Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-46887

Summary
Assigner-siemens
Assigner Org ID-cec7a2ec-15b4-4faf-bd53-b40f371f3a77
Published At-08 Oct, 2024 | 08:40
Updated At-21 Oct, 2025 | 14:12
Rejected At-
Credits

The web server of affected devices do not properly authenticate user request to the '/ClientArea/RuntimeInfoData.mwsl' endpoint. This could allow an unauthenticated remote attacker to gain knowledge about current actual and configured maximum cycle times as well as about configured maximum communication load.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:siemens
Assigner Org ID:cec7a2ec-15b4-4faf-bd53-b40f371f3a77
Published At:08 Oct, 2024 | 08:40
Updated At:21 Oct, 2025 | 14:12
Rejected At:
â–¼CVE Numbering Authority (CNA)

The web server of affected devices do not properly authenticate user request to the '/ClientArea/RuntimeInfoData.mwsl' endpoint. This could allow an unauthenticated remote attacker to gain knowledge about current actual and configured maximum cycle times as well as about configured maximum communication load.

Affected Products
Vendor
Siemens AGSiemens
Product
SIMATIC Drive Controller CPU 1504D TF
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC Drive Controller CPU 1507D TF
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC ET 200SP CPU 1510SP F-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC ET 200SP CPU 1510SP F-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC ET 200SP CPU 1510SP-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC ET 200SP CPU 1510SP-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC ET 200SP CPU 1512SP F-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC ET 200SP CPU 1512SP F-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC ET 200SP CPU 1512SP-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC ET 200SP CPU 1512SP-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC ET 200SP CPU 1514SP F-2 PN
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC ET 200SP CPU 1514SP-2 PN
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC ET 200SP CPU 1514SPT F-2 PN
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC ET 200SP CPU 1514SPT-2 PN
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) V2 CPUs - Windows OS
Default Status
unknown
Versions
Affected
  • From 0 before V21.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) V3 CPUs - Industrial OS
Default Status
unknown
Versions
Affected
  • From 0 before V31.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) V3 CPUs - Windows OS
Default Status
unknown
Versions
Affected
  • From 0 before V31.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1511-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1511-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1511-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1511C-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1511C-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1511C-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1511F-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1511F-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1511F-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1511T-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1511T-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1511TF-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1511TF-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1512C-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1512C-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1512C-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1513-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1513-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1513-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1513F-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1513F-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1513F-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1513pro F-2 PN
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1513pro-2 PN
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1515-2 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1515-2 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1515-2 PN
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1515F-2 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1515F-2 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1515F-2 PN
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1515T-2 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1515T-2 PN
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1515TF-2 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1515TF-2 PN
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1516-3 PN/DP
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1516-3 PN/DP
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1516-3 PN/DP
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1516F-3 PN/DP
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1516F-3 PN/DP
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1516F-3 PN/DP
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1516pro F-2 PN
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1516pro-2 PN
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1516T-3 PN/DP
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1516TF-3 PN/DP
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1517-3 PN/DP
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1517F-3 PN/DP
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1517F-3 PN/DP
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1517T-3 PN/DP
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1517TF-3 PN/DP
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1518-4 PN/DP
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1518-4 PN/DP MFP
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1518F-4 PN/DP
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1518F-4 PN/DP MFP
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1518T-4 PN/DP
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU 1518TF-4 PN/DP
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU S7-1518-4 PN/DP ODK
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 CPU S7-1518F-4 PN/DP ODK
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 ET 200pro: CPU 1513PRO F-2 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 ET 200pro: CPU 1513PRO-2 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 ET 200pro: CPU 1516PRO F-2 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 ET 200pro: CPU 1516PRO-2 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 Software Controller CPU 1507S F V2
Default Status
unknown
Versions
Affected
  • From 0 before V21.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 Software Controller CPU 1507S F V3
Default Status
unknown
Versions
Affected
  • From 0 before V31.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 Software Controller CPU 1507S V2
Default Status
unknown
Versions
Affected
  • From 0 before V21.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 Software Controller CPU 1507S V3
Default Status
unknown
Versions
Affected
  • From 0 before V31.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 Software Controller CPU 1508S F V2
Default Status
unknown
Versions
Affected
  • From 0 before V21.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 Software Controller CPU 1508S F V3
Default Status
unknown
Versions
Affected
  • From 0 before V31.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 Software Controller CPU 1508S T V3
Default Status
unknown
Versions
Affected
  • From 0 before V31.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 Software Controller CPU 1508S TF V3
Default Status
unknown
Versions
Affected
  • From 0 before V31.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 Software Controller CPU 1508S V2
Default Status
unknown
Versions
Affected
  • From 0 before V21.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 Software Controller CPU 1508S V3
Default Status
unknown
Versions
Affected
  • From 0 before V31.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 Software Controller Linux V2
Default Status
unknown
Versions
Affected
  • From 0 before * (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-1500 Software Controller Linux V3
Default Status
unknown
Versions
Affected
  • From 0 before V31.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIMATIC S7-PLCSIM Advanced
Default Status
unknown
Versions
Affected
  • From 0 before V7.0 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS ET 200SP CPU 1510SP F-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS ET 200SP CPU 1510SP F-1 PN RAIL
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS ET 200SP CPU 1510SP-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS ET 200SP CPU 1510SP-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS ET 200SP CPU 1510SP-1 PN RAIL
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS ET 200SP CPU 1510SP-1 PN RAIL
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS ET 200SP CPU 1512SP F-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS ET 200SP CPU 1512SP F-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS ET 200SP CPU 1512SP F-1 PN RAIL
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS ET 200SP CPU 1512SP F-1 PN RAIL
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS ET 200SP CPU 1512SP-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS ET 200SP CPU 1512SP-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS ET 200SP CPU 1512SP-1 PN RAIL
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS ET 200SP CPU 1512SP-1 PN RAIL
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS S7-1500 CPU 1511-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS S7-1500 CPU 1511-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS S7-1500 CPU 1511-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS S7-1500 CPU 1511-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS S7-1500 CPU 1511-1 PN T1 RAIL
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS S7-1500 CPU 1511-1 PN T1 RAIL
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS S7-1500 CPU 1511-1 PN TX RAIL
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS S7-1500 CPU 1511-1 PN TX RAIL
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS S7-1500 CPU 1511F-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS S7-1500 CPU 1511F-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS S7-1500 CPU 1513-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS S7-1500 CPU 1513-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS S7-1500 CPU 1513-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS S7-1500 CPU 1513-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS S7-1500 CPU 1513F-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS S7-1500 CPU 1513F-1 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS S7-1500 CPU 1515F-2 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS S7-1500 CPU 1515F-2 PN
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS S7-1500 CPU 1515F-2 PN RAIL
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS S7-1500 CPU 1515F-2 PN T2 RAIL
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS S7-1500 CPU 1516-3 PN/DP
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS S7-1500 CPU 1516-3 PN/DP
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS S7-1500 CPU 1516-3 PN/DP
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS S7-1500 CPU 1516-3 PN/DP
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS S7-1500 CPU 1516-3 PN/DP RAIL
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS S7-1500 CPU 1516-3 PN/DP TX RAIL
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS S7-1500 CPU 1516F-3 PN/DP
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS S7-1500 CPU 1516F-3 PN/DP
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS S7-1500 CPU 1516F-3 PN/DP RAIL
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS S7-1500 CPU 1516F-3 PN/DP RAIL
Default Status
unknown
Versions
Affected
  • From 0 before V2.9.8 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS S7-1500 CPU 1518-4 PN/DP
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS S7-1500 CPU 1518-4 PN/DP MFP
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Vendor
Siemens AGSiemens
Product
SIPLUS S7-1500 CPU 1518F-4 PN/DP
Default Status
unknown
Versions
Affected
  • From 0 before V3.1.4 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-288CWE-288: Authentication Bypass Using an Alternate Path or Channel
Type: CWE
CWE ID: CWE-288
Description: CWE-288: Authentication Bypass Using an Alternate Path or Channel
Metrics
VersionBase scoreBase severityVector
3.15.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
4.06.9MEDIUM
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
Version: 3.1
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Version: 4.0
Base score: 6.9
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://cert-portal.siemens.com/productcert/html/ssa-054046.html
N/A
Hyperlink: https://cert-portal.siemens.com/productcert/html/ssa-054046.html
Resource: N/A
â–¼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:productcert@siemens.com
Published At:08 Oct, 2024 | 09:15
Updated At:15 Apr, 2026 | 00:35

