Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2022-50978

Summary
Assigner-CERTVDE
Assigner Org ID-270ccfa6-a436-4e77-922e-914ec3a9685c
Published At-02 Feb, 2026 | 14:09
Updated At-02 Feb, 2026 | 17:24
Rejected At-
Credits

Multiple Innomic VibroLine VLX and avibia AVLX allow unauthenticated configuration preset change via Modbus (TCP)

An unauthenticated remote attacker could potentially disrupt operations by switching between multiple configuration presets via Modbus (TCP).

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:CERTVDE
Assigner Org ID:270ccfa6-a436-4e77-922e-914ec3a9685c
Published At:02 Feb, 2026 | 14:09
Updated At:02 Feb, 2026 | 17:24
Rejected At:
â–¼CVE Numbering Authority (CNA)
Multiple Innomic VibroLine VLX and avibia AVLX allow unauthenticated configuration preset change via Modbus (TCP)

An unauthenticated remote attacker could potentially disrupt operations by switching between multiple configuration presets via Modbus (TCP).

Affected Products
Vendor
Innomic
Product
VibroLine VLX1 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Affected
  • From 2.1.1340 through 2.1.1387 (semver)
  • 2.1.1866
Vendor
Innomic
Product
VibroLine VLX2 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Affected
  • From 2.1.1340 through 2.1.1387 (semver)
  • 2.1.1866
Vendor
Innomic
Product
VibroLine VLX4 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Affected
  • From 2.1.1340 through 2.1.1387 (semver)
  • 2.1.1866
Vendor
Innomic
Product
VibroLine VLX6 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Affected
  • From 2.1.1340 through 2.1.1387 (semver)
  • 2.1.1866
Vendor
Innomic
Product
VibroLine VLX8 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Affected
  • From 2.1.1340 through 2.1.1387 (semver)
  • 2.1.1866
Vendor
avibia
Product
AvibiaLine AVLX1 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Affected
  • From 2.1.1340 through 2.1.1387 (semver)
  • 2.1.1866
Vendor
avibia
Product
AvibiaLine AVLX2 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Affected
  • From 2.1.1340 through 2.1.1387 (semver)
  • 2.1.1866
Vendor
avibia
Product
AvibiaLine AVLX4 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Affected
  • From 2.1.1340 through 2.1.1387 (semver)
  • 2.1.1866
Vendor
avibia
Product
AvibiaLine AVLX6 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Affected
  • From 2.1.1340 through 2.1.1387 (semver)
  • 2.1.1866
Vendor
avibia
Product
AvibiaLine AVLX8 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Affected
  • From 2.1.1340 through 2.1.1387 (semver)
  • 2.1.1866
Vendor
Innomic
Product
VibroLine VLE1 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • From 2.1.1340 through 2.1.1387 (semver)
Vendor
Innomic
Product
VibroLine VLE2 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • From 2.1.1340 through 2.1.1387 (semver)
Vendor
Innomic
Product
VibroLine VLE4 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • From 2.1.1340 through 2.1.1387 (semver)
Vendor
Innomic
Product
VibroLine VLE6 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • From 2.1.1340 through 2.1.1387 (semver)
Vendor
Innomic
Product
VibroLine VLE8 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • From 2.1.1340 through 2.1.1387 (semver)
Vendor
avibia
Product
AvibiaLine AVLE1 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • From 2.1.1340 through 2.1.1387 (semver)
  • 2.1.1866
Vendor
avibia
Product
AvibiaLine AVLE2 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • From 2.1.1340 through 2.1.1387 (semver)
  • 2.1.1866
Vendor
avibia
Product
AvibiaLine AVLE4 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • From 2.1.1340 through 2.1.1387 (semver)
  • 2.1.1866
Vendor
avibia
Product
AvibiaLine AVLE6 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • From 2.1.1340 through 2.1.1387 (semver)
  • 2.1.1866
Vendor
avibia
Product
AvibiaLine AVLE8 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • From 2.1.1340 through 2.1.1387 (semver)
  • 2.1.1866
Vendor
Innomic
Product
VibroLine VLE1 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • 2.1.1866
Vendor
Innomic
Product
VibroLine VLE2 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • 2.1.1866
Vendor
Innomic
Product
VibroLine VLE4 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • 2.1.1866
Vendor
Innomic
Product
VibroLine VLE6 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • 2.1.1866
Vendor
Innomic
Product
VibroLine VLE8 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • 2.1.1866
Vendor
Innomic
Product
VibroLine VLE1 HD 4.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • From 1.4.1074 through 1.4.1116 (semver)
Vendor
Innomic
Product
VibroLine VLE2 HD 4.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • From 1.4.1074 through 1.4.1116 (semver)
Vendor
Innomic
Product
VibroLine VLE4 HD 4.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • From 1.4.1074 through 1.4.1116 (semver)
Vendor
Innomic
Product
VibroLine VLE6 HD 4.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • From 1.4.1074 through 1.4.1116 (semver)
Vendor
Innomic
Product
VibroLine VLE8 HD 4.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • From 1.4.1074 through 1.4.1116 (semver)
Vendor
Innomic
Product
VibroLine VLX1 HD 4.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • From 1.5.1074 through 1.5.1116 (semver)
Vendor
Innomic
Product
VibroLine VLX2 HD 4.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • From 1.5.1074 through 1.5.1116 (semver)
Vendor
Innomic
Product
VibroLine VLX4 HD 4.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • From 1.5.1074 through 1.5.1116 (semver)
Vendor
Innomic
Product
VibroLine VLX6 HD 4.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • From 1.5.1074 through 1.5.1116 (semver)
Vendor
Innomic
Product
VibroLine VLX8 HD 4.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • From 1.5.1074 through 1.5.1116 (semver)
Problem Types
TypeCWE IDDescription
CWECWE-306CWE-306 Missing Authentication for Critical Function
Type: CWE
CWE ID: CWE-306
Description: CWE-306 Missing Authentication for Critical Function
Metrics
VersionBase scoreBase severityVector
3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.innomic.com/.well-known/csaf/white/2026/ids-2026-0001.html
vendor-advisory
https://www.innomic.com/.well-known/csaf/white/2026/ids-2026-0001.json
vendor-advisory
Hyperlink: https://www.innomic.com/.well-known/csaf/white/2026/ids-2026-0001.html
Resource:
vendor-advisory
Hyperlink: https://www.innomic.com/.well-known/csaf/white/2026/ids-2026-0001.json
Resource:
vendor-advisory
â–¼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:info@cert.vde.com
Published At:02 Feb, 2026 | 15:16
Updated At:03 Feb, 2026 | 16:44

