Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2022-50980

Summary
Assigner-CERTVDE
Assigner Org ID-270ccfa6-a436-4e77-922e-914ec3a9685c
Published At-02 Feb, 2026 | 14:11
Updated At-02 Feb, 2026 | 17:23
Rejected At-
Credits

Multiple Innomic VibroLine VLX and avibia AVLX allow unauthenticated configuration preset change via CAN

A unauthenticated adjacent attacker could potentially disrupt operations by switching between multiple configuration presets via CAN.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:CERTVDE
Assigner Org ID:270ccfa6-a436-4e77-922e-914ec3a9685c
Published At:02 Feb, 2026 | 14:11
Updated At:02 Feb, 2026 | 17:23
Rejected At:
â–¼CVE Numbering Authority (CNA)
Multiple Innomic VibroLine VLX and avibia AVLX allow unauthenticated configuration preset change via CAN

A unauthenticated adjacent attacker could potentially disrupt operations by switching between multiple configuration presets via CAN.

Affected Products
Vendor
Innomic
Product
VibroLine VLX1 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Affected
  • From 2.1.1340 through 2.1.1387 (semver)
  • 2.1.1866
Vendor
Innomic
Product
VibroLine VLX2 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Affected
  • From 2.1.1340 through 2.1.1387 (semver)
  • 2.1.1866
Vendor
Innomic
Product
VibroLine VLX4 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Affected
  • From 2.1.1340 through 2.1.1387 (semver)
  • 2.1.1866
Vendor
Innomic
Product
VibroLine VLX6 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Affected
  • From 2.1.1340 through 2.1.1387 (semver)
  • 2.1.1866
Vendor
Innomic
Product
VibroLine VLX8 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Affected
  • From 2.1.1340 through 2.1.1387 (semver)
  • 2.1.1866
Vendor
avibia
Product
AvibiaLine AVLX1 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Affected
  • From 2.1.1340 through 2.1.1387 (semver)
  • 2.1.1866
Vendor
avibia
Product
AvibiaLine AVLX2 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Affected
  • From 2.1.1340 through 2.1.1387 (semver)
  • 2.1.1866
Vendor
avibia
Product
AvibiaLine AVLX4 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Affected
  • From 2.1.1340 through 2.1.1387 (semver)
  • 2.1.1866
Vendor
avibia
Product
AvibiaLine AVLX6 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Affected
  • From 2.1.1340 through 2.1.1387 (semver)
  • 2.1.1866
Vendor
avibia
Product
AvibiaLine AVLX8 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Affected
  • From 2.1.1340 through 2.1.1387 (semver)
  • 2.1.1866
Vendor
Innomic
Product
VibroLine VLE1 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • From 2.1.1340 through 2.1.1387 (semver)
Vendor
Innomic
Product
VibroLine VLE2 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • From 2.1.1340 through 2.1.1387 (semver)
Vendor
Innomic
Product
VibroLine VLE4 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • From 2.1.1340 through 2.1.1387 (semver)
Vendor
Innomic
Product
VibroLine VLE6 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • From 2.1.1340 through 2.1.1387 (semver)
Vendor
Innomic
Product
VibroLine VLE8 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • From 2.1.1340 through 2.1.1387 (semver)
Vendor
avibia
Product
AvibiaLine AVLE1 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • From 2.1.1340 through 2.1.1387 (semver)
  • 2.1.1866
Vendor
avibia
Product
AvibiaLine AVLE2 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • From 2.1.1340 through 2.1.1387 (semver)
  • 2.1.1866
Vendor
avibia
Product
AvibiaLine AVLE4 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • From 2.1.1340 through 2.1.1387 (semver)
  • 2.1.1866
Vendor
avibia
Product
AvibiaLine AVLE6 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • From 2.1.1340 through 2.1.1387 (semver)
  • 2.1.1866
Vendor
avibia
Product
AvibiaLine AVLE8 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • From 2.1.1340 through 2.1.1387 (semver)
  • 2.1.1866
Vendor
Innomic
Product
VibroLine VLE1 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • 2.1.1866
Vendor
Innomic
Product
VibroLine VLE2 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • 2.1.1866
Vendor
Innomic
Product
VibroLine VLE4 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • 2.1.1866
Vendor
Innomic
Product
VibroLine VLE6 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • 2.1.1866
Vendor
Innomic
Product
VibroLine VLE8 HD 5.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • 2.1.1866
Vendor
Innomic
Product
VibroLine VLE1 HD 4.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • From 1.4.1074 through 1.4.1116 (semver)
Vendor
Innomic
Product
VibroLine VLE2 HD 4.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • From 1.4.1074 through 1.4.1116 (semver)
Vendor
Innomic
Product
VibroLine VLE4 HD 4.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • From 1.4.1074 through 1.4.1116 (semver)
Vendor
Innomic
Product
VibroLine VLE6 HD 4.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • From 1.4.1074 through 1.4.1116 (semver)
Vendor
Innomic
Product
VibroLine VLE8 HD 4.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • From 1.4.1074 through 1.4.1116 (semver)
Vendor
Innomic
Product
VibroLine VLX1 HD 4.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • From 1.5.1074 through 1.5.1116 (semver)
Vendor
Innomic
Product
VibroLine VLX2 HD 4.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • From 1.5.1074 through 1.5.1116 (semver)
Vendor
Innomic
Product
VibroLine VLX4 HD 4.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • From 1.5.1074 through 1.5.1116 (semver)
Vendor
Innomic
Product
VibroLine VLX6 HD 4.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • From 1.5.1074 through 1.5.1116 (semver)
Vendor
Innomic
Product
VibroLine VLX8 HD 4.0
Modules
  • firmware
Default Status
unaffected
Versions
Unaffected
  • From 1.5.1074 through 1.5.1116 (semver)
Problem Types
TypeCWE IDDescription
CWECWE-306CWE-306 Missing Authentication for Critical Function
Type: CWE
CWE ID: CWE-306
Description: CWE-306 Missing Authentication for Critical Function
Metrics
VersionBase scoreBase severityVector
3.16.5MEDIUM
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Version: 3.1
Base score: 6.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.innomic.com/.well-known/csaf/white/2026/ids-2026-0001.html
vendor-advisory
https://www.innomic.com/.well-known/csaf/white/2026/ids-2026-0001.json
vendor-advisory
Hyperlink: https://www.innomic.com/.well-known/csaf/white/2026/ids-2026-0001.html
Resource:
vendor-advisory
Hyperlink: https://www.innomic.com/.well-known/csaf/white/2026/ids-2026-0001.json
Resource:
vendor-advisory
â–¼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:info@cert.vde.com
Published At:02 Feb, 2026 | 15:16
Updated At:03 Feb, 2026 | 16:44

