Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2025-12476

Summary
Assigner-azure-access
Assigner Org ID-a0340c66-c385-4f8b-991b-3d05f6fd5220
Published At-29 Oct, 2025 | 16:31
Updated At-29 Oct, 2025 | 17:37
Rejected At-
Credits

Resource Lacking AuthN

Resource Lacking AuthN.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5 .

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:azure-access
Assigner Org ID:a0340c66-c385-4f8b-991b-3d05f6fd5220
Published At:29 Oct, 2025 | 16:31
Updated At:29 Oct, 2025 | 17:37
Rejected At:
▼CVE Numbering Authority (CNA)
Resource Lacking AuthN

Resource Lacking AuthN.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5 .

Affected Products
Vendor
Azure Access Technology
Product
BLU-IC2
Default Status
unaffected
Versions
Affected
  • From 0 through 1.19.5 (semver)
Vendor
Azure Access Technology
Product
BLU-IC4
Default Status
unaffected
Versions
Affected
  • From 0 through 1.19.5 (semver)
Problem Types
TypeCWE IDDescription
CWECWE-306CWE-306 Missing Authentication for Critical Function
Type: CWE
CWE ID: CWE-306
Description: CWE-306 Missing Authentication for Critical Function
Metrics
VersionBase scoreBase severityVector
4.010.0CRITICAL
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Version: 4.0
Base score: 10.0
Base severity: CRITICAL
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-36CAPEC-36 Using Unpublished Interfaces or Functionality
CAPEC ID: CAPEC-36
Description: CAPEC-36 Using Unpublished Interfaces or Functionality
Solutions

Configurations

Workarounds

Exploits

Credits

finder
Kevin Schaller
finder
Benjamin Lafois
finder
Alexi Bitsios
finder
Sebastian Toscano
finder
Dominik Schneider
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://azure-access.com/security-advisories
N/A
Hyperlink: https://azure-access.com/security-advisories
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:a0340c66-c385-4f8b-991b-3d05f6fd5220
Published At:29 Oct, 2025 | 17:15
Updated At:07 Nov, 2025 | 14:36

Resource Lacking AuthN.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5 .

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.010.0CRITICAL
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Primary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 4.0
Base score: 10.0
Base severity: CRITICAL
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Primary
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CPE Matches

azure-access
azure-access
>>blu-ic2_firmware>>Versions before 1.20(exclusive)
cpe:2.3:o:azure-access:blu-ic2_firmware:*:*:*:*:*:*:*:*
azure-access
azure-access
>>blu-ic2>>*
cpe:2.3:h:azure-access:blu-ic2:*:*:*:*:*:*:*:*
azure-access
azure-access
>>blu-ic4_firmware>>Versions before 1.20(exclusive)
cpe:2.3:o:azure-access:blu-ic4_firmware:*:*:*:*:*:*:*:*
azure-access
azure-access
>>blu-ic4>>*
cpe:2.3:h:azure-access:blu-ic4:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-306Secondarya0340c66-c385-4f8b-991b-3d05f6fd5220
CWE ID: CWE-306
Type: Secondary
Source: a0340c66-c385-4f8b-991b-3d05f6fd5220
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://azure-access.com/security-advisoriesa0340c66-c385-4f8b-991b-3d05f6fd5220
Vendor Advisory
Hyperlink: https://azure-access.com/security-advisories
Source: a0340c66-c385-4f8b-991b-3d05f6fd5220
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

560Records found

CVE-2021-29203
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-9.8||CRITICAL
EPSS-87.07% / 99.44%
||
7 Day CHG+0.29%
Published-06 May, 2021 | 20:17
Updated-03 Aug, 2024 | 22:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A security vulnerability has been identified in the HPE Edgeline Infrastructure Manager, also known as HPE Edgeline Infrastructure Management Software, prior to version 1.22. The vulnerability could be remotely exploited to bypass remote authentication leading to execution of arbitrary commands, gaining privileged access, causing denial of service, and changing the configuration. HPE has released a software update to resolve the vulnerability in the HPE Edgeline Infrastructure Manager.

Action-Not Available
Vendor-n/aHP Inc.
Product-edgeline_infrastructure_managerHPE Edgeline Infrastructure Management Software
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-40736
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-9.3||CRITICAL
EPSS-0.16% / 37.32%
||
7 Day CHG~0.00%
Published-08 Jul, 2025 | 10:34
Updated-21 Aug, 2025 | 15:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SINEC NMS (All versions < V4.0). The affected application exposes an endpoint that allows an unauthorized modification of administrative credentials. This could allow an unauthenticated attacker to reset the superadmin password and gain full control of the application (ZDI-CAN-26569).

Action-Not Available
Vendor-Siemens AG
Product-sinec_nmsSINEC NMS
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-40771
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-9.3||CRITICAL
EPSS-0.15% / 35.48%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 09:15
Updated-14 Oct, 2025 | 19:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SIMATIC CP 1542SP-1 (6GK7542-6UX00-0XE0) (All versions < V2.4.24), SIMATIC CP 1542SP-1 IRC (6GK7542-6VX00-0XE0) (All versions < V2.4.24), SIMATIC CP 1543SP-1 (6GK7543-6WX00-0XE0) (All versions < V2.4.24), SIPLUS ET 200SP CP 1542SP-1 IRC TX RAIL (6AG2542-6VX00-4XE0) (All versions < V2.4.24), SIPLUS ET 200SP CP 1543SP-1 ISEC (6AG1543-6WX00-7XE0) (All versions < V2.4.24), SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAIL (6AG2543-6WX00-4XE0) (All versions < V2.4.24). Affected devices do not properly authenticate configuration connections. This could allow an unauthenticated remote attacker to access the configuration data.

Action-Not Available
Vendor-Siemens AG
Product-SIPLUS ET 200SP CP 1542SP-1 IRC TX RAILSIMATIC CP 1543SP-1SIMATIC CP 1542SP-1SIPLUS ET 200SP CP 1543SP-1 ISEC TX RAILSIPLUS ET 200SP CP 1543SP-1 ISECSIMATIC CP 1542SP-1 IRC
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-40765
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-9.3||CRITICAL
EPSS-0.15% / 35.48%
||
7 Day CHG~0.00%
Published-14 Oct, 2025 | 09:15
Updated-21 Oct, 2025 | 14:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in TeleControl Server Basic V3.1 (All versions >= V3.1.2.2 < V3.1.2.3). The affected application contains an information disclosure vulnerability. This could allow an unauthenticated remote attacker to obtain password hashes of users and to login to and perform authenticated operations of the database service.

Action-Not Available
Vendor-Siemens AG
Product-telecontrol_server_basicTeleControl Server Basic V3.1
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-28913
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-2.83% / 85.98%
||
7 Day CHG~0.00%
Published-09 Sep, 2021 | 18:00
Updated-03 Aug, 2024 | 21:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

BAB TECHNOLOGIE GmbH eibPort V3 prior version 3.9.1 allow unauthenticated attackers access to /webif/SecurityModule to validate the so called and hard coded unique 'eibPort String' which acts as the root SSH key passphrase. This is usable and part of an attack chain to gain SSH root access.

Action-Not Available
Vendor-bab-technologien/a
Product-eibport_firmwareeibportn/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-28809
Matching Score-4
Assigner-QNAP Systems, Inc.
ShareView Details
Matching Score-4
Assigner-QNAP Systems, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.58% / 68.56%
||
7 Day CHG~0.00%
Published-08 Jul, 2021 | 07:40
Updated-17 Sep, 2024 | 00:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing Authentication for Critical Function in RTRR Server in HBS3

An improper access control vulnerability has been reported to affect certain legacy versions of HBS 3. If exploited, this vulnerability allows attackers to compromise the security of the operating system.QNAP have already fixed this vulnerability in the following versions of HBS 3: QTS 4.3.6: HBS 3 v3.0.210507 and later QTS 4.3.4: HBS 3 v3.0.210506 and later QTS 4.3.3: HBS 3 v3.0.210506 and later

Action-Not Available
Vendor-QNAP Systems, Inc.
Product-hybrid_backup_syncqtsHBS 3
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-749
Exposed Dangerous Method or Function
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-26637
Matching Score-4
Assigner-KrCERT/CC
ShareView Details
Matching Score-4
Assigner-KrCERT/CC
CVSS Score-8.8||HIGH
EPSS-0.98% / 76.59%
||
7 Day CHG~0.00%
Published-22 Jun, 2022 | 13:55
Updated-03 Aug, 2024 | 20:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SiHAS Improper Authentication vulnerability

There is no account authentication and permission check logic in the firmware and existing apps of SiHAS's SGW-300, ACM-300, GCM-300, so unauthorized users can remotely control the device.

