Authentication
CVE-2021-36350
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-5.9||MEDIUM
EPSS-0.39% / 59.35%
||
7 Day CHG~0.00%
Published-21 Dec, 2021 | 17:05
Updated-17 Sep, 2024 | 02:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell PowerScale OneFS, versions 8.2.2-9.3.0.x, contain an authentication bypass by primary weakness in one of the authentication factors. A remote unauthenticated attacker may potentially exploit this vulnerability and bypass one of the factors of authentication.

Action-Not Available
Vendor-Dell Inc.
Product-powerscale_onefsPowerScale OneFS
CWE ID-CWE-287
Improper Authentication
CVE-2021-36370
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.51% / 65.21%
||
7 Day CHG~0.00%
Published-30 Aug, 2021 | 18:37
Updated-04 Aug, 2024 | 00:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Midnight Commander through 4.8.26. When establishing an SFTP connection, the fingerprint of the server is neither checked nor displayed. As a result, a user connects to the server without the ability to verify its authenticity.

Action-Not Available
Vendor-midnight-commandern/a
Product-midnight_commandern/a
CWE ID-CWE-287
Improper Authentication
CVE-2018-19832
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.20% / 42.07%
||
7 Day CHG~0.00%
Published-31 Dec, 2019 | 15:06
Updated-05 Aug, 2024 | 11:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The NETM() function of a smart contract implementation for NewIntelTechMedia (NETM), an tradable Ethereum ERC20 token, allows attackers to change the owner of the contract, because the function does not check the caller's identity.

Action-Not Available
Vendor-newinteltechmedia_projectn/a
Product-newinteltechmedian/a
CWE ID-CWE-287
Improper Authentication
CVE-2023-6584
Matching Score-4
Assigner-WPScan
ShareView Details
Matching Score-4
Assigner-WPScan
CVSS Score-7.5||HIGH
EPSS-0.37% / 57.85%
||
7 Day CHG~0.00%
Published-27 Feb, 2024 | 08:30
Updated-01 May, 2025 | 15:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
JobSearch WP Job Board < 2.3.4 - Authentication Bypass

The WP JobSearch WordPress plugin before 2.3.4 does not prevent attackers from logging-in as any users with the only knowledge of that user's email address.

Action-Not Available
Vendor-eyecixUnknownwpjobsearch
Product-jobsearch_wp_job_boardWP JobSearchwpjobsearch_wordpress
CWE ID-CWE-287
Improper Authentication
CVE-2023-6847
Matching Score-4
Assigner-GitHub, Inc. (Products Only)
ShareView Details
Matching Score-4
Assigner-GitHub, Inc. (Products Only)
CVSS Score-7.5||HIGH
EPSS-0.12% / 31.54%
||
7 Day CHG~0.00%
Published-21 Dec, 2023 | 20:46
Updated-02 Aug, 2024 | 08:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Authentication in GitHub Enterprise Server leading to Authentication Bypass for Public Repository Data

An improper authentication vulnerability was identified in GitHub Enterprise Server that allowed a bypass of Private Mode by using a specially crafted API request. To exploit this vulnerability, an attacker would need network access to the Enterprise Server appliance configured in Private Mode. This vulnerability affected all versions of GitHub Enterprise Server since 3.9 and was fixed in version 3.9.7, 3.10.4, and 3.11.1. This vulnerability was reported via the GitHub Bug Bounty program.

Action-Not Available
Vendor-GitHub, Inc.
Product-enterprise_serverEnterprise Server
CWE ID-CWE-287
Improper Authentication
CVE-2018-19833
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.20% / 42.07%
||
7 Day CHG~0.00%
Published-31 Dec, 2019 | 15:06
Updated-05 Aug, 2024 | 11:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The owned function of a smart contract implementation for DDQ, an tradable Ethereum ERC20 token, allows attackers to change the owner of the contract, because the function does not check the caller's identity.

