CWE-1188
Initialization of a Resource with an Insecure Default
The product initializes or sets a resource with a default that is intended to be changed by the administrator, but the default is not secure.
CVE-2017-12736 (GCVE-0-2017-12736)
Vulnerability from cvelistv5
- CWE-1188 - Initialization of a Resource with an Insecure Default
▼ | URL | Tags |
---|---|---|
https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-856721.pdf | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1039463 | vdb-entry, x_refsource_SECTRACK | |
http://www.securitytracker.com/id/1039464 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/101041 | vdb-entry, x_refsource_BID | |
https://cert-portal.siemens.com/productcert/html/ssa-856721.html |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:43:56.622Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-856721.pdf" }, { "name": "1039463", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039463" }, { "name": "1039464", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039464" }, { "name": "101041", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/101041" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "RUGGEDCOM i800", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM i800NC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM i801", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM i801NC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM i802", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM i802NC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM i803", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM i803NC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM M2100", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM M2100NC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM M2200", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM M2200NC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM M969", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM M969NC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RMC30", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RMC30NC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RMC8388 V4.X", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RMC8388 V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.0.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RMC8388NC V4.X", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RMC8388NC V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.0.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RP110", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RP110NC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS1600", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS1600F", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS1600FNC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS1600NC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS1600T", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS1600TNC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS400", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS400NC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS401", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS401NC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS416", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS416NC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS416NCv2 V4.X", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS416NCv2 V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.0.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS416P", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS416PNC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS416PNCv2 V4.X", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS416PNCv2 V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.0.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS416Pv2 V4.X", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS416Pv2 V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.0.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS416v2 V4.X", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS416v2 V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.0.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS8000", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS8000A", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS8000ANC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS8000H", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS8000HNC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS8000NC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS8000T", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS8000TNC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS900", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS900 (32M) V4.X", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS900 (32M) V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.0.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS900G", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS900G (32M) V4.X", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS900G (32M) V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.0.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS900GNC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS900GNC(32M) V4.X", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS900GNC(32M) V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.0.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS900GP", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS900GPNC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS900L", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS900LNC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS900M-GETS-C01", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS900M-GETS-XX", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS900M-STND-C01", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS900M-STND-XX", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS900MNC-GETS-C01", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS900MNC-GETS-XX", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS900MNC-STND-XX", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS900MNC-STND-XX-C01", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS900NC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS900NC(32M) V4.X", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS900NC(32M) V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.0.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS900W", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS910", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS910L", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS910LNC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS910NC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS910W", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS920L", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS920LNC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS920W", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS930L", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS930LNC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS930W", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS940G", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS940GNC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS969", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RS969NC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG2100", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG2100 (32M) V4.X", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG2100 (32M) V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.0.