Action-Not Available
Vendor-shinasysShina System Co.,Ltd
Product-sihas_sgw-300sihas_acm-300sihas_sgw-300_firmwaresihas_gcm-300sihas_gcm-300_firmwaresihas_acm-300_firmwareSiHAS firmwareSiHAS old app
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-862
Missing Authorization
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-27215
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.78% / 73.54%
||
7 Day CHG~0.00%
Published-03 Mar, 2021 | 15:45
Updated-03 Aug, 2024 | 20:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in genua genugate before 9.0 Z p19, 9.1.x through 9.6.x before 9.6 p7, and 10.x before 10.1 p4. The Web Interfaces (Admin, Userweb, Sidechannel) can use different methods to perform the authentication of a user. A specific authentication method during login does not check the provided data (when a certain manipulation occurs) and returns OK for any authentication request. This allows an attacker to login to the admin panel as a user of his choice, e.g., the root user (with highest privileges) or even a non-existing user.

Action-Not Available
Vendor-genuan/a
Product-genuagaten/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2022-28660
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.47% / 64.14%
||
7 Day CHG~0.00%
Published-20 May, 2022 | 14:32
Updated-03 Aug, 2024 | 05:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The querier component in Grafana Enterprise Logs 1.1.x through 1.3.x before 1.4.0 does not require authentication when X-Scope-OrgID is used. Versions 1.2.1, 1.3.1, and 1.4.0 contain the bugfix. This affects -auth.type=enterprise in microservices mode

Action-Not Available
Vendor-n/aGrafana Labs
Product-grafanan/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-3699
Matching Score-4
Assigner-Mitsubishi Electric Corporation
ShareView Details
Matching Score-4
Assigner-Mitsubishi Electric Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.25% / 48.43%
||
7 Day CHG+0.03%
Published-26 Jun, 2025 | 22:40
Updated-23 Dec, 2025 | 03:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Missing Authentication for Critical Function vulnerability in Mitsubishi Electric Corporation G-50 all versions, G-50-W all versions, G-50A all versions, GB-50 all versions, GB-50A all versions, GB-24A all versions, G-150AD all versions, AG-150A-A all versions, AG-150A-J all versions, GB-50AD all versions, GB-50ADA-A all versions, GB-50ADA-J all versions, EB-50GU-A all versions, EB-50GU-J all versions, AE-200J all versions, AE-200A all versions, AE-200E all versions, AE-50J all versions, AE-50A all versions, AE-50E all versions, EW-50J all versions, EW-50A all versions, EW-50E all versions, TE-200A all versions, TE-50A all versions, TW-50A all versions, and CMS-RMD-J all versions allows a remote unauthenticated attacker to bypass authentication and then control the air conditioning systems illegally, or disclose information in them by exploiting this vulnerability. In addition, the attacker may tamper with firmware for them using the disclosed information.

Action-Not Available
Vendor-Mitsubishi Electric Corporation
Product-AG-150A-JAE-50EGB-50ADEW-50JTW-50AEB-50GU-AGB-24AAE-200JGB-50ADA-JAE-50JEB-50GU-JAE-200AEW-50EAE-50AG-150ADTE-50ATE-200AEW-50AAG-150A-AGB-50ADA-AAE-200EGB-50AGB-50G-50CMS-RMD-JG-50AG-50-W
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-31143
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-5.9||MEDIUM
EPSS-0.14% / 34.52%
||
7 Day CHG~0.00%
Published-09 May, 2023 | 14:59
Updated-28 Jan, 2025 | 16:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Mage terminal user authentication not working properly

mage-ai is an open-source data pipeline tool for transforming and integrating data. Those who use Mage starting in version 0.8.34 and prior to 0.8.72 with user authentication enabled may be affected by a vulnerability. The terminal could be accessed by users who are not signed in or do not have editor permissions. Version 0.8.72 contains a fix for this issue.

Action-Not Available
Vendor-magemage-ai
Product-mage-aimage-ai
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-34073
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-10||CRITICAL
EPSS-54.24% / 97.98%
||
7 Day CHG~0.00%
Published-02 Jul, 2025 | 13:46
Updated-20 Dec, 2025 | 13:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
stamparm/maltrail <=0.54 Remote Command Execution

An unauthenticated command injection vulnerability exists in stamparm/maltrail (Maltrail) versions <=0.54. A remote attacker can execute arbitrary operating system commands via the username parameter in a POST request to the /login endpoint. This occurs due to unsafe handling of user-supplied input passed to subprocess.check_output() in core/http.py, allowing injection of shell metacharacters. Exploitation does not require authentication and commands are executed with the privileges of the Maltrail process.

Action-Not Available
Vendor-Stamparm
Product-Maltrail
CWE ID-CWE-306
Missing Authentication for Critical Function
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2025-34216
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-10||CRITICAL
EPSS-0.21% / 43.83%
||
7 Day CHG-0.05%
Published-29 Sep, 2025 | 20:39
Updated-17 Nov, 2025 | 23:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Vasion Print (formerly PrinterLogic) RCE and Password Leaks via API

Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 22.0.1026 and Application prior to version 20.0.2702 (VA deployments only) expose a set of unauthenticated REST API endpoints that return configuration files and clear‑text passwords. The same endpoints also disclose the Laravel APP_KEY used for cryptographic signing. Because the APP_KEY is required to generate valid signed requests, an attacker who obtains it can craft malicious payloads that are accepted by the application and achieve remote code execution on the appliance. This vulnerability has been identified by the vendor as: V-2024-018 — RCE & Leaks via API.

Action-Not Available
Vendor-vasionVasion
Product-virtual_appliance_applicationvirtual_appliance_hostPrint Virtual Appliance HostPrint Application
CWE ID-CWE-306
Missing Authentication for Critical Function
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CVE-2025-34222
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-10||CRITICAL
EPSS-0.18% / 39.48%
||
7 Day CHG-0.09%
Published-29 Sep, 2025 | 20:41
Updated-17 Nov, 2025 | 23:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Vasion Print (formerly PrinterLogic) Unauthenticated Admin APIs Used to Modify SSL Certificates

Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 22.0.1049 and Application prior to version 20.0.2786 (VA/SaaS deployments) expose four admin routes – /admin/hp/cert_upload, /admin/hp/cert_delete, /admin/certs/ca, and /admin/certs/serviceclients/{scid} – without any authentication check. The routes are defined in the /var/www/app/routes/web.php file inside the printercloud/pi Docker container and are handled by the HPCertificateController class, which performs no user validation. An unauthenticated attacker can therefore upload a new TLS/SSL certificate replacing the trusted root used by the appliance, delete an existing certificate causing immediate loss of trust for services that rely on it, or download any stored CA or client certificate via the service‑clients endpoint which also suffers an IDOR that allows enumeration of all client IDs. This vulnerability has been identified by the vendor as: V-2024-028 — Unauthenticated Admin APIs Used to Modify SSL Certificates.