A unauthenticated adjacent attacker could potentially disrupt operations by switching between multiple configuration presets via CAN.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.16.5MEDIUM
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Type: Primary
Version: 3.1
Base score: 6.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-306Primaryinfo@cert.vde.com
CWE ID: CWE-306
Type: Primary
Source: info@cert.vde.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.innomic.com/.well-known/csaf/white/2026/ids-2026-0001.htmlinfo@cert.vde.com
N/A
https://www.innomic.com/.well-known/csaf/white/2026/ids-2026-0001.jsoninfo@cert.vde.com
N/A
Hyperlink: https://www.innomic.com/.well-known/csaf/white/2026/ids-2026-0001.html
Source: info@cert.vde.com
Resource: N/A
Hyperlink: https://www.innomic.com/.well-known/csaf/white/2026/ids-2026-0001.json
Source: info@cert.vde.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

12Records found

CVE-2022-50979
Matching Score-10
Assigner-CERT@VDE
ShareView Details
Matching Score-10
Assigner-CERT@VDE
CVSS Score-6.5||MEDIUM
EPSS-0.01% / 0.45%
||
7 Day CHG~0.00%
Published-02 Feb, 2026 | 14:10
Updated-03 Feb, 2026 | 16:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Multiple Innomic VibroLine VLX and avibia AVLX allow unauthenticated configuration preset change via Modbus (RS485)

An unauthenticated adjacent attacker could potentially disrupt operations by switching between multiple configuration presets via Modbus (RS485).