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG2100NC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG2100NC(32M) V4.X", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG2100NC(32M) V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.0.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG2100P", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG2100P (32M) V4.X", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG2100P (32M) V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.0.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG2100PNC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG2100PNC (32M) V4.X", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG2100PNC (32M) V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.0.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG2200", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG2200NC", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG2288 V4.X", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG2288 V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.0.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG2288NC V4.X", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG2288NC V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.0.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG2300 V4.X", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG2300 V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.0.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG2300NC V4.X", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG2300NC V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.0.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG2300P V4.X", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG2300P V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.0.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG2300PNC V4.X", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG2300PNC V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.0.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG2488 V4.X", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG2488 V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.0.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG2488NC V4.X", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG2488NC V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.0.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG907R", "vendor": "Siemens", "versions": [ { "lessThan": "V5.0.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG908C", "vendor": "Siemens", "versions": [ { "lessThan": "V5.0.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG909R", "vendor": "Siemens", "versions": [ { "lessThan": "V5.0.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG910C", "vendor": "Siemens", "versions": [ { "lessThan": "V5.0.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG920P V4.X", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG920P V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.0.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG920PNC V4.X", "vendor": "Siemens", "versions": [ { "lessThan": "V4.3.4", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSG920PNC V5.X", "vendor": "Siemens", "versions": [ { "lessThan": "V5.0.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSL910", "vendor": "Siemens", "versions": [ { "lessThan": "V5.0.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RSL910NC", "vendor": "Siemens", "versions": [ { "lessThan": "V5.0.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RST2228", "vendor": "Siemens", "versions": [ { "lessThan": "V5.0.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RST2228P", "vendor": "Siemens", "versions": [ { "lessThan": "V5.0.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RST916C", "vendor": "Siemens", "versions": [ { "lessThan": "V5.0.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "RUGGEDCOM RST916P", "vendor": "Siemens", "versions": [ { "lessThan": "V5.0.1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (SC, PN)", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (ST, E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (ST, E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3 (ST, PN)", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3LD (SC, E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB205-3LD (SC, PN)", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB206-2 (SC)", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB206-2 (ST/BFOC)", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB206-2 LD", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB206-2 SC", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB206-2 ST", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB206-2LD", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB208 (E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB208 (PN)", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (SC, E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (SC, PN)", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (ST, E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3 (ST, PN)", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3LD (SC, E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB213-3LD (SC, PN)", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB216 (E/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XB216 (PN)", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2 (SC)", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2 (ST/BFOC)", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2G PoE", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2G PoE (54 V DC)", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2G PoE EEC (54 V DC)", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP G", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP G (EIP DEF.)", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC206-2SFP G EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G (EIP def.)", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G PoE", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC208G PoE (54 V DC)", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-3G PoE", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-3G PoE (54 V DC)", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C G", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C G (EIP Def.)", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216-4C G EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC216EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224-4C G", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224-4C G (EIP Def.)", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XC224-4C G EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204 DNA", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204-2BA", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204-2BA DNA", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XF204G", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM408-4C", "vendor": "Siemens", "versions": [ { "lessThan": "V6.1.1", "status": "affected", "version": "V6.1.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM408-4C (L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.1.1", "status": "affected", "version": "V6.1.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM408-8C", "vendor": "Siemens", "versions": [ { "lessThan": "V6.1.1", "status": "affected", "version": "V6.1.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM408-8C (L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.1.1", "status": "affected", "version": "V6.1.