Action-Not Available
Vendor-vasionVasion
Product-virtual_appliance_applicationvirtual_appliance_hostPrint Virtual Appliance HostPrint Application
CWE ID-CWE-306
Missing Authentication for Critical Function
CWE ID-CWE-434
Unrestricted Upload of File with Dangerous Type
CVE-2025-34070
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-10||CRITICAL
EPSS-0.84% / 74.53%
||
7 Day CHG~0.00%
Published-02 Jul, 2025 | 13:44
Updated-26 Feb, 2026 | 18:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
GFI Kerio Control GFIAgent Missing Authentication on Administrative Interfaces

A missing authentication vulnerability in the GFIAgent component of GFI Kerio Control 9.4.5 allows unauthenticated remote attackers to perform privileged operations. The GFIAgent service, responsible for integration with GFI AppManager, exposes HTTP services on ports 7995 and 7996 without proper authentication. The /proxy handler on port 7996 allows arbitrary forwarding to administrative endpoints when provided with an Appliance UUID, which itself can be retrieved from port 7995. This results in a complete authentication bypass, permitting access to sensitive administrative APIs.

Action-Not Available
Vendor-gfiGFI Software
Product-kerio_controlKerio Control
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-34112
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-10||CRITICAL
EPSS-45.48% / 97.56%
||
7 Day CHG~0.00%
Published-15 Jul, 2025 | 13:07
Updated-15 Jul, 2025 | 20:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Riverbed SteelCentral NetProfiler / NetExpress 10.8.7 RCE

An authenticated multi-stage remote code execution vulnerability exists in Riverbed SteelCentral NetProfiler and NetExpress 10.8.7 virtual appliances. A SQL injection vulnerability in the '/api/common/1.0/login' endpoint can be exploited to create a new user account in the appliance database. This user can then trigger a command injection vulnerability in the '/index.php?page=licenses' endpoint to execute arbitrary commands. The attacker may escalate privileges to root by exploiting an insecure sudoers configuration that allows the 'mazu' user to execute arbitrary commands as root via SSH key extraction and command chaining. Successful exploitation allows full remote root access to the virtual appliance.

Action-Not Available
Vendor-Riverbed Technology
Product-SteelCentral NetProfilerSteelCentral NetExpress
CWE ID-CWE-266
Incorrect Privilege Assignment
CWE ID-CWE-306
Missing Authentication for Critical Function
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CVE-2025-34218
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-10||CRITICAL
EPSS-0.73% / 72.50%
||
7 Day CHG-0.19%
Published-29 Sep, 2025 | 20:34
Updated-26 Feb, 2026 | 17:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Vasion Print (formerly PrinterLogic) Exposed Internal Docker Instance

Vasion Print (formerly PrinterLogic) Virtual Appliance Host prior to version 22.0.1049 and Application prior to version 20.0.2786 (VA/SaaS deployments) expose internal Docker containers through the gw Docker instance. The gateway publishes a /meta endpoint which lists every micro‑service container together with version information. These containers are reachable directly over HTTP/HTTPS without any access‑control list (ACL), authentication or rate‑limiting. Consequently, any attacker on the LAN or the Internet can enumerate all internal services and their versions, interact with the exposed APIs of each microservice as an unauthenticated user, or issue malicious requests that may lead to information disclosure, privilege escalation within the container, or denial‑of‑service of the entire appliance. The root cause is the absence of authentication and network‑level restrictions on the API‑gateway’s proxy to internal Docker containers, effectively turning the internal service mesh into a public attack surface. This vulnerability has been identified by the vendor as: V-2024-030 — Exposed Internal Docker Instance (LAN).

Action-Not Available
Vendor-vasionVasion
Product-virtual_appliance_applicationvirtual_appliance_hostPrint Virtual Appliance HostPrint Application
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-30762
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-0.24% / 47.53%
||
7 Day CHG~0.00%
Published-13 Jun, 2023 | 00:00
Updated-03 Jan, 2025 | 18:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authentication vulnerability exists in KB-AHR series and KB-IRIP series. If this vulnerability is exploited, an arbitrary OS command may be executed on the product or the device settings may be altered. Affected products and versions are as follows: KB-AHR04D versions prior to 91110.1.101106.78, KB-AHR08D versions prior to 91210.1.101106.78, KB-AHR16D versions prior to 91310.1.101106.78, KB-IRIP04A versions prior to 95110.1.100290.78A, KB-IRIP08A versions prior to 95210.1.100290.78A, and KB-IRIP16A versions prior to 95310.1.100290.78A.

Action-Not Available
Vendor-kbdeviceKbDevice,Inc.
Product-kb-ahr04d_firmwarekb-ahr08dkb-irip08akb-irip16akb-irip04akb-ahr08d_firmwarekb-ahr16dkb-irip08a_firmwarekb-ahr04dkb-irip04a_firmwarekb-ahr16d_firmwarekb-irip16a_firmwareKB-AHR series and KB-IRIP series
CWE ID-CWE-306
Missing Authentication for Critical Function
CWE ID-CWE-287
Improper Authentication
CVE-2025-34069
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-9.5||CRITICAL
EPSS-0.54% / 67.33%
||
7 Day CHG~0.00%
Published-02 Jul, 2025 | 13:44
Updated-19 Nov, 2025 | 14:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
GFI Kerio Control GFIAgent Authentication Bypass via Proxy Forwarding

An authentication bypass vulnerability exists in GFI Kerio Control 9.4.5 due to insecure default proxy configuration and weak access control in the GFIAgent service. The non-transparent proxy on TCP port 3128 can be used to forward unauthenticated requests to internal services such as GFIAgent, bypassing firewall restrictions and exposing internal management endpoints. This enables unauthenticated attackers to access the GFIAgent service on ports 7995 and 7996, retrieve the appliance UUID, and issue administrative requests via the proxy. Exploitation results in full administrative access to the Kerio Control appliance.

Action-Not Available
Vendor-gfiGFI Software
Product-kerio_controlKerio Control
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-34039
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-10||CRITICAL
EPSS-0.32% / 54.53%
||
7 Day CHG+0.03%
Published-24 Jun, 2025 | 01:07
Updated-20 Nov, 2025 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Yonyou NC BeanShell Command Injection

A code injection vulnerability exists in Yonyou UFIDA NC v6.5 and prior due to the exposure of the BeanShell testing servlet (bsh.servlet.BshServlet) without proper access controls. The servlet allows unauthenticated remote attackers to execute arbitrary Java code via the bsh.script parameter. This can be exploited to run system commands and ultimately gain full control over the target server. The issue is rooted in a third-party JAR component bundled with the application, and the servlet is accessible without authentication on vulnerable installations. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-05 UTC.

Action-Not Available
Vendor-Yonyou Co., Ltd.
Product-UFIDA NC
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-3461
Matching Score-4
Assigner-Austin Hackers Anonymous
ShareView Details
Matching Score-4
Assigner-Austin Hackers Anonymous
CVSS Score-9.1||CRITICAL
EPSS-0.10% / 26.53%
||
7 Day CHG~0.00%
Published-08 Jun, 2025 | 21:02
Updated-13 Jan, 2026 | 20:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
ON Semiconductor Quantenna Telnet Missing Authentication

The Quantenna Wi-Fi chips ship with an unauthenticated telnet interface by default. This is an instance of CWE-306, "Missing Authentication for Critical Function," and is estimated as a CVSS 9.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N). This issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the latest SDK, and appears to be unpatched at the time of this CVE record's first publishing, though the vendor has released a best practices guide for implementors of this chipset.

Action-Not Available
Vendor-onsemiON Semiconductor
Product-qd840qhs710_firmwareqcs-ax2-t8qv840cqhs710qcs-ax3-t8_firmwareqv840c_firmwareqv940_firmwareqv942cqcs-ax2-s5qcs-ax3-t12_firmwareqv952cqsr10gaqcs-ax2-s5_firmwareqcs-ax2-a12_firmwareqcs-ax3-s5qcs-ax2-t12_firmwareqcs-ax3-s5_firmwareqv940qv840qsr10guqcs-ax3-t12qd840_firmwareqcs-ax3-a12qv840_firmwareqcs-ax2-t12qcs-ax2-a12qcs-ax3-a12_firmwareqsr10ga_firmwareqv952c_firmwareqsr10gu_firmwareqv942c_firmwareqv860_firmwareqv860qcs-ax3-t8qcs-ax2-t8_firmwareQuantenna Wi-Fi chipset
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-22652
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.8||CRITICAL
EPSS-40.86% / 97.32%
||
7 Day CHG~0.00%
Published-11 Feb, 2021 | 16:06
Updated-03 Aug, 2024 | 18:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Access to the Advantech iView versions prior to v5.7.03.6112 configuration are missing authentication, which may allow an unauthorized attacker to change the configuration and obtain code execution.

