Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2023-3263

Summary
Assigner-trellix
Assigner Org ID-01626437-bf8f-4d1c-912a-893b5eb04808
Published At-14 Aug, 2023 | 04:02
Updated At-09 Oct, 2024 | 14:44
Rejected At-
Credits

The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier is vulnerable to authentication bypass in the REST API due to the mishandling of special characters when parsing credentials.Successful exploitation allows the malicious agent to obtain a valid authorization token and read information relating to the state of the relays and power distribution.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:trellix
Assigner Org ID:01626437-bf8f-4d1c-912a-893b5eb04808
Published At:14 Aug, 2023 | 04:02
Updated At:09 Oct, 2024 | 14:44
Rejected At:
▼CVE Numbering Authority (CNA)

The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier is vulnerable to authentication bypass in the REST API due to the mishandling of special characters when parsing credentials.Successful exploitation allows the malicious agent to obtain a valid authorization token and read information relating to the state of the relays and power distribution.

Affected Products
Vendor
Dataprobe, Inc.Dataprobe
Product
iBoot PDU
Platforms
  • Linux
Default Status
unaffected
Versions
Affected
  • From 1.43.03312023 through <= 1.43.03312023 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-289CWE-289: Authentication Bypass by Alternate Name
Type: CWE
CWE ID: CWE-289
Description: CWE-289: Authentication Bypass by Alternate Name
Metrics
VersionBase scoreBase severityVector
3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-421CAPEC-421 Influence Perception of Authority
CAPEC ID: CAPEC-421
Description: CAPEC-421 Influence Perception of Authority
Solutions

Configurations

Workarounds

Exploits

Credits

reporter
Sam Quinn
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html
N/A
Hyperlink: https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html
x_transferred
Hyperlink: https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Vendor
Dataprobe, Inc.dataprobe
Product
iboot_pdu
CPEs
  • cpe:2.3:a:dataprobe:iboot_pdu:*:*:*:*:*:*:*:*
Default Status
unaffected
Versions
Affected
  • From 0 through 1.43.03312023 (custom)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:trellixpsirt@trellix.com
Published At:14 Aug, 2023 | 05:15
Updated At:22 Aug, 2023 | 16:24

The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier is vulnerable to authentication bypass in the REST API due to the mishandling of special characters when parsing credentials.Successful exploitation allows the malicious agent to obtain a valid authorization token and read information relating to the state of the relays and power distribution.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Secondary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Type: Primary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CPE Matches