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM416-4C", "vendor": "Siemens", "versions": [ { "lessThan": "V6.1.1", "status": "affected", "version": "V6.1.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XM416-4C (L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.1.1", "status": "affected", "version": "V6.1.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208 (Ethernet/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208G", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208G EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208G PoE EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208G PP", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208PoE EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP208PoE EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216 (Ethernet/IP)", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216 (V2)", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216EEC (V2)", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216G", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216G EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216G PoE EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216POE EEC", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XP216PoE EEC (V2)", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324WG (24 x FE, AC 230V)", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR324WG (24 X FE, DC 24V)", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR326-2C PoE WG", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR326-2C PoE WG (without UL)", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24XFE, 4XGE, 24V)", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24xFE, 4xGE,DC24V)", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V)", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (24xFE,4xGE,AC230V)", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (28xGE, AC 230V)", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR328-4C WG (28xGE, DC 24V)", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 1x230V", "vendor": "Siemens", "versions": [ { "lessThan": "V6.1.1", "status": "affected", "version": "V6.1.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 1x230V (L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.1.1", "status": "affected", "version": "V6.1.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 24V", "vendor": "Siemens", "versions": [ { "lessThan": "V6.1.1", "status": "affected", "version": "V6.1.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 24V (L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.1.1", "status": "affected", "version": "V6.1.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 2x230V", "vendor": "Siemens", "versions": [ { "lessThan": "V6.1.1", "status": "affected", "version": "V6.1.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR524-8C, 2x230V (L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.1.1", "status": "affected", "version": "V6.1.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 1x230V", "vendor": "Siemens", "versions": [ { "lessThan": "V6.1.1", "status": "affected", "version": "V6.1.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 1x230V (L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.1.1", "status": "affected", "version": "V6.1.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 24V", "vendor": "Siemens", "versions": [ { "lessThan": "V6.1.1", "status": "affected", "version": "V6.1.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 24V (L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.1.1", "status": "affected", "version": "V6.1.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 2x230V", "vendor": "Siemens", "versions": [ { "lessThan": "V6.1.1", "status": "affected", "version": "V6.1.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR526-8C, 2x230V (L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.1.1", "status": "affected", "version": "V6.1.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR528-6M", "vendor": "Siemens", "versions": [ { "lessThan": "V6.1.1", "status": "affected", "version": "V6.1.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR528-6M (2HR2, L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.1.1", "status": "affected", "version": "V6.1.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR528-6M (2HR2)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.1.1", "status": "affected", "version": "V6.1.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR528-6M (L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.1.1", "status": "affected", "version": "V6.1.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR552-12M", "vendor": "Siemens", "versions": [ { "lessThan": "V6.1.1", "status": "affected", "version": "V6.1.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR552-12M (2HR2, L3 int.)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.1.1", "status": "affected", "version": "V6.1.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR552-12M (2HR2)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.1.1", "status": "affected", "version": "V6.1.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SCALANCE XR552-12M (2HR2)", "vendor": "Siemens", "versions": [ { "lessThan": "V6.1.1", "status": "affected", "version": "V6.1.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC206-2", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC206-2SFP", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC208", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] }, { "defaultStatus": "unknown", "product": "SIPLUS NET SCALANCE XC216-4C", "vendor": "Siemens", "versions": [ { "lessThan": "V3.0.2", "status": "affected", "version": "V3.0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "After initial configuration, the Ruggedcom Discovery Protocol (RCDP) is still able to write to the device under certain conditions.\r\n\r\nThis could allow an attacker located in the adjacent network of the targeted device to perform unauthorized administrative actions." } ], "metrics": [ { "cvssV3_1": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1188", "description": "CWE-1188: Initialization of a Resource with an Insecure Default", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-12T11:10:44.721Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.siemens.com/cert/pool/cert/siemens_security_advisory_ssa-856721.pdf" }, { "name": "1039463", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039463" }, { "name": "1039464", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039464" }, { "name": "101041", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/101041" }, { "url": "https://cert-portal.siemens.com/productcert/html/ssa-856721.html" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2017-12736", "datePublished": "2017-12-26T04:00:00Z", "dateReserved": "2017-08-09T00:00:00", "dateUpdated": "2025-08-12T11:10:44.721Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-24706 (GCVE-0-2022-24706)
Vulnerability from cvelistv5
- CWE-1188 - Insecure Default Initialization of Resource
▼ | URL | Tags |
---|---|---|
https://lists.apache.org/thread/w24wo0h8nlctfps65txvk0oc5hdcnv00 | ||
https://docs.couchdb.org/en/3.2.2/setup/cluster.html | ||
http://www.openwall.com/lists/oss-security/2022/04/26/1 | mailing-list | |
http://www.openwall.com/lists/oss-security/2022/05/09/1 | mailing-list | |
http://www.openwall.com/lists/oss-security/2022/05/09/3 | mailing-list | |
http://www.openwall.com/lists/oss-security/2022/05/09/4 | mailing-list | |