Action-Not Available
Vendor-n/aAdvantech (Advantech Co., Ltd.)
Product-iviewAdvantech iView
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-22772
Matching Score-4
Assigner-Schneider Electric
ShareView Details
Matching Score-4
Assigner-Schneider Electric
CVSS Score-9.8||CRITICAL
EPSS-0.28% / 51.47%
||
7 Day CHG~0.00%
Published-21 Jul, 2021 | 10:41
Updated-03 Aug, 2024 | 18:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A CWE-306: Missing Authentication for Critical Function vulnerability exists in Easergy T200 ((Modbus) SC2-04MOD-07000100 and earlier), Easergy T200 ((IEC104) SC2-04IEC-07000100 and earlier), and Easergy T200 ((DNP3) SC2-04DNP-07000102 and earlier) that could cause unauthorized operation when authentication is bypassed.

Action-Not Available
Vendor-n/a
Product-t200et200i_firmwaret200it200pt200e_firmwaret200p_firmwareEasergy T200 ((Modbus) SC2-04MOD-07000100 and earlier), Easergy T200 ((IEC104) SC2-04IEC-07000100 and earlier), and Easergy T200 ((DNP3) SC2-04DNP-07000102 and earlier)
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-22850
Matching Score-4
Assigner-TWCERT/CC
ShareView Details
Matching Score-4
Assigner-TWCERT/CC
CVSS Score-5.3||MEDIUM
EPSS-0.29% / 52.25%
||
7 Day CHG~0.00%
Published-19 Jan, 2021 | 10:05
Updated-17 Sep, 2024 | 01:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
HGiga OAKloud Portal - Security Misconfiguration

HGiga EIP product lacks ineffective access control in certain pages that allow attackers to access database or perform privileged functions.

Action-Not Available
Vendor-hgigaHGiga
Product-oaklouds_portalOAKSv20 OAKlouds-document_v3OAKSv30 OAKlouds-document_v3
CWE ID-CWE-732
Incorrect Permission Assignment for Critical Resource
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-23847
Matching Score-4
Assigner-Robert Bosch GmbH
ShareView Details
Matching Score-4
Assigner-Robert Bosch GmbH
CVSS Score-9.8||CRITICAL
EPSS-0.46% / 63.64%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 14:19
Updated-17 Sep, 2024 | 02:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unauthenticated Information Extraction Vulnerability

A Missing Authentication in Critical Function in Bosch IP cameras allows an unauthenticated remote attacker to extract sensitive information or change settings of the camera by sending crafted requests to the device. Only devices of the CPP6, CPP7 and CPP7.3 family with firmware 7.70, 7.72, and 7.80 prior to B128 are affected by this vulnerability. Versions 7.62 or lower and INTEOX cameras are not affected.

Action-Not Available
Vendor-Robert Bosch GmbH
Product-cpp7_firmwarecpp7.3_firmwarecpp7.3cpp7cpp6_firmwarecpp6CPP Firmware
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-3319
Matching Score-4
Assigner-IBM Corporation
ShareView Details
Matching Score-4
Assigner-IBM Corporation
CVSS Score-8.1||HIGH
EPSS-0.04% / 11.96%
||
7 Day CHG~0.00%
Published-20 Jun, 2025 | 14:50
Updated-24 Aug, 2025 | 11:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM Spectrum Protect Server authentication bypass

IBM Spectrum Protect Server 8.1 through 8.1.26 could allow attacker to bypass authentication due to improper session authentication which can result in access to unauthorized resources.

Action-Not Available
Vendor-IBM Corporation
Product-spectrum_protect_serverSpectrum Protect Server
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-22279
Matching Score-4
Assigner-Asea Brown Boveri Ltd. (ABB)
ShareView Details
Matching Score-4
Assigner-Asea Brown Boveri Ltd. (ABB)
CVSS Score-9.8||CRITICAL
EPSS-0.31% / 53.87%
||
7 Day CHG~0.00%
Published-13 Dec, 2021 | 15:48
Updated-16 Sep, 2024 | 17:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OmniCore RobotWare Missing Authentication Vulnerability

A Missing Authentication vulnerability in RobotWare for the OmniCore robot controller allows an attacker to read and modify files on the robot controller if the attacker has access to the Connected Services Gateway Ethernet port.

Action-Not Available
Vendor-ABB
Product-omnicore_c30_firmwareomnicore_c30RobotWare
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-21986
Matching Score-4
Assigner-VMware by Broadcom
ShareView Details
Matching Score-4
Assigner-VMware by Broadcom
CVSS Score-9.8||CRITICAL
EPSS-0.92% / 75.76%
||
7 Day CHG-0.57%
Published-26 May, 2021 | 14:04
Updated-03 Aug, 2024 | 18:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The vSphere Client (HTML5) contains a vulnerability in a vSphere authentication mechanism for the Virtual SAN Health Check, Site Recovery, vSphere Lifecycle Manager, and VMware Cloud Director Availability plug-ins. A malicious actor with network access to port 443 on vCenter Server may perform actions allowed by the impacted plug-ins without authentication.

Action-Not Available
Vendor-n/aVMware (Broadcom Inc.)
Product-vcenter_servercloud_foundationVMware vCenter Server and VMware Cloud Foundation
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-20998
Matching Score-4
Assigner-CERT@VDE
ShareView Details
Matching Score-4
Assigner-CERT@VDE
CVSS Score-10||CRITICAL
EPSS-0.14% / 33.49%
||
7 Day CHG~0.00%
Published-13 May, 2021 | 13:45
Updated-17 Sep, 2024 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WAGO: Managed Switches: Unauthorized creation of user accounts

In multiple managed switches by WAGO in different versions without authorization and with specially crafted packets it is possible to create users.

Action-Not Available
Vendor-wagoWAGO
Product-0852-1305_firmware0852-13050852-1305\/000-001_firmware0852-1505\/000-0010852-0303_firmware0852-1305\/000-0010852-1505\/000-001_firmware0852-1505_firmware0852-03030852-15050852-13050852-1305/000-0010852-1505/000-0010852-03030852-1505
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-20697
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-0.58% / 68.51%
||
7 Day CHG~0.00%
Published-26 Apr, 2021 | 00:20
Updated-03 Aug, 2024 | 17:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Missing authentication for critical function in DAP-1880AC firmware version 1.21 and earlier allows a remote attacker to login to the device as an authenticated user without the access privilege via unspecified vectors.

Action-Not Available
Vendor-D-Link Corporation
Product-dap-1880acdap-1880ac_firmwareDAP-1880AC
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-29485
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.06% / 18.19%
||
7 Day CHG~0.00%
Published-21 Dec, 2023 | 00:00
Updated-25 Sep, 2024 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Heimdal Thor agent versions 3.4.2 and before on Windows and 2.6.9 and before on macOS, allows attackers to bypass network filtering, execute arbitrary code, and obtain sensitive information via DarkLayer Guard threat prevention module. NOTE: Heimdal disputes the validity of this issue arguing that their DNS Security for Endpoint filters DNS traffic on the endpoint by intercepting system-generated DNS requests. The product was not designed to intercept DNS requests from third-party solutions.