An unauthenticated remote attacker could potentially disrupt operations by switching between multiple configuration presets via Modbus (TCP).

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Type: Primary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-306Primaryinfo@cert.vde.com
CWE ID: CWE-306
Type: Primary
Source: info@cert.vde.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.innomic.com/.well-known/csaf/white/2026/ids-2026-0001.htmlinfo@cert.vde.com
N/A
https://www.innomic.com/.well-known/csaf/white/2026/ids-2026-0001.jsoninfo@cert.vde.com
N/A
Hyperlink: https://www.innomic.com/.well-known/csaf/white/2026/ids-2026-0001.html
Source: info@cert.vde.com
Resource: N/A
Hyperlink: https://www.innomic.com/.well-known/csaf/white/2026/ids-2026-0001.json
Source: info@cert.vde.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

65Records found

CVE-2020-9487
Matching Score-4
Assigner-Apache Software Foundation
ShareView Details
Matching Score-4
Assigner-Apache Software Foundation
CVSS Score-7.5||HIGH
EPSS-0.63% / 69.86%
||
7 Day CHG-0.01%
Published-01 Oct, 2020 | 19:53
Updated-04 Aug, 2024 | 10:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Apache NiFi 1.0.0 to 1.11.4, the NiFi download token (one-time password) mechanism used a fixed cache size and did not authenticate a request to create a download token, only when attempting to use the token to access the content. An unauthenticated user could repeatedly request download tokens, preventing legitimate users from requesting download tokens.