http://www.openwall.com/lists/oss-security/2022/05/09/2 | mailing-list | |
http://packetstormsecurity.com/files/167032/Apache-CouchDB-3.2.1-Remote-Code-Execution.html | ||
https://medium.com/%40_sadshade/couchdb-erlang-and-cookies-rce-on-default-settings-b1e9173a4bcd | ||
http://packetstormsecurity.com/files/169702/Apache-CouchDB-Erlang-Remote-Code-Execution.html |
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache CouchDB |
Version: Apache CouchDB < |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:20:50.213Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://lists.apache.org/thread/w24wo0h8nlctfps65txvk0oc5hdcnv00" }, { "tags": [ "x_transferred" ], "url": "https://docs.couchdb.org/en/3.2.2/setup/cluster.html" }, { "name": "[oss-security] 20220426 CVE-2022-24706: Apache CouchDB: Remote Code Execution Vulnerability in Packaging", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/04/26/1" }, { "name": "[oss-security] 20220509 Re: CVE-2022-24706: Apache CouchDB: Remote Code Execution Vulnerability in Packaging", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/05/09/1" }, { "name": "[oss-security] 20220509 Re: CVE-2022-24706: Apache CouchDB: Remote Code Execution Vulnerability in Packaging", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/05/09/3" }, { "name": "[oss-security] 20220509 Re: CVE-2022-24706: Apache CouchDB: Remote Code Execution Vulnerability in Packaging", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/05/09/4" }, { "name": "[oss-security] 20220509 Re: CVE-2022-24706: Apache CouchDB: Remote Code Execution Vulnerability in Packaging", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/05/09/2" }, { "tags": [ "x_transferred" ], "url": "http://packetstormsecurity.com/files/167032/Apache-CouchDB-3.2.1-Remote-Code-Execution.html" }, { "tags": [ "x_transferred" ], "url": "https://medium.com/%40_sadshade/couchdb-erlang-and-cookies-rce-on-default-settings-b1e9173a4bcd" }, { "tags": [ "x_transferred" ], "url": "http://packetstormsecurity.com/files/169702/Apache-CouchDB-Erlang-Remote-Code-Execution.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-24706", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-01-29T16:14:35.670152Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2022-08-25", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-24706" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2025-07-30T01:37:42.786Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2022-08-25T00:00:00+00:00", "value": "CVE-2022-24706 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Apache CouchDB", "vendor": "Apache Software Foundation", "versions": [ { "lessThanOrEqual": "3.2.1", "status": "affected", "version": "Apache CouchDB", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "The Apache CouchDB Team would like to thank Alex Vandiver \u003calexmv@zulip.com\u003e for the report of this issue." } ], "descriptions": [ { "lang": "en", "value": "In Apache CouchDB prior to 3.2.2, an attacker can access an improperly secured default installation without authenticating and gain admin privileges. The CouchDB documentation has always made recommendations for properly securing an installation, including recommending using a firewall in front of all CouchDB installations." } ], "metrics": [ { "other": { "content": { "other": "critical" }, "type": "unknown" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1188", "description": "CWE-1188 Insecure Default Initialization of Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-02T00:00:00.000Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "url": "https://lists.apache.org/thread/w24wo0h8nlctfps65txvk0oc5hdcnv00" }, { "url": "https://docs.couchdb.org/en/3.2.2/setup/cluster.html" }, { "name": "[oss-security] 20220426 CVE-2022-24706: Apache CouchDB: Remote Code Execution Vulnerability in Packaging", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/04/26/1" }, { "name": "[oss-security] 20220509 Re: CVE-2022-24706: Apache CouchDB: Remote Code Execution Vulnerability in Packaging", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/05/09/1" }, { "name": "[oss-security] 20220509 Re: CVE-2022-24706: Apache CouchDB: Remote Code Execution Vulnerability in Packaging", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/05/09/3" }, { "name": "[oss-security] 20220509 Re: CVE-2022-24706: Apache CouchDB: Remote Code Execution Vulnerability in Packaging", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/05/09/4" }, { "name": "[oss-security] 20220509 Re: CVE-2022-24706: Apache CouchDB: Remote Code Execution Vulnerability in Packaging", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/05/09/2" }, { "url": "http://packetstormsecurity.com/files/167032/Apache-CouchDB-3.2.1-Remote-Code-Execution.html" }, { "url": "https://medium.com/%40_sadshade/couchdb-erlang-and-cookies-rce-on-default-settings-b1e9173a4bcd" }, { "url": "http://packetstormsecurity.com/files/169702/Apache-CouchDB-Erlang-Remote-Code-Execution.html" } ], "source": { "discovery": "UNKNOWN" }, "title": "Remote Code Execution Vulnerability in Packaging", "workarounds": [ { "lang": "en", "value": "CouchDB 3.2.2 and onwards will refuse to start with the former default\nErlang cookie value of `monster`. Installations that upgrade to this\nversions are forced to choose a different value.\n\nIn addition, all binary packages have been updated to bind `epmd` as\nwell as the CouchDB distribution port to `127.0.0.1` and/or `::1`\nrespectively." } ], "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2022-24706", "datePublished": "2022-04-26T00:00:00.000Z", "dateReserved": "2022-02-10T00:00:00.000Z", "dateUpdated": "2025-07-30T01:37:42.786Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-27524 (GCVE-0-2023-27524)
Vulnerability from cvelistv5
- CWE-1188 - Insecure Default Initialization of Resource
▼ | URL | Tags |
---|---|---|
https://lists.apache.org/thread/n0ftx60sllf527j7g11kmt24wvof8xyk | vendor-advisory | |
https://www.openwall.com/lists/oss-security/2023/04/24/2 | ||
https://packetstormsecurity.com/files/172522/Apache-Superset-2.0.0-Authentication-Bypass.html | ||
https://packetstormsecurity.com/files/175094/Apache-Superset-2.0.0-Remote-Code-Execution.html |
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Superset |
Version: 0 ≤ 2.0.1 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T12:16:35.472Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.apache.org/thread/n0ftx60sllf527j7g11kmt24wvof8xyk" }, { "tags": [ "x_transferred" ], "url": "https://www.openwall.com/lists/oss-security/2023/04/24/2" }, { "tags": [ "x_transferred" ], "url": "https://packetstormsecurity.com/files/172522/Apache-Superset-2.0.0-Authentication-Bypass.html" }, { "tags": [ "x_transferred" ], "url": "https://packetstormsecurity.com/files/175094/Apache-Superset-2.0.0-Remote-Code-Execution.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-27524", "options": [ { "Exploitation": "active" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-03T16:30:35.297888Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2024-01-08", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-27524" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2025-07-30T01:37:26.652Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2024-01-08T00:00:00+00:00", "value": "CVE-2023-27524 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Apache Superset", "vendor": "Apache Software Foundation", "versions": [ { "lessThanOrEqual": "2.0.1", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Naveen Sunkavally (Horizon3.ai)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Session Validation attacks in Apache Superset versions up to and including 2.0.1. Installations that have not altered the default configured SECRET_KEY according to installation instructions allow for an attacker to authenticate and access unauthorized resources. This does not affect Superset administrators who have changed the default value for SECRET_KEY config.