Action-Not Available
Vendor-heimdalsecurityn/aApple Inc.Microsoft Corporation
Product-windowsmacosthorn/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-1393
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-9.8||CRITICAL
EPSS-2.06% / 83.70%
||
7 Day CHG~0.00%
Published-24 Feb, 2021 | 19:31
Updated-08 Nov, 2024 | 23:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Application Services Engine Unauthorized Access Vulnerabilities

Multiple vulnerabilities in Cisco Application Services Engine could allow an unauthenticated, remote attacker to gain privileged access to host-level operations or to learn device-specific information, create diagnostic files, and make limited configuration changes. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-application_policy_infrastructure_controllerapplication_services_engineCisco Application Services Engine Software
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-28326
Matching Score-4
Assigner-Apache Software Foundation
ShareView Details
Matching Score-4
Assigner-Apache Software Foundation
CVSS Score-9.8||CRITICAL
EPSS-0.24% / 47.55%
||
7 Day CHG~0.00%
Published-28 Mar, 2023 | 12:36
Updated-23 Oct, 2024 | 16:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apache OpenMeetings: allows user impersonation

Vendor: The Apache Software Foundation Versions Affected: Apache OpenMeetings from 2.0.0 before 7.0.0 Description: Attacker can elevate their privileges in any room

Action-Not Available
Vendor-The Apache Software Foundation
Product-openmeetingsApache OpenMeetingsopenmeetings
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-2834
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-9.8||CRITICAL
EPSS-0.42% / 61.72%
||
7 Day CHG~0.00%
Published-30 Jun, 2023 | 01:56
Updated-26 Nov, 2024 | 16:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The BookIt plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.3.7. This is due to insufficient verification on the user being supplied during booking an appointment through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email.

Action-Not Available
Vendor-stylemixthemesstylemix
Product-bookitBooking Calendar | Appointment Booking | BookIt
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-20136
Matching Score-4
Assigner-Tenable Network Security, Inc.
ShareView Details
Matching Score-4
Assigner-Tenable Network Security, Inc.
CVSS Score-9.8||CRITICAL
EPSS-31.40% / 96.70%
||
7 Day CHG~0.00%
Published-01 Nov, 2021 | 20:55
Updated-03 Aug, 2024 | 17:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ManageEngine Log360 Builds < 5235 are affected by an improper access control vulnerability allowing database configuration overwrite. An unauthenticated remote attacker can send a specially crafted message to Log360 to change its backend database to an attacker-controlled database and to force Log360 to restart. An attacker can leverage this vulnerability to achieve remote code execution by replacing files executed by Log360 on startup.

Action-Not Available
Vendor-n/aZoho Corporation Pvt. Ltd.
Product-manageengine_log360ManageEngine Log360
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-20158
Matching Score-4
Assigner-Tenable Network Security, Inc.
ShareView Details
Matching Score-4
Assigner-Tenable Network Security, Inc.
CVSS Score-9.8||CRITICAL
EPSS-80.34% / 99.10%
||
7 Day CHG~0.00%
Published-30 Dec, 2021 | 21:31
Updated-03 Aug, 2024 | 17:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Trendnet AC2600 TEW-827DRU version 2.08B01 contains an authentication bypass vulnerability. It is possible for an unauthenticated, malicous actor to force the change of the admin password due to a hidden administrative command.

Action-Not Available
Vendor-n/aTRENDnet, Inc.
Product-tew-827dru_firmwaretew-827druTrendnet AC2600 TEW-827DRU
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2021-1396
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.83% / 74.32%
||
7 Day CHG~0.00%
Published-24 Feb, 2021 | 19:31
Updated-08 Nov, 2024 | 23:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Application Services Engine Unauthorized Access Vulnerabilities

Multiple vulnerabilities in Cisco Application Services Engine could allow an unauthenticated, remote attacker to gain privileged access to host-level operations or to learn device-specific information, create diagnostic files, and make limited configuration changes. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-application_policy_infrastructure_controllerapplication_services_engineCisco Application Services Engine Software
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-2781
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-8.1||HIGH
EPSS-0.39% / 59.80%
||
7 Day CHG+0.03%
Published-02 Jun, 2023 | 23:37
Updated-23 Dec, 2024 | 16:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The User Email Verification for WooCommerce plugin for WordPress is vulnerable to authentication bypass via authenticate_user_by_email in versions up to, and including, 3.5.0. This is due to a random token generation weakness in the resend_verification_email function. This allows unauthenticated attackers to impersonate users and trigger an email address verification for arbitrary accounts, including administrative accounts, and automatically be logged in as that user, including any site administrators. This requires the Allow Automatic Login After Successful Verification setting to be enabled, which it is not by default.

Action-Not Available
Vendor-wisetrsandeepsoni214
Product-user_email_verification_for_woocommerceUser Email Verification for WooCommerce
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-27396
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-1.54% / 81.19%
||
7 Day CHG~0.00%
Published-19 Jun, 2023 | 00:00
Updated-24 Dec, 2024 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

FINS (Factory Interface Network Service) is a message communication protocol, which is designed to be used in closed FA (Factory Automation) networks, and is used in FA networks composed of OMRON products. Multiple OMRON products that implement FINS protocol contain following security issues -- (1)Plaintext communication, and (2)No authentication required. When FINS messages are intercepted, the contents may be retrieved. When arbitrary FINS messages are injected, any commands may be executed on, or the system information may be retrieved from, the affected device. Affected products and versions are as follows: SYSMAC CS-series CPU Units, all versions, SYSMAC CJ-series CPU Units, all versions, SYSMAC CP-series CPU Units, all versions, SYSMAC NJ-series CPU Units, all versions, SYSMAC NX1P-series CPU Units, all versions, SYSMAC NX102-series CPU Units, all versions, and SYSMAC NX7 Database Connection CPU Units (Ver.1.16 or later)