Action-Not Available
Vendor-ddq_projectn/a
Product-ddqn/a
CWE ID-CWE-287
Improper Authentication
CVE-2023-52111
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-7.5||HIGH
EPSS-0.05% / 16.76%
||
7 Day CHG~0.00%
Published-16 Jan, 2024 | 07:55
Updated-11 Jun, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Authorization vulnerability in the BootLoader module. Successful exploitation of this vulnerability may affect service integrity.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-emuiharmonyosHarmonyOSEMUI
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-48703
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.5||HIGH
EPSS-0.02% / 2.35%
||
7 Day CHG~0.00%
Published-06 Mar, 2024 | 19:18
Updated-02 Aug, 2024 | 21:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SAML authentication bypass vulnerability in RobotsAndPencils/go-saml

RobotsAndPencils go-saml, a SAML client library written in Go, contains an authentication bypass vulnerability in all known versions. This is due to how the `xmlsec1` command line tool is called internally to verify the signature of SAML assertions. When `xmlsec1` is used without defining the enabled key data, the origin of the public key for the signature verification is, unfortunately, not restricted. That means an attacker can sign the SAML assertions themselves and provide the required public key (e.g. an RSA key) directly embedded in the SAML token. Projects still using RobotsAndPencils/go-saml should move to another SAML library or alternatively remove support for SAML from their projects. The vulnerability can likely temporarily be fixed by forking the go-saml project and adding the command line argument `--enabled-key-data` and specifying a value such as `x509` or `raw-x509-cert` when calling the `xmlsec1` binary in the verify function. Please note that this workaround must be carefully tested before it can be used.

Action-Not Available
Vendor-RobotsAndPencilsrobotsandpencils
Product-go-samlgo-saml
CWE ID-CWE-287
Improper Authentication
CVE-2018-16738
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-3.7||LOW
EPSS-0.38% / 58.65%
||
7 Day CHG~0.00%
Published-10 Oct, 2018 | 00:00
Updated-05 Aug, 2024 | 10:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

tinc 1.0.30 through 1.0.34 has a broken authentication protocol, although there is a partial mitigation. This is fixed in 1.1.

Action-Not Available
Vendor-tinc-vpnstarwindsoftwaren/aDebian GNU/Linux
Product-debian_linuxtincstarwind_virtual_sann/a
CWE ID-CWE-287
Improper Authentication
CVE-2021-3282
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.30% / 52.94%
||
7 Day CHG~0.00%
Published-01 Feb, 2021 | 15:38
Updated-03 Aug, 2024 | 16:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

HashiCorp Vault Enterprise 1.6.0 & 1.6.1 allowed the `remove-peer` raft operator command to be executed against DR secondaries without authentication. Fixed in 1.6.2.

Action-Not Available
Vendor-n/aHashiCorp, Inc.
Product-vaultn/a
CWE ID-CWE-287
Improper Authentication
CVE-2023-48228
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.5||HIGH
EPSS-0.47% / 63.41%
||
7 Day CHG~0.00%
Published-21 Nov, 2023 | 20:48
Updated-02 Aug, 2024 | 21:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OAuth2: PKCE can be fully circumvented

authentik is an open-source identity provider. When initialising a oauth2 flow with a `code_challenge` and `code_method` (thus requesting PKCE), the single sign-on provider (authentik) must check if there is a matching and existing `code_verifier` during the token step. Prior to versions 2023.10.4 and 2023.8.5, authentik checks if the contents of `code_verifier` is matching only when it is provided. When it is left out completely, authentik simply accepts the token request with out it; even when the flow was started with a `code_challenge`. authentik 2023.8.5 and 2023.10.4 fix this issue.

Action-Not Available
Vendor-goauthentikgoauthentik
Product-authentikauthentik
CWE ID-CWE-287
Improper Authentication
CVE-2018-19834
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.20% / 42.07%
||
7 Day CHG~0.00%
Published-31 Dec, 2019 | 15:06
Updated-05 Aug, 2024 | 11:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The quaker function of a smart contract implementation for BOMBBA (BOMB), an tradable Ethereum ERC20 token, allows attackers to change the owner of the contract, because the function does not check the caller's identity.

Action-Not Available
Vendor-bombba_projectn/a
Product-bombban/a
CWE ID-CWE-287
Improper Authentication
CVE-2018-19831
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.20% / 42.07%
||
7 Day CHG~0.00%
Published-31 Dec, 2019 | 15:06
Updated-05 Aug, 2024 | 11:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The ToOwner() function of a smart contract implementation for Cryptbond Network (CBN), an tradable Ethereum ERC20 token, allows attackers to change the owner of the contract, because the function does not check the caller's identity.