\u003cbr\u003e\u003cbr\u003eAll superset installations should always set a unique secure random SECRET_KEY. Your SECRET_KEY is used to securely sign all session cookies and encrypting sensitive information on the database.\u003cbr\u003eAdd a strong SECRET_KEY to your `superset_config.py` file like:\u003cbr\u003e\u003cbr\u003eSECRET_KEY = \u0026lt;YOUR_OWN_RANDOM_GENERATED_SECRET_KEY\u0026gt;\u003cbr\u003e\u003cbr\u003eAlternatively you can set it with `SUPERSET_SECRET_KEY` environment variable.\u003cbr\u003e" } ], "value": "Session Validation attacks in Apache Superset versions up to and including 2.0.1. Installations that have not altered the default configured SECRET_KEY according to installation instructions allow for an attacker to authenticate and access unauthorized resources. This does not affect Superset administrators who have changed the default value for SECRET_KEY config.\n\nAll superset installations should always set a unique secure random SECRET_KEY. Your SECRET_KEY is used to securely sign all session cookies and encrypting sensitive information on the database.\nAdd a strong SECRET_KEY to your `superset_config.py` file like:\n\nSECRET_KEY = \u003cYOUR_OWN_RANDOM_GENERATED_SECRET_KEY\u003e\n\nAlternatively you can set it with `SUPERSET_SECRET_KEY` environment variable.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.9, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1188", "description": "CWE-1188 Insecure Default Initialization of Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-08T09:07:31.645Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://lists.apache.org/thread/n0ftx60sllf527j7g11kmt24wvof8xyk" }, { "url": "https://www.openwall.com/lists/oss-security/2023/04/24/2" }, { "url": "https://packetstormsecurity.com/files/172522/Apache-Superset-2.0.0-Authentication-Bypass.html" }, { "url": "https://packetstormsecurity.com/files/175094/Apache-Superset-2.0.0-Remote-Code-Execution.html" } ], "source": { "discovery": "UNKNOWN" }, "title": "Apache Superset: Session validation vulnerability when using provided default SECRET_KEY", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2023-27524", "datePublished": "2023-04-24T15:28:16.573Z", "dateReserved": "2023-03-02T13:28:19.726Z", "dateUpdated": "2025-07-30T01:37:26.652Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-6448 (GCVE-0-2023-6448)
Vulnerability from cvelistv5
- CWE-1188 - Insecure Default Initialization of Resource
▼ | URL | Tags |
---|---|---|
https://www.cisa.gov/news-events/alerts/2023/11/28/exploitation-unitronics-plcs-used-water-and-wastewater-systems | government-resource | |
https://www.unitronicsplc.com/cyber_security_vision-samba/ | ||
https://downloads.unitronicsplc.com/Sites/plc/Visilogic/Version_Changes-Bug_Reports/VisiLogic%209.9.00%20Version%20changes.pdf | release-notes | |
https://downloads.unitronicsplc.com/Sites/plc/Technical_Library/Unitronics-Cybersecurity-Advisory-2023-001-CVE-2023-6448.pdf | vendor-advisory |
Vendor | Product | Version | ||
---|---|---|---|---|
Unitronics | VisiLogic |
Version: 0 < 9.9.00 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:28:21.839Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "government-resource", "x_transferred" ], "url": "https://www.cisa.gov/news-events/alerts/2023/11/28/exploitation-unitronics-plcs-used-water-and-wastewater-systems" }, { "tags": [ "x_transferred" ], "url": "https://www.unitronicsplc.com/cyber_security_vision-samba/" }, { "tags": [ "release-notes", "x_transferred" ], "url": "https://downloads.unitronicsplc.com/Sites/plc/Visilogic/Version_Changes-Bug_Reports/VisiLogic%209.9.00%20Version%20changes.pdf" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://downloads.unitronicsplc.com/Sites/plc/Technical_Library/Unitronics-Cybersecurity-Advisory-2023-001-CVE-2023-6448.pdf" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:unitronics:visilogic:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "visilogic", "vendor": "unitronics", "versions": [ { "lessThan": "9.9.00", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-6448", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2023-12-06T14:07:21.216497Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2023-12-11", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-6448" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2025-07-30T01:37:10.634Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2023-12-11T00:00:00+00:00", "value": "CVE-2023-6448 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "VisiLogic", "vendor": "Unitronics", "versions": [ { "lessThan": "9.9.00", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "datePublic": "2023-11-28T05:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Unitronics VisiLogic before version 9.9.00, used in Vision and Samba PLCs and HMIs, uses a default administrative password. An unauthenticated attacker with network access can take administrative control of a vulnerable system.\u003cbr\u003e" } ], "value": "Unitronics VisiLogic before version 9.9.00, used in Vision and Samba PLCs and HMIs, uses a default administrative password. An unauthenticated attacker with network access can take administrative control of a vulnerable system.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1188", "description": "CWE-1188 Insecure Default Initialization of Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-12-19T16:23:39.022Z", "orgId": "9119a7d8-5eab-497f-8521-727c672e3725", "shortName": "cisa-cg" }, "references": [ { "tags": [ "government-resource" ], "url": "https://www.cisa.gov/news-events/alerts/2023/11/28/exploitation-unitronics-plcs-used-water-and-wastewater-systems" }, { "url": "https://www.unitronicsplc.com/cyber_security_vision-samba/" }, { "tags": [ "release-notes" ], "url": "https://downloads.unitronicsplc.com/Sites/plc/Visilogic/Version_Changes-Bug_Reports/VisiLogic%209.9.00%20Version%20changes.pdf" }, { "tags": [ "vendor-advisory" ], "url": "https://downloads.unitronicsplc.com/Sites/plc/Technical_Library/Unitronics-Cybersecurity-Advisory-2023-001-CVE-2023-6448.pdf" } ], "source": { "discovery": "UNKNOWN" }, "title": "Unitronics VisiLogic uses a default administrative password", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "9119a7d8-5eab-497f-8521-727c672e3725", "assignerShortName": "cisa-cg", "cveId": "CVE-2023-6448", "datePublished": "2023-12-05T17:43:40.451Z", "dateReserved": "2023-11-30T18:40:51.463Z", "dateUpdated": "2025-07-30T01:37:10.634Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-25271 (GCVE-0-2025-25271)
Vulnerability from cvelistv5
- CWE-1188 - Insecure Default Initialization of Resource
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Phoenix Contact | CHARX SEC-3150 |
Version: 0.0.0 ≤ |