Action-Not Available
Vendor-omronOMRON Corporation
Product-nx1p2-1040dt_firmwarenx701-1620_firmwarenj501-5300cp1e-e10dt-d_firmwarecp1e-e40sdr-a_firmwarecj2h-cpu64_firmwarecp1e-n40s1dt-d_firmwarecp1w-20edt_firmwarecs1w-etn21cp2w-cifd2cp1w-ext01_firmwarecp2e-s30dt-d_firmwarecp1w-40edrcp2e-n30dt-dcp1l-el20dr-dcp1h-x40dr-acp2e-n20dt-d_firmwarecs1w-clk_firmwarenx102-1000cp1e-n20dt-acp2w-cifd3_firmwarecp1w-mad42_firmwarecp1h-xa40dr-a_firmwarecp1w-16ercp1l-l14dt-a_firmwarecp1l-m30dr-acp1l-l20dt-acp2w-cifd2_firmwarenx1p2-1140dt1cp1e-n60s1dr-a_firmwarecp1w-20edtcp1w-ts002cp2e-n60dr-acp1l-em40dt1-dcj2m-cpu32cp1e-n40sdt-dcp1e-n30sdr-acp1e-n14dt-acp2e-s60dt-d_firmwarecp2e-s40dt-d_firmwarecp1w-ts102cs1w-ncf71cp1e-n20dr-acp1l-m40dr-dcp2e-n40dr-d_firmwarecp2e-e14dr-a_firmwarecp1w-40edt_firmwarecp2e-e60dr-a_firmwarenj501-r400_firmwarecp1l-l20dt1-dnj501-1300_firmwarecp1l-l14dr-dcp1e-n30s1dr-a_firmwarecp1w-dam01cp1h-x40dt-d_firmwarecp1e-n40sdr-acj2m-cpu15_firmwarecp2e-s40dt1-dcp2e-n14dr-dcp1e-n20dr-dcp1w-cif11_firmwarecp2e-s30dr-a_firmwarecp1e-e14sdr-a_firmwarecj2m-cpu12_firmwarecp1e-n30dt-dnj501-r400cp1e-n30s1dt-d_firmwarecj2h-cpu67-eip_firmwarecp2e-n20dt-a_firmwarecp1w-srt21nj101-9020cs1w-clkcp1e-e20sdr-acj2h-cpu68-eipcp2e-n30dr-acp2e-s60dt1-d_firmwarenj501-r320cp1l-m30dt-d_firmwarecp2e-n30dt-a_firmwarecp1l-m30dt-a_firmwarecp2e-s30dt1-dcp1e-n60dr-d_firmwarecj2m-cpu33_firmwarecp1l-l20dr-a_firmwarecs1w-nc471nx1p2-1040dt1cp1w-ts001cp2e-n60dt1-d_firmwarecp1w-ad042cp2e-e40dr-a_firmwarecp1e-n60sdt-dcp1e-n14dt1-dcp2e-n14dr-d_firmwarecs1w-nc471_firmwarecp2e-n60dt-d_firmwarecp2e-e40dr-acp1w-8ercp1l-l14dr-d_firmwarenx102-1000_firmwarecp1e-n60s1dt1-d_firmwarecp2e-n14dt-acp1e-n60dt-a_firmwarecp2e-s60dr-acp1e-n20dt1-dnx102-1100_firmwarecp1w-20edr1_firmwarecp1w-ad041_firmwarecp1e-n60sdr-anj501-1320_firmwarecp2e-n20dt-acp1e-e10dt-dcp1e-n30dt1-a_firmwarecp1w-mab221_firmwarecp1e-e20dr-a_firmwarecs1w-spu01-v2_firmwarecp1e-n60dr-dcp1l-em40dt1-d_firmwarecp1l-l20dr-d_firmwarenj501-4400cp2e-e60dr-acp2e-n60dr-d_firmwarecp1e-n14dt1-a_firmwarecp1l-em40dr-d_firmwarecp1e-n40dt1-a_firmwarecp1w-cif01cp1e-n14dt-dcp2e-n40dt-dnj-pd3001_firmwarecs1w-nc271_firmwarenx1p2-1140dtcp1w-mad42cp2e-s30dt-dcj2m-cpu12cp1e-n40s1dt1-dnj501-4310cp1e-n20dt-dcp1l-m30dt1-d_firmwarecp1e-e14dr-a_firmwarecp1l-l10dt-dcp1e-n14dr-acs1w-drm21-v1_firmwarenj501-4300_firmwarecp1e-n14dt-a_firmwarecp1w-ad042_firmwarenj501-4500_firmwarecj2h-cpu64cp1w-srt21_firmwarecp1w-20edt1cp1e-n60dt1-d_firmwarecp1w-ts101_firmwarecp2e-n40dr-dcp1w-16er_firmwarecp2e-e20dr-acp1e-n20dt-a_firmwarenx102-1100cp1l-em30dt1-d_firmwarecp1e-na20dt1-dcp1e-n40dt1-dcp1l-em30dt1-dcp1l-m30dr-dnx1p2-1040dt1_firmwarecp1l-l10dt-d_firmwarecp1w-16et1_firmwarecp2w-cifd1cp1w-mad44_firmwarecj2m-md211cp1w-ts101cp1w-40edr_firmwarecp1e-n40sdt-d_firmwarenx701-1720_firmwarecp1l-m60dr-dcp1w-8et1_firmwarecp1w-me05m_firmwarecp1w-mad11_firmwarecp1e-n14dt1-d_firmwarecp1e-n60dt1-dcs1w-spu02-v2_firmwarecj2m-cpu34cp2e-n14dt-d_firmwarecp1w-8edcj2m-cpu31_firmwarecp1w-cif41cp1w-40edtcp1h-xa40dt-dcp1l-m60dt1-d_firmwarecp1e-n40sdt1-d_firmwarecp1l-l10dt1-dcp1l-m60dt1-dcp1e-e60sdr-a_firmwarecp2e-n30dr-a_firmwarecp1e-n40dr-a_firmwarecj2m-cpu11cp1w-32etcp1e-n40dt-acp1e-n14dr-a_firmwarecp1e-e10dt1-dcj2m-md212_firmwarecp1w-40edt1nj501-r500nj501-1320nj501-1340_firmwarenj301-1200_firmwarenx102-1020nx102-9000cp2e-n60dr-dcp2e-n20dr-dcp1w-ts003_firmwarecp2e-n14dt1-d_firmwarecp1h-xa40dt1-dcp1l-m60dr-d_firmwarecp2e-n14dt-dcs1w-drm21-v1cp2e-n20dr-anx102-1220cp1e-n40sdr-a_firmwarenx102-1200_firmwarecp1l-m40dt-dcp1w-16et_firmwarenx1p2-9024dt_firmwarecp2e-n40dt-d_firmwarecp1e-n40sdt1-dcp1e-n40s1dr-acp2e-s40dt-dcp1e-e40dr-acp1e-n30s1dt1-dcp1l-m30dt1-dnx1p2-1140dt1_firmwarenj501-1400_firmwarecp1w-mab221nj501-1500_firmwarecp2e-s40dr-a_firmwarecs1w-eip21_firmwarecp1l-m30dt-dcp1e-e10dt-anj501-1420cp1w-32er_firmwarenx701-1720nj501-4320cp1w-cif12-v1cp1l-m60dr-a_firmwarecp1h-x40dt1-d_firmwarecp1w-8et_firmwarenx102-9000_firmwarenj501-1520nx102-1120_firmwarecp2e-e30dr-a_firmwarecp1l-m30dr-a_firmwarecp2e-n40dt1-d_firmwarecp1e-n60dt1-a_firmwarenj501-4300cp1l-m30dt-anj101-1000_firmwarecj2m-cpu13_firmwarenj101-9020_firmwarecs1w-fln22_firmwarecp1h-x40dt-dcp1e-e60sdr-acp1w-da042cp1e-n30dr-d_firmwarecp1e-n30sdt1-dcp1l-el20dr-d_firmwarecp1e-n40s1dt-dcp2e-n60dr-a_firmwarenx1p2-9024dt1cp1e-n30sdt-d_firmwarecp1e-e40sdr-acp1w-mad11cp2e-n20dr-d_firmwarecp1e-n30s1dt1-d_firmwarecp1e-n20dt-d_firmwarecp1e-n60s1dt-d_firmwarecp1l-m40dr-acp1e-n40s1dt1-d_firmwarecj2h-cpu67-eipcp1l-l20dr-dcp1l-l14dr-anj501-r300cp1l-el20dt-dcp1e-n40dr-dcs1w-nc271cp2e-n60dt-acj2h-cpu66-eipcp1e-n30s1dr-acp1e-n60sdt-d_firmwarenx1p2-9024dtnj501-1420_firmwarecp1l-l20dt1-d_firmwarecp1l-m40dt1-dcj2m-cpu14_firmwarecp1l-m60dt-dcp1l-em30dt-d_firmwarecp1l-l10dr-a_firmwarecj2h-cpu66_firmwarecp1e-e30sdr-acp1e-n30sdr-a_firmwarecp1e-n20dt1-acp1e-n20dr-a_firmwarecp1w-me05mcp1e-n30dt-d_firmwarenx1p2-1140dt_firmwarenx1p2-1040dtnx102-1020_firmwarenj501-4310_firmwarecj2m-cpu13cs1w-spu01-v2cp1w-ts102_firmwarecp1w-cn811cp1h-xa40dt1-d_firmwarecp1w-16etnj501-r520cp1e-n30dt1-d_firmwarecp2e-n14dt-a_firmwarecp1h-x40dt1-dnj501-4320_firmwarecs1w-spu02-v2nj501-4400_firmwarecp1w-da042_firmwarecj2m-cpu11_firmwarecp1l-m60dt-a_firmwarecp1e-n40dt-dnx102-9020cp1l-l10dr-acp1l-m40dr-d_firmwarecp1w-ts004cp1h-y20dt-dcp2e-s30dt1-d_firmwarenx102-1200cp1e-n40dr-acp1w-dam01_firmwarecp2e-n20dr-a_firmwarecp1l-el20dt1-d_firmwarenx1p2-9024dt1_firmwarenj101-9000_firmwarecp2w-cifd3cp2e-s60dr-a_firmwarecp1w-40edt1_firmwarecp1l-em40dt-d_firmwarecp1w-20edt1_firmwarecp1e-n14dr-d_firmwarecp1e-n20dt1-d_firmwarecp1e-n30s1dt-dnj501-5300_firmwarecp2e-n14dt1-dcp1e-n40dt-d_firmwarenj101-1020cp2e-s40dr-acj2m-cpu33cp1h-xa40dt-d_firmwarecj2h-cpu65-eipcp2e-n40dt-acp1e-n30dt1-dcp1l-m40dr-a_firmwarecs1w-ncf71_firmwarecp1e-e10dt-a_firmwarecp1e-e14dr-acp2e-e30dr-acp1l-l14dt-dcp1e-e10dt1-a_firmwarecp1e-n30dr-anj501-1340cj2m-cpu32_firmwarecp1e-n20dr-d_firmwarecp1l-l10dt-a_firmwarecj2h-cpu66-eip_firmwarecp1w-cif12-v1_firmwarecj2h-cpu64-eipcp1e-e30dr-a_firmwarecp1l-l10dt1-d_firmwarecp2e-e20dr-a_firmwarecp1l-l14dr-a_firmwarecp1w-adb21cj2m-cpu35_firmwarecp1w-8etcp1l-em30dr-d_firmwarecp1e-e10dr-dcp1e-n60dr-acp1w-ad041cp1e-n40dt-a_firmwarecp2e-n30dt-acp1l-l20dt-d_firmwarecp1h-x40dr-a_firmwarecp2e-n40dt1-dcp1w-da021_firmwarecp2e-n30dt1-dcj2m-cpu31cp2e-n40dr-a_firmwarecp1e-n40dr-d_firmwarecp1e-na20dt1-d_firmwarecp1w-20edr1cp1e-n30sdt-dcp2e-s40dt1-d_firmwarecp1l-l14dt1-dcj2h-cpu65_firmwarecj2h-cpu68cp1e-e10dt1-d_firmwarenj501-r300_firmwarecj2h-cpu68_firmwarecp1l-l10dt-acp1w-ext01nj501-r320_firmwarecp1e-na20dt-d_firmwarecj2m-cpu15cp1w-adb21_firmwarecp1w-16et1cp1l-em30dt-dcp1e-n14dt-d_firmwarecp1e-n30dr-a_firmwarecp1e-e10dt1-anj501-1300cp1w-mad44cp1w-cif41_firmwarenx102-1120cs1w-etn21_firmwarecp1e-e10dr-d_firmwarecp1w-da041_firmwarecp1h-xa40dr-anj-pa3001_firmwarenx102-9020_firmwarecp1e-n30dt-anj101-1000cp2e-n20dt1-dcp1l-l14dt-anj-pd3001cp2e-n14dr-acp2e-n30dt1-d_firmwarecp1e-na20dr-acp1w-dab21vcp1e-n60dt1-acj2m-cpu35cp1e-e10dr-acp1l-l14dt1-d_firmwarecj2h-cpu68-eip_firmwarecj2h-cpu67cp2e-n60dt-a_firmwarecp1l-em30dr-dcj2m-md212nj501-1500cp1l-l10dr-dcp2e-s60dt1-dcp1e-e20sdr-a_firmwarenj501-1400cp1w-dab21v_firmwarecp1l-em40dt-dcj2h-cpu64-eip_firmwarecp2e-n14dr-a_firmwarecp1w-ts002_firmwarecp1w-32ercp1e-e30sdr-a_firmwarecp1e-n60s1dt1-dcp1e-n14dt1-acp1e-n60dt-d_firmwarecp1e-e40dr-a_firmwarecp1l-l14dt-d_firmwarecp2e-n60dt-dcp1e-e20dr-anj-pa3001cp1w-8ed_firmwarenx102-1220_firmwarecp2e-e14dr-acp1l-m60dr-acp1l-m40dt1-d_firmwarenj301-1100cp1h-y20dt-d_firmwarecp1l-el20dt-d_firmwarecp1w-ts004_firmwarenj101-9000cp2e-n40dt-a_firmwarecp1l-m60dt-acj2h-cpu65-eip_firmwarecp2e-n40dr-acp1e-e30dr-acp1e-n30dt1-anj501-r520_firmwarecp1l-m40dt-a_firmwarecp2e-n30dr-dcp1w-32et_firmwarecp1e-n14dr-dcp1e-n60s1dt-dcp1w-8er_firmwarecp1e-n30sdt1-d_firmwarenj101-1020_firmwarecp1w-8et1cp1e-n60sdt1-d_firmwarecp2e-n30dt-d_firmwarecj2h-cpu67_firmwarecp2e-n60dt1-dcp1e-n30dt-a_firmwarecp1e-na20dr-a_firmwarecp2e-n20dt-dcp1l-m40dt-d_firmwarecp1l-l20dt-dnj501-r420_firmwarenj501-r420cj2h-cpu66nj501-4500cp1e-n60sdr-a_firmwarecp1e-n60sdt1-dcp1l-l20dt-a_firmwarecp1e-n40dt1-d_firmwarecj2h-cpu65cp1e-na20dt-dcp1w-cif11cp1e-n60dr-a_firmwarecp1e-n40s1dr-a_firmwarecp1l-l20dr-acs1w-eip21nj501-r500_firmwarecp1e-n60dt-acp1e-n60s1dr-acp2e-n20dt1-d_firmwarecp2e-s30dr-acp1w-da041cs1w-fln22cp2e-n30dr-d_firmwarecp1e-n30dr-dcp2e-s60dt-dcp1w-cn811_firmwarenj301-1100_firmwarecp1e-e14sdr-acp1l-em40dr-dcp2w-cifd1_firmwarecp1l-el20dt1-dcp1w-cif01_firmwarecj2m-cpu14cj2m-md211_firmwarecp1w-32et1_firmwarecj2m-cpu34_firmwarecp1e-n40dt1-acp1l-l10dr-d_firmwarecp1l-m30dr-d_firmwarecp1w-ts001_firmwarecp1w-32et1nj301-1200cp1w-da021cp1e-n20dt1-a_firmwarenj501-1520_firmwarecp1l-m40dt-acp1e-n60dt-dnx701-1620cp1w-ts003cp1l-m60dt-d_firmwarecp1e-e10dr-a_firmwareMultiple OMRON products which implement FINS protocol
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2020-9480
Matching Score-4
Assigner-Apache Software Foundation
ShareView Details
Matching Score-4
Assigner-Apache Software Foundation
CVSS Score-9.8||CRITICAL
EPSS-93.18% / 99.79%
||
7 Day CHG-0.12%
Published-23 Jun, 2020 | 21:50
Updated-04 Aug, 2024 | 10:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Apache Spark 2.4.5 and earlier, a standalone resource manager's master may be configured to require authentication (spark.authenticate) via a shared secret. When enabled, however, a specially-crafted RPC to the master can succeed in starting an application's resources on the Spark cluster, even without the shared key. This can be leveraged to execute shell commands on the host machine. This does not affect Spark clusters using other resource managers (YARN, Mesos, etc).

