Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2026-20435

Summary
Assigner-MediaTek
Assigner Org ID-ee979b05-11f8-4f25-a7e0-a1fa9c190374
Published At-02 Mar, 2026 | 08:39
Updated At-02 Mar, 2026 | 13:35
Rejected At-
Credits

In preloader, there is a possible read of device unique identifiers due to a logic error. This could lead to local information disclosure, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS10607099; Issue ID: MSV-6118.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:MediaTek
Assigner Org ID:ee979b05-11f8-4f25-a7e0-a1fa9c190374
Published At:02 Mar, 2026 | 08:39
Updated At:02 Mar, 2026 | 13:35
Rejected At:
▼CVE Numbering Authority (CNA)

In preloader, there is a possible read of device unique identifiers due to a logic error. This could lead to local information disclosure, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS10607099; Issue ID: MSV-6118.

Affected Products
Vendor
MediaTek Inc.MediaTek, Inc.
Product
MT2737, MT6739, MT6761, MT6765, MT6768, MT6781, MT6789, MT6813, MT6833, MT6853, MT6855, MT6877, MT6878, MT6879, MT6880, MT6885, MT6886, MT6890, MT6893, MT6895, MT6897, MT6983, MT6985, MT6989, MT6990, MT6993, MT8169, MT8186, MT8188, MT8370, MT8390, MT8676, MT8678, MT8696, MT8793
Versions
Affected
  • Android 14.0, 15.0, 16.0 / openWRT 21.02, 23.05 / Yocto 4.0 / RDK-B 22Q3, 24Q1 / Zephyr 3.7.0
Problem Types
TypeCWE IDDescription
CWECWE-522CWE-522 Insufficiently Protected Credentials
Type: CWE
CWE ID: CWE-522
Description: CWE-522 Insufficiently Protected Credentials
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://corp.mediatek.com/product-security-bulletin/March-2026
N/A
Hyperlink: https://corp.mediatek.com/product-security-bulletin/March-2026
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
3.14.6MEDIUM
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Version: 3.1
Base score: 4.6
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security@mediatek.com
Published At:02 Mar, 2026 | 09:16
Updated At:03 Mar, 2026 | 12:52

In preloader, there is a possible read of device unique identifiers due to a logic error. This could lead to local information disclosure, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS10607099; Issue ID: MSV-6118.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.14.6MEDIUM
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 4.6
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CPE Matches