Action-Not Available
Vendor-avibiaInnomic
Product-VibroLine VLE4 HD 5.0VibroLine VLX6 HD 5.0AvibiaLine AVLE1 HD 5.0VibroLine VLX2 HD 4.0VibroLine VLE6 HD 4.0AvibiaLine AVLX8 HD 5.0VibroLine VLX6 HD 4.0VibroLine VLX1 HD 4.0VibroLine VLX4 HD 5.0VibroLine VLE6 HD 5.0AvibiaLine AVLE6 HD 5.0AvibiaLine AVLE4 HD 5.0VibroLine VLE2 HD 5.0AvibiaLine AVLE2 HD 5.0AvibiaLine AVLX4 HD 5.0AvibiaLine AVLX1 HD 5.0AvibiaLine AVLE8 HD 5.0VibroLine VLX2 HD 5.0AvibiaLine AVLX2 HD 5.0VibroLine VLE1 HD 4.0VibroLine VLX8 HD 4.0VibroLine VLE8 HD 4.0VibroLine VLE8 HD 5.0VibroLine VLE4 HD 4.0VibroLine VLE1 HD 5.0VibroLine VLX8 HD 5.0AvibiaLine AVLX6 HD 5.0VibroLine VLX1 HD 5.0VibroLine VLE2 HD 4.0VibroLine VLX4 HD 4.0
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2022-50977
Matching Score-6
Assigner-CERT@VDE
ShareView Details
Matching Score-6
Assigner-CERT@VDE
CVSS Score-7.5||HIGH
EPSS-0.04% / 10.49%
||
7 Day CHG+0.01%
Published-02 Feb, 2026 | 14:08
Updated-03 Feb, 2026 | 16:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Multiple Innomic VibroLine VLX and avibia AVLX allow unauthenticated configuration preset change via HTTP

An unauthenticated remote attacker could potentially disrupt operations by switching between multiple configuration presets via HTTP.

Action-Not Available
Vendor-avibiaInnomic
Product-VibroLine VLE4 HD 5.0VibroLine VLX6 HD 5.0AvibiaLine AVLE1 HD 5.0VibroLine VLX2 HD 4.0VibroLine VLE6 HD 4.0AvibiaLine AVLX8 HD 5.0VibroLine VLX6 HD 4.0VibroLine VLX1 HD 4.0VibroLine VLX4 HD 5.0VibroLine VLE6 HD 5.0AvibiaLine AVLE6 HD 5.0AvibiaLine AVLE4 HD 5.0VibroLine VLE2 HD 5.0AvibiaLine AVLE2 HD 5.0AvibiaLine AVLX4 HD 5.0AvibiaLine AVLX1 HD 5.0AvibiaLine AVLE8 HD 5.0VibroLine VLX2 HD 5.0AvibiaLine AVLX2 HD 5.0VibroLine VLE1 HD 4.0VibroLine VLX8 HD 4.0VibroLine VLE8 HD 4.0VibroLine VLE8 HD 5.0VibroLine VLE4 HD 4.0VibroLine VLE1 HD 5.0VibroLine VLX8 HD 5.0AvibiaLine AVLX6 HD 5.0VibroLine VLX1 HD 5.0VibroLine VLE2 HD 4.0VibroLine VLX4 HD 4.0
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2022-50981
Matching Score-6
Assigner-CERT@VDE
ShareView Details
Matching Score-6
Assigner-CERT@VDE
CVSS Score-9.8||CRITICAL
EPSS-0.04% / 12.14%
||
7 Day CHG+0.01%
Published-02 Feb, 2026 | 14:12
Updated-03 Feb, 2026 | 16:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Multiple Innomic VibroLine VLX HD 5.0 and avibia AVLX weak password requirements

An unauthenticated remote attacker can gain full access on the affected devices as they are shipped without a password by default and setting one is not enforced.