Action-Not Available
Vendor-The Apache Software FoundationOracle Corporation
Product-sparkbusiness_intelligenceApache Spark
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-27060
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-1.77% / 82.43%
||
7 Day CHG~0.00%
Published-22 Mar, 2023 | 00:00
Updated-26 Feb, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

LightCMS v1.3.7 was discovered to contain a remote code execution (RCE) vulnerability via the image:make function.

Action-Not Available
Vendor-lightcms_projectn/a
Product-lightcmsn/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2020-8598
Matching Score-4
Assigner-Trend Micro, Inc.
ShareView Details
Matching Score-4
Assigner-Trend Micro, Inc.
CVSS Score-9.8||CRITICAL
EPSS-8.46% / 92.23%
||
7 Day CHG~0.00%
Published-18 Mar, 2020 | 00:30
Updated-04 Aug, 2024 | 10:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Trend Micro Apex One (2019), OfficeScan XG and Worry-Free Business Security (9.0, 9.5, 10.0) server contains a vulnerable service DLL file that could allow a remote attacker to execute arbitrary code on affected installations with SYSTEM level privileges. Authentication is not required to exploit this vulnerability.

Action-Not Available
Vendor-Trend Micro Incorporated
Product-apex_oneworry-free_business_securityofficescanTrend Micro OfficeScan, Trend Micro Apex One, Trend Micro Worry-Free Business Security (WFBS)
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2020-7114
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-9.8||CRITICAL
EPSS-0.42% / 61.63%
||
7 Day CHG~0.00%
Published-16 Apr, 2020 | 16:14
Updated-04 Aug, 2024 | 09:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability exists allowing attackers, when present in the same network segment as ClearPass' management interface, to make changes to certain databases in ClearPass by crafting HTTP packets. As a result of this attack, a possible complete cluster compromise might occur. Resolution: Fixed in 6.7.13, 6.8.4, 6.9.0 and higher.