Action-Not Available
Vendor-cryptbond_network_projectn/a
Product-cryptbond_networkn/a
CWE ID-CWE-287
Improper Authentication
CVE-2021-30769
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.08% / 23.41%
||
7 Day CHG-0.02%
Published-08 Sep, 2021 | 13:47
Updated-03 Aug, 2024 | 22:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A logic issue was addressed with improved state management. This issue is fixed in iOS 14.7, tvOS 14.7, watchOS 7.6. A malicious attacker with arbitrary read and write capability may be able to bypass Pointer Authentication.

Action-Not Available
Vendor-Apple Inc.
Product-iphone_oswatchostvostvOSwatchOSiOS
CWE ID-CWE-287
Improper Authentication
CVE-2018-18907
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.20% / 42.16%
||
7 Day CHG~0.00%
Published-16 Jun, 2022 | 21:32
Updated-05 Aug, 2024 | 11:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on D-Link DIR-850L 1.21WW devices. A partially completed WPA handshake is sufficient for obtaining full access to the wireless network. A client can access the network by sending packets on Data Frames to the AP without encryption.

Action-Not Available
Vendor-n/aD-Link Corporation
Product-dir-850l_firmaredir-850ln/a
CWE ID-CWE-287
Improper Authentication
CVE-2014-6116
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.21% / 43.13%
||
7 Day CHG~0.00%
Published-19 Oct, 2014 | 01:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Telemetry Component in WebSphere MQ 8.0.0.1 before p000-001-L140910 allows remote attackers to bypass authentication by setting the JAASConfig property in an MQTT client configuration.

Action-Not Available
Vendor-n/aIBM Corporation
Product-websphere_mqn/a
CWE ID-CWE-287
Improper Authentication
CVE-2023-44397
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.5||HIGH
EPSS-0.02% / 3.46%
||
7 Day CHG~0.00%
Published-30 Oct, 2023 | 22:28
Updated-05 Sep, 2024 | 20:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CloudExplorer Lite permission bypass vulnerability

CloudExplorer Lite is an open source, lightweight cloud management platform. Prior to version 1.4.1, the gateway filter of CloudExplorer Lite uses a controller with path starting with `matching/API/`, which can cause a permission bypass. Version 1.4.1 contains a patch for this issue.

Action-Not Available
Vendor-FIT2CLOUD Inc.CloudExplorer Lite (FIT2CLOUD Inc.)
Product-cloudexplorer_liteCloudExplorer-Lite
CWE ID-CWE-287
Improper Authentication
CVE-2018-12399
Matching Score-4
Assigner-Mozilla Corporation
ShareView Details
Matching Score-4
Assigner-Mozilla Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.35% / 56.89%
||
7 Day CHG-0.31%
Published-28 Feb, 2019 | 18:00
Updated-05 Aug, 2024 | 08:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

When a new protocol handler is registered, the API accepts a title argument which can be used to mislead users about which domain is registering the new protocol. This may result in the user approving a protocol handler that they otherwise would not have. This vulnerability affects Firefox < 63.

Action-Not Available
Vendor-Mozilla CorporationCanonical Ltd.
Product-firefoxubuntu_linuxFirefox
CWE ID-CWE-287
Improper Authentication
CVE-2018-16465
Matching Score-4
Assigner-HackerOne
ShareView Details
Matching Score-4
Assigner-HackerOne
CVSS Score-5.3||MEDIUM
EPSS-0.15% / 36.00%
||
7 Day CHG~0.00%
Published-30 Oct, 2018 | 21:00
Updated-05 Aug, 2024 | 10:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Missing state in Nextcloud Server prior to 14.0.0 would not enforce the use of a second factor at login if the the provider of the second factor failed to load.

Action-Not Available
Vendor-n/aNextcloud GmbH
Product-nextcloud_serverNextcloud Server
CWE ID-CWE-287
Improper Authentication
CVE-2021-29047
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.21% / 43.79%
||
7 Day CHG~0.00%
Published-16 May, 2021 | 15:29
Updated-03 Aug, 2024 | 21:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The SimpleCaptcha implementation in Liferay Portal 7.3.4, 7.3.5 and Liferay DXP 7.3 before fix pack 1 does not invalidate CAPTCHA answers after it is used, which allows remote attackers to repeatedly perform actions protected by a CAPTCHA challenge by reusing the same CAPTCHA answer.