Action-Not Available
Vendor-n/aThe Apache Software Foundation
Product-nifiApache NiFi
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2020-6309
Matching Score-4
Assigner-SAP SE
ShareView Details
Matching Score-4
Assigner-SAP SE
CVSS Score-7.5||HIGH
EPSS-0.54% / 67.08%
||
7 Day CHG~0.00%
Published-12 Aug, 2020 | 13:51
Updated-04 Aug, 2024 | 08:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SAP NetWeaver AS JAVA, versions - (ENGINEAPI 7.10; WSRM 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50; J2EE-FRMW 7.10, 7.11), does not perform any authentication checks for a web service allowing the attacker to send several payloads and leading to complete denial of service.

Action-Not Available
Vendor-SAP SE
Product-netweaver_application_server_javaSAP NetWeaver AS JAVA (ENGINEAPI)SAP NetWeaver AS JAVA (J2EE-FRMW)SAP NetWeaver AS JAVA (WSRM)
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2020-6186
Matching Score-4
Assigner-SAP SE
ShareView Details
Matching Score-4
Assigner-SAP SE
CVSS Score-7.5||HIGH
EPSS-0.51% / 65.97%
||
7 Day CHG~0.00%
Published-12 Feb, 2020 | 19:46
Updated-04 Aug, 2024 | 08:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SAP Host Agent, version 7.21, allows an attacker to cause a slowdown in processing of username/password-based authentication requests of the SAP Host Agent, leading to Denial of Service.

Action-Not Available
Vendor-SAP SE
Product-host_agentSAP Host Agent
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-8419
Matching Score-4
Assigner-CERT@VDE
ShareView Details
Matching Score-4
Assigner-CERT@VDE
CVSS Score-7.5||HIGH
EPSS-0.17% / 38.03%
||
7 Day CHG~0.00%
Published-30 Jun, 2025 | 09:39
Updated-30 Jun, 2025 | 18:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ifm: Improper Access Control vulnerability in AC4xxS devices

The endpoint hosts a script that allows an unauthorized remote attacker to put the system in a fail-safe state over the network due to missing authentication.

Action-Not Available
Vendor-ifm electronic GmbH
Product-ifm Smart PLC AC4xxS Firmware
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-8751
Matching Score-4
Assigner-SICK AG
ShareView Details
Matching Score-4
Assigner-SICK AG
CVSS Score-7.5||HIGH
EPSS-0.11% / 29.38%
||
7 Day CHG~0.00%
Published-12 Sep, 2024 | 21:38
Updated-13 Sep, 2024 | 14:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Vulnerability in SICK MSC800

A vulnerability in the MSC800 allows an unauthenticated attacker to modify the product’s IP address over Sopas ET. This can lead to Denial of Service. Users are recommended to upgrade both MSC800 and MSC800 LFT to version V4.26 and S2.93.20 respectively which fixes this issue.

Action-Not Available
Vendor-SICK AG
Product-SICK MSC800msc800_firmware
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2020-21996
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-5.91% / 90.40%
||
7 Day CHG~0.00%
Published-28 Apr, 2021 | 14:54
Updated-04 Aug, 2024 | 14:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

AVE DOMINAplus <=1.10.x suffers from an unauthenticated reboot command execution. Attackers can exploit this issue to cause a denial of service scenario.

Action-Not Available
Vendor-aven/a
Product-ts03x-v_firmware53ab-wbs_firmwaredominaplusts05n-v_firmwarets03x-vts01_firmwarets04x-v_firmwarets05ts04x-vts05_firmwarets05n-v53ab-wbsts01n/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2020-15127
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.5||HIGH
EPSS-0.31% / 53.90%
||
7 Day CHG~0.00%
Published-05 Aug, 2020 | 20:15
Updated-04 Aug, 2024 | 13:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Denial of service in Contour

In Contour ( Ingress controller for Kubernetes) before version 1.7.0, a bad actor can shut down all instances of Envoy, essentially killing the entire ingress data plane. GET requests to /shutdown on port 8090 of the Envoy pod initiate Envoy's shutdown procedure. The shutdown procedure includes flipping the readiness endpoint to false, which removes Envoy from the routing pool. When running Envoy (For example on the host network, pod spec hostNetwork=true), the shutdown manager's endpoint is accessible to anyone on the network that can reach the Kubernetes node that's running Envoy. There is no authentication in place that prevents a rogue actor on the network from shutting down Envoy via the shutdown manager endpoint. Successful exploitation of this issue will lead to bad actors shutting down all instances of Envoy, essentially killing the entire ingress data plane. This is fixed in version 1.7.0.