The Linux Foundation
linuxfoundation
>>yocto>>4.0
cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*
rdkcentral
rdkcentral
>>rdk-b>>2022q3
cpe:2.3:a:rdkcentral:rdk-b:2022q3:*:*:*:*:*:*:*
rdkcentral
rdkcentral
>>rdk-b>>2024q1
cpe:2.3:a:rdkcentral:rdk-b:2024q1:*:*:*:*:*:*:*
Google LLC
google
>>android>>14.0
cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*
Google LLC
google
>>android>>15.0
cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*
Google LLC
google
>>android>>16.0
cpe:2.3:o:google:android:16.0:-:*:*:*:*:*:*
OpenWrt
openwrt
>>openwrt>>21.02.0
cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*
OpenWrt
openwrt
>>openwrt>>23.05.0
cpe:2.3:o:openwrt:openwrt:23.05.0:-:*:*:*:*:*:*
Zephyr Project
zephyrproject
>>zephyr>>3.7.0
cpe:2.3:o:zephyrproject:zephyr:3.7.0:-:*:*:*:*:*:*
MediaTek Inc.
mediatek
>>mt2737>>-
cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*
MediaTek Inc.
mediatek
>>mt6739>>-
cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*
MediaTek Inc.
mediatek
>>mt6761>>-
cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*
MediaTek Inc.
mediatek
>>mt6765>>-
cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*
MediaTek Inc.
mediatek
>>mt6768>>-
cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*
MediaTek Inc.
mediatek
>>mt6781>>-
cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*
MediaTek Inc.
mediatek
>>mt6789>>-
cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*
MediaTek Inc.
mediatek
>>mt6813>>-
cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*
MediaTek Inc.
mediatek
>>mt6833>>-
cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*
MediaTek Inc.
mediatek
>>mt6853>>-
cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*
MediaTek Inc.
mediatek
>>mt6855>>-
cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*
MediaTek Inc.
mediatek
>>mt6877>>-
cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*
MediaTek Inc.
mediatek
>>mt6878>>-
cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*
MediaTek Inc.
mediatek
>>mt6879>>-
cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*
MediaTek Inc.
mediatek
>>mt6880>>-
cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*
MediaTek Inc.
mediatek
>>mt6885>>-
cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*
MediaTek Inc.
mediatek
>>mt6886>>-
cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*
MediaTek Inc.
mediatek
>>mt6890>>-
cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*
MediaTek Inc.
mediatek
>>mt6893>>-
cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*
MediaTek Inc.
mediatek
>>mt6895>>-
cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*
MediaTek Inc.
mediatek
>>mt6897>>-
cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*
MediaTek Inc.
mediatek
>>mt6983>>-
cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*
MediaTek Inc.
mediatek
>>mt6985>>-
cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*
MediaTek Inc.
mediatek
>>mt6989>>-
cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*
MediaTek Inc.
mediatek
>>mt6990>>-
cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*
MediaTek Inc.
mediatek
>>mt6993>>-
cpe:2.3:h:mediatek:mt6993:-:*:*:*:*:*:*:*
MediaTek Inc.
mediatek
>>mt8169>>-
cpe:2.3:h:mediatek:mt8169:-:*:*:*:*:*:*:*
MediaTek Inc.
mediatek
>>mt8186>>-
cpe:2.3:h:mediatek:mt8186:-:*:*:*:*:*:*:*
MediaTek Inc.
mediatek
>>mt8188>>-
cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*
MediaTek Inc.
mediatek
>>mt8370>>-
cpe:2.3:h:mediatek:mt8370:-:*:*:*:*:*:*:*
MediaTek Inc.
mediatek
>>mt8390>>-
cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*
MediaTek Inc.
mediatek
>>mt8676>>-
cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*
MediaTek Inc.
mediatek
>>mt8678>>-
cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*
MediaTek Inc.
mediatek
>>mt8696>>-
cpe:2.3:h:mediatek:mt8696:-:*:*:*:*:*:*:*
MediaTek Inc.
mediatek
>>mt8793>>-
cpe:2.3:h:mediatek:mt8793:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-522Secondarysecurity@mediatek.com
CWE ID: CWE-522
Type: Secondary
Source: security@mediatek.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://corp.mediatek.com/product-security-bulletin/March-2026security@mediatek.com
Vendor Advisory
Hyperlink: https://corp.mediatek.com/product-security-bulletin/March-2026
Source: security@mediatek.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

56Records found

CVE-2024-3082
Matching Score-4
Assigner-Nozomi Networks Inc.
ShareView Details
Matching Score-4
Assigner-Nozomi Networks Inc.
CVSS Score-4.2||MEDIUM
EPSS-0.07% / 20.29%
||
7 Day CHG~0.00%
Published-31 Jul, 2024 | 13:14
Updated-30 Sep, 2024 | 14:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A “CWE-256: Plaintext Storage of a Password” affecting the administrative account allows an attacker with physical access to the machine to retrieve the password in cleartext unless specific security measures at other layers (e.g., full-disk encryption) have been enabled.

Action-Not Available
Vendor-progesPlug&Trackproges
Product-sensor_net_connect_firmware_v2sensor_net_connect_v2Sensor Net Connect V2sensor_net_connect
CWE ID-CWE-256
Plaintext Storage of a Password
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2023-6259
Matching Score-4
Assigner-Security Risk Advisors (SRA)
ShareView Details
Matching Score-4
Assigner-Security Risk Advisors (SRA)
CVSS Score-7.1||HIGH
EPSS-0.01% / 1.29%
||
7 Day CHG~0.00%
Published-19 Feb, 2024 | 21:28
Updated-01 Apr, 2025 | 15:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Local Access to Sensitive Data in Brivo ACS100 and ACS300

Insufficiently Protected Credentials, : Improper Access Control vulnerability in Brivo ACS100, ACS300 allows Password Recovery Exploitation, Bypassing Physical Security.This issue affects ACS100, ACS300: from 5.2.4 before 6.2.4.3.