The web server of affected devices do not properly authenticate user request to the '/ClientArea/RuntimeInfoData.mwsl' endpoint. This could allow an unauthenticated remote attacker to gain knowledge about current actual and configured maximum cycle times as well as about configured maximum communication load.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.06.9MEDIUM
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Secondary3.15.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Type: Secondary
Version: 4.0
Base score: 6.9
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Secondary
Version: 3.1
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-288Secondaryproductcert@siemens.com
CWE ID: CWE-288
Type: Secondary
Source: productcert@siemens.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://cert-portal.siemens.com/productcert/html/ssa-054046.htmlproductcert@siemens.com
N/A
Hyperlink: https://cert-portal.siemens.com/productcert/html/ssa-054046.html
Source: productcert@siemens.com
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

49Records found

CVE-2019-19283
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-5.3||MEDIUM
EPSS-0.24% / 46.85%
||
7 Day CHG~0.00%
Published-14 Dec, 2020 | 21:05
Updated-05 Aug, 2024 | 02:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in XHQ (All Versions < 6.1). The application's web server could expose non-sensitive information about the server's architecture. This could allow an attacker to adapt further attacks to the version in place.

Action-Not Available
Vendor-Siemens AG
Product-xhqXHQ
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2019-18312
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-5.3||MEDIUM
EPSS-0.33% / 55.85%
||
7 Day CHG~0.00%
Published-12 Dec, 2019 | 19:08
Updated-05 Aug, 2024 | 01:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SPPA-T3000 MS3000 Migration Server (All versions). An attacker with network access to the MS3000 Server could be able to enumerate running RPC services. Please note that an attacker needs to have network access to the MS3000 in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.

Action-Not Available
Vendor-Siemens AG
Product-sppa-t3000_ms3000_migration_serverSPPA-T3000 MS3000 Migration Server
CWE ID-CWE-287
Improper Authentication
CVE-2019-18333
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-5.3||MEDIUM
EPSS-0.17% / 37.65%
||
7 Day CHG~0.00%
Published-12 Dec, 2019 | 19:08
Updated-05 Aug, 2024 | 01:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SPPA-T3000 Application Server (All versions < Service Pack R8.2 SP2). An attacker with network access to the Application Server could gain access to filenames on the server by sending specifically crafted packets to 8090/tcp. Please note that an attacker needs to have network access to the Application Server in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.

Action-Not Available
Vendor-Siemens AG
Product-sppa-t3000_application_serverSPPA-T3000 Application Server
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2019-18286
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-5.3||MEDIUM
EPSS-0.33% / 55.85%
||
7 Day CHG~0.00%
Published-12 Dec, 2019 | 19:08
Updated-05 Aug, 2024 | 01:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SPPA-T3000 Application Server (All versions < Service Pack R8.2 SP2). The Application Server exposes directory listings and files containing sensitive information. This vulnerability is independent from CVE-2019-18287. Please note that an attacker needs to have access to the Application Highway in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.

Action-Not Available
Vendor-Siemens AG
Product-sppa-t3000_application_serverSPPA-T3000 Application Server
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2019-18334
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-5.3||MEDIUM
EPSS-0.17% / 37.65%
||
7 Day CHG~0.00%
Published-12 Dec, 2019 | 19:08
Updated-05 Aug, 2024 | 01:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SPPA-T3000 Application Server (All versions < Service Pack R8.2 SP2). An attacker with network access to the Application Server could be able to enumerate valid user names by sending specifically crafted packets to 8090/tcp. Please note that an attacker needs to have network access to the Application Server in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.

Action-Not Available
Vendor-Siemens AG
Product-sppa-t3000_application_serverSPPA-T3000 Application Server
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2019-18341
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-5.3||MEDIUM
EPSS-0.06% / 19.99%
||
7 Day CHG~0.00%
Published-12 Dec, 2019 | 19:08
Updated-05 Aug, 2024 | 01:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in Control Center Server (CCS) (All versions < V1.5.0). The SFTP service (default port 22/tcp) of the Control Center Server (CCS) contains an authentication bypass vulnerability. A remote attacker with network access to the CCS server could exploit this vulnerability to read data from the EDIR directory (for example, the list of all configured stations).

Action-Not Available
Vendor-Siemens AG
Product-sinvr_3_video_serversinvr_3_central_control_serverControl Center Server (CCS)
CWE ID-CWE-287
Improper Authentication
CVE-2019-18331
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-5.3||MEDIUM
EPSS-0.17% / 37.65%
||
7 Day CHG~0.00%
Published-12 Dec, 2019 | 19:08
Updated-05 Aug, 2024 | 01:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SPPA-T3000 Application Server (All versions < Service Pack R8.2 SP2). An attacker with network access to the Application Server could gain access to path and filenames on the server by sending specifically crafted packets to 1099/tcp. Please note that an attacker needs to have network access to the Application Server in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.

Action-Not Available
Vendor-Siemens AG
Product-sppa-t3000_application_serverSPPA-T3000 Application Server
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2019-18287
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-5.3||MEDIUM
EPSS-0.33% / 55.85%
||
7 Day CHG~0.00%
Published-12 Dec, 2019 | 19:08
Updated-05 Aug, 2024 | 01:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SPPA-T3000 Application Server (All versions < Service Pack R8.2 SP2). The Application Server exposes directory listings and files containing sensitive information. This vulnerability is independent from CVE-2019-18286. Please note that an attacker needs to have access to the Application Highway in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.

Action-Not Available
Vendor-Siemens AG
Product-sppa-t3000_application_serverSPPA-T3000 Application Server
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2019-18335
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-5.3||MEDIUM
EPSS-0.17% / 37.65%
||
7 Day CHG~0.00%
Published-12 Dec, 2019 | 19:08
Updated-05 Aug, 2024 | 01:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SPPA-T3000 Application Server (All versions < Service Pack R8.2 SP2). An attacker with network access to the Application Server could be able to gain access to logs and configuration files by sending specifically crafted packets to 80/tcp. Please note that an attacker needs to have network access to the Application Server in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.

Action-Not Available
Vendor-Siemens AG
Product-sppa-t3000_application_serverSPPA-T3000 Application Server
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2022-46354
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-5.3||MEDIUM
EPSS-0.31% / 54.07%
||
7 Day CHG~0.00%
Published-13 Dec, 2022 | 00:00
Updated-22 Apr, 2025 | 15:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SCALANCE X204RNA (HSR) (All versions < V3.2.7), SCALANCE X204RNA (PRP) (All versions < V3.2.7), SCALANCE X204RNA EEC (HSR) (All versions < V3.2.7), SCALANCE X204RNA EEC (PRP) (All versions < V3.2.7), SCALANCE X204RNA EEC (PRP/HSR) (All versions < V3.2.7). The webserver of an affected device is missing specific security headers. This could allow an remote attacker to extract confidential session information under certain circumstances.

Action-Not Available
Vendor-Siemens AG
Product-6gk5204-0ba00-2mb26gk5204-0ba00-2kb26gk5204-0bs00-3pa36gk5204-0bs00-3pa3_firmware6gk5204-0ba00-2kb2_firmware6gk5204-0bs00-2na3_firmware6gk5204-0bs00-3la36gk5204-0bs00-3la3_firmware6gk5204-0bs00-2na36gk5204-0ba00-2mb2_firmwareSCALANCE X204RNA (HSR)SCALANCE X204RNA EEC (PRP/HSR)SCALANCE X204RNA EEC (HSR)SCALANCE X204RNA EEC (PRP)SCALANCE X204RNA (PRP)
CWE ID-CWE-284
Improper Access Control
CVE-2022-42892
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-5.3||MEDIUM
EPSS-0.27% / 50.45%
||
7 Day CHG~0.00%
Published-17 Nov, 2022 | 00:00
Updated-30 Apr, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in syngo Dynamics (All versions < VA40G HF01). syngo Dynamics application server hosts a web service using an operation with improper write access control that could allow directory listing in any folder accessible to the account assigned to the website’s application pool.