Dataprobe, Inc.
dataprobe
>>iboot-pdu4a-c10_firmware>>Versions before 1.44.0804202(exclusive)
cpe:2.3:o:dataprobe:iboot-pdu4a-c10_firmware:*:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu4a-c10>>-
cpe:2.3:h:dataprobe:iboot-pdu4a-c10:-:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu4a-c20_firmware>>Versions before 1.44.0804202(exclusive)
cpe:2.3:o:dataprobe:iboot-pdu4a-c20_firmware:*:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu4a-c20>>-
cpe:2.3:h:dataprobe:iboot-pdu4a-c20:-:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu4a-n15_firmware>>Versions before 1.44.0804202(exclusive)
cpe:2.3:o:dataprobe:iboot-pdu4a-n15_firmware:*:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu4a-n15>>-
cpe:2.3:h:dataprobe:iboot-pdu4a-n15:-:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu4a-n20_firmware>>Versions before 1.44.0804202(exclusive)
cpe:2.3:o:dataprobe:iboot-pdu4a-n20_firmware:*:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu4a-n20>>-
cpe:2.3:h:dataprobe:iboot-pdu4a-n20:-:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu4-c20_firmware>>Versions before 1.44.0804202(exclusive)
cpe:2.3:o:dataprobe:iboot-pdu4-c20_firmware:*:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu4-c20>>-
cpe:2.3:h:dataprobe:iboot-pdu4-c20:-:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu4-n20_firmware>>Versions before 1.44.0804202(exclusive)
cpe:2.3:o:dataprobe:iboot-pdu4-n20_firmware:*:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu4-n20>>-
cpe:2.3:h:dataprobe:iboot-pdu4-n20:-:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu4sa-c10_firmware>>Versions before 1.44.0804202(exclusive)
cpe:2.3:o:dataprobe:iboot-pdu4sa-c10_firmware:*:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu4sa-c10>>-
cpe:2.3:h:dataprobe:iboot-pdu4sa-c10:-:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu4sa-c20_firmware>>Versions before 1.44.0804202(exclusive)
cpe:2.3:o:dataprobe:iboot-pdu4sa-c20_firmware:*:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu4sa-c20>>-
cpe:2.3:h:dataprobe:iboot-pdu4sa-c20:-:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu4sa-n15_firmware>>Versions before 1.44.0804202(exclusive)
cpe:2.3:o:dataprobe:iboot-pdu4sa-n15_firmware:*:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu4sa-n15>>-
cpe:2.3:h:dataprobe:iboot-pdu4sa-n15:-:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu4sa-n20_firmware>>Versions before 1.44.0804202(exclusive)
cpe:2.3:o:dataprobe:iboot-pdu4sa-n20_firmware:*:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu4sa-n20>>-
cpe:2.3:h:dataprobe:iboot-pdu4sa-n20:-:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8a-2c10_firmware>>Versions before 1.44.0804202(exclusive)
cpe:2.3:o:dataprobe:iboot-pdu8a-2c10_firmware:*:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8a-2c10>>-
cpe:2.3:h:dataprobe:iboot-pdu8a-2c10:-:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8a-2c20_firmware>>Versions before 1.44.0804202(exclusive)
cpe:2.3:o:dataprobe:iboot-pdu8a-2c20_firmware:*:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8a-2c20>>-
cpe:2.3:h:dataprobe:iboot-pdu8a-2c20:-:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8a-2n15_firmware>>Versions before 1.44.0804202(exclusive)
cpe:2.3:o:dataprobe:iboot-pdu8a-2n15_firmware:*:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8a-2n15>>-
cpe:2.3:h:dataprobe:iboot-pdu8a-2n15:-:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8a-2n20_firmware>>Versions before 1.44.0804202(exclusive)
cpe:2.3:o:dataprobe:iboot-pdu8a-2n20_firmware:*:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8a-2n20>>-
cpe:2.3:h:dataprobe:iboot-pdu8a-2n20:-:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8a-c10_firmware>>Versions before 1.44.0804202(exclusive)
cpe:2.3:o:dataprobe:iboot-pdu8a-c10_firmware:*:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8a-c10>>-
cpe:2.3:h:dataprobe:iboot-pdu8a-c10:-:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8a-c20_firmware>>Versions before 1.44.0804202(exclusive)
cpe:2.3:o:dataprobe:iboot-pdu8a-c20_firmware:*:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8a-c20>>-
cpe:2.3:h:dataprobe:iboot-pdu8a-c20:-:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8a-n15_firmware>>Versions before 1.44.0804202(exclusive)
cpe:2.3:o:dataprobe:iboot-pdu8a-n15_firmware:*:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8a-n15>>-
cpe:2.3:h:dataprobe:iboot-pdu8a-n15:-:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8a-n20_firmware>>Versions before 1.44.0804202(exclusive)
cpe:2.3:o:dataprobe:iboot-pdu8a-n20_firmware:*:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8a-n20>>-
cpe:2.3:h:dataprobe:iboot-pdu8a-n20:-:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8sa-2n15_firmware>>Versions before 1.44.0804202(exclusive)
cpe:2.3:o:dataprobe:iboot-pdu8sa-2n15_firmware:*:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8sa-2n15>>-
cpe:2.3:h:dataprobe:iboot-pdu8sa-2n15:-:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8sa-c10_firmware>>Versions before 1.44.0804202(exclusive)
cpe:2.3:o:dataprobe:iboot-pdu8sa-c10_firmware:*:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8sa-c10>>-
cpe:2.3:h:dataprobe:iboot-pdu8sa-c10:-:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8sa-n15_firmware>>Versions before 1.44.0804202(exclusive)
cpe:2.3:o:dataprobe:iboot-pdu8sa-n15_firmware:*:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8sa-n15>>-
cpe:2.3:h:dataprobe:iboot-pdu8sa-n15:-:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8sa-n20_firmware>>Versions before 1.44.0804202(exclusive)
cpe:2.3:o:dataprobe:iboot-pdu8sa-n20_firmware:*:*:*:*:*:*:*:*
Dataprobe, Inc.
dataprobe
>>iboot-pdu8sa-n20>>-
cpe:2.3:h:dataprobe:iboot-pdu8sa-n20:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-287Primarynvd@nist.gov
CWE-289Secondarytrellixpsirt@trellix.com
CWE ID: CWE-287
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-289
Type: Secondary
Source: trellixpsirt@trellix.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.htmltrellixpsirt@trellix.com
Vendor Advisory
Hyperlink: https://www.trellix.com/en-us/about/newsroom/stories/research/the-threat-lurking-in-data-centers.html
Source: trellixpsirt@trellix.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