Action-Not Available
Vendor-n/aAruba Networks
Product-clearpassClearPass Policy Manager
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2020-7115
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-9.8||CRITICAL
EPSS-42.33% / 97.39%
||
7 Day CHG-18.37%
Published-03 Jun, 2020 | 12:43
Updated-04 Aug, 2024 | 09:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The ClearPass Policy Manager web interface is affected by a vulnerability that leads to authentication bypass. Upon successful bypass an attacker could then execute an exploit that would allow to remote command execution in the underlying operating system. Resolution: Fixed in 6.7.13-HF, 6.8.5-HF, 6.8.6, 6.9.1 and higher.

Action-Not Available
Vendor-n/aAruba Networks
Product-clearpass_policy_managerClearPass Policy Manager
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2020-7128
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-9.8||CRITICAL
EPSS-0.93% / 75.88%
||
7 Day CHG~0.00%
Published-04 Nov, 2020 | 19:21
Updated-04 Aug, 2024 | 09:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A remote unauthenticated arbitrary code execution vulnerability was discovered in Aruba Airwave Software version(s): Prior to 1.3.2.

Action-Not Available
Vendor-n/aAruba Networks
Product-airwave_glassAruba Airwave Software
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2020-6198
Matching Score-4
Assigner-SAP SE
ShareView Details
Matching Score-4
Assigner-SAP SE
CVSS Score-9.8||CRITICAL
EPSS-0.27% / 49.83%
||
7 Day CHG~0.00%
Published-10 Mar, 2020 | 20:18
Updated-04 Aug, 2024 | 08:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SAP Solution Manager (Diagnostics Agent), version 720, allows unencrypted connections from unauthenticated sources. This allows an attacker to control all remote functions on the Agent due to Missing Authentication Check.

Action-Not Available
Vendor-SAP SE
Product-solution_managerSAP Solution Manager (Diagnostics Agent)
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2023-23451
Matching Score-4
Assigner-SICK AG
ShareView Details
Matching Score-4
Assigner-SICK AG
CVSS Score-9.8||CRITICAL
EPSS-0.25% / 47.85%
||
7 Day CHG~0.00%
Published-19 Apr, 2023 | 00:00
Updated-05 Feb, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Flexi Classic and Flexi Soft Gateways SICK UE410-EN3 FLEXI ETHERNET GATEW. with serial number <=2311xxxx all Firmware versions, SICK UE410-EN1 FLEXI ETHERNET GATEW. with serial number <=2311xxxx all Firmware versions, SICK UE410-EN3S04 FLEXI ETHERNET GATEW. with serial number <=2311xxxx all Firmware versions, SICK UE410-EN4 FLEXI ETHERNET GATEW. with serial number <=2311xxxx all Firmware versions, SICK FX0-GENT00000 FLEXISOFT EIP GATEW. with serial number <=2311xxxx with Firmware <=V2.11.0, SICK FX0-GMOD00000 FLEXISOFT MOD GATEW. with serial number <=2311xxxx with Firmware <=V2.11.0, SICK FX0-GPNT00000 FLEXISOFT PNET GATEW. with serial number <=2311xxxx with Firmware <=V2.12.0, SICK FX0-GENT00030 FLEXISOFT EIP GATEW.V2 with serial number <=2311xxxx all Firmware versions, SICK FX0-GPNT00030 FLEXISOFT PNET GATEW.V2 with serial number <=2311xxxx all Firmware versions and SICK FX0-GMOD00010 FLEXISOFT MOD GW with serial number <=2311xxxx with Firmware <=V2.11.0 all have Telnet enabled by factory default. No password is set in the default configuration.

Action-Not Available
Vendor-N/ASICK AG
Product-fx0-gmod00000ue410-en3s04_firmwareue410-en4ue410-en1fx0-gmod00010_firmwarefx0-gpnt00000ue410-en3s04ue410-en3fx0-gent00000_firmwarefx0-gpnt00030_firmwarefx0-gent00000ue410-en1_firmwarefx0-gpnt00000_firmwareue410-en4_firmwarefx0-gent00030fx0-gpnt00030fx0-gmod00010fx0-gent00030_firmwarefx0-gmod00000_firmwareue410-en3_firmwareSICK FX0-GENT00000, SICK FX0-GENT00030, SICK FX0-GMOD00000, SICK FX0-GMOD00010, SICK FX0-GPNT00000, SICK FX0-GPNT00030, SICK UE410-EN1, SICK UE410-EN3, SICK UE410-EN3S04, SICK UE410-EN4
CWE ID-CWE-477
Use of Obsolete Function
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2020-36713
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-9.8||CRITICAL
EPSS-0.79% / 73.61%
||
7 Day CHG~0.00%
Published-07 Jun, 2023 | 01:51
Updated-28 Dec, 2024 | 00:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The MStore API plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.1.5. This is due to unrestricted access to the 'register' and 'update_user_profile' routes. This makes it possible for unauthenticated attackers to create new administrator accounts, delete existing administrator accounts, or escalate privileges on any account.

Action-Not Available
Vendor-inspireuiinspireui
Product-mstore_apiMStore API
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2020-36892
Matching Score-4
Assigner-VulnCheck
ShareView Details
Matching Score-4
Assigner-VulnCheck
CVSS Score-9.3||CRITICAL
EPSS-0.52% / 66.47%
||
7 Day CHG~0.00%
Published-10 Dec, 2025 | 20:52
Updated-17 Dec, 2025 | 16:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Eibiz i-Media Server Digital Signage 3.8.0 Unauthenticated Privilege Escalation

Eibiz i-Media Server Digital Signage 3.8.0 contains an unauthenticated privilege escalation vulnerability in the updateUser object that allows attackers to modify user roles. Attackers can exploit the /messagebroker/amf endpoint to elevate privileges and take over user accounts by manipulating role settings without authentication.

Action-Not Available
Vendor-eibizEIBIZ Co.,Ltd.
Product-i-media_server_digital_signagei-Media Server Digital Signage
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2020-36239
Matching Score-4
Assigner-Atlassian
ShareView Details
Matching Score-4
Assigner-Atlassian
CVSS Score-9.8||CRITICAL
EPSS-4.18% / 88.55%
||
7 Day CHG-11.99%
Published-29 Jul, 2021 | 10:12
Updated-17 Oct, 2024 | 16:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Jira Data Center, Jira Core Data Center, Jira Software Data Center from version 6.3.0 before 8.5.16, from 8.6.0 before 8.13.8, from 8.14.0 before 8.17.0 and Jira Service Management Data Center from version 2.0.2 before 4.5.16, from version 4.6.0 before 4.13.8, and from version 4.14.0 before 4.17.0 exposed a Ehcache RMI network service which attackers, who can connect to the service, on port 40001 and potentially 40011[0][1], could execute arbitrary code of their choice in Jira through deserialization due to a missing authentication vulnerability. While Atlassian strongly suggests restricting access to the Ehcache ports to only Data Center instances, fixed versions of Jira will now require a shared secret in order to allow access to the Ehcache service. [0] In Jira Data Center, Jira Core Data Center, and Jira Software Data Center versions prior to 7.13.1, the Ehcache object port can be randomly allocated. [1] In Jira Service Management Data Center versions prior to 3.16.1, the Ehcache object port can be randomly allocated.

Action-Not Available
Vendor-Atlassian
Product-jira_data_centerjira_service_deskjira_service_managementJira Core Data CenterJira Service Management Data CenterJira Data CenterJira Software Data Centerjira_data_centerjira_service_deskjira_service_management
CWE ID-CWE-862
Missing Authorization
CWE ID-CWE-306
Missing Authentication for Critical Function
  • Previous
  • 1
  • 2
  • ...
  • 8
  • 9
  • 10
  • 11
  • 12
  • Next
Details not found