Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2021-34588

Summary
Assigner-CERTVDE
Assigner Org ID-270ccfa6-a436-4e77-922e-914ec3a9685c
Published At-27 Apr, 2022 | 15:15
Updated At-16 Sep, 2024 | 21:07
Rejected At-
Credits

Bender Charge Controller: Unprotected data export

In Bender/ebee Charge Controllers in multiple versions are prone to unprotected data export. Backup export is protected via a random key. The key is set at user login. It is empty after reboot .

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:CERTVDE
Assigner Org ID:270ccfa6-a436-4e77-922e-914ec3a9685c
Published At:27 Apr, 2022 | 15:15
Updated At:16 Sep, 2024 | 21:07
Rejected At:
▼CVE Numbering Authority (CNA)
Bender Charge Controller: Unprotected data export

In Bender/ebee Charge Controllers in multiple versions are prone to unprotected data export. Backup export is protected via a random key. The key is set at user login. It is empty after reboot .

Affected Products
Vendor
Bender / ebee
Product
CC612
Versions
Affected
  • From 5.11.x before 5.11.2 (custom)
  • From 5.12.x before 5.12.5 (custom)
  • From 5.13.x before 5.13.2 (custom)
  • From 5.20.x before 5.20.2 (custom)
Vendor
Bender / ebee
Product
CC613
Versions
Affected
  • From 5.11.x before 5.11.2 (custom)
  • From 5.12.x before 5.12.5 (custom)
  • From 5.13.x before 5.13.2 (custom)
  • From 5.20.x before 5.20.2 (custom)
Vendor
Bender / ebee
Product
ICC15xx
Versions
Affected
  • From 5.11.x before 5.11.2 (custom)
  • From 5.12.x before 5.12.5 (custom)
  • From 5.13.x before 5.13.2 (custom)
  • From 5.20.x before 5.20.2 (custom)
Vendor
Bender / ebee
Product
ICC16xx
Versions
Affected
  • From 5.11.x before 5.11.2 (custom)
  • From 5.12.x before 5.12.5 (custom)
  • From 5.13.x before 5.13.2 (custom)
  • From 5.20.x before 5.20.2 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-425CWE-425 Direct Request (Forced Browsing)
Type: CWE
CWE ID: CWE-425
Description: CWE-425 Direct Request (Forced Browsing)
Metrics
VersionBase scoreBase severityVector
3.18.6HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Version: 3.1
Base score: 8.6
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Bender thanks the IT security researchers at OpenSource Security GmbH for their thorough and in-depth work. The issue was coordinated by CERT@VDE.
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://cert.vde.com/en/advisories/VDE-2021-047
x_refsource_CONFIRM
Hyperlink: https://cert.vde.com/en/advisories/VDE-2021-047
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://cert.vde.com/en/advisories/VDE-2021-047
x_refsource_CONFIRM
x_transferred
Hyperlink: https://cert.vde.com/en/advisories/VDE-2021-047
Resource:
x_refsource_CONFIRM
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:info@cert.vde.com
Published At:27 Apr, 2022 | 16:15
Updated At:11 May, 2022 | 16:55

In Bender/ebee Charge Controllers in multiple versions are prone to unprotected data export. Backup export is protected via a random key. The key is set at user login. It is empty after reboot .

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.18.6HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Secondary3.18.6HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Primary2.05.0MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:N
Type: Primary
Version: 3.1
Base score: 8.6
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 8.6
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Type: Primary
Version: 2.0
Base score: 5.0
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N
CPE Matches