Action-Not Available
Vendor-brivoBrivobrivo
Product-acs100acs300acs100_firmwareacs300_firmwareACS100, ACS300acs300_firmwareacs100_firmware
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2023-49106
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-4.6||MEDIUM
EPSS-0.08% / 23.10%
||
7 Day CHG~0.00%
Published-16 Jan, 2024 | 00:58
Updated-13 Nov, 2024 | 20:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Missing Password Field Masking Vulnerability in Hitachi Device Manager

Missing Password Field Masking vulnerability in Hitachi Device Manager on Windows, Linux (Device Manager Agent component).This issue affects Hitachi Device Manager: before 8.8.5-04.

Action-Not Available
Vendor-Linux Kernel Organization, IncHitachi, Ltd.Microsoft Corporation
Product-windowsdevice_managerlinux_kernelHitachi Device Manager
CWE ID-CWE-549
Missing Password Field Masking
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2022-46142
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-5.2||MEDIUM
EPSS-0.09% / 25.48%
||
7 Day CHG~0.00%
Published-13 Dec, 2022 | 00:00
Updated-21 Apr, 2025 | 13:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Affected devices store the CLI user passwords encrypted in flash memory. Attackers with physical access to the device could retrieve the file and decrypt the CLI user passwords.

Action-Not Available
Vendor-Siemens AG
Product-scalance_xb205-3ldscalance_xb216_firmwarescalance_xp216_firmwarescalance_xr324wg_firmwarescalance_xc224-4c_g_firmwarescalance_w1788-2_m12scalance_w786-1_rj45_firmwarescalance_wam766-1scalance_xr324wgscalance_m826-2_shdsl-routerscalance_wam766-1_ecc_firmwarescalance_xr524-8c_firmwarescalance_w748-1_m12_firmwarescalance_w738-1_m12scalance_sc646-2cscalance_m804pb_firmwarescalance_xp216eec_firmwarescalance_w774-1_rj45scalance_sc636-2cscalance_xc208_eecscalance_w788-2_m12_eecscalance_xc206-2sfp_eecscalance_m812-1_adsl-router_firmwarescalance_xc224-4c_g_eecscalance_wam766-1_eccscalance_xp208eecscalance_w778-1_m12scalance_xb205-3ruggedcom_rm1224_lte\(4g\)_eu_firmwarescalance_wum766-1_6ghz_firmwarescalance_xc206-2sfp_g_firmwarescalance_xc216eec_firmwarescalance_xr528-6m_firmwarescalance_w1748-1_m12scalance_m804pbscalance_xc224_firmwarescalance_mum856-1scalance_m874-3scalance_xm416-4c_firmwarescalance_xc206-2sfp_gscalance_xf204-2bca_dnascalance_xm416-4cscalance_xp216scalance_w1788-1_m12_firmwaresiplus_net_scalance_xc208scalance_wam763-1scalance_xf204_dna_firmwarescalance_xp216poe_eec_firmwarescalance_xc206-2g_poe_eecscalance_w1788-1_m12scalance_xb213-3_firmwarescalance_w721-1_rj45scalance_sc632-2cscalance_wum763-1scalance_m874-3_firmwarescalance_xc216-4c_gscalance_w738-1_m12_firmwarescalance_wum766-1scalance_xc206-2g_poescalance_w761-1_rj45_firmwarescalance_s615_eecscalance_xc216-4c_firmwarescalance_xc216-4c_g_firmwarescalance_xm408