||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-25271", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-07-08T14:23:31.539913Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-08T14:28:44.675Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "CHARX SEC-3150", "vendor": "Phoenix Contact", "versions": [ { "lessThan": "1.7.3", "status": "affected", "version": "0.0.0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "CHARX SEC-3100", "vendor": "Phoenix Contact", "versions": [ { "lessThan": "1.7.3", "status": "affected", "version": "0.0.0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "CHARX SEC-3050", "vendor": "Phoenix Contact", "versions": [ { "lessThan": "1.7.3", "status": "affected", "version": "0.0.0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "CHARX SEC-3000", "vendor": "Phoenix Contact", "versions": [ { "lessThan": "1.7.3", "status": "affected", "version": "0.0.0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An unauthenticated adjacent attacker is able to configure a new OCPP backend, due to insecure defaults for the configuration interface.\u003cbr\u003e" } ], "value": "An unauthenticated adjacent attacker is able to configure a new OCPP backend, due to insecure defaults for the configuration interface." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1188", "description": "CWE-1188 Insecure Default Initialization of Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-22T07:50:50.592Z", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE" }, "references": [ { "url": "https://certvde.com/de/advisories/VDE-2025-019" } ], "source": { "advisory": "VDE-2025-019", "defect": [ "CERT@VDE#641747" ], "discovery": "UNKNOWN" }, "title": "OCPP Backend Configuration via Insecure Defaults", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2025-25271", "datePublished": "2025-07-08T07:01:33.274Z", "dateReserved": "2025-02-06T13:19:38.484Z", "dateUpdated": "2025-07-22T07:50:50.592Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-36222 (GCVE-0-2025-36222)
Vulnerability from cvelistv5
- CWE-1188 - Insecure Default Initialization of Resource
▼ | URL | Tags |
---|---|---|
https://www.ibm.com/support/pages/node/7244646 | vendor-advisory, patch |
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | IBM | Fusion |
Version: 2.2.0 ≤ 2.10.1 cpe:2.3:a:ibm:storage_fusion:2.2.0:*:*:*:*:*:*:* cpe:2.3:a:ibm:storage_fusion:2.10.1:*:*:*:*:*:*:* |
|||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-36222", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-09-12T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-13T03:55:38.759Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:ibm:storage_fusion:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:storage_fusion:2.10.1:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "Fusion", "vendor": "IBM", "versions": [ { "lessThanOrEqual": "2.10.1", "status": "affected", "version": "2.2.0", "versionType": "semver" } ] }, { "cpes": [ "cpe:2.3:a:ibm:storage_fusion_hci:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:storage_fusion_hci:2.10.0:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "Fusion HCI", "vendor": "IBM", "versions": [ { "lessThanOrEqual": "2.10.0", "status": "affected", "version": "2.2.0", "versionType": "semver" } ] }, { "cpes": [ "cpe:2.3:a:ibm:storage_fusion_hci_for_watsonx:2.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:storage_fusion_hci_for_watsonx:2.10.0:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "Fusion HCI for watsonx", "vendor": "IBM", "versions": [ { "lessThanOrEqual": "2.10.0", "status": "affected", "version": "2.8.2", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Robert Hotchkiss" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "IBM Fusion 2.2.0 through 2.10.1, IBM Fusion HCI 2.2.0 through 2.10.0, and IBM Fusion HCI for watsonx 2.8.2 through 2.10.0 uses insecure default configurations that could expose AMQStreams without client authentication that could allow an attacker to perform unauthorized actions." } ], "value": "IBM Fusion 2.2.0 through 2.10.1, IBM Fusion HCI 2.2.0 through 2.10.0, and IBM Fusion HCI for watsonx 2.8.2 through 2.10.0 uses insecure default configurations that could expose AMQStreams without client authentication that could allow an attacker to perform unauthorized actions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1188", "description": "CWE-1188 Insecure Default Initialization of Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-11T20:44:06.696Z", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "vendor-advisory", "patch" ], "url": "https://www.ibm.com/support/pages/node/7244646" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eIBM strongly recommends addressing the vulnerability now.\u003c/p\u003e\u003cdiv\u003e\u003ctable\u003e\u003ctbody\u003e\u003ctr\u003e\u003ctd\u003e\u003cstrong\u003eProducts\u003c/strong\u003e\u003c/td\u003e\u003ctd\u003e\u003cstrong\u003eVersion range \u003c/strong\u003e\u003c/td\u003e\u003ctd\u003e\u003cstrong\u003eRemediation Instructions\u003c/strong\u003e\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eIBM Fusion\u003c/td\u003e\u003ctd\u003e2.2.0 - 2.10.1\u003c/td\u003e\u003ctd\u003eUpgrade to IBM Fusion 2.11.0. See the \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/support/pages/node/7242341\"\u003eREADME\u003c/a\u003e\u0026nbsp;for instructions..\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eIBM Fusion HCI\u003c/td\u003e\u003ctd\u003e2.2.0 - 2.10.0\u003c/td\u003e\u003ctd\u003eUpgrade to IBM Fusion HCI 2.11.0. See the \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/support/pages/node/7242340\"\u003eREADME\u003c/a\u003e\u0026nbsp;for instructions.\u003c/td\u003e\u003c/tr\u003e\u003ctr\u003e\u003ctd\u003eIBM Fusion HCI for watsonx\u003c/td\u003e\u003ctd\u003e2.8.2 - 2.10.0\u003c/td\u003e\u003ctd\u003eUpgrade to IBM Fusion HCI for watsonx 2.11.0. See \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.ibm.com/support/pages/node/7242340\"\u003eREADME\u003c/a\u003e\u0026nbsp;for instructions.\u003c/td\u003e\u003c/tr\u003e\u003c/tbody\u003e\u003c/table\u003e\u003c/div\u003e\n\n\u003cbr\u003e" } ], "value": "IBM strongly recommends addressing the vulnerability now.\n\nProductsVersion range Remediation InstructionsIBM Fusion2.2.0 - 2.10.1Upgrade to IBM Fusion 2.11.0. See the README https://www.ibm.com/support/pages/node/7242341 \u00a0for instructions..IBM Fusion HCI2.2.0 - 2.10.0Upgrade to IBM Fusion HCI 2.11.0. See the README https://www.ibm.com/support/pages/node/7242340 \u00a0for instructions.IBM Fusion HCI for watsonx2.8.2 - 2.10.0Upgrade to IBM Fusion HCI for watsonx 2.11.0. See README https://www.ibm.com/support/pages/node/7242340 \u00a0for instructions." } ], "source": { "discovery": "UNKNOWN" }, "title": "IBM Fusion insecure default configuration", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2025-36222", "datePublished": "2025-09-11T20:44:06.696Z", "dateReserved": "2025-04-15T21:16:41.802Z", "dateUpdated": "2025-09-13T03:55:38.759Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-41672 (GCVE-0-2025-41672)
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
WAGO | Wago Device Sphere |
Version: 1.0.0 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-41672", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-07-07T16:27:29.386240Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-07T16:34:52.794Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Wago Device Sphere", "vendor": "WAGO", "versions": [ { "status": "affected", "version": "1.0.0" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A remote unauthenticated attacker may use default certificates to generate JWT Tokens and gain full access to the tool and all connected devices." } ], "value": "A remote unauthenticated attacker may use default certificates to generate JWT Tokens and gain full access to the tool and all connected devices." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1188", "description": "CWE-1188", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-07T06:17:18.988Z", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE" }, "references": [ { "url": "https://cert.vde.com/en/advisories/VDE-2025-057" }, { "tags": [ "vendor-advisory" ], "url": "https://wago.csaf-tp.certvde.com/.well-known/csaf/white/2025/vde-2025-057.json" } ], "source": { "discovery": "UNKNOWN" }, "title": "WAGO: Vulnerability in WAGO Device Sphere", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2025-41672", "datePublished": "2025-07-07T06:17:18.988Z", "dateReserved": "2025-04-16T11:17:48.308Z", "dateUpdated": "2025-07-07T16:34:52.794Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-41713 (GCVE-0-2025-41713)