bender
bender
>>cc612_firmware>>Versions from 5.11.0(inclusive) to 5.11.2(exclusive)
cpe:2.3:o:bender:cc612_firmware:*:*:*:*:*:*:*:*
bender
bender
>>cc612_firmware>>Versions from 5.12.0(inclusive) to 5.12.5(exclusive)
cpe:2.3:o:bender:cc612_firmware:*:*:*:*:*:*:*:*
bender
bender
>>cc612_firmware>>Versions from 5.13.0(inclusive) to 5.13.2(exclusive)
cpe:2.3:o:bender:cc612_firmware:*:*:*:*:*:*:*:*
bender
bender
>>cc612_firmware>>Versions from 5.20.0(inclusive) to 5.20.2(exclusive)
cpe:2.3:o:bender:cc612_firmware:*:*:*:*:*:*:*:*
bender
bender
>>cc612>>-
cpe:2.3:h:bender:cc612:-:*:*:*:*:*:*:*
bender
bender
>>icc15xx_firmware>>Versions from 5.11.0(inclusive) to 5.11.2(exclusive)
cpe:2.3:o:bender:icc15xx_firmware:*:*:*:*:*:*:*:*
bender
bender
>>icc15xx_firmware>>Versions from 5.12.0(inclusive) to 5.12.5(exclusive)
cpe:2.3:o:bender:icc15xx_firmware:*:*:*:*:*:*:*:*
bender
bender
>>icc15xx_firmware>>Versions from 5.13.0(inclusive) to 5.13.2(exclusive)
cpe:2.3:o:bender:icc15xx_firmware:*:*:*:*:*:*:*:*
bender
bender
>>icc15xx_firmware>>Versions from 5.20.0(inclusive) to 5.20.2(exclusive)
cpe:2.3:o:bender:icc15xx_firmware:*:*:*:*:*:*:*:*
bender
bender
>>cc613>>-
cpe:2.3:h:bender:cc613:-:*:*:*:*:*:*:*
bender
bender
>>icc15xx_firmware>>Versions from 5.11.0(inclusive) to 5.11.2(exclusive)
cpe:2.3:o:bender:icc15xx_firmware:*:*:*:*:*:*:*:*
bender
bender
>>icc15xx_firmware>>Versions from 5.12.0(inclusive) to 5.12.5(exclusive)
cpe:2.3:o:bender:icc15xx_firmware:*:*:*:*:*:*:*:*
bender
bender
>>icc15xx_firmware>>Versions from 5.13.0(inclusive) to 5.13.2(exclusive)
cpe:2.3:o:bender:icc15xx_firmware:*:*:*:*:*:*:*:*
bender
bender
>>icc15xx_firmware>>Versions from 5.20.0(inclusive) to 5.20.2(exclusive)
cpe:2.3:o:bender:icc15xx_firmware:*:*:*:*:*:*:*:*
bender
bender
>>cc613>>-
cpe:2.3:h:bender:cc613:-:*:*:*:*:*:*:*
bender
bender
>>icc15xx_firmware>>Versions from 5.11.0(inclusive) to 5.11.2(exclusive)
cpe:2.3:o:bender:icc15xx_firmware:*:*:*:*:*:*:*:*
bender
bender
>>icc15xx_firmware>>Versions from 5.12.0(inclusive) to 5.12.5(exclusive)
cpe:2.3:o:bender:icc15xx_firmware:*:*:*:*:*:*:*:*
bender
bender
>>icc15xx_firmware>>Versions from 5.13.0(inclusive) to 5.13.2(exclusive)
cpe:2.3:o:bender:icc15xx_firmware:*:*:*:*:*:*:*:*
bender
bender
>>icc15xx_firmware>>Versions from 5.20.0(inclusive) to 5.20.2(exclusive)
cpe:2.3:o:bender:icc15xx_firmware:*:*:*:*:*:*:*:*
bender
bender
>>cc613>>-
cpe:2.3:h:bender:cc613:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-425Primaryinfo@cert.vde.com
CWE ID: CWE-425
Type: Primary
Source: info@cert.vde.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://cert.vde.com/en/advisories/VDE-2021-047info@cert.vde.com
Third Party Advisory
Hyperlink: https://cert.vde.com/en/advisories/VDE-2021-047
Source: info@cert.vde.com
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

61Records found

CVE-2021-3113
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.84% / 73.70%
||
7 Day CHG~0.00%
Published-17 Jan, 2021 | 02:33
Updated-03 Aug, 2024 | 16:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Netsia SEBA+ through 0.16.1 build 70-e669dcd7 allows remote attackers to discover session cookies via a direct /session/list/allActiveSession request. For example, the attacker can discover the admin's cookie if the admin account happens to be logged in when the allActiveSession request occurs, and can then use that cookie immediately for admin access,