Action-Not Available
Vendor-avibiaInnomic
Product-VibroLine VLE4 HD 5.0VibroLine VLX6 HD 5.0AvibiaLine AVLE1 HD 5.0VibroLine VLX2 HD 4.0VibroLine VLE6 HD 4.0AvibiaLine AVLX8 HD 5.0VibroLine VLX6 HD 4.0VibroLine VLX1 HD 4.0VibroLine VLX4 HD 5.0VibroLine VLE6 HD 5.0AvibiaLine AVLE6 HD 5.0AvibiaLine AVLE4 HD 5.0VibroLine VLE2 HD 5.0AvibiaLine AVLE2 HD 5.0AvibiaLine AVLX4 HD 5.0AvibiaLine AVLX1 HD 5.0AvibiaLine AVLE8 HD 5.0VibroLine VLX2 HD 5.0AvibiaLine AVLX2 HD 5.0VibroLine VLE1 HD 4.0VibroLine VLX8 HD 4.0VibroLine VLE8 HD 4.0VibroLine VLE8 HD 5.0VibroLine VLE4 HD 4.0VibroLine VLE1 HD 5.0VibroLine VLX8 HD 5.0AvibiaLine AVLX6 HD 5.0VibroLine VLX1 HD 5.0VibroLine VLE2 HD 4.0VibroLine VLX4 HD 4.0
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2022-50978
Matching Score-6
Assigner-CERT@VDE
ShareView Details
Matching Score-6
Assigner-CERT@VDE
CVSS Score-7.5||HIGH
EPSS-0.04% / 10.49%
||
7 Day CHG+0.01%
Published-02 Feb, 2026 | 14:09
Updated-03 Feb, 2026 | 16:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Multiple Innomic VibroLine VLX and avibia AVLX allow unauthenticated configuration preset change via Modbus (TCP)

An unauthenticated remote attacker could potentially disrupt operations by switching between multiple configuration presets via Modbus (TCP).

Action-Not Available
Vendor-avibiaInnomic
Product-VibroLine VLE4 HD 5.0VibroLine VLX6 HD 5.0AvibiaLine AVLE1 HD 5.0VibroLine VLX2 HD 4.0VibroLine VLE6 HD 4.0AvibiaLine AVLX8 HD 5.0VibroLine VLX6 HD 4.0VibroLine VLX1 HD 4.0VibroLine VLX4 HD 5.0VibroLine VLE6 HD 5.0AvibiaLine AVLE6 HD 5.0AvibiaLine AVLE4 HD 5.0VibroLine VLE2 HD 5.0AvibiaLine AVLE2 HD 5.0AvibiaLine AVLX4 HD 5.0AvibiaLine AVLX1 HD 5.0AvibiaLine AVLE8 HD 5.0VibroLine VLX2 HD 5.0AvibiaLine AVLX2 HD 5.0VibroLine VLE1 HD 4.0VibroLine VLX8 HD 4.0VibroLine VLE8 HD 4.0VibroLine VLE8 HD 5.0VibroLine VLE4 HD 4.0VibroLine VLE1 HD 5.0VibroLine VLX8 HD 5.0AvibiaLine AVLX6 HD 5.0VibroLine VLX1 HD 5.0VibroLine VLE2 HD 4.0VibroLine VLX4 HD 4.0
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2019-5014
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-6.5||MEDIUM
EPSS-0.09% / 25.51%
||
7 Day CHG~0.00%
Published-08 May, 2019 | 16:47
Updated-04 Aug, 2024 | 19:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An exploitable improper access control vulnerability exists in the bluetooth low energy functionality of Winco Fireworks FireFly FW-1007 V2.0. An attacker can connect to the device to trigger this vulnerability.

Action-Not Available
Vendor-wincofireworksn/a
Product-fw-1007_firmwarefw-1007Winco Firefly
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-5952
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-4.3||MEDIUM
EPSS-0.02% / 4.79%
||
7 Day CHG~0.00%
Published-13 Jun, 2024 | 19:40
Updated-07 Aug, 2024 | 17:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Deep Sea Electronics DSE855 Restart Missing Authentication Denial-of-Service Vulnerability

Deep Sea Electronics DSE855 Restart Missing Authentication Denial-of-Service Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Deep Sea Electronics DSE855 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web-based UI. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-23174.

Action-Not Available
Vendor-deepseaelectronicsDeep Sea Electronicsdeep_sea_electronics
Product-dse855dse855_firmwareDSE855dse855
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-65828
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.12% / 31.82%
||
7 Day CHG~0.00%
Published-10 Dec, 2025 | 00:00
Updated-30 Dec, 2025 | 19:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An unauthenticated attacker within proximity of the Meatmeet device can issue several commands over Bluetooth Low Energy (BLE) to these devices which would result in a Denial of Service. These commands include: shutdown, restart, clear config. Clear config would disassociate the current device from its user and would require re-configuration to re-enable the device. As a result, the end user would be unable to receive updates from the Meatmeet base station which communicates with the cloud services until the device had been fixed or turned back on.