Vulnerability from cvelistv5
- CWE-1188 - Insecure Default Initialization of Resource
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | WAGO | CC100 0751-9301 |
Version: 0 ≤ |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-41713", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-15T15:23:05.302247Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-15T15:23:17.088Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "CC100 0751-9301", "vendor": "WAGO", "versions": [ { "lessThan": "HW", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "CC100 0751-9301 HW rev. \u0026lt;082100", "vendor": "WAGO", "versions": [ { "lessThan": "04.08.05", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "CC100 0751-9301/K000-0005", "vendor": "WAGO", "versions": [ { "lessThan": "HW", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "CC100 0751-9301/K000-0005 HW rev. \u0026lt;082100", "vendor": "WAGO", "versions": [ { "lessThan": "04.08.05", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "CC100 0751-9401", "vendor": "WAGO", "versions": [ { "lessThan": "HW", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "CC100 0751-9401 HW rev. \u0026lt;052500", "vendor": "WAGO", "versions": [ { "lessThan": "04.08.05", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "CC100 0751-9402", "vendor": "WAGO", "versions": [ { "lessThan": "HW", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "CC100 0751-9402/0000-0001", "vendor": "WAGO", "versions": [ { "lessThan": "HW", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "CC100 0751-9402/0000-0001 HW rev. \u0026lt;052800", "vendor": "WAGO", "versions": [ { "lessThan": "04.08.05", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "CC100 0751-9402 HW rev. \u0026lt;032800", "vendor": "WAGO", "versions": [ { "lessThan": "04.08.05", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "CC100 0751-9403", "vendor": "WAGO", "versions": [ { "lessThan": "HW", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "CC100 0751-9403 HW rev. \u0026lt;022800", "vendor": "WAGO", "versions": [ { "lessThan": "04.08.05", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "Edge Controller 0752-8303/8000-0002", "vendor": "WAGO", "versions": [ { "lessThan": "HW", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "Edge Controller 0752-8303/8000-0002 HW rev. 32500", "vendor": "WAGO", "versions": [ { "lessThan": "04.08.05", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TP600 0762-4101", "vendor": "WAGO", "versions": [ { "lessThan": "HW", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TP600 0762-4101 HW rev. \u0026lt;072500", "vendor": "WAGO", "versions": [ { "lessThan": "04.08.05", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TP600 0762-4102", "vendor": "WAGO", "versions": [ { "lessThan": "HW", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TP600 0762-4102 HW rev. \u0026lt;072500", "vendor": "WAGO", "versions": [ { "lessThan": "04.08.05", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TP600 0762-4104", "vendor": "WAGO", "versions": [ { "lessThan": "HW", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TP600 0762-4104 HW rev. \u0026lt;062500", "vendor": "WAGO", "versions": [ { "lessThan": "04.08.05", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TP600 0762-4201/8000-0001", "vendor": "WAGO", "versions": [ { "lessThan": "HW", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TP600 0762-4201/8000-0001 HW rev. \u0026lt;072500", "vendor": "WAGO", "versions": [ { "lessThan": "04.08.05", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TP600 0762-4201/8000-0002", "vendor": "WAGO", "versions": [ { "lessThan": "HW", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TP600 0762-4201/8000-0002", "vendor": "WAGO", "versions": [ { "lessThan": "HW", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TP600 0762-4201/8000-0002 HW rev. \u0026lt;072500", "vendor": "WAGO", "versions": [ { "lessThan": "04.08.05", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TP600 0762-4201/8000-0002 HW rev. \u0026lt;072500", "vendor": "WAGO", "versions": [ { "lessThan": "04.08.05", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TP600 0762-4301/8000-0002", "vendor": "WAGO", "versions": [ { "lessThan": "HW", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TP600 0762-4301/8000-0002 HW rev. \u0026lt;072500", "vendor": "WAGO", "versions": [ { "lessThan": "04.08.05", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TP600 0762-4302/8000-0002", "vendor": "WAGO", "versions": [ { "lessThan": "HW", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TP600 0762-4302/8000-0002 HW rev. \u0026lt;072500", "vendor": "WAGO", "versions": [ { "lessThan": "04.08.05", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TP600 0762-4303/8000-0002", "vendor": "WAGO", "versions": [ { "lessThan": "HW", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TP600 0762-4303/8000-0002 HW rev. \u0026lt;062500", "vendor": "WAGO", "versions": [ { "lessThan": "04.08.05", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TP600 0762-4304/8000-0002", "vendor": "WAGO", "versions": [ { "lessThan": "HW", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TP600 0762-4304/8000-0002 HW rev. \u0026lt;062500", "vendor": "WAGO", "versions": [ { "lessThan": "04.08.05", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TP600 0762-4305/8000-0002", "vendor": "WAGO", "versions": [ { "lessThan": "HW", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TP600 0762-4305/8000-0002 HW rev. \u0026lt;052500", "vendor": "WAGO", "versions": [ { "lessThan": "04.08.05", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TP600 0762-4306/8000-0001", "vendor": "WAGO", "versions": [ { "lessThan": "HW", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TP600 0762-4306/8000-0001 HW rev. \u0026lt;042500", "vendor": "WAGO", "versions": [ { "lessThan": "04.08.05", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TP600 0762-4306/8000-0002", "vendor": "WAGO", "versions": [ { "lessThan": "HW", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TP600 0762-4306/8000-0002 HW rev. \u0026lt;042500", "vendor": "WAGO", "versions": [ { "lessThan": "04.08.05", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TP600 0762-5201/8000-0001", "vendor": "WAGO", "versions": [ { "lessThan": "HW", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TP600 0762-5201/8000-0001 HW rev. \u0026lt;062500", "vendor": "WAGO", "versions": [ { "lessThan": "04.08.05", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TP600 0762-5203/8000-0001", "vendor": "WAGO", "versions": [ { "lessThan": "HW", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TP600 0762-5203/8000-0001 HW rev. \u0026lt;062500", "vendor": "WAGO", "versions": [ { "lessThan": "04.08.05", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TP600 0762-5204/8000-0001", "vendor": "WAGO", "versions": [ { "lessThan": "HW", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TP600 0762-5204/8000-0001", "vendor": "WAGO", "versions": [ { "lessThan": "HW", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TP600 0762-5204/8000-0001 HW