-8c_firmwarescalance_xp208poe_eecscalance_w788-2_m12_eec_firmwarescalance_w761-1_rj45siplus_net_scalance_xc206-2sfpscalance_xc216-3g_poe_firmwarescalance_xb213-3ldscalance_xc224-4c_g_eec_firmwarescalance_xr524-8cscalance_m816-1_adsl-routerscalance_xc208_poe_firmwarescalance_w722-1_rj45_firmwarescalance_xf204siplus_net_scalance_xc206-2_firmwarescalance_s615_eec_firmwarescalance_sc626-2cscalance_xc206-2sfp_g_eecscalance_w786-2_rj45scalance_xb213-3scalance_xr326-2c_poe_firmwarescalance_xr328-4c_wgscalance_xc206-2_firmwarescalance_w1788-2_eec_m12_firmwarescalance_s615siplus_net_scalance_xc216-4cscalance_xc208_firmwarescalance_xc208scalance_m874-2_firmwarescalance_xc224scalance_w1788-2ia_m12scalance_xf204-2bca_dna_firmwarescalance_xc224-4c_gscalance_xr552-12m_firmwarescalance_xb208scalance_xc216-4c_g_eecscalance_xc206-2sfp_g_eec_firmwaresiplus_net_scalance_xc206-2scalance_m874-2scalance_sc646-2c_firmwarescalance_sc642-2c_firmwarescalance_xp216poe_eecscalance_w734-1_rj45_firmwarescalance_xc206-2sfp_firmwarescalance_w786-2_sfpruggedcom_rm1224_lte\(4g\)_euscalance_w774-1_m12_rj45_firmwarescalance_wum763-1_firmwarescalance_m812-1_adsl-routerscalance_xp208poe_eec_firmwarescalance_xc206-2g_poe_eec_firmwaresiplus_net_scalance_xc206-2sfp_firmwarescalance_xc216-4cscalance_wum766-1_firmwarescalance_xr326-2c_poescalance_xr328-4c_wg_firmwarescalance_xr552-12mruggedcom_rm1224_lte\(4g\)_namsiplus_net_scalance_xc208_firmwarescalance_sc626-2c_firmwarescalance_sc632-2c_firmwarescalance_xf204-2ba_firmwarescalance_w786-2_rj45_firmwarescalance_w778-1_m12_firmwarescalance_xm408-4c_firmwarescalance_xr526-8c_firmwarescalance_w778-1_m12_eec_firmwarescalance_w734-1_rj45scalance_xb208_firmwarescalance_xc206-2sfpscalance_xb205-3_firmwarescalance_xc206-2g_poe_firmwarescalance_xr528-6mscalance_w1788-2_m12_firmwarescalance_w1748-1_m12_firmwarescalance_w788-2_m12scalance_m816-1_adsl-router_firmwarescalance_sc636-2c_firmwaresiplus_net_scalance_xc216-4c_firmwarescalance_s615_firmwarescalance_wam766-1_6ghz_firmwarescalance_xb205-3ld_firmwareruggedcom_rm1224_lte\(4g\)_nam_firmwarescalance_m876-3scalance_mum853-1_firmwarescalance_w774-1_m12_rj45scalance_w1788-2_eec_m12scalance_sc622-2cscalance_wam766-1_firmwarescalance_w788-1_m12scalance_wam763-1_firmwarescalance_xp208_firmwarescalance_w774-1_m12_eecscalance_xb213-3ld_firmwarescalance_xc216-4c_g_eec_firmwarescalance_w774-1_m12_eec_firmwarescalance_wam766-1_6ghzscalance_xc216scalance_xc208_poescalance_xb216scalance_m876-3_firmwarescalance_mum853-1scalance_w748-1_m12scalance_w774-1_rj45_firmwarescalance_xp208scalance_xr526-8cscalance_xf204-2bascalance_m826-2_shdsl-router_firmwarescalance_w1788-2ia_m12_firmwarescalance_xc206-2sfp_eec_firmwarescalance_xm408-8cscalance_xp208eec_firmwarescalance_xp216eecscalance_w721-1_rj45_firmwarescalance_w786-2_sfp_firmwarescalance_m876-