Action-Not Available
Vendor-n/aLiferay Inc.
Product-dxpliferay_portaln/a
CWE ID-CWE-287
Improper Authentication
CVE-2009-0130
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.08% / 24.74%
||
7 Day CHG~0.00%
Published-15 Jan, 2009 | 17:00
Updated-21 Jan, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

lib/crypto/c_src/crypto_drv.c in erlang does not properly check the return value from the OpenSSL DSA_do_verify function, which might allow remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077. NOTE: a package maintainer disputes this issue, reporting that there is a proper check within the only code that uses the applicable part of crypto_drv.c, and thus "this report is invalid.

Action-Not Available
Vendor-erlangn/a
Product-erlangn/a
CWE ID-CWE-287
Improper Authentication
CVE-2023-43551
Matching Score-4
Assigner-Qualcomm, Inc.
ShareView Details
Matching Score-4
Assigner-Qualcomm, Inc.
CVSS Score-9.1||CRITICAL
EPSS-0.10% / 27.34%
||
7 Day CHG~0.00%
Published-03 Jun, 2024 | 10:05
Updated-11 Aug, 2025 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Authentication in Multi-Mode Call Processor

Cryptographic issue while performing attach with a LTE network, a rogue base station can skip the authentication phase and immediately send the Security Mode Command.