rev. \u0026lt;052500", "vendor": "WAGO", "versions": [ { "lessThan": "04.08.05", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TP600 0762-5204/8000-0001 HW rev. \u0026lt;052500", "vendor": "WAGO", "versions": [ { "lessThan": "04.08.05", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TP600 0762-5205/8000-0001", "vendor": "WAGO", "versions": [ { "lessThan": "HW", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TP600 0762-5205/8000-0001 HW rev. \u0026lt;032500", "vendor": "WAGO", "versions": [ { "lessThan": "04.08.05", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TP600 0762-5206/8000-0001", "vendor": "WAGO", "versions": [ { "lessThan": "HW", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "TP600 0762-5206/8000-0001 HW rev. \u0026lt;042500", "vendor": "WAGO", "versions": [ { "lessThan": "04.08.05", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "During a short time frame while the device is booting an unauthenticated remote attacker can send traffic to unauthorized networks due to the switch operating in an undefined state until a CPU-induced reset allows proper configuration." } ], "value": "During a short time frame while the device is booting an unauthenticated remote attacker can send traffic to unauthorized networks due to the switch operating in an undefined state until a CPU-induced reset allows proper configuration." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1188", "description": "CWE-1188 Insecure Default Initialization of Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-15T08:00:50.241Z", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE" }, "references": [ { "url": "https://certvde.com/en/advisories/VDE-2025-083" }, { "url": "https://wago.csaf-tp.certvde.com/.well-known/csaf/white/2025/vde-2025-083.json" } ], "source": { "advisory": "VDE-2025-083", "defect": [ "CERT@VDE#641852" ], "discovery": "UNKNOWN" }, "title": "WAGO: Vulnerability in hardware switch circuit", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2025-41713", "datePublished": "2025-09-15T08:00:50.241Z", "dateReserved": "2025-04-16T11:17:48.311Z", "dateUpdated": "2025-09-15T15:23:17.088Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-43797 (GCVE-0-2025-43797)
Vulnerability from cvelistv5
- CWE-1188 - Insecure Default Initialization of Resource
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-43797", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-09-16T13:50:07.409886Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-09-16T13:50:15.726Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Portal", "vendor": "Liferay", "versions": [ { "lessThanOrEqual": "7.4.3.111", "status": "affected", "version": "7.1.0", "versionType": "maven" } ] }, { "defaultStatus": "unaffected", "product": "DXP", "vendor": "Liferay", "versions": [ { "lessThanOrEqual": "7.3.10-u35", "status": "affected", "version": "7.3.10", "versionType": "maven" }, { "lessThanOrEqual": "7.4.13-u92", "status": "affected", "version": "7.4.13", "versionType": "maven" }, { "lessThanOrEqual": "2023.Q3.4", "status": "affected", "version": "2023.Q3.1", "versionType": "maven" }, { "status": "affected", "version": "2023.Q4.0", "versionType": "maven" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In Liferay Portal 7.1.0 through 7.4.3.111, and Liferay DXP 2023.Q4.0, 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92, 7.3 GA through update 35, and older unsupported versions, the default membership type of a newly created site is \u201cOpen\u201d which allows any registered users to become a member of the site. A remote attacker with site membership can potentially view, add or edit content on the site." } ], "value": "In Liferay Portal 7.1.0 through 7.4.3.111, and Liferay DXP 2023.Q4.0, 2023.Q3.1 through 2023.Q3.4, 7.4 GA through update 92, 7.3 GA through update 35, and older unsupported versions, the default membership type of a newly created site is \u201cOpen\u201d which allows any registered users to become a member of the site. A remote attacker with site membership can potentially view, add or edit content on the site." } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 5.3, "baseSeverity": "MEDIUM", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1188", "description": "CWE-1188: Insecure Default Initialization of Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-15T21:28:30.977Z", "orgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3", "shortName": "Liferay" }, "references": [ { "url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43797" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "8b54e794-c6f0-462e-9faa-c1001a673ac3", "assignerShortName": "Liferay", "cveId": "CVE-2025-43797", "datePublished": "2025-09-15T21:28:30.977Z", "dateReserved": "2025-04-17T10:55:31.458Z", "dateUpdated": "2025-09-16T13:50:15.726Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-48927 (GCVE-0-2025-48927)
Vulnerability from cvelistv5
- CWE-1188 - Initialization of a Resource with an Insecure Default
Vendor | Product | Version | ||
---|---|---|---|---|
TeleMessage | service |
Version: 0 < |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-48927", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-07-17T03:55:34.108284Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2025-07-01", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-48927" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2025-07-30T01:36:11.666Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2025-07-01T00:00:00+00:00", "value": "CVE-2025-48927 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "service", "vendor": "TeleMessage", "versions": [ { "lessThanOrEqual": "2025-05-05", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "The TeleMessage service through 2025-05-05 configures Spring Boot Actuator with an exposed heap dump endpoint at a /heapdump URI, as exploited in the wild in May 2025." } ], "metrics": [ { "cvssV3_1": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1188", "description": "CWE-1188 Initialization of a Resource with an Insecure Default", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-28T16:57:32.196Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://www.wired.com/story/how-the-signal-knock-off-app-telemessage-got-hacked-in-20-minutes/" } ], "tags": [ "exclusively-hosted-service" ], "x_generator": { "engine": "enrichogram 0.0.1" } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2025-48927", "datePublished": "2025-05-28T00:00:00.000Z", "dateReserved": "2025-05-28T00:00:00.000Z", "dateUpdated": "2025-07-30T01:36:11.666Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
No mitigation information available for this CWE.
CAPEC-665: Exploitation of Thunderbolt Protection Flaws
An adversary leverages a firmware weakness within the Thunderbolt protocol, on a computing device to manipulate Thunderbolt controller firmware in order to exploit vulnerabilities in the implementation of authorization and verification schemes within Thunderbolt protection mechanisms. Upon gaining physical access to a target device, the adversary conducts high-level firmware manipulation of the victim Thunderbolt controller SPI (Serial Peripheral Interface) flash, through the use of a SPI Programing device and an external Thunderbolt device, typically as the target device is booting up. If successful, this allows the adversary to modify memory, subvert authentication mechanisms, spoof identities and content, and extract data and memory from the target device. Currently 7 major vulnerabilities exist within Thunderbolt protocol with 9 attack vectors as noted in the Execution Flow.