Action-Not Available
Vendor-projectcontourprojectcontour
Product-contourcontour
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-48882
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-8.6||HIGH
EPSS-0.06% / 18.97%
||
7 Day CHG~0.00%
Published-01 Dec, 2025 | 15:25
Updated-05 Dec, 2025 | 21:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A denial of service vulnerability exists in the Modbus TCP functionality of Socomec DIRIS Digiware M-70 1.6.9. A specially crafted network packet can lead to denial of service. An attacker can send an unauthenticated packet to trigger this vulnerability.

Action-Not Available
Vendor-socomecSocomec
Product-diris_m-70diris_m-70_firmwareDIRIS Digiware M-70
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-32978
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.22% / 44.93%
||
7 Day CHG~0.00%
Published-24 Jun, 2025 | 00:00
Updated-03 Nov, 2025 | 20:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x before 13.1.81, 13.2.x before 13.2.183, 14.0.x before 14.0.341 (Patch 5), and 14.1.x before 14.1.101 (Patch 4) allows unauthenticated users to replace system licenses through a web interface intended for license renewal. Attackers can exploit this to replace valid licenses with expired or trial licenses, causing denial of service.

Action-Not Available
Vendor-n/a
Product-n/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-45049
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.5||HIGH
EPSS-0.36% / 57.61%
||
7 Day CHG~0.00%
Published-27 Aug, 2024 | 20:33
Updated-28 Aug, 2024 | 14:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Nix Hydra Missing authentication when triggering evaluations

Hydra is a Continuous Integration service for Nix based projects. It is possible to trigger evaluations in Hydra without any authentication. Depending on the size of evaluations, this can impact the availability of systems. The problem can be fixed by applying https://github.com/NixOS/hydra/commit/f73043378907c2c7e44f633ad764c8bdd1c947d5 to any Hydra package. Users are advised to upgrade. Users unable to upgrade should deny the `/api/push` route in a reverse proxy. This also breaks the "Evaluate jobset" button in the frontend.

Action-Not Available
Vendor-NixOSnixos
Product-hydrahydra
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-23906
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-7.5||HIGH
EPSS-0.91% / 75.35%
||
7 Day CHG~0.00%
Published-10 May, 2023 | 00:00
Updated-28 Jan, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Missing authentication for critical function exists in SkyBridge MB-A100/110 firmware Ver. 4.2.0 and earlier, which may allow a remote unauthenticated attacker to execute some critical functions without authentication, e.g., rebooting the product.

Action-Not Available
Vendor-seiko-solSeiko Solutions Inc.
Product-skybridge_mb-a110skybridge_mb-a100skybridge_mb-a110_firmwareskybridge_mb-a100_firmwareSkyBridge MB-A100/110
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-23444
Matching Score-4
Assigner-SICK AG
ShareView Details
Matching Score-4
Assigner-SICK AG
CVSS Score-7.5||HIGH
EPSS-0.71% / 71.74%
||
7 Day CHG~0.00%
Published-12 May, 2023 | 12:39
Updated-24 Jan, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Missing Authentication for Critical Function in SICK Flexi Classic and Flexi Soft Gateways with Partnumbers 1042193, 1042964, 1044078, 1044072, 1044073, 1044074, 1099830, 1099832, 1127717, 1069070, 1112296, 1051432, 1102420, 1127487, 1121596, 1121597 allows an unauthenticated remote attacker to influence the availability of the device by changing the IP settings of the device via broadcasted UDP packets.