Action-Not Available
Vendor-netsian/a
Product-seba\+n/a
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2025-2147
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-0.08% / 25.10%
||
7 Day CHG~0.00%
Published-10 Mar, 2025 | 11:00
Updated-24 Mar, 2025 | 14:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Beijing Zhide Intelligent Internet Technology Modern Farm Digital Integrated Management System file access

A vulnerability was found in Beijing Zhide Intelligent Internet Technology Modern Farm Digital Integrated Management System 1.0. It has been classified as problematic. Affected is an unknown function. The manipulation leads to files or directories accessible. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Multiple endpoints are affected. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-caishixiongBeijing Zhide Intelligent Internet Technology
Product-modern_farm_digital_integrated_management_systemModern Farm Digital Integrated Management System
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CWE ID-CWE-552
Files or Directories Accessible to External Parties
CVE-2021-26085
Matching Score-4
Assigner-Atlassian
ShareView Details
Matching Score-4
Assigner-Atlassian
CVSS Score-5.3||MEDIUM
EPSS-94.19% / 99.91%
||
7 Day CHG~0.00%
Published-03 Aug, 2021 | 00:00
Updated-30 Jul, 2025 | 01:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-04-18||Apply updates per vendor instructions.

Affected versions of Atlassian Confluence Server allow remote attackers to view restricted resources via a Pre-Authorization Arbitrary File Read vulnerability in the /s/ endpoint. The affected versions are before version 7.4.10, and from version 7.5.0 before 7.12.3.

Action-Not Available
Vendor-Atlassian
Product-confluence_serverconfluence_data_centerConfluence Data CenterConfluence ServerConfluence Server
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2021-24695
Matching Score-4
Assigner-WPScan
ShareView Details
Matching Score-4
Assigner-WPScan
CVSS Score-7.5||HIGH
EPSS-1.02% / 76.34%
||
7 Day CHG~0.00%
Published-08 Nov, 2021 | 17:35
Updated-03 Aug, 2024 | 19:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Simple Download Monitor < 3.9.6 - Unauthenticated Log Access

The Simple Download Monitor WordPress plugin before 3.9.6 saves logs in a predictable location, and does not have any authentication or authorisation in place to prevent unauthenticated users to download and read the logs containing Sensitive Information such as IP Addresses and Usernames

Action-Not Available
Vendor-UnknownTips and Tricks HQ
Product-simple_download_monitorSimple Download Monitor
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2024-7753
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-0.05% / 16.76%
||
7 Day CHG~0.00%
Published-14 Aug, 2024 | 00:00
Updated-19 Aug, 2024 | 17:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SourceCodester Clinics Patient Management System user_images direct request

A vulnerability was found in SourceCodester Clinics Patient Management System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /user_images/. The manipulation leads to direct request. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-clinics_patient_management_system_projectoretnom23SourceCodester
Product-clinic\'s_patient_management_systemClinics Patient Management Systemclinics_patient_management_system
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2024-6414
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-0.04% / 11.00%
||
7 Day CHG-0.01%
Published-30 Jun, 2024 | 03:00
Updated-01 Aug, 2024 | 21:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Parsec Automation TrakSYS Export Page contentpage direct request

A vulnerability classified as problematic has been found in Parsec Automation TrakSYS 11.x.x. Affected is an unknown function of the file TS/export/contentpage of the component Export Page. The manipulation of the argument ID leads to direct request. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-270000. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-Parsec Automationparsec_automation
Product-TrakSYStracksys
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2018-7526
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.5||HIGH
EPSS-0.23% / 45.49%
||
7 Day CHG~0.00%
Published-24 May, 2018 | 20:00
Updated-05 Aug, 2024 | 06:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In TotalAlert Web Application in BeaconMedaes Scroll Medical Air Systems prior to v4107600010.23, by accessing a specific uniform resource locator (URL) on the webserver, a malicious user may be able to access information in the application without authenticating.