162Records found

CVE-2021-25368
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-3.3||LOW
EPSS-0.14% / 34.24%
||
7 Day CHG~0.00%
Published-25 Mar, 2021 | 16:15
Updated-03 Aug, 2024 | 20:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Hijacking vulnerability in Samsung Cloud prior to version 4.7.0.3 allows attackers to intercept when the provider is executed.

Action-Not Available
Vendor-SamsungSamsung Electronics
Product-cloudSamsung Cloud
CWE ID-CWE-287
Improper Authentication
CVE-2021-26620
Matching Score-4
Assigner-KrCERT/CC
ShareView Details
Matching Score-4
Assigner-KrCERT/CC
CVSS Score-7.5||HIGH
EPSS-0.61% / 68.80%
||
7 Day CHG~0.00%
Published-25 Mar, 2022 | 18:02
Updated-03 Aug, 2024 | 20:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IPTIME NAS2dual improper authentication vulnerability

An improper authentication vulnerability leading to information leakage was discovered in iptime NAS2dual. Remote attackers are able to steal important information in the server by exploiting vulnerabilities such as insufficient authentication when accessing the shared folder and changing user’s passwords.

Action-Not Available
Vendor-iptimeEFM Networks Co., Ltd
Product-nas1dualnas3nas101nas4dualnas4_firmwarenas1dual_firmwarenas2dual_firmwarenas101_firmwarenas3_firmwarenas-iienas2dualnas-ii_firmwarenas-i_firmwarenas-inas4dual_firmwarenas-iinas-iie_firmwarenas4ipTIME NAS product (NAS1, 2, 3, 4, 1dual, 2dual 4dual)
CWE ID-CWE-287
Improper Authentication
CVE-2022-34908
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.2||HIGH
EPSS-0.10% / 28.57%
||
7 Day CHG~0.00%
Published-27 Feb, 2023 | 00:00
Updated-30 May, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the A4N (Aremis 4 Nomad) application 1.5.0 for Android. It possesses an authentication mechanism; however, some features do not require any token or cookie in a request. Therefore, an attacker may send a simple HTTP request to the right endpoint, and obtain authorization to retrieve application data.

Action-Not Available
Vendor-aremisn/a
Product-aremis_4_nomadsn/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CWE ID-CWE-287
Improper Authentication
CVE-2022-34535
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.59% / 68.12%
||
7 Day CHG~0.00%
Published-19 Jul, 2022 | 19:03
Updated-03 Aug, 2024 | 09:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Digital Watchdog DW MEGApix IP cameras A7.2.2_20211029 allows unauthenticated attackers to view internal paths and scripts via web files.