Action-Not Available
Vendor-Siemens AG
Product-syngo_dynamics_cardiovascular_imaging_and_information_systemsyngo Dynamics
CWE ID-CWE-23
Relative Path Traversal
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2022-36363
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-5.3||MEDIUM
EPSS-0.26% / 49.74%
||
7 Day CHG~0.00%
Published-11 Oct, 2022 | 00:00
Updated-08 Oct, 2024 | 08:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in LOGO! 12/24RCE (6ED1052-1MD08-0BA1) (All versions), LOGO! 12/24RCEo (6ED1052-2MD08-0BA1) (All versions), LOGO! 230RCE (6ED1052-1FB08-0BA1) (All versions), LOGO! 230RCEo (6ED1052-2FB08-0BA1) (All versions), LOGO! 24CE (6ED1052-1CC08-0BA1) (All versions), LOGO! 24CEo (6ED1052-2CC08-0BA1) (All versions), LOGO! 24RCE (6ED1052-1HB08-0BA1) (All versions), LOGO! 24RCEo (6ED1052-2HB08-0BA1) (All versions), SIPLUS LOGO! 12/24RCE (6AG1052-1MD08-7BA1) (All versions), SIPLUS LOGO! 12/24RCEo (6AG1052-2MD08-7BA1) (All versions), SIPLUS LOGO! 230RCE (6AG1052-1FB08-7BA1) (All versions), SIPLUS LOGO! 230RCEo (6AG1052-2FB08-7BA1) (All versions), SIPLUS LOGO! 24CE (6AG1052-1CC08-7BA1) (All versions), SIPLUS LOGO! 24CEo (6AG1052-2CC08-7BA1) (All versions), SIPLUS LOGO! 24RCE (6AG1052-1HB08-7BA1) (All versions), SIPLUS LOGO! 24RCEo (6AG1052-2HB08-7BA1) (All versions). Affected devices do not properly validate an offset value which can be defined in TCP packets when calling a method. This could allow an attacker to retrieve parts of the content of the memory.

Action-Not Available
Vendor-Siemens AG
Product-logo\!8_bm_fs-05logo\!8_bm_fs-05_firmwarelogo\!_8_bm_firmwarelogo\!8_bmLOGO! 230RCEoSIPLUS LOGO! 24CEoLOGO! 12/24RCELOGO! 24RCEoSIPLUS LOGO! 12/24RCEoLOGO! 24CEoSIPLUS LOGO! 24RCEoLOGO! 24RCESIPLUS LOGO! 24CELOGO! 12/24RCEoLOGO! 230RCESIPLUS LOGO! 230RCEoLOGO! 24CESIPLUS LOGO! 24RCESIPLUS LOGO! 12/24RCESIPLUS LOGO! 230RCE
CWE ID-CWE-1285
Improper Validation of Specified Index, Position, or Offset in Input
CWE ID-CWE-20
Improper Input Validation
CVE-2022-32258
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-5.3||MEDIUM
EPSS-0.26% / 49.79%
||
7 Day CHG~0.00%
Published-14 Jun, 2022 | 09:22
Updated-03 Aug, 2024 | 07:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.1). The affected application contains an older feature that allows to import device configurations via a specific endpoint. An attacker could use this vulnerability for information disclosure.

Action-Not Available
Vendor-Siemens AG
Product-sinema_remote_connect_serverSINEMA Remote Connect Serversinema_remote_connect_server
CWE ID-CWE-448
Obsolete Feature in UI
CVE-2022-29881
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-6.9||MEDIUM
EPSS-1.09% / 78.02%
||
7 Day CHG~0.00%
Published-10 May, 2022 | 09:47
Updated-09 Dec, 2025 | 16:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SICAM T (All versions < V3.0). The web based management interface of affected devices does not employ special access protection for certain internal developer views. This could allow unauthenticated users to extract internal configuration details.

Action-Not Available
Vendor-Siemens AG
Product-7kg8551-0aa12-0aa0_firmware7kg8550-0aa10-2aa07kg8501-0aa31-2aa07kg8500-0aa30-2aa07kg8551-0aa32-2aa07kg8551-0aa01-0aa0_firmware7kg8551-0aa12-2aa0_firmware7kg8550-0aa30-2aa07kg8501-0aa32-0aa07kg8551-0aa02-0aa07kg8501-0aa31-0aa07kg8501-0aa12-0aa0_firmware7kg8500-0aa30-0aa0_firmware7kg8501-0aa01-2aa0_firmware7kg8551-0aa12-0aa07kg8501-0aa02-0aa0_firmware7kg8551-0aa31-2aa0_firmware7kg8551-0aa32-0aa07kg8551-0aa02-2aa0_firmware7kg8501-0aa11-0aa07kg8551-0aa01-2aa07kg8500-0aa00-2aa07kg8551-0aa31-0aa0_firmware7kg8501-0aa01-0aa0_firmware7kg8551-0aa11-2aa0_firmware7kg8500-0aa30-0aa07kg8501-0aa11-0aa0_firmware7kg8500-0aa10-0aa07kg8550-0aa00-0aa07kg8500-0aa00-2aa0_firmware7kg8501-0aa32-2aa07kg8500-0aa00-0aa0_firmware7kg8501-0aa31-2aa0_firmware7kg8550-0aa30-2aa0_firmware7kg8551-0aa02-0aa0_firmware7kg8550-0aa00-2aa0_firmware7kg8501-0aa12-2aa07kg8551-0aa11-0aa07kg8501-0aa12-2aa0_firmware7kg8550-0aa30-0aa07kg8501-0aa11-2aa0_firmware7kg8501-0aa02-0aa07kg8551-0aa31-2aa07kg8551-0aa31-0aa07kg8500-0aa10-0aa0_firmware7kg8551-0aa12-2aa07kg8551-0aa11-2aa07kg8501-0aa11-2aa07kg8501-0aa32-2aa0_firmware7kg8500-0aa00-0aa07kg8551-0aa01-2aa0_firmware7kg8551-0aa32-2aa0_firmware7kg8550-0aa00-2aa07kg8550-0aa30-0aa0_firmware7kg8500-0aa30-2aa0_firmware7kg8551-0aa01-0aa07kg8550-0aa10-0aa07kg8500-0aa10-2aa07kg8501-0aa12-0aa07kg8550-0aa00-0aa0_firmware7kg8500-0aa10-2aa0_firmware7kg8501-0aa02-2aa07kg8551-0aa11-0aa0_firmware7kg8550-0aa10-0aa0_firmware7kg8551-0aa02-2aa07kg8551-0aa32-0aa0_firmware7kg8501-0aa01-2aa07kg8501-0aa02-2aa0_firmware7kg8501-0aa32-0aa0_firmware7kg8501-0aa31-0aa0_firmware7kg8501-0aa01-0aa07kg8550-0aa10-2aa0_firmwareSICAM T
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-41682
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-6.9||MEDIUM
EPSS-0.99% / 76.94%
||
7 Day CHG~0.00%
Published-13 Aug, 2024 | 07:54
Updated-14 Aug, 2024 | 18:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in Location Intelligence family (All versions < V4.4). Affected products do not properly enforce restriction of excessive authentication attempts. This could allow an unauthenticated remote attacker to conduct brute force attacks against legitimate user passwords.