Action-Not Available
Vendor-SICK AG
Product-ue410-en1fx0-gent00010_firmwareue410-en3fx0-gent00000_firmwareue410-en3_firmwarefx0-gpnt00010_firmwarefx0-gent00010fx0-gpnt00030fx0-gmod00000_firmwarefx0-gent00030ue410-en4_firmwarefx0-gent00030_firmwarefx0-gpnt00010ue410-en1_firmwarefx0-gmod00000fx0-gpnt00000_firmwarefx0-gmod00010ue410-en4fx0-gmod00010_firmwarefx0-gent00000fx0-gpnt00000fx0-gpnt00030_firmwareFX0-GPNT00000 FLEXISOFT PNET GATEW.FX0-GMOD00010 FLEXISOFT MOD GW (C)FX3-GEPR00000 FLEXISOFT EFI-PRO GW FirmwareFX0-GENT00010 FLEXISOFT EIP GW (C) FirmwareFX0-GPNT00000 FLEXISOFT PNET GATEW. FirmwareFX0-GENT00030 FLEXISOFT EIP GATEW.V2 FirmwareUE410-EN4 FLEXI ETHERNET GATEW.FX3-GEPR00010 FLEXISOFT EFI-PRO GWFX0-GPNT00010 FLEXISOFT PNET GW (C) FirmwareUE410-EN4 FLEXI ETHERNET GATEW. FirmwareFX0-GMOD00010 FLEXISOFT MOD GW (C) FirmwareFX0-GPNT00010 FLEXISOFT PNET GW (C)FX0-GETC00010 FLEXISOFT ETC GW (C)FX0-GETC00040 FLEXISOFT ETC GW FirmwareFX0-GENT00000 FLEXISOFT EIP GATEW.FX0-GETC00010 FLEXISOFT ETC GW (C) FirmwareFX0-GENT00000 FLEXISOFT EIP GATEW. FirmwareUE410-EN1 FLEXI ETHERNET GATEW. FirmwareFX0-GPNT00030 FLEXISOFT PNET GATEW.V2FX0-GETC00000 FLEXISOFT ETC GW FirmwareFX0-GENT00010 FLEXISOFT EIP GW (C)UE410-EN3 FLEXI ETHERNET GATEW.FX0-GENT00030 FLEXISOFT EIP GATEW.V2FX0-GMOD00000 FLEXISOFT MOD GATEW. FirmwareUE410-EN1 FLEXI ETHERNET GATEW.FX3-GEPR00000 FLEXISOFT EFI-PRO GWFX0-GPNT00030 FLEXISOFT PNET GATEW.V2 FirmwareFX0-GMOD00000 FLEXISOFT MOD GATEW.FX3-GEPR00010 FLEXISOFT EFI-PRO GW FirmwareUE410-EN3 FLEXI ETHERNET GATEW. FirmwareFX0-GETC00000 FLEXISOFT ETC GWFX0-GETC00040 FLEXISOFT ETC GW
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-22803
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.5||HIGH
EPSS-0.05% / 14.74%
||
7 Day CHG-0.03%
Published-15 Feb, 2023 | 17:23
Updated-16 Jan, 2025 | 21:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CVE-2023-22803

LS ELECTRIC XBC-DN32U with operating system version 01.80 is missing authentication to perform critical functions to the PLC. This could allow an attacker to change the PLC's mode arbitrarily.

Action-Not Available
Vendor-LS ELECTRIC Co. Ltd.
Product-xbc-dn32uxbc-dn32u_firmwareXBC-DN32U
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-0116
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-7.5||HIGH
EPSS-0.10% / 27.78%
||
7 Day CHG~0.00%
Published-26 May, 2023 | 00:00
Updated-15 Jan, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The reminder module lacks an authentication mechanism for broadcasts received. Successful exploitation of this vulnerability may affect availability.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-emuiEMUIHarmonyOS
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-21623
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.5||HIGH
EPSS-1.19% / 78.44%
||
7 Day CHG~0.00%
Published-07 Jan, 2025 | 15:43
Updated-05 Sep, 2025 | 16:34
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ClipBucket V5 Unauthenticated Template Directory Update to Denial-of-Service

ClipBucket V5 provides open source video hosting with PHP. Prior to 5.5.1 - 238, ClipBucket V5 allows unauthenticated attackers to change the template directory via a directory traversal, which results in a denial of service.

Action-Not Available
Vendor-oxygenzMacWarrior
Product-clipbucketclipbucket-v5
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CWE ID-CWE-306
Missing Authentication for Critical Function
  • Previous
  • 1
  • 2
  • Next
Details not found