Action-Not Available
Vendor-dwn/a
Product-megapixmegapix_firmwaren/a
CWE ID-CWE-287
Improper Authentication
CVE-2024-51996
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.5||HIGH
EPSS-0.05% / 15.58%
||
7 Day CHG~0.00%
Published-13 Nov, 2024 | 16:18
Updated-15 Nov, 2024 | 14:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Symphony has an Authentication Bypass via RememberMe

Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. When consuming a persisted remember-me cookie, Symfony does not check if the username persisted in the database matches the username attached with the cookie, leading to authentication bypass. This vulnerability is fixed in 5.4.47, 6.4.15, and 7.1.8.

Action-Not Available
Vendor-symfonysymphony_php_framework
Product-symfonysymphony_process
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-289
Authentication Bypass by Alternate Name
CVE-2022-30995
Matching Score-4
Assigner-Acronis International GmbH
ShareView Details
Matching Score-4
Assigner-Acronis International GmbH
CVSS Score-9.3||CRITICAL
EPSS-46.43% / 97.57%
||
7 Day CHG~0.00%
Published-03 May, 2023 | 10:50
Updated-30 Jan, 2025 | 15:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Sensitive information disclosure due to improper authentication. The following products are affected: Acronis Cyber Protect 15 (Windows, Linux) before build 29486, Acronis Cyber Backup 12.5 (Windows, Linux) before build 16545.

Action-Not Available
Vendor-Acronis (Acronis International GmbH)Linux Kernel Organization, IncMicrosoft Corporation
Product-cyber_protectwindowscyber_backuplinux_kernelAcronis Cyber Backup 12.5Acronis Cyber Protect 15
CWE ID-CWE-287
Improper Authentication
CVE-2024-49757
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-7.5||HIGH
EPSS-3.06% / 86.18%
||
7 Day CHG-3.96%
Published-25 Oct, 2024 | 14:22
Updated-26 Aug, 2025 | 16:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Zitadel User Registration Bypass Vulnerability

The open-source identity infrastructure software Zitadel allows administrators to disable the user self-registration. Due to a missing security check in versions prior to 2.64.0, 2.63.5, 2.62.7, 2.61.4, 2.60.4, 2.59.5, and 2.58.7, disabling the "User Registration allowed" option only hid the registration button on the login page. Users could bypass this restriction by directly accessing the registration URL (/ui/login/loginname) and register a user that way. Versions 2.64.0, 2.63.5, 2.62.7, 2.61.4, 2.60.4, 2.59.5, and 2.58.7 contain a patch. No known workarounds are available.

Action-Not Available
Vendor-zitadelzitadel
Product-zitadelzitadel
CWE ID-CWE-287
Improper Authentication
CVE-2021-20092
Matching Score-4
Assigner-Tenable Network Security, Inc.
ShareView Details
Matching Score-4
Assigner-Tenable Network Security, Inc.
CVSS Score-7.5||HIGH
EPSS-79.49% / 99.04%
||
7 Day CHG~0.00%
Published-29 Apr, 2021 | 14:29
Updated-03 Aug, 2024 | 17:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The web interfaces of Buffalo WSR-2533DHPL2 firmware version <= 1.02 and WSR-2533DHP3 firmware version <= 1.24 do not properly restrict access to sensitive information from an unauthorized actor.

Action-Not Available
Vendor-n/aBUFFALO INC.
Product-wsr-2533dhpl2-bk_firmwarewsr-2533dhpl2-bkwsr-2533dhp3-bkwsr-2533dhp3-bk_firmwareBuffalo WSR-2533DHPL2, Buffalo WSR-2533DHP3
CWE ID-CWE-287
Improper Authentication
CVE-2013-1391
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-84.10% / 99.26%
||
7 Day CHG~0.00%
Published-30 Oct, 2019 | 20:36
Updated-06 Aug, 2024 | 14:57
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Authentication bypass vulnerability in the the web interface in Hunt CCTV, Capture CCTV, Hachi CCTV, NoVus CCTV, and Well-Vision Inc DVR systems allows a remote attacker to retrieve the device configuration.