Action-Not Available
Vendor-Siemens AG
Product-location_intelligenceLocation Intelligence family
CWE ID-CWE-307
Improper Restriction of Excessive Authentication Attempts
CVE-2024-52285
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-6.9||MEDIUM
EPSS-0.05% / 16.81%
||
7 Day CHG~0.00%
Published-11 Mar, 2025 | 09:47
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SiPass integrated AC5102 (ACC-G2) (All versions < V6.4.8), SiPass integrated ACC-AP (All versions < V6.4.8). Affected devices expose several MQTT URLs without authentication. This could allow an unauthenticated remote attacker to access sensitive data.

Action-Not Available
Vendor-Siemens AG
Product-SiPass integrated ACC-APSiPass integrated AC5102 (ACC-G2)
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-52334
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-6.3||MEDIUM
EPSS-0.02% / 3.31%
||
7 Day CHG~0.00%
Published-10 Feb, 2026 | 09:58
Updated-10 Feb, 2026 | 19:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in syngo.plaza VB30E (All versions < VB30E_HF07). The affected application does not encrypt the passwords properly. This could allow an attacker to recover the original passwords and might gain unauthorized access.

Action-Not Available
Vendor-Siemens AG
Product-syngo.plaza VB30E
CWE ID-CWE-261
Weak Encoding for Password
CVE-2023-43623
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-5.3||MEDIUM
EPSS-0.23% / 45.82%
||
7 Day CHG~0.00%
Published-10 Oct, 2023 | 10:21
Updated-18 Sep, 2024 | 18:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in Mendix Forgot Password (Mendix 10 compatible) (All versions < V5.4.0), Mendix Forgot Password (Mendix 7 compatible) (All versions < V3.7.3), Mendix Forgot Password (Mendix 8 compatible) (All versions < V4.1.3), Mendix Forgot Password (Mendix 9 compatible) (All versions < V5.4.0). Applications using the affected module are vulnerable to user enumeration due to distinguishable responses. This could allow an unauthenticated remote attacker to determine if a user is valid or not, enabling a brute force attack with valid users.

Action-Not Available
Vendor-mendixSiemens AG
Product-forgot_passwordMendix Forgot Password (Mendix 8 compatible)Mendix Forgot Password (Mendix 10 compatible)Mendix Forgot Password (Mendix 9 compatible)Mendix Forgot Password (Mendix 7 compatible)
CWE ID-CWE-203
Observable Discrepancy
CVE-2024-51447
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-6.9||MEDIUM
EPSS-0.17% / 38.24%
||
7 Day CHG~0.00%
Published-13 May, 2025 | 09:38
Updated-22 Aug, 2025 | 20:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in Polarion V2310 (All versions), Polarion V2404 (All versions < V2404.2). The login implementation of the affected application contains an observable response discrepancy vulnerability when validating usernames. This could allow an unauthenticated remote attacker to distinguish between valid and invalid usernames.

Action-Not Available
Vendor-Siemens AG
Product-polarion_almPolarion V2404Polarion V2310
CWE ID-CWE-204
Observable Response Discrepancy
CVE-2021-37175
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-5.3||MEDIUM
EPSS-0.24% / 46.43%
||
7 Day CHG~0.00%
Published-14 Sep, 2021 | 10:47
Updated-04 Aug, 2024 | 01:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.14.1), RUGGEDCOM ROX RX1400 (All versions < V2.14.1), RUGGEDCOM ROX RX1500 (All versions < V2.14.1), RUGGEDCOM ROX RX1501 (All versions < V2.14.1), RUGGEDCOM ROX RX1510 (All versions < V2.14.1), RUGGEDCOM ROX RX1511 (All versions < V2.14.1), RUGGEDCOM ROX RX1512 (All versions < V2.14.1), RUGGEDCOM ROX RX1524 (All versions < V2.14.1), RUGGEDCOM ROX RX1536 (All versions < V2.14.1), RUGGEDCOM ROX RX5000 (All versions < V2.14.1). The affected devices do not properly handle permissions to traverse the file system. If exploited, an attacker could gain access to an overview of the complete file system on the affected devices.

Action-Not Available
Vendor-Siemens AG
Product-ruggedcom_rox_rx1511ruggedcom_rox_rx1512ruggedcom_rox_mx5000_firmwareruggedcom_rox_rx5000_firmwareruggedcom_rox_rx1511_firmwareruggedcom_rox_rx1510ruggedcom_rox_rx1400_firmwareruggedcom_rox_rx1500_firmwareruggedcom_rox_rx1400ruggedcom_rox_rx1510_firmwareruggedcom_rox_rx1500ruggedcom_rox_rx1524_firmwareruggedcom_rox_rx5000ruggedcom_rox_rx1501ruggedcom_rox_rx1536ruggedcom_rox_mx5000ruggedcom_rox_rx1524ruggedcom_rox_rx1536_firmwareruggedcom_rox_rx1501_firmwareruggedcom_rox_rx1512_firmwareRUGGEDCOM ROX RX1511RUGGEDCOM ROX RX1536RUGGEDCOM ROX RX1400RUGGEDCOM ROX RX1500RUGGEDCOM ROX RX1501RUGGEDCOM ROX RX5000RUGGEDCOM ROX MX5000RUGGEDCOM ROX RX1524RUGGEDCOM ROX RX1510RUGGEDCOM ROX RX1512
CWE ID-CWE-280
Improper Handling of Insufficient Permissions or Privileges
CWE ID-CWE-755
Improper Handling of Exceptional Conditions
CVE-2021-33711
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-5.3||MEDIUM
EPSS-0.24% / 46.85%
||
7 Day CHG~0.00%
Published-13 Jul, 2021 | 11:03
Updated-03 Aug, 2024 | 23:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in Teamcenter Active Workspace V4 (All versions < V4.3.9), Teamcenter Active Workspace V5.0 (All versions < V5.0.7), Teamcenter Active Workspace V5.1 (All versions < V5.1.4). The affected application allows verbose error messages which allow leaking of sensitive information, such as full paths.

Action-Not Available
Vendor-Siemens AG
Product-teamcenter_active_workspaceTeamcenter Active Workspace V4Teamcenter Active Workspace V5.0Teamcenter Active Workspace V5.1
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CVE-2024-46889
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-6.9||MEDIUM
EPSS-0.41% / 61.58%
||
7 Day CHG~0.00%
Published-12 Nov, 2024 | 12:49
Updated-13 Nov, 2024 | 23:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SINEC INS (All versions < V1.0 SP2 Update 3). The affected application uses hard-coded cryptographic key material to obfuscate configuration files. This could allow an attacker to learn that cryptographic key material through reverse engineering of the application binary and decrypt arbitrary backup files.

Action-Not Available
Vendor-Siemens AG
Product-sinec_insSINEC INSsinec_ins
CWE ID-CWE-321
Use of Hard-coded Cryptographic Key
CVE-2025-40806
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-6.9||MEDIUM
EPSS-0.06% / 17.62%
||
7 Day CHG~0.00%
Published-09 Dec, 2025 | 10:44
Updated-02 Jan, 2026 | 21:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in Gridscale X Prepay (All versions < V4.2.1). The affected application is vulnerable to user enumeration due to distinguishable responses. This could allow an unauthenticated remote attacker to determine if a user is valid or not, enabling a brute force attack with valid users.

Action-Not Available
Vendor-Siemens AG
Product-gridscale_x_prepayGridscale X Prepay
CWE ID-CWE-204
Observable Response Discrepancy
CVE-2020-28397
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-5.3||MEDIUM
EPSS-0.18% / 40.04%
||
7 Day CHG~0.00%
Published-10 Aug, 2021 | 10:35
Updated-04 Aug, 2024 | 16:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SIMATIC Drive Controller family (All versions < V2.9.2), SIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants) (All versions < V21.9), SIMATIC S7 PLCSIM Advanced (All versions > V2 < V4), SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (Version V4.4), SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants) (All versions > V2.5 < V2.9.2), SIMATIC S7-1500 Software Controller (All versions > V2.5 < V21.9), TIM 1531 IRC (incl. SIPLUS NET variants) (Version V2.1). Due to an incorrect authorization check in the affected component, an attacker could extract information about access protected PLC program variables over port 102/tcp from an affected device when reading multiple attributes at once.