4scalance_xf204_dnascalance_m876-4_firmwarescalance_xc208_eec_firmwarescalance_w778-1_m12_eecscalance_w788-2_m12_firmwarescalance_w786-2ia_rj45scalance_xc216_firmwarescalance_sc622-2c_firmwarescalance_xm408-4cscalance_xr326-2c_firmwarescalance_xr326-2cscalance_sc642-2cscalance_w788-1_rj45_firmwarescalance_xc206-2scalance_xf204_firmwarescalance_w788-1_m12_firmwarescalance_w786-2ia_rj45_firmwarescalance_xc216-3g_poescalance_xc216eecscalance_mum856-1_firmwarescalance_w722-1_rj45scalance_wum766-1_6ghzscalance_w786-1_rj45scalance_w788-1_rj45SCALANCE W774-1 RJ45SCALANCE M876-4 (NAM)SCALANCE W1788-2IA M12SCALANCE XB213-3 (ST, E/IP)SCALANCE XR524-8C, 24VSCALANCE XB213-3 (ST, PN)SCALANCE XC216EECRUGGEDCOM RM1224 LTE(4G) NAMSCALANCE XB205-3 (ST, PN)SCALANCE XC208SCALANCE XB213-3LD (SC, PN)SCALANCE XC206-2G PoESCALANCE XR328-4C WG (28xGE, DC 24V)SCALANCE XB205-3LD (SC, PN)SCALANCE M876-3SCALANCE W734-1 RJ45 (USA)SCALANCE MUM856-1 (RoW)SCALANCE XR324WG (24 X FE, DC 24V)SCALANCE XR528-6M (2HR2)SCALANCE XR528-6M (L3 int.)SCALANCE XB216 (E/IP)SCALANCE XC216-4CSCALANCE XB208 (E/IP)SCALANCE XR324WG (24 x FE, AC 230V)SCALANCE XC206-2 (SC)SCALANCE W778-1 M12 EECSCALANCE XR524-8C, 1x230VSCALANCE W788-1 M12SCALANCE XP208SCALANCE XR552-12M (2HR2)SCALANCE S615 EEC LAN-RouterSCALANCE XF204-2BA DNASCALANCE XB205-3LD (SC, E/IP)SCALANCE XF204-2BASCALANCE WUM763-1SIPLUS NET SCALANCE XC216-4CSCALANCE W788-2 M12 EECSCALANCE W786-2 RJ45SCALANCE XB213-3 (SC, PN)SCALANCE W1788-2 EEC M12SCALANCE XC206-2SFPSCALANCE XP216POE EECSCALANCE XM408-4C (L3 int.)SCALANCE W1788-2 M12SCALANCE W786-1 RJ45SCALANCE XP208EECSCALANCE MUM856-1 (EU)SCALANCE WAM766-1 (US)SCALANCE SC646-2CSCALANCE M826-2 SHDSL-RouterSCALANCE W786-2 SFPSCALANCE WUM766-1SCALANCE XR524-8C, 24V (L3 int.)SCALANCE XR552-12M (2HR2, L3 int.)SCALANCE XC206-2 (ST/BFOC)SCALANCE W722-1 RJ45SCALANCE S615 LAN-RouterSCALANCE XM416-4CSCALANCE W788-1 RJ45SCALANCE XR526-8C, 24V (L3 int.)SCALANCE XR528-6MSCALANCE XR528-6M (2HR2, L3 int.)SCALANCE XC216-4C GSCALANCE M874-2SCALANCE XR526-8C, 2x230VSCALANCE W1748-1 M12SCALANCE XP216 (Ethernet/IP)SCALANCE W774-1 M12 EECSCALANCE WAM766-1 EECSCALANCE XR328-4C WG (24xFE,4xGE,AC230V)SCALANCE XC224-4C GSCALANCE XC208G PoE (54 V DC)SCALANCE XC206-2G PoE EEC (54 V DC)SCALANCE XP208 (Ethernet/IP)SCALANCE M876-3 (ROK)SCALANCE XB216 (PN)SCALANCE XC216-4C G (EIP Def.)SCALANCE M876-4SCALANCE XR526-8C, 24VSCALANCE W734-1 RJ45SCALANCE SC636-2CSCALANCE W788-2 RJ45SCALANCE XM408-4CSCALANCE XC208G PoESCALANCE XR524-8C, 1x230V (L3 int.)SCALANCE W778-1 M12SCALANCE W748-1 RJ45SCALANCE XM408-8C (L3 int.)SCALANCE XB213-3LD (SC, E/IP)SCALANCE XC216SCALANCE XC208G EECSCALANCE XC208G (EIP def.)SCALANCE XC208GSCALANCE XR526-8C, 2x230V (L3 int.)SCALANCE XP216EECSCALANCE XC206-2G PoE (54 V DC)SCALANCE XM416-4C (L3 int.)RUGGEDCOM RM1224 LTE(4G) EUSCALANCE