Action-Not Available
Vendor-meatmeetn/a
Product-meatmeet_pro_wifi_\&_bluetooth_meat_thermometer_firmwaremeatmeet_pro_wifi_\&_bluetooth_meat_thermometern/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2022-0922
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-6.5||MEDIUM
EPSS-0.04% / 13.07%
||
7 Day CHG~0.00%
Published-01 Apr, 2022 | 22:17
Updated-16 Apr, 2025 | 16:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ICSMA-22-088-01 Philips e-Alert

The software does not perform any authentication for critical system functionality.

Action-Not Available
Vendor-Philips
Product-e-alerte-alert_firmwaree-Alert
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2022-0878
Matching Score-4
Assigner-Switzerland National Cyber Security Centre (NCSC)
ShareView Details
Matching Score-4
Assigner-Switzerland National Cyber Security Centre (NCSC)
CVSS Score-4.6||MEDIUM
EPSS-0.19% / 41.05%
||
7 Day CHG~0.00%
Published-12 Apr, 2022 | 12:00
Updated-16 Sep, 2024 | 23:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Novel attack against the Combined Charging System (CCS) in electric vehicles to remotely cause a denial of service

Electric Vehicle (EV) commonly utilises the Combined Charging System (CCS) for DC rapid charging. To exchange important messages such as the State of Charge (SoC) with the Electric Vehicle Supply Equipment (EVSE) CCS uses a high-bandwidth IP link provided by the HomePlug Green PHY (HPGP) power-line communication (PLC) technology. The attack interrupts necessary control communication between the vehicle and charger, causing charging sessions to abort. The attack can be conducted wirelessly from a distance using electromagnetic interference, allowing individual vehicles or entire fleets to be disrupted simultaneously. In addition, the attack can be mounted with off-the-shelf radio hardware and minimal technical knowledge. With a power budget of 1 W, the attack is successful from around 47 m distance. The exploited behavior is a required part of the HomePlug Green PHY, DIN 70121 & ISO 15118 standards and all known implementations exhibit it. In addition to electric cars, Brokenwire affects electric ships, airplanes and heavy duty vehicles utilising these standards.

Action-Not Available
Vendor-combined_charging_system_projectCombined Charging System
Product-combined_charging_systemcombined_charging_system_firmwareCombined Charging SystemHomePlug GreenPHY
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-5951
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-7.1||HIGH
EPSS-0.02% / 5.02%
||
7 Day CHG~0.00%
Published-13 Jun, 2024 | 19:40
Updated-07 Aug, 2024 | 17:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Deep Sea Electronics DSE855 Factory Reset Missing Authentication Denial-of-Service Vulnerability

Deep Sea Electronics DSE855 Factory Reset Missing Authentication Denial-of-Service Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Deep Sea Electronics DSE855 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web-based UI. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-23173.

Action-Not Available
Vendor-deepseaelectronicsDeep Sea Electronics
Product-dse855dse855_firmwareDSE855
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-57725
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-6.94% / 91.22%
||
7 Day CHG~0.00%
Published-14 Feb, 2025 | 00:00
Updated-18 Feb, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in the Arcadyan Livebox Fibra PRV3399B_B_LT allows a remote or local attacker to modify the GPON link value without authentication, causing an internet service disruption via the /firstconnection.cgi endpoint.

Action-Not Available
Vendor-n/a
Product-n/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-6347
Matching Score-4
Assigner-Automotive Security Research Group (ASRG)
ShareView Details
Matching Score-4
Assigner-Automotive Security Research Group (ASRG)
CVSS Score-5.3||MEDIUM
EPSS-0.06% / 17.82%
||
7 Day CHG~0.00%
Published-15 Aug, 2024 | 14:37
Updated-16 Aug, 2024 | 14:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unauthorized access to ECU functionality

* Unprotected privileged mode access through UDS session in the Blind Spot Detection Sensor ECU firmware in Nissan Altima (2022) allows attackers to trigger denial-of-service (DoS) by unauthorized access to the ECU's programming session. * No preconditions implemented for ECU management functionality through UDS session in the Blind Spot Detection Sensor ECU in Nissan Altima (2022) allows attackers to disrupt normal ECU operations by triggering a control command without authentication.

Action-Not Available
Vendor-nissan-globalNissan
Product-blind_spot_detection_sensor_ecu_firmwarealtimaAltima
CWE ID-CWE-285
Improper Authorization
CWE ID-CWE-306
Missing Authentication for Critical Function
Details not found