Action-Not Available
Vendor-Siemens AG
Product-cpu_1517t-3_pn\/dpsiplus_cpu_1511f-1_pnsimatic_s7_plcsim_advancedcpu_1513pro_f-2_pn_firmwarecpu_1512sp-1_pncpu_1513r-1_pn_firmwarecpu_1516pro_f-2_pn_firmwarecpu_1515tf-2_pncpu_1212fccpu_1215c_firmwaresiplus_cpu_1511f-1_pn_firmwaresiplus_cpu_1510sp_f-1pn_firmwarecpu_1511tf-1pncpu_1212fc_firmwarecpu_1515sp_pc2_tf_firmwarecpu_1513f-1_pncpu_1517f-3_pn\/dp_firmwarecpu_1515f-2_firmwaretim_1531_irccpu_1515-2cpu_1507d_tf_firmwarecpu_1515sp_pc2_tfcpu_1211ccpu_1517f-3_pn\/dpsiplus_cpu-1516f-3_pn\/dpcpu_1217ccpu_1513f-1_pn_firmwarecpu_1516tf-3_pn\/dpcpu_1215fccpu_1510sp-1pn_firmwarecpu_1214fc_firmwarecpu_1517tf-3_pn\/dp_firmwarecpu_1516t-3_pn\/dp_firmwarecpu_1215ccpu_1518f-4_pn\/dp_firmwaresiplus_cpu_1512sp-1_pn_firmwarecpu_1517-3_pn\/dpsiplus_cpu_1518f-4_pn\/dp_firmwarecpu_1511f-1pncpu_1516f-3_firmwarecpu_1516pro-2_pn_firmwarecpu_1504d_tf_firmwaresiplus_cpu_1516-3_pn\/dp_firmwaresiplus_cpu_1513-1_pncpu_1518f-4_pn\/dpcpu_1516t-3_pn\/dpsiplus_cpu_1513-1_pn_firmwarecpu_1510sp-1pncpu_1217c_firmwarecpu_1211c_firmwarecpu_1513-1_pncpu_1512sp_f-1_pnsimatic_s7-1500_software_controllercpu_1518-4_pn\/dpsiplus_cpu_1518-4_pn\/dpcpu_1512sp_f-1_pn_firmwarecpu_1513pro_f-2_pnsiplus_cpu_1510sp_f-1pncpu_1214c_firmwaresiplus_cpu_1512sp_f-1pnsiplus_cpu_1513f-1_pncpu_1511t-1pncpu_1511f-1pn_firmwarecpu_1515r-2_pn_firmwarecpu_1512sp-1_pn_firmwarecpu_1515f-2cpu_1214ccpu_1517t-3_pn\/dp_firmwaresiplus_cpu_1512sp-1_pncpu_1517-3_pn\/dp_firmwaresiplus_cpu_1513f-1_pn_firmwarecpu_1516pro-2_pncpu_1516tf-3_pn\/dp_firmwaresiplus_cpu_1516-3_pn\/dpcpu_1513-1_pn_firmwarecpu_1515tf-2_pn_firmwaretim_1531_irc_firmwaresiplus_cpu_1518f-4_pn\/dpcpu_1512c-1_pncpu_1507d_tfcpu_1511t-1pn_firmwarecpu1510sp_f-1_firmwarecpu_1515r-2_pncpu_1214fccpu_1516f-3cpu_1511c-1_pn_firmwarecpu_1513r-1_pncpu_1516-3simatic_s7_plcsim_advanced_firmwarecpu_1515-2_firmwarecpu_1215fc_firmwarecpu_1511-1pn_firmwarecpu_1511c-1_pnsiplus_cpu_1511-1_pn_firmwarecpu1510sp_f-1cpu_1516pro_f-2_pnsiplus_cpu_1518-4_pn\/dp_firmwarecpu_1504d_tfcpu_1517tf-3_pn\/dpcpu_1511-1pncpu_1212ccpu_1515t-2_pnsiplus_cpu-1516f-3_pn\/dp_firmwarecpu_1512c-1_pn_firmwaresiplus_cpu_1511-1_pnsiplus_cpu_1512sp_f-1pn_firmwarecpu_1515t-2_pn_firmwarecpu_1212c_firmwarecpu_1518-4_pn\/dp_firmwarecpu_1511tf-1pn_firmwarecpu_1516-3_firmwareTIM 1531 IRC (incl. SIPLUS NET variants)SIMATIC S7-1500 Software ControllerSIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)SIMATIC Drive Controller familySIMATIC S7-1200 CPU family (incl. SIPLUS variants)SIMATIC S7-1500 CPU family (incl. related ET200 CPUs and SIPLUS variants)SIMATIC S7 PLCSIM Advanced
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-41683
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-6.9||MEDIUM
EPSS-0.41% / 61.16%
||
7 Day CHG~0.00%
Published-13 Aug, 2024 | 07:54
Updated-14 Aug, 2024 | 18:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in Location Intelligence family (All versions < V4.4). Affected products do not properly enforce a strong user password policy. This could facilitate a brute force attack against legitimate user passwords.

Action-Not Available
Vendor-Siemens AG
Product-location_intelligenceLocation Intelligence familylocation_intelligence_family
CWE ID-CWE-521
Weak Password Requirements
CVE-2024-27947
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-5.3||MEDIUM
EPSS-0.41% / 61.49%
||
7 Day CHG~0.00%
Published-14 May, 2024 | 10:02
Updated-06 Feb, 2025 | 18:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in RUGGEDCOM CROSSBOW (All versions < V5.5). The affected systems could allow log messages to be forwarded to a specific client under certain circumstances. An attacker could leverage this vulnerability to forward log messages to a specific compromised client.

Action-Not Available
Vendor-Siemens AG
Product-ruggedcom_crossbowRUGGEDCOM CROSSBOWruggedcom_crossbow
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2025-40757
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-6.3||MEDIUM
EPSS-0.04% / 11.28%
||
7 Day CHG-0.00%
Published-09 Sep, 2025 | 08:47
Updated-09 Sep, 2025 | 19:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in APOGEE PXC Series (BACnet) (All versions), APOGEE PXC Series (P2 Ethernet) (All versions), TALON TC Series (BACnet) (All versions). Affected devices connected to the network allow unrestricted access to sensitive files, such as databases. This could allow an attacker to download encrypted .db file containing passwords.

Action-Not Available
Vendor-Siemens AG
Product-APOGEE PXC Series (BACnet)TALON TC Series (BACnet)APOGEE PXC Series (P2 Ethernet)
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2025-30280
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-6.9||MEDIUM
EPSS-0.15% / 34.97%
||
7 Day CHG~0.00%
Published-08 Apr, 2025 | 08:22
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in Mendix Runtime V10 (All versions < V10.21.0), Mendix Runtime V10.12 (All versions < V10.12.16), Mendix Runtime V10.18 (All versions < V10.18.5), Mendix Runtime V10.6 (All versions < V10.6.22), Mendix Runtime V8 (All versions < V8.18.35), Mendix Runtime V9 (All versions < V9.24.34). Affected applications allow for entity enumeration due to distinguishable responses in certain client actions. This could allow an unauthenticated remote attacker to list all valid entities and attribute names of a Mendix Runtime-based application.

Action-Not Available
Vendor-Siemens AG
Product-Mendix Runtime V10.6Mendix Runtime V10.12Mendix Runtime V8Mendix Runtime V9Mendix Runtime V10.18Mendix Runtime V10
CWE ID-CWE-204
Observable Response Discrepancy
CVE-2023-49069
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-6.9||MEDIUM
EPSS-0.35% / 57.52%
||
7 Day CHG~0.00%
Published-10 Sep, 2024 | 09:36
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in Mendix Runtime V10 (All versions < V10.17.0 only if the basic authentication mechanism is used by the application), Mendix Runtime V10.12 (All versions < V10.12.11 only if the basic authentication mechanism is used by the application), Mendix Runtime V10.6 (All versions < V10.6.19 only if the basic authentication mechanism is used by the application), Mendix Runtime V8 (All versions < V8.18.33 only if the basic authentication mechanism is used by the application), Mendix Runtime V9 (All versions < V9.24.31 only if the basic authentication mechanism is used by the application). The authentication mechanism of affected applications contains an observable response discrepancy vulnerability when validating usernames. This could allow unauthenticated remote attackers to distinguish between valid and invalid usernames.