XC206-2SFP GSCALANCE W774-1 RJ45 (USA)SCALANCE MUM853-1 (EU)SCALANCE WAM766-1SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V)SCALANCE W778-1 M12 EEC (USA)SCALANCE W1788-1 M12SCALANCE W738-1 M12SCALANCE M876-4 (EU)SCALANCE XR524-8C, 2x230VSCALANCE XR526-8C, 1x230V (L3 int.)SCALANCE M804PBSCALANCE XC216-3G PoE (54 V DC)SCALANCE XR326-2C PoE WG (without UL)SCALANCE XB205-3 (SC, PN)SCALANCE WUM766-1 (USA)SCALANCE XC206-2SFP EECSCALANCE W721-1 RJ45SCALANCE XC206-2SFP G (EIP DEF.)SCALANCE SC632-2CSCALANCE XP208PoE EECSCALANCE W786-2IA RJ45SCALANCE XF204SCALANCE XF204 DNASCALANCE XB213-3 (SC, E/IP)SCALANCE XR524-8C, 2x230V (L3 int.)SCALANCE XB208 (PN)SCALANCE XC224SCALANCE XR326-2C PoE WGSCALANCE M874-3SCALANCE XB205-3 (ST, E/IP)SCALANCE XC208EECSCALANCE WAM763-1SCALANCE XR328-4C WG (24XFE, 4XGE, 24V)SIPLUS NET SCALANCE XC206-2SCALANCE XM408-8CSCALANCE W748-1 M12SCALANCE SC642-2CSCALANCE XR552-12MSCALANCE XR526-8C, 1x230VSCALANCE XR328-4C WG (28xGE, AC 230V)SIPLUS NET SCALANCE XC208SCALANCE M812-1 ADSL-RouterSCALANCE XC206-2SFP G EECSCALANCE XC224-4C G EECSCALANCE WAM766-1 EEC (US)SCALANCE W761-1 RJ45SCALANCE XC216-3G PoESCALANCE M816-1 ADSL-RouterSCALANCE XC216-4C G EECSIPLUS NET SCALANCE XC206-2SFPSCALANCE XP216SCALANCE XC224-4C G (EIP Def.)SCALANCE SC622-2CSCALANCE SC626-2CSCALANCE W788-2 M12
CWE ID-CWE-257
Storing Passwords in a Recoverable Format
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2022-43442
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-4.6||MEDIUM
EPSS-0.09% / 26.42%
||
7 Day CHG~0.00%
Published-05 Dec, 2022 | 00:00
Updated-24 Apr, 2025 | 15:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Plaintext storage of a password vulnerability exists in +F FS040U software versions v2.3.4 and earlier, which may allow an attacker to obtain the login password of +F FS040U and log in to the management console.

Action-Not Available
Vendor-fsiFUJI SOFT INCORPORATED
Product-fs040ufs040u_firmware+F FS040U software
CWE ID-CWE-522
Insufficiently Protected Credentials
CVE-2019-10224
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.05% / 16.10%
||
7 Day CHG~0.00%
Published-25 Nov, 2019 | 00:00
Updated-04 Aug, 2024 | 22:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw has been found in 389-ds-base versions 1.4.x.x before 1.4.1.3. When executed in verbose mode, the dscreate and dsconf commands may display sensitive information, such as the Directory Manager password. An attacker, able to see the screen or record the terminal standard error output, could use this flaw to gain sensitive information.

Action-Not Available
Vendor-Red Hat, Inc.Fedora Project
Product-389_directory_server389-ds-base
CWE ID-CWE-522
Insufficiently Protected Credentials
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
  • Previous
  • 1
  • 2
  • Next
Details not found