Action-Not Available
Vendor-huntcctvnovuscctvvsphachicapturecctvn/a
Product-hdr-04kd_firmwaretw-dvr604_firmwarecdr_0820vde_firmwaredvr-04ch_firmwarenv-dvr1216dvr-08ch_firmwarehv-08rd_pro_firmwaredvr-16chhv-08rd_procdr_0410ve_firmwaredvr-04ncdr6-7316a4hlnv-dvr1204hdr-04kdtw-dvr616dr6-7316a4h_firmwaredr6-7316a4hl_firmwarehv-04rd_procdr_0410venv-dvr1208_firmwaredr6-704a4h_firmwaredvr-08chtw-dvr616_firmwaredvr-08ncnv-dvr1208nv-dvr1216_firmwaredr6-704a4hdvr-04chdvr-04nc_firmwarehdr-08kddvr-16ch_firmwarenv-dvr1204_firmwaredr6-708a4hcdr_0820vdedr6-7316a4hhdr-08kd_firmwaretw-dvr604dr6-708a4h_firmwarehv-04rd_pro_firmwaredvr-08nc_firmwaren/a
CWE ID-CWE-287
Improper Authentication
CVE-2020-5686
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-7.5||HIGH
EPSS-0.29% / 51.99%
||
7 Day CHG~0.00%
Published-13 Jan, 2021 | 09:40
Updated-04 Aug, 2024 | 08:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Incorrect implementation of authentication algorithm issue in UNIVERGE SV9500 series from V1 to V7and SV8500 series from S6 to S8 allows an attacker to access the remote system maintenance feature and obtain the information by sending a specially crafted request to a specific URL.

Action-Not Available
Vendor-NEC Corporation
Product-univerge_sv8500univerge_sv9500_firmwareuniverge_sv8500_firmwareuniverge_sv9500UNIVERGE SV9500/SV8500 series
CWE ID-CWE-287
Improper Authentication
CVE-2020-4494
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-7.5||HIGH
EPSS-0.21% / 43.15%
||
7 Day CHG~0.00%
Published-15 Jun, 2020 | 13:25
Updated-17 Sep, 2024 | 02:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM Spectrum Protect Client 8.1.7.0 through 8.1.9.1 (Linux and Windows), 8.1.9.0 trough 8.1.9.1 (AIX) and IBM Spectrum Protect for Space Management 8.1.7.0 through 8.1.9.1 (Linux), 8.1.9.0 through 8.1.9.1 (AIX) web user interfaces could allow an attacker to bypass authentication due to improper session validation which can result in access to unauthorized resources. IBM X-Force ID: 182019.

Action-Not Available
Vendor-IBM CorporationLinux Kernel Organization, IncMicrosoft Corporation
Product-linux_kernelwindowsspectrum_protect_clientspectrum_protect_for_space_managementaixSpectrum Protect for Space Management (Linux)Spectrum Protect Client (AIX)Spectrum Protect for Space Management (AIX)Spectrum Protect Client (Linux and Windows)
CWE ID-CWE-287
Improper Authentication
CVE-2017-9946
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-7.5||HIGH
EPSS-0.48% / 64.29%
||
7 Day CHG~0.00%
Published-23 Oct, 2017 | 00:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in Siemens APOGEE PXC and TALON TC BACnet Automation Controllers in all versions <V3.5. An attacker with network access to the integrated web server (80/tcp and 443/tcp) could bypass the authentication and download sensitive information from the device.

Action-Not Available
Vendor-n/aSiemens AG
Product-talon_tc_compact_firmwaretalon_tc_modular_firmwaretalon_tc_modularapogee_pxctalon_tc_compactapogee_pxc_modularapogee_pxc_modular_firmwareapogee_pxc_firmwareAPOGEE PXC and TALON TC BACnet Automation Controllers All versions <V3.5
CWE ID-CWE-287
Improper Authentication
  • Previous
  • 1
  • 2
  • 3
  • 4
  • Next
Details not found