Action-Not Available
Vendor-Siemens AG
Product-Mendix Runtime V10.12Mendix Runtime V8Mendix Runtime V10.6Mendix Runtime V9Mendix Runtime V10mendix
CWE ID-CWE-204
Observable Response Discrepancy
CVE-2023-29106
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-5.3||MEDIUM
EPSS-0.59% / 69.24%
||
7 Day CHG~0.00%
Published-09 May, 2023 | 11:51
Updated-28 Jan, 2025 | 18:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SIMATIC Cloud Connect 7 CC712 (All versions >= V2.0 < V2.1), SIMATIC Cloud Connect 7 CC716 (All versions >= V2.0 < V2.1). The export endpoint is accessible via REST API without authentication. This could allow an unauthenticated remote attacker to download the files available via the endpoint.

Action-Not Available
Vendor-Siemens AG
Product-6gk1411-1ac00_firmware6gk1411-5ac00_firmware6gk1411-1ac006gk1411-5ac00SIMATIC Cloud Connect 7 CC716SIMATIC Cloud Connect 7 CC712
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2023-29107
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-5.3||MEDIUM
EPSS-0.43% / 62.50%
||
7 Day CHG~0.00%
Published-09 May, 2023 | 11:51
Updated-28 Jan, 2025 | 18:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SIMATIC Cloud Connect 7 CC712 (All versions >= V2.0 < V2.1), SIMATIC Cloud Connect 7 CC716 (All versions >= V2.0 < V2.1). The export endpoint discloses some undocumented files. This could allow an unauthenticated remote attacker to gain access to additional information resources.

Action-Not Available
Vendor-Siemens AG
Product-6gk1411-1ac00_firmware6gk1411-5ac00_firmware6gk1411-1ac006gk1411-5ac00SIMATIC Cloud Connect 7 CC716SIMATIC Cloud Connect 7 CC712
CWE ID-CWE-552
Files or Directories Accessible to External Parties
CVE-2022-32255
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-5.3||MEDIUM
EPSS-0.24% / 47.51%
||
7 Day CHG~0.00%
Published-14 Jun, 2022 | 09:22
Updated-03 Aug, 2024 | 07:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.1). The affected application consists of a web service that lacks proper access control for some of the endpoints. This could lead to unauthorized access to limited information.

Action-Not Available
Vendor-Siemens AG
Product-sinema_remote_connect_serverSINEMA Remote Connect Serversinema_remote_connect_server
CWE ID-CWE-284
Improper Access Control
CVE-2023-27464
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-5.3||MEDIUM
EPSS-0.36% / 58.57%
||
7 Day CHG+0.07%
Published-11 Apr, 2023 | 09:03
Updated-07 Feb, 2025 | 16:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in Mendix Forgot Password (Mendix 7 compatible) (All versions < V3.7.1), Mendix Forgot Password (Mendix 8 compatible) (All versions < V4.1.1), Mendix Forgot Password (Mendix 9 compatible) (All versions < V5.1.1). The affected versions of the module contain an observable response discrepancy issue that could allow an attacker to retrieve sensitive information.

Action-Not Available
Vendor-mendixSiemens AG
Product-forgot_passwordMendix Forgot Password (Mendix 7 compatible)Mendix Forgot Password (Mendix 8 compatible)Mendix Forgot Password (Mendix 9 compatible)
CWE ID-CWE-204
Observable Response Discrepancy
CWE ID-CWE-203
Observable Discrepancy
CVE-2019-18332
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-5.3||MEDIUM
EPSS-0.14% / 34.40%
||
7 Day CHG~0.00%
Published-12 Dec, 2019 | 19:08
Updated-05 Aug, 2024 | 01:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SPPA-T3000 Application Server (All versions < Service Pack R8.2 SP2). An attacker with network access to the Application Server could gain access to directory listings of the server by sending specifically crafted packets to 80/tcp, 8095/tcp or 8080/tcp. Please note that an attacker needs to have network access to the Application Server in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.

Action-Not Available
Vendor-Siemens AG
Product-sppa-t3000_application_serverSPPA-T3000 Application Server
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-287
Improper Authentication
CVE-2023-37482
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-6.9||MEDIUM
EPSS-0.13% / 32.90%
||
7 Day CHG~0.00%
Published-11 Feb, 2025 | 10:26
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The login functionality of the web server in affected devices does not normalize the response times of login attempts. An unauthenticated remote attacker could exploit this side-channel information to distinguish between valid and invalid usernames.