Action-Not Available
Vendor-beaconmedaesn/a
Product-scroll_medical_air_systemsscroll_medical_air_systems_firmwaren/a
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2024-7153
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-0.10% / 28.44%
||
7 Day CHG~0.00%
Published-27 Jul, 2024 | 22:00
Updated-01 Aug, 2024 | 21:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Netgear WN604 siteSurvey.php direct request

A vulnerability classified as problematic has been found in Netgear WN604 up to 20240719. Affected is an unknown function of the file siteSurvey.php. The manipulation leads to direct request. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-272556. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-NETGEAR, Inc.
Product-WN604wn604_firmware
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2024-7080
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-1.20% / 78.06%
||
7 Day CHG~0.00%
Published-24 Jul, 2024 | 20:00
Updated-22 Apr, 2025 | 16:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SourceCodester Insurance Management System direct request

A vulnerability was found in SourceCodester Insurance Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /E-Insurance/. The manipulation leads to direct request. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-272365 was assigned to this vulnerability.

Action-Not Available
Vendor-SourceCodestermunyweki
Product-insurance_management_systemInsurance Management Systeminsurance_management_system
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2021-20114
Matching Score-4
Assigner-Tenable Network Security, Inc.
ShareView Details
Matching Score-4
Assigner-Tenable Network Security, Inc.
CVSS Score-7.5||HIGH
EPSS-53.87% / 97.91%
||
7 Day CHG~0.00%
Published-29 Jul, 2021 | 18:00
Updated-03 Aug, 2024 | 17:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

When installed following the default/recommended settings, TCExam <= 14.8.1 allowed unauthenticated users to access the /cache/backup/ directory, which included sensitive database backup files.

Action-Not Available
Vendor-tecnickn/a
Product-tcexamTCExam
CWE ID-CWE-425
Direct Request ('Forced Browsing')
CVE-2020-7541
Matching Score-4
Assigner-Schneider Electric
ShareView Details
Matching Score-4
Assigner-Schneider Electric
CVSS Score-5.3||MEDIUM
EPSS-0.31% / 53.85%
||
7 Day CHG~0.00%
Published-11 Dec, 2020 | 00:52
Updated-04 Aug, 2024 | 09:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A CWE-425: Direct Request ('Forced Browsing') vulnerability exists in the Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and associated Communication Modules (see security notification for affected versions), that could cause disclosure of sensitive data when sending a specially crafted request to the controller over HTTP.

Action-Not Available
Vendor-n/a
Product-140noc78100140cpu65150140noc78000_firmwaretsxp575634_firmware140noc78000bmxnoe0110_firmwaretsxp574634modicon_m340_bmxp3420102clmodicon_m340_bmxp3420302_firmware140noc78100_firmwaremodicon_m340_bmxp342000modicon_m340_bmxp3420302cl_firmwaremodicon_m340_bmxp341000140noe77111_firmwaremodicon_m340_bmxp342020_firmware140noc77101_firmwaremodicon_m340_bmxp3420102_firmware140noc77101bmxnoe0110tsxety5103_firmwaremodicon_m340_bmxp3420102cl_firmwaretsxety5103tsxp574634_firmwarebmxnoc0401_firmware140noe77111modicon_m340_bmxp3420302clmodicon_m340_bmxp3420302modicon_m340_bmxp342020bmxnoe0100_firmwaretsxp576634modicon_m340_bmxp341000_firmwaretsxety4103_firmwarebmxnoc0401tsxp576634_firmwaremodicon_m340_bmxp342000_firmwarebmxnoe0100140cpu65150_firmwaremodicon_m340_bmxp3420102tsxety4103tsxp575634Web Server on Modicon M340, Legacy Offers Modicon Quantum and Modicon Premium and associated Communication Modules (see security notification for affected versions)
CWE ID-CWE-425
Direct Request ('Forced Browsing')
  • Previous
  • 1
  • 2
  • Next
Details not found