Action-Not Available
Vendor-Qualcomm Technologies, Inc.
Product-snapdragon_wear_3100_firmwaresdm429w_firmwareqcm8550_firmwareapq8017sd865_5gqcs410_firmwarerobotics_rb3sw5100psxr1120qcs610_firmwarewcd9335wcd9370qca8081_firmwaresnapdragon_7c_gen_2_compute_firmwaresnapdragon_670_mobileqca4004qca6696snapdragon_x70_modem-rf_firmwarewcd9340_firmwarewcd9341_firmwarewcd9395_firmwareqcn6024qcc710_firmwareqca6426snapdragon_8\+_gen_1_mobilewcn6740_firmwarefastconnect_6700wcn3610snapdragon_208_firmwaresnapdragon_750g_5g_mobilesnapdragon_780g_5g_mobilesnapdragon_685_4g_mobilevision_intelligence_200_firmwaresnapdragon_x50_5g_modem-rf_firmwaresnapdragon_782g_mobile_firmwaresnapdragon_wear_4100\+_firmwarewsa8832_firmwareqca8337qca6426_firmwarewcd9395snapdragon_auto_4g_modemsnapdragon_665_mobile_firmwaresc8180xp-aaab9205_lte_modemqca6574au_firmwaresnapdragon_690_5g_mobile_firmware9207_lte_modem_firmwarewcd9341sd626_firmwaresnapdragon_wear_1300qca6574ausnapdragon_820_automotive205_mobilesnapdragon_888\+_5g_mobile_firmwaresnapdragon_x12_lte_modemwsa8810_firmwaresd730_firmwarewsa8845h_firmwarewcd9390csra6640snapdragon_212_mobilemsm8209_firmwaresnapdragon_778g_5g_mobile_firmwaresc8180xp-acafsnapdragon_850_mobile_computewcn3660b_firmwaresd730snapdragon_820_automotive_firmwarefastconnect_6800_firmwareqcs5430snapdragon_690_5g_mobile9207_lte_modemsd835_firmwareqcn6024_firmwaresnapdragon_636_mobile_firmwareqcm5430qcm5430_firmwarevideo_collaboration_vc1_platform_firmwaresnapdragon_712_mobile_firmwareqcm6125_firmwarec-v2x_9150snapdragon_678_mobile_firmwaresnapdragon_425_mobileqcc710snapdragon_1100_wearable_firmwaresnapdragon_xr2_5g_firmwaremdm9615msm8108snapdragon_xr1_firmwaresxr1120_firmwaresnapdragon_x5_lte_modem_firmwaresnapdragon_wear_4100\+315_5g_iot_modem_firmwarefastconnect_6900snapdragon_w5\+_gen_1_wearable_firmwarevideo_collaboration_vc1_platformqfw7114snapdragon_730_mobile_firmwarewcd9385_firmwareqca6421vision_intelligence_200315_5g_iot_modemqca6310wcd9360qca6335snapdragon_x65_5g_modem-rfqcs4490snapdragon_730_mobilesnapdragon_wear_3100mdm9250snapdragon_680_4g_mobilewsa8845qca6421_firmwareqcm6125snapdragon_212_mobile_firmwaremdm9230sc8180x-adqca6564au_firmwaresd820snapdragon_429_mobile_firmwarewsa8810mdm8207snapdragon_835_mobilesnapdragon_888_5g_mobile_firmwareqca6595ausnapdragon_888_5g_mobilesm7315_firmwaresnapdragon_wear_2500snapdragon_662_mobile_firmwaresnapdragon_685_4g_mobile_firmwarewcd9326_firmwaresnapdragon_845_mobile_firmwaremdm9640_firmwarewsa8840mdm9230_firmwareqcs8550_firmwaresnapdragon_730g_mobilesnapdragon_782g_mobilesd835snapdragon_8_gen_2_mobile_firmwaresnapdragon_x55_5g_modem-rfqfw7124_firmwareqca6436_firmwarewcd9371_firmwaresnapdragon_695_5g_mobile_firmwareqcs4490_firmwaresnapdragon_x55_5g_modem-rf_firmwaresnapdragon_7c\+_gen_3_compute_firmwareqts110wcn3910_firmwaresnapdragon_460_mobilesnapdragon_8_gen_2_mobileqca6420qca6174_firmwarewcn3910mdm9205s_firmwarewcd9370_firmwarecsrb31024qca9367mdm9250_firmwaresnapdragon_712_mobilesnapdragon_835_mobile_firmwarewcn3660bqca6574asnapdragon_8\+_gen_2_mobilewcn3620_firmwareqca6174aqca6584_firmwarewcd9340qcm2290snapdragon_1200_wearable_firmwaresnapdragon_auto_5g_modem-rf_gen_2qca6335_firmwareqcm6490sm8550p_firmwareqcm8550wcn3988snapdragon_765_5g_mobile_firmwaresnapdragon_662_mobileqcn9024vision_intelligence_300_firmwareqca6574215_mobilesd675_firmwaresnapdragon_855_mobile_firmwareqca6430_firmwaresdx57msmart_audio_400qcn9024_firmwarewsa8845hwcd9326qcs410qcm2290_firmwarevision_intelligence_100snapdragon_630_mobileqca6564asnapdragon_765g_5g_mobile_firmwaresnapdragon_wear_2100_firmwarewsa8830smart_display_200_firmwaresm8550psnapdragon_wear_2100snapdragon_768g_5g_mobile_firmwaresnapdragon_7c_gen_2_computesc8180x\+sdx55_firmwarear8035msm8996ausnapdragon_208snapdragon_7c_compute_firmwarewcn3620qcm4325qcn6224snapdragon_865\+_5g_mobile_firmwaresnapdragon_x5_lte_modemsnapdragon_429_mobilesc8180x\+sdx55qca6698aqwcn3950_firmwaresm6250mdm9205ssnapdragon_480\+_5g_mobilefastconnect_6200sd670wcn3680bsm7325p_firmwarewcd9360_firmwaresc8180x-acaf_firmwaresnapdragon_480_5g_mobile_firmwaresnapdragon_210_firmwaresnapdragon_660_mobile_firmwarefastconnect_6700_firmwaresnapdragon_710_mobile_firmwarevideo_collaboration_vc3_platform_firmwarewcn3990robotics_rb3_firmwaresnapdragon_x75_5g_modem-rf_firmwaresd670_firmwaresnapdragon_855_mobileqcs6490snapdragon_210snapdragon_695_5g_mobilesc8180xp-acaf_firmwaresnapdragon_778g_5g_mobilefastconnect_6200_firmwarewsa8830_firmwaresnapdragon_460_mobile_firmwareqcn6224_firmwarevision_intelligence_100_firmwareqca6431wsa8845_firmwaresd660_firmwarewsa8832mdm9330_firmwaresnapdragon_auto_4g_modem_firmwaresnapdragon_480_5g_mobilesnapdragon_750g_5g_mobile_firmwaresdx57m_firmwaresxr2130_firmwaresnapdragon_860_mobile_firmwarear8035_firmwaresc8180xp-aaab_firmwaremdm9630snapdragon_778g\+_5g_mobile205_mobile_firmwareqca6320msm8608_firmwaresd888_firmwaremsm8209wcd9306qca6564auqcs6125_firmwaresnapdragon_1100_wearablesnapdragon_425_mobile_firmwaresnapdragon_wear_1300_firmwaresm6250p_firmwaresc8180xp-adar6003wsa8815_firmwareqca8337_firmwaresnapdragon_x12_lte_modem_firmwareqcm4290sd_455_firmwaremsm8608sg8275p_firmwareqca9377_firmwareqcm6490_firmwaresnapdragon_665_mobilesm7250p_firmwarewcn3680_firmwareqcm4490_firmwarevision_intelligence_400_firmwarewcn3950qcs6125snapdragon_870_5g_mobile_firmwaresnapdragon_730g_mobile_firmwaresnapdragon_auto_5g_modem-rf_gen_2_firmwaresnapdragon_7c\+_gen_3_computesnapdragon_732g_mobileqca4004_firmwaresnapdragon_778g\+_5g_mobile_firmwareapq8037smart_audio_400_firmwaresnapdragon_870_5g_mobilesd_675_firmwaresmart_audio_200_firmwaresnapdragon_678_mobilesnapdragon_720g_mobilesd_455sm7250pcsrb31024_firmwaresc8180x-acafsm6250_firmwaresc8180x-ad_firmwaresnapdragon_7c_computeqca6584ausd888qca6320_firmwareqcn6274_firmwaresnapdragon_850_mobile_compute_firmwaresnapdragon_675_mobile_firmwaresnapdragon_wear_2500_firmwaresw5100_firmwarewcn6740snapdragon_768g_5g_mobilesnapdragon_780g_5g_mobile_firmwareqca6310_firmwaresnapdragon_845_mobilesd626fastconnect_6800qfw7114_firmwarefastconnect_7800_firmwaresnapdragon_675_mobilesnapdragon_865_5g_mobile_firmwarewcd9371mdm9630_firmwarefastconnect_6900_firmwareapq8017_firmwarewcd9380smart_audio_200snapdragon_xr2_5gsnapdragon_x24_lte_modemmsm8996au_firmwaresnapdragon_1200_wearablesnapdragon_auto_5g_modem-rf_firmwaresc8180x-aaabsc8180x-aaab_firmwaresw5100video_collaboration_vc3_platformaqt1000wcd9306_firmwaresnapdragon_4_gen_1_mobile_firmware215_mobile_firmwarec-v2x_9150_firmwaresd855qca6431_firmwarewcd9330_firmwareqca6174wcn3990_firmware9205_lte_modem_firmwaresm7315snapdragon_660_mobileqca6698aq_firmwareqcs2290qca6564a_firmwarewcd9385snapdragon_888\+_5g_mobileqcs2290_firmwaremsm8909w_firmwaresnapdragon_8_gen_1_mobilewcn3615qca9367_firmwaresnapdragon_630_mobile_firmwarewcd9330mdm8207_firmwaresnapdragon_680_4g_mobile_firmwarewcn3680wcn3610_firmwareqcs4290wcd9390_firmwaresnapdragon_865\+_5g_mobilesd820_firmwareqca6430snapdragon_855\+_mobilesg8275psm6250psnapdragon_765_5g_mobilesnapdragon_860_mobilesdx55_firmwaresc8180xp-ad_firmwaresnapdragon_auto_5g_modem-rfwcn3615_firmwaresxr21309206_lte_modem_firmwaremsm8108_firmwaresnapdragon_x65_5g_modem-rf_firmwareqcm4490csra6640_firmwaresnapdragon_480\+_5g_mobile_firmwareqca6174a_firmwaresm7325psnapdragon_732g_mobile_firmwaresnapdragon_x50_5g_modem-rfapq8037_firmwaresnapdragon_670_mobile_firmwareqca6420_firmwareaqt1000_firmwareqcs6490_firmwaresdm429wsd855_firmwarewcd9335_firmwaremdm9640qca6436snapdragon_x70_modem-rfwcn3980_firmwaresnapdragon_x24_lte_modem_firmwarewsa8835qca6391_firmwarewsa8840_firmwareqcn6274qfw7124qca6595au_firmwareqcs610sw5100p_firmwareqca6696_firmwareqcs4290_firmwaresnapdragon_430_mobile_firmwarewcd9380_firmwareqca6574_firmwarecsra6620qca8081sd660mdm9628wsa8815sg4150pqca9377mdm9628_firmwaresnapdragon_x75_5g_modem-rfqcm4325_firmwaresnapdragon_439_mobile_firmware9206_lte_modemqca6574a_firmwaresdx55snapdragon_4_gen_1_mobileqcm4290_firmwaresnapdragon_720g_mobile_firmwaresnapdragon_865_5g_mobilesnapdragon_855\+_mobile_firmwaresd675wcd9375_firmwareqca6391snapdragon_710_mobileqts110_firmwaremdm9615_firmwareqcs5430_firmwaresnapdragon_439_mobilesg4150p_firmwareqca6584csra6620_firmwareqcs8550fastconnect_7800sd865_5g_firmwaresnapdragon_8\+_gen_2_mobile_firmwaresnapdragon_xr1wcd9375vision_intelligence_300snapdragon_765g_5g_mobilewcn3988_firmwaresnapdragon_430_mobilesnapdragon_636_mobilesd_675snapdragon_8\+_gen_1_mobile_firmwarevision_intelligence_400wsa8835_firmwaresmart_display_200ar6003_firmwarewcn3980qca6584au_firmwaremdm9330msm8909wwcn3680b_firmwaresnapdragon_w5\+_gen_1_wearablesnapdragon_8_gen_1_mobile_firmwareSnapdragonqcm2290_firmwareqca9377_firmwarequalcomm_video_collaboration_vc1_platform_firmwareqca8337_firmwaremdm9640_firmwaremsm8996au_firmware315_5g_iot_modem_firmwareqcs2290_firmwareqca6431_firmwaremdm9628_firmwareqcn6224_firmwaremsm8909w_firmwaresd670_firmwaremdm9205s_firmwareqca6420_firmwareqca6595au_firmwareqca6174_firmwaresd730_firmwaresd_455_firmwarecsra6620_firmwaresd_675_firmwaresd675_firmwarecsra6640_firmwareqcm5430_firmwareqcs6125_firmwareqca6584au_firmwarec-v2x_9150_firmwareqca6310_firmwareqca6430_firmwareqfw7114_firmwarequalcomm_video_collaboration_vc3_platform_firmwaremsm8108_firmwareqca6335_firmwareqcn6024_firmwareqcm4325_firmwareqca6574_firmwareqca6584_firmwareqca6426_firmwaremdm9230_firmwareqca6320_firmwareqca6574a_firmwareqca6574au_firmwarefastconnect_6200_firmwareqca8081_firmwareqca6436_firmwareqca6421_firmware9205_lte_modem_firmwareaqt1000_firmwareqca6564au_firmwarear6003_firmwareqca9367_firmwareqcm8550_firmwareqcm4490_firmwareqcn6274_firmwareqcs4490_firmwarecsrb31024_firmwareqcm6490_firmwarefastconnect_6900_firmwarerobotics_rb3_platform_firmwareqca4004_firmwareqcs8550_firmware9206_lte_modem_firmwarefastconnect_6700_firmwareqca6564a_firmwareapq8017_firmwaresd626_firmwareqcn9024_firmwarefastconnect_7800_firmwareqcm4290_firmwareqcs610_firmwareqca6698aq_firmwaremsm8209_firmwarequalcomm_215_mobile_platform_firmwaresd835_firmwareqca6174a_firmwaremdm9250_firmwareqcs4290_firmwarequalcomm_205_mobile_platform_firmware9207_lte_modem_firmwareqca6696_firmwareqcs6490_firmwaremdm8207_firmwareqcs5430_firmwaresd820_firmwareqca6391_firmwaremsm8608_firmwaresd888_firmwareqcc710_firmwaremdm9330_firmwaresd855_firmwaresd865_5g_firmwaremdm9615_firmwareapq8037_firmwaresd660_firmwarefastconnect_6800_firmwareqcs410_firmwareqfw7124_firmwaremdm9630_firmwarear8035_firmwareqcm6125_firmwareqts110_firmware
CWE ID-CWE-287
Improper Authentication
CVE-2014-8006
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.37% / 57.92%
||
7 Day CHG~0.00%
Published-17 Dec, 2014 | 00:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Disaster Recovery (DRA) feature on the Cisco ISB8320-E High-Definition IP-Only DVR allows remote attackers to bypass authentication by establishing a TELNET session during a recovery boot, aka Bug ID CSCup85422.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-isb8320-e_high-definition_ip-only_dvrn/a
CWE ID-CWE-287
Improper Authentication
  • Previous
  • 1
  • 2
  • 3
  • Next
Details not found