Action-Not Available
Vendor-Siemens AG
Product-SIMATIC S7-1500 CPU 1513-1 PNSIPLUS S7-1200 CPU 1212C DC/DC/DC RAILSIPLUS S7-1200 CPU 1215 AC/DC/RLYSIMATIC S7-1500 CPU 1513pro-2 PNSIMATIC Drive Controller CPU 1504D TFSIMATIC S7-1500 CPU 1515F-2 PNSIMATIC ET 200SP CPU 1514SPT-2 PNSIMATIC S7-1200 CPU 1215C DC/DC/DCSIMATIC S7-1500 CPU 1516T-3 PN/DPSIMATIC S7-1500 CPU 1517F-3 PN/DPSIPLUS S7-1200 CPU 1214 DC/DC/DCSIMATIC S7-1500 CPU 1518F-4 PN/DPSIMATIC S7-1500 CPU 1518-4 PN/DP MFPSIMATIC S7-1500 CPU 1518F-4 PN/DP MFPSIMATIC S7-1500 CPU 1515TF-2 PNSIMATIC S7-1500 CPU 1515-2 PNSIMATIC S7-1200 CPU 1214C DC/DC/RlySIMATIC S7-1500 Software Controller CPU 1508S F V3SIMATIC S7-1200 CPU 1212C DC/DC/DCSIMATIC S7-1200 CPU 1215FC DC/DC/DCSIMATIC S7-1500 CPU 1516-3 PN/DPSIMATIC S7-1500 CPU 1518-4 PN/DPSIMATIC ET 200SP CPU 1514SP-2 PNSIMATIC S7-1200 CPU 1212FC DC/DC/RlySIMATIC S7-1500 CPU 1517T-3 PN/DPSIMATIC S7-1200 CPU 1214C DC/DC/DCSIPLUS S7-1500 CPU 1517H-3 PNSIMATIC S7-1500 Software Controller Linux V3SIPLUS S7-1500 CPU 1518-4 PN/DP MFPSIMATIC S7-1200 CPU 1211C DC/DC/RlySIMATIC S7-1500 CPU 1517-3 PN/DPSIMATIC S7-1500 CPU 1513F-1 PNSIPLUS S7-1200 CPU 1212 DC/DC/RLYSIMATIC ET 200SP CPU 1514SPT F-2 PNSIMATIC S7-PLCSIM AdvancedSIMATIC S7-1200 CPU 1214FC DC/DC/RlySIMATIC Drive Controller CPU 1507D TFSIMATIC S7-1500 Software Controller CPU 1508S TF V3SIPLUS S7-1200 CPU 1214FC DC/DC/DCSIMATIC S7-1500 CPU 1511C-1 PNSIMATIC S7-1500 CPU 1513pro F-2 PNSIMATIC ET 200SP CPU 1512SP-1 PNSIMATIC S7-1500 CPU 1517TF-3 PN/DPSIPLUS S7-1200 CPU 1212C DC/DC/DCSIMATIC ET 200SP CPU 1510SP F-1 PNSIPLUS S7-1500 CPU 1518F-4 PN/DPSIMATIC S7-1500 CPU 1511TF-1 PNSIMATIC S7-1200 CPU 1212C AC/DC/RlySIMATIC S7-1500 CPU 1516pro F-2 PNSIMATIC S7-1200 CPU 1215C DC/DC/RlySIMATIC S7-1500 Software Controller CPU 1507S V3SIMATIC S7-1500 Software Controller CPU 1508S V3SIPLUS S7-1500 CPU 1518-4 PN/DPSIMATIC S7-1500 CPU 1516pro-2 PNSIMATIC S7-1200 CPU 1211C DC/DC/DCSIMATIC S7-1500 CPU 1511-1 PNSIMATIC S7-1500 CPU 1511T-1 PNSIMATIC S7-1500 CPU 1516TF-3 PN/DPSIPLUS S7-1500 CPU 1518HF-4 PNSIMATIC S7-1200 CPU 1211C AC/DC/RlySIMATIC S7-1500 CPU 1515R-2 PNSIPLUS S7-1200 CPU 1215C DC/DC/DCSIMATIC S7-1500 CPU 1518HF-4 PNSIMATIC S7-1500 CPU 1513R-1 PNSIMATIC S7-1200 CPU 1214C AC/DC/RlySIMATIC S7-1200 CPU 1215C AC/DC/RlySIMATIC ET 200SP CPU 1512SP F-1 PNSIMATIC S7-1200 CPU 1214FC DC/DC/DCSIMATIC ET 200SP Open Controller CPU 1515SP PC2 (incl. SIPLUS variants)SIMATIC ET 200SP CPU 1510SP-1 PNSIPLUS S7-1200 CPU 1214 DC/DC/RLYSIMATIC ET 200SP CPU 1514SP F-2 PNSIPLUS S7-1200 CPU 1214FC DC/DC/RLYSIMATIC S7-1200 CPU 1217C DC/DC/DCSIMATIC S7-1500 CPU 1515T-2 PNSIPLUS S7-1200 CPU 1215FC DC/DC/DCSIPLUS S7-1200 CPU 1214 AC/DC/RLYSIPLUS S7-1200 CPU 1215 DC/DC/DCSIPLUS S7-1200 CPU 1212 AC/DC/RLYSIMATIC S7-1200 CPU 1212C DC/DC/RlySIPLUS S7-1200 CPU 1214C DC/DC/DC RAILSIMATIC S7-1500 CPU 1512C-1 PNSIMATIC S7-1500 CPU 1518TF-4 PN/DPSIMATIC S7-1200 CPU 1212FC DC/DC/DCSIMATIC S7-1500 CPU 1517H-3 PNSIMATIC S7-1500 Software Controller CPU 1508S T V3SIPLUS S7-1200 CPU 1215 DC/DC/RLYSIMATIC S7-1500 Software Controller CPU 1507S F V3SIMATIC S7-1500 CPU 1516F-3 PN/DPSIMATIC S7-1200 CPU 1215FC DC/DC/RlySIMATIC S7-1500 CPU 1511F-1 PNSIMATIC S7-1500 CPU 1518T-4 PN/DP
CWE ID-CWE-203
Observable Discrepancy
CVE-2021-46304
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-5.3||MEDIUM
EPSS-0.33% / 55.89%
||
7 Day CHG~0.00%
Published-10 Aug, 2022 | 11:17
Updated-20 Oct, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in CP-8000 MASTER MODULE WITH I/O -25/+70°C (All versions), CP-8000 MASTER MODULE WITH I/O -40/+70°C (All versions), CP-8021 MASTER MODULE (All versions), CP-8022 MASTER MODULE WITH GPRS (All versions). The component allows to activate a web server module which provides unauthenticated access to its web pages. This could allow an attacker to retrieve debug-level information from the component such as internal network topology or connected systems.

Action-Not Available
Vendor-Siemens AG
Product-cp-8022_master_module_with_gprs_firmwarecp-8021_master_modulecp-8000_master_module_with_i\/o_-40\/\+70_firmwarecp-8000_master_module_with_i\/o_-25\/\+70cp-8021_master_module_firmwarecp-8022_master_module_with_gprscp-8000_master_module_with_i\/o_-25\/\+70_firmwarecp-8000_master_module_with_i\/o_-40\/\+70CP-8022 MASTER MODULE WITH GPRSCP-8000 MASTER MODULE WITH I/O -25/+70°CCP-8021 MASTER MODULECP-8000 MASTER MODULE WITH I/O -40/+70°C
CWE ID-CWE-284
Improper Access Control
CVE-2019-10941
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-5.3||MEDIUM
EPSS-0.18% / 40.18%
||
7 Day CHG~0.00%
Published-14 Sep, 2021 | 10:47
Updated-04 Aug, 2024 | 22:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SINEMA Server (All versions < V14 SP3). Missing authentication for functionality that requires administrative user identity could allow an attacker to obtain encoded system configuration backup files. This is only possible through network access to the affected system, and successful exploitation requires no system privileges.

Action-Not Available
Vendor-Siemens AG
Product-sinema_serverSINEMA Server
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2022-24043
Matching Score-8
Assigner-Siemens
ShareView Details
Matching Score-8
Assigner-Siemens
CVSS Score-5.3||MEDIUM
EPSS-0.67% / 71.38%
||
7 Day CHG~0.00%
Published-10 May, 2022 | 09:46
Updated-03 Aug, 2024 | 03:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in Desigo DXR2 (All versions < V01.21.142.5-22), Desigo PXC3 (All versions < V01.21.142.4-18), Desigo PXC4 (All versions < V02.20.142.10-10884), Desigo PXC5 (All versions < V02.20.142.10-10884). The login functionality of the application fails to normalize the response times of login attempts performed with wrong usernames with the ones executed with correct usernames. A remote unauthenticated attacker could exploit this side-channel information to perform a username enumeration attack and identify valid usernames.

Action-Not Available
Vendor-Siemens AG
Product-desigo_dxr2desigo_pxc3_firmwaredesigo_pxc4desigo_dxr2_firmwaredesigo_pxc5_firmwaredesigo_pxc4_firmwaredesigo_pxc3desigo_pxc5Desigo PXC5Desigo PXC3Desigo DXR2Desigo PXC4
CWE ID-CWE-203
Observable Discrepancy
CVE-2025-40761
Matching Score-6
Assigner-Siemens
ShareView Details
Matching Score-6
Assigner-Siemens
CVSS Score-8.6||HIGH
EPSS-0.03% / 9.22%
||
7 Day CHG~0.00%
Published-12 Aug, 2025 | 11:17
Updated-12 Aug, 2025 | 18:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions), RUGGEDCOM ROX MX5000RE (All versions), RUGGEDCOM ROX RX1400 (All versions), RUGGEDCOM ROX RX1500 (All versions), RUGGEDCOM ROX RX1501 (All versions), RUGGEDCOM ROX RX1510 (All versions), RUGGEDCOM ROX RX1511 (All versions), RUGGEDCOM ROX RX1512 (All versions), RUGGEDCOM ROX RX1524 (All versions), RUGGEDCOM ROX RX1536 (All versions), RUGGEDCOM ROX RX5000 (All versions). Affected devices do not properly limit access through its Built-In-Self-Test (BIST) mode. This could allow an attacker with physical access to the serial interface to bypass authentication and get access to a root shell on the device.

