var-201702-0698
Vulnerability from variot
An issue was discovered in Carlo Gavazzi VMU-C EM prior to firmware Version A11_U05, and VMU-C PV prior to firmware Version A17. Sensitive information is stored in clear-text. Carlo Gavazzi VMU-C EM and VMU-C PV Firmware contains a vulnerability that allows important information to be stored in clear text.Important information may be stored in clear text. CarloGavazziAutomationVMU-CEM and VMU-CPV are control modules in the automation products of Italy's CarloGavazzi Automation. Multiple Carlo Gavazzi products are prone to an unauthorized-access vulnerability, a cross-site request-forgery vulnerability and an information-disclosure vulnerability. Exploiting these issues may allow a remote attacker to gain access to the sensitive information, or perform certain administrative actions and gain unauthorized access to the affected application. Other attacks are also possible. VMU-C Web-Server solution for photovoltaic applications
VMU-C EM is a data logger system for small to medium projects, VMUC-Y EM is a hardware data aggregator for medium to larger projects and Em2 Server is a software solution for large projects. They are designed to complement the extensive line of Carlo Gavazzi energy meters and current transformers. Weak Credentials Management* -> admin/admin -> Application does not enforce mandatory password change
2. Access Control flaws
- Access control is not enforced correctly
- Certain application functions can be accessed without any authentication
- Application stores the Energy / Plant data in a sqlite database - EWPlant.db. Anyone can dump plant database file - without any authentication
4. Reflected + Stored XSS - multiple URLs, parameters - Not documented in ICS-CERT Advisory
Successful exploitation of this vulnerability could allow an unauthenticated attacker to inject arbitrary JavaScript in a specially crafted URL request where the response containing user data is returned to the web browser without being made safe to display.
5. Vulnerable to Cross-Site Request Forgery
There is no CSRF Token generated per page and / or per (sensitive) function. Successful exploitation of this vulnerability can allow silent execution of unauthorized actions on the device such as configuration parameter changes, and saving modified configuration.
+++++
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201702-0698", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "vmu-c pv", "scope": "eq", "trust": 1.6, "vendor": "carlosgavazzi", "version": null }, { "model": "vmu-c em", "scope": "eq", "trust": 1.6, "vendor": "carlosgavazzi", "version": null }, { "model": "vmu-c em", "scope": null, "trust": 0.8, "vendor": "carlo gavazzi", "version": null }, { "model": "vmu-c em", "scope": "lt", "trust": 0.8, "vendor": "carlo gavazzi", "version": "a11_u05" }, { "model": "vmu-c pv", "scope": null, "trust": 0.8, "vendor": "carlo gavazzi", "version": null }, { "model": "vmu-c pv", "scope": "lt", "trust": 0.8, "vendor": "carlo gavazzi", "version": "a17" }, { "model": "gavazzi vmu-c em \u003ca11 u05", "scope": null, "trust": 0.6, "vendor": "carlo", "version": null }, { "model": "gavazzi vmu-c pv \u003ca17", "scope": null, "trust": 0.6, "vendor": "carlo", "version": null }, { "model": "gavazzi vmu-c pv", "scope": "eq", "trust": 0.3, "vendor": "carlo", "version": "0" }, { "model": "gavazzi vmu-c em", "scope": "eq", "trust": 0.3, "vendor": "carlo", "version": "0" }, { "model": "gavazzi vmu-c pv a17", "scope": "ne", "trust": 0.3, "vendor": "carlo", "version": null }, { "model": "gavazzi vmu-c em a11 u05", "scope": "ne", "trust": 0.3, "vendor": "carlo", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "vmu c em", "version": null }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "vmu c pv", "version": null } ], "sources": [ { "db": "IVD", "id": "43fc3419-278c-43ee-aa4a-d7c4f9efd16f" }, { "db": "CNVD", "id": "CNVD-2017-00491" }, { "db": "BID", "id": "95411" }, { "db": "JVNDB", "id": "JVNDB-2017-001715" }, { "db": "CNNVD", "id": "CNNVD-201701-325" }, { "db": "NVD", "id": "CVE-2017-5146" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/h:carlosgavazzi:vmu-c_em", "vulnerable": true }, { "cpe22Uri": "cpe:/o:carlosgavazzi:vmu-c_em_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/h:carlosgavazzi:vmu-c_pv", "vulnerable": true }, { "cpe22Uri": "cpe:/o:carlosgavazzi:vmu-c_pv_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-001715" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Karn Ganeshen", "sources": [ { "db": "BID", "id": "95411" }, { "db": "PACKETSTORM", "id": "142045" } ], "trust": 0.4 }, "cve": "CVE-2017-5146", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2017-5146", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2017-00491", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "43fc3419-278c-43ee-aa4a-d7c4f9efd16f", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-113349", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "id": "CVE-2017-5146", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-5146", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2017-5146", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2017-00491", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201701-325", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "43fc3419-278c-43ee-aa4a-d7c4f9efd16f", "trust": 0.2, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-113349", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2017-5146", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "43fc3419-278c-43ee-aa4a-d7c4f9efd16f" }, { "db": "CNVD", "id": "CNVD-2017-00491" }, { "db": "VULHUB", "id": "VHN-113349" }, { "db": "VULMON", "id": "CVE-2017-5146" }, { "db": "JVNDB", "id": "JVNDB-2017-001715" }, { "db": "CNNVD", "id": "CNNVD-201701-325" }, { "db": "NVD", "id": "CVE-2017-5146" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An issue was discovered in Carlo Gavazzi VMU-C EM prior to firmware Version A11_U05, and VMU-C PV prior to firmware Version A17. Sensitive information is stored in clear-text. Carlo Gavazzi VMU-C EM and VMU-C PV Firmware contains a vulnerability that allows important information to be stored in clear text.Important information may be stored in clear text. CarloGavazziAutomationVMU-CEM and VMU-CPV are control modules in the automation products of Italy\u0027s CarloGavazzi Automation. Multiple Carlo Gavazzi products are prone to an unauthorized-access vulnerability, a cross-site request-forgery vulnerability and an information-disclosure vulnerability. \nExploiting these issues may allow a remote attacker to gain access to the sensitive information, or perform certain administrative actions and gain unauthorized access to the affected application. Other attacks are also possible. *VMU-C Web-Server solution for photovoltaic applications*\n\nVMU-C EM is a data logger system for small to medium projects, VMUC-Y EM is\na hardware data aggregator for medium to larger projects and Em2 Server is\na software solution for large projects. They are designed to complement the\nextensive line of Carlo Gavazzi energy meters and current transformers. Weak Credentials Management*\n-\u003e admin/admin\n-\u003e Application does not enforce mandatory password change\n\n*2. Access Control flaws*\n\n 1. Access control is not enforced correctly\n 2. Certain application functions can be accessed without any\n authentication\n 3. Application stores the Energy / Plant data in a sqlite database -\n EWPlant.db. Anyone can dump plant database file - without any authentication\n\n*4. Reflected + Stored XSS - multiple URLs, parameters - *Not documented in\nICS-CERT Advisory\n\nSuccessful exploitation of this vulnerability could allow an\nunauthenticated attacker to inject arbitrary JavaScript in a specially\ncrafted URL request where the response containing user data is returned to\nthe web browser without being made safe to display. \n\n*5. Vulnerable to Cross-Site Request Forgery*\n\nThere is no CSRF Token generated per page and / or per (sensitive)\nfunction. Successful exploitation of this vulnerability can allow silent\nexecution of unauthorized actions on the device such as configuration\nparameter changes, and saving modified configuration. \n\n+++++\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2017-5146" }, { "db": "JVNDB", "id": "JVNDB-2017-001715" }, { "db": "CNVD", "id": "CNVD-2017-00491" }, { "db": "BID", "id": "95411" }, { "db": "IVD", "id": "43fc3419-278c-43ee-aa4a-d7c4f9efd16f" }, { "db": "VULHUB", "id": "VHN-113349" }, { "db": "VULMON", "id": "CVE-2017-5146" }, { "db": "PACKETSTORM", "id": "142045" } ], "trust": 2.88 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-5146", "trust": 3.8 }, { "db": "ICS CERT", "id": "ICSA-17-012-03", "trust": 3.6 }, { "db": "BID", "id": "95411", "trust": 2.1 }, { "db": "CNNVD", "id": "CNNVD-201701-325", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2017-00491", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2017-001715", "trust": 0.8 }, { "db": "IVD", "id": "43FC3419-278C-43EE-AA4A-D7C4F9EFD16F", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-113349", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2017-5146", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "142045", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "43fc3419-278c-43ee-aa4a-d7c4f9efd16f" }, { "db": "CNVD", "id": "CNVD-2017-00491" }, { "db": "VULHUB", "id": "VHN-113349" }, { "db": "VULMON", "id": "CVE-2017-5146" }, { "db": "BID", "id": "95411" }, { "db": "JVNDB", "id": "JVNDB-2017-001715" }, { "db": "PACKETSTORM", "id": "142045" }, { "db": "CNNVD", "id": "CNNVD-201701-325" }, { "db": "NVD", "id": "CVE-2017-5146" } ] }, "id": "VAR-201702-0698", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "43fc3419-278c-43ee-aa4a-d7c4f9efd16f" }, { "db": "CNVD", "id": "CNVD-2017-00491" }, { "db": "VULHUB", "id": "VHN-113349" } ], "trust": 1.775 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 }, { "category": [ "ICS" ], "sub_category": null, "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "43fc3419-278c-43ee-aa4a-d7c4f9efd16f" }, { "db": "CNVD", "id": "CNVD-2017-00491" } ] }, "last_update_date": "2024-11-23T21:41:43.637000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top Page", "trust": 0.8, "url": "http://www.productselection.net/" }, { "title": "CarloGavazziAutomationVMU-CEM and VMU-CPV have patches for information disclosure vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/88077" }, { "title": "Carlo Gavazzi Automation VMU-C EM and VMU-C PV Repair measures for information disclosure vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=66990" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-00491" }, { "db": "JVNDB", "id": "JVNDB-2017-001715" }, { "db": "CNNVD", "id": "CNNVD-201701-325" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-113349" }, { "db": "JVNDB", "id": "JVNDB-2017-001715" }, { "db": "NVD", "id": "CVE-2017-5146" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.7, "url": "https://ics-cert.us-cert.gov/advisories/icsa-17-012-03" }, { "trust": 1.2, "url": "http://www.securityfocus.com/bid/95411" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-5146" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2017-5146" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/95411/info" }, { "trust": 0.3, "url": "http://www.carlogavazzi.com/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/200.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5145" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5144" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5146" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-00491" }, { "db": "VULHUB", "id": "VHN-113349" }, { "db": "VULMON", "id": "CVE-2017-5146" }, { "db": "BID", "id": "95411" }, { "db": "JVNDB", "id": "JVNDB-2017-001715" }, { "db": "PACKETSTORM", "id": "142045" }, { "db": "CNNVD", "id": "CNNVD-201701-325" }, { "db": "NVD", "id": "CVE-2017-5146" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "43fc3419-278c-43ee-aa4a-d7c4f9efd16f" }, { "db": "CNVD", "id": "CNVD-2017-00491" }, { "db": "VULHUB", "id": "VHN-113349" }, { "db": "VULMON", "id": "CVE-2017-5146" }, { "db": "BID", "id": "95411" }, { "db": "JVNDB", "id": "JVNDB-2017-001715" }, { "db": "PACKETSTORM", "id": "142045" }, { "db": "CNNVD", "id": "CNNVD-201701-325" }, { "db": "NVD", "id": "CVE-2017-5146" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-01-17T00:00:00", "db": "IVD", "id": "43fc3419-278c-43ee-aa4a-d7c4f9efd16f" }, { "date": "2017-01-17T00:00:00", "db": "CNVD", "id": "CNVD-2017-00491" }, { "date": "2017-02-13T00:00:00", "db": "VULHUB", "id": "VHN-113349" }, { "date": "2017-02-13T00:00:00", "db": "VULMON", "id": "CVE-2017-5146" }, { "date": "2017-01-12T00:00:00", "db": "BID", "id": "95411" }, { "date": "2017-03-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-001715" }, { "date": "2017-04-06T18:22:22", "db": "PACKETSTORM", "id": "142045" }, { "date": "2017-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201701-325" }, { "date": "2017-02-13T21:59:02.580000", "db": "NVD", "id": "CVE-2017-5146" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-01-17T00:00:00", "db": "CNVD", "id": "CNVD-2017-00491" }, { "date": "2017-02-24T00:00:00", "db": "VULHUB", "id": "VHN-113349" }, { "date": "2017-02-24T00:00:00", "db": "VULMON", "id": "CVE-2017-5146" }, { "date": "2017-01-23T04:05:00", "db": "BID", "id": "95411" }, { "date": "2017-03-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-001715" }, { "date": "2017-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201701-325" }, { "date": "2024-11-21T03:27:09.100000", "db": "NVD", "id": "CVE-2017-5146" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201701-325" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Carlo Gavazzi VMU-C EM and VMU-C PV Vulnerability that important information in firmware is saved in clear text", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-001715" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201701-325" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.