Show filters
449 Total Results
Displaying 51-60 of 449
Sort by:
Attacker Value
Unknown
CVE-2022-24693
Disclosure Date: March 30, 2022 (last updated February 23, 2025)
Baicells Nova436Q and Neutrino 430 devices with firmware through QRTB 2.7.8 have hardcoded credentials that are easily discovered, and can be used by remote attackers to authenticate via ssh. (The credentials are stored in the firmware, encrypted by the crypt function.)
0
Attacker Value
Unknown
CVE-2022-25521
Disclosure Date: March 29, 2022 (last updated February 23, 2025)
NUUO v03.11.00 was discovered to contain access control issue.
0
Attacker Value
Unknown
CVE-2022-25577
Disclosure Date: March 25, 2022 (last updated February 23, 2025)
ALF-BanCO v8.2.5 and below was discovered to use a hardcoded password to encrypt the SQLite database containing the user's data. Attackers who are able to gain remote or local access to the system are able to read and modify the data.
0
Attacker Value
Unknown
CVE-2021-27430
Disclosure Date: March 23, 2022 (last updated February 23, 2025)
GE UR bootloader binary Version 7.00, 7.01 and 7.02 included unused hardcoded credentials. Additionally, a user with physical access to the UR IED can interrupt the boot sequence by rebooting the UR.
0
Attacker Value
Unknown
CVE-2021-45877
Disclosure Date: March 21, 2022 (last updated February 23, 2025)
Multiple versions of GARO Wallbox GLB/GTB/GTC are affected by hard coded credentials. A hardcoded credential exist in /etc/tomcat8/tomcat-user.xml, which allows attackers to gain authorized access and control the tomcat completely on port 8000 in the tomcat manger page.
0
Attacker Value
Unknown
CVE-2020-25193
Disclosure Date: March 18, 2022 (last updated February 23, 2025)
By having access to the hard-coded cryptographic key for GE Reason RT430, RT431 & RT434 GNSS clocks in firmware versions prior to version 08A06, attackers would be able to intercept and decrypt encrypted traffic through an HTTPS connection.
0
Attacker Value
Unknown
CVE-2020-25180
Disclosure Date: March 18, 2022 (last updated February 23, 2025)
Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x includes the functionality of setting a password that is required to execute privileged commands. The password value passed to ISaGRAF Runtime is the result of encryption performed with a fixed key value using the tiny encryption algorithm (TEA) on an entered or saved password. A remote, unauthenticated attacker could pass their own encrypted password to the ISaGRAF 5 Runtime, which may result in information disclosure on the device.
0
Attacker Value
Unknown
CVE-2022-26660
Disclosure Date: March 16, 2022 (last updated February 23, 2025)
RunAsSpc 4.0 uses a universal and recoverable encryption key. In possession of a file encrypted by RunAsSpc, an attacker can recover the credentials that were used.
0
Attacker Value
Unknown
CVE-2021-41848
Disclosure Date: March 11, 2022 (last updated February 23, 2025)
An issue was discovered in Luna Simo PPR1.180610.011/202001031830. It mishandles software updates such that local third-party apps can provide a spoofed software update file that contains an arbitrary shell script and arbitrary ARM binary, where both will be executed as the root user with an SELinux domain named osi. To exploit this vulnerability, a local third-party app needs to have write access to external storage to write the spoofed update at the expected path. The vulnerable system binary (i.e., /system/bin/osi_bin) does not perform any authentication of the update file beyond ensuring that it is encrypted with an AES key (that is hard-coded in the vulnerable system binary). Processes executing with the osi SELinux domain can programmatically perform the following actions: install apps, grant runtime permissions to apps (including permissions with protection levels of dangerous and development), access extensive Personally Identifiable Information (PII) using the programmaticall…
0
Attacker Value
Unknown
CVE-2022-23402
Disclosure Date: March 11, 2022 (last updated February 23, 2025)
The following Yokogawa Electric products hard-code the password for CAMS server applications: CENTUM VP versions from R5.01.00 to R5.04.20 and versions from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00
0