Action-Not Available
Vendor-Siemens AG
Product-RUGGEDCOM ROX MX5000RUGGEDCOM ROX RX1501RUGGEDCOM ROX RX1510RUGGEDCOM ROX RX1524RUGGEDCOM ROX RX1400RUGGEDCOM ROX RX1511RUGGEDCOM ROX RX1500RUGGEDCOM ROX RX5000RUGGEDCOM ROX RX1512RUGGEDCOM ROX RX1536RUGGEDCOM ROX MX5000RE
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CVE-2025-40743
Matching Score-6
Assigner-Siemens
ShareView Details
Matching Score-6
Assigner-Siemens
CVSS Score-8.7||HIGH
EPSS-0.03% / 7.96%
||
7 Day CHG~0.00%
Published-12 Aug, 2025 | 11:17
Updated-13 Aug, 2025 | 20:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SINUMERIK 828D PPU.4 (All versions < V4.95 SP5), SINUMERIK 828D PPU.5 (All versions < V5.25 SP1), SINUMERIK 840D sl (All versions < V4.95 SP5), SINUMERIK MC (All versions < V1.25 SP1), SINUMERIK MC V1.15 (All versions < V1.15 SP5), SINUMERIK ONE (All versions < V6.25 SP1), SINUMERIK ONE V6.15 (All versions < V6.15 SP5). The affected application improperly validates authentication for its VNC access service, allowing access with insufficient password verification. This could allow an attacker to gain unauthorized remote access and potentially compromise system confidentiality, integrity, or availability.

Action-Not Available
Vendor-Siemens AG
Product-SINUMERIK 828D PPU.4SINUMERIK MCSINUMERIK ONESINUMERIK 840D slSINUMERIK ONE V6.15SINUMERIK MC V1.15SINUMERIK 828D PPU.5
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CVE-2025-40581
Matching Score-6
Assigner-Siemens
ShareView Details
Matching Score-6
Assigner-Siemens
CVSS Score-8.4||HIGH
EPSS-0.05% / 14.48%
||
7 Day CHG~0.00%
Published-13 May, 2025 | 09:39
Updated-04 Jun, 2025 | 16:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SCALANCE LPE9403 (6GK5998-3GS00-2AC2) (All versions with SINEMA Remote Connect Edge Client installed). Affected devices are vulnerable to an authentication bypass. This could allow a non-privileged local attacker to bypass the authentication of the SINEMA Remote Connect Edge Client, and to read and modify the configuration parameters.

Action-Not Available
Vendor-Siemens AG
Product-scalance_lpe9403scalance_lpe9403_firmwareSCALANCE LPE9403
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CVE-2020-10048
Matching Score-6
Assigner-Siemens
ShareView Details
Matching Score-6
Assigner-Siemens
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 17.81%
||
7 Day CHG~0.00%
Published-09 Feb, 2021 | 15:38
Updated-04 Aug, 2024 | 10:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SIMATIC PCS 7 (All versions), SIMATIC WinCC (All versions < V7.5 SP2). Due to an insecure password verification process, an attacker could bypass the password protection set on protected files, thus being granted access to the protected content, circumventing authentication.

Action-Not Available
Vendor-Siemens AG
Product-simatic_winccsimatic_pcs_7SIMATIC PCS 7SIMATIC WinCC
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CWE ID-CWE-287
Improper Authentication
CVE-2025-13980
Matching Score-4
Assigner-Drupal.org
ShareView Details
Matching Score-4
Assigner-Drupal.org
CVSS Score-5.3||MEDIUM
EPSS-0.05% / 16.22%
||
7 Day CHG~0.00%
Published-28 Jan, 2026 | 20:01
Updated-12 Feb, 2026 | 19:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
CKEditor 5 Premium Features - Moderately critical - Access bypass - SA-CONTRIB-2025-118

Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal CKEditor 5 Premium Features allows Functionality Bypass.This issue affects CKEditor 5 Premium Features: from 0.0.0 before 1.2.10, from 1.3.0 before 1.3.6, from 1.4.0 before 1.4.3, from 1.5.0 before 1.5.1, from 1.6.0 before 1.6.4.

Action-Not Available
Vendor-cksourceThe Drupal Association
Product-ckeditor_5_premium_featuresCKEditor 5 Premium Features
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CVE-2026-33315
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-6.9||MEDIUM
EPSS-0.11% / 29.80%
||
7 Day CHG+0.03%
Published-24 Mar, 2026 | 14:53
Updated-24 Mar, 2026 | 19:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Vikunja has a 2FA Bypass via Caldav Basic Auth

Vikunja is an open-source self-hosted task management platform. Prior to version 2.2.0, the Caldav endpoint allows login using Basic Authentication, which in turn allows users to bypass the TOTP on 2FA-enabled accounts. The user can then access standard project information that would normally be protected behind 2FA (if enabled), such as project name, description, etc. Version 2.2.0 patches the issue.

Action-Not Available
Vendor-vikunjago-vikunja
Product-vikunjavikunja
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CVE-2024-50334
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-8.7||HIGH
EPSS-10.11% / 93.11%
||
7 Day CHG~0.00%
Published-29 Oct, 2024 | 14:36
Updated-08 Nov, 2024 | 19:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Semicolon Path Injection on API /api;/config

Scoold is a Q&A and a knowledge sharing platform for teams. A semicolon path injection vulnerability was found on the /api;/config endpoint. By appending a semicolon in the URL, attackers can bypass authentication and gain unauthorised access to sensitive configuration data. Furthermore, PUT requests on the /api;/config endpoint while setting the Content-Type: application/hocon header allow unauthenticated attackers to file reading via HOCON file inclusion. This allows attackers to retrieve sensitive information such as configuration files from the server, which can be leveraged for further exploitation. The vulnerability has been fixed in Scoold 1.64.0. A workaround would be to disable the Scoold API with scoold.api_enabled = false.

Action-Not Available
Vendor-erudikaErudikaerudika
Product-scooldscooldscoold
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CVE-2025-4427
Matching Score-4
Assigner-Ivanti
ShareView Details
Matching Score-4
Assigner-Ivanti
CVSS Score-5.3||MEDIUM
EPSS-91.26% / 99.66%
||
7 Day CHG-0.33%
Published-13 May, 2025 | 15:45
Updated-26 Feb, 2026 | 18:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2025-06-09||Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Authentication Bypass

An authentication bypass in the API component of Ivanti Endpoint Manager Mobile 12.5.0.0 and prior allows attackers to access protected resources without proper credentials via the API.

Action-Not Available
Vendor-Ivanti Software
Product-endpoint_manager_mobileEndpoint Manager MobileEndpoint Manager Mobile (EPMM)
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CVE-2025-3652
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-6.9||MEDIUM
EPSS-0.05% / 15.44%
||
7 Day CHG~0.00%
Published-03 Jan, 2026 | 23:33
Updated-03 Feb, 2026 | 17:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Petlibro Smart Pet Feeder Platform through 1.7.31 Audio Information Disclosure via API endpoint

Petlibro Smart Pet Feeder Platform versions up to 1.7.31 contains an information disclosure vulnerability that allows unauthorized access to private audio recordings by exploiting sequential audio IDs and insecure assignment endpoints. Attackers can send requests to /device/deviceAudio/use with arbitrary audio IDs to assign recordings to any device, then retrieve audio URLs to access other users' private recordings.

Action-Not Available
Vendor-petlibroPetlibrio
Product-petlibroSmart Pet Feeder Platform
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CVE-2025-52338
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-0.11% / 29.81%
||
7 Day CHG~0.00%
Published-19 Aug, 2025 | 00:00
Updated-20 Aug, 2025 | 14:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in the default configuration of the password reset function in LogicData eCommerce Framework v5.0.9.7000 allows attackers to bypass authentication and compromise user accounts via a bruteforce attack.

Action-Not Available
Vendor-n/a
Product-n/a
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CVE-2021-4353
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-5.3||MEDIUM
EPSS-0.29% / 52.72%
||
7 Day CHG+0.01%
Published-20 Oct, 2023 | 06:35
Updated-08 Apr, 2026 | 18:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WooCommerce Dynamic Pricing and Discounts <= 2.4.1 - Unauthenticated Settings Import/Export

The WooCommerce Dynamic Pricing and Discounts plugin for WordPress is vulnerable to unauthenticated settings export in versions up to, and including, 2.4.1. This is due to missing authorization on the export() function which makes makes it possible for unauthenticated attackers to export the plugin's settings.

Action-Not Available
Vendor-rightpressRightPress
Product-woocommerce_dynamic_pricing_\&_discountsWooCommerce Dynamic Pricing and Discounts
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CWE ID-CWE-862
Missing Authorization
Details not found