Show filters
91 Total Results
Displaying 21-30 of 91
Sort by:
Attacker Value
Unknown

CVE-2023-5767

Disclosure Date: December 04, 2023 (last updated December 08, 2023)
A vulnerability exists in the webserver that affects the RTU500 series product versions listed below. A malicious actor could perform cross-site scripting on the webserver due to an RDT language file being improperly sanitized.
Attacker Value
Unknown

CVE-2023-4518

Disclosure Date: December 01, 2023 (last updated September 23, 2024)
A vulnerability exists in the input validation of the GOOSE messages where out of range values received and processed by the IED caused a reboot of the device. In order for an attacker to exploit the vulnerability, goose receiving blocks need to be configured.
Attacker Value
Unknown

CVE-2023-5516

Disclosure Date: November 01, 2023 (last updated November 09, 2023)
Poorly constructed webap requests and URI components with special characters trigger unhandled errors and exceptions, disclosing information about the underlying technology and other sensitive information details. The website unintentionally reveals sensitive information including technical details like version Info, endpoints, backend server, Internal IP. etc., which can potentially expose additional attack surface containing other interesting vulnerabilities.
Attacker Value
Unknown

CVE-2023-5515

Disclosure Date: November 01, 2023 (last updated November 09, 2023)
The responses for web queries with certain parameters disclose internal path of resources. This information can be used to learn internal structure of the application and to further plot attacks against web servers and deployed web applications.
Attacker Value
Unknown

CVE-2023-5514

Disclosure Date: November 01, 2023 (last updated November 09, 2023)
The response messages received from the eSOMS report generation using certain parameter queries with full file path can be abused for enumerating the local file system structure.
Attacker Value
Unknown

CVE-2023-2622

Disclosure Date: November 01, 2023 (last updated November 09, 2023)
Authenticated clients can read arbitrary files on the MAIN Computer system using the remote procedure call (RPC) of the InspectSetup service endpoint. The low privilege client is then allowed to read arbitrary files that they do not have authorization to read.
Attacker Value
Unknown

CVE-2023-2621

Disclosure Date: November 01, 2023 (last updated November 09, 2023)
The McFeeder server (distributed as part of SSW package), is susceptible to an arbitrary file write vulnerability on the MAIN computer system. This vulnerability stems from the use of an outdated version of a third-party library, which is used to extract archives uploaded to McFeeder server. An authenticated malicious client can exploit this vulnerability by uploading a crafted ZIP archive via the network to McFeeder’s service endpoint.
Attacker Value
Unknown

CVE-2023-4816

Disclosure Date: September 11, 2023 (last updated October 08, 2023)
A vulnerability exists in the Equipment Tag Out authentication, when configured with Single Sign-On (SSO) with password validation in T214. This vulnerability can be exploited by an authenticated user per-forming an Equipment Tag Out holder action (Accept, Release, and Clear) for another user and entering an arbitrary password in the holder action confirmation dialog box. Despite entering an arbitrary password in the confirmation box, the system will execute the selected holder action.
Attacker Value
Unknown

CVE-2022-4608

Disclosure Date: July 26, 2023 (last updated October 08, 2023)
A vulnerability exists in HCI IEC 60870-5-104 function included in certain versions of the RTU500 series product. The vulnerability can only be exploited, if the HCI 60870-5-104 is configured with support for IEC 62351-3. After session resumption interval is expired an RTU500 initiated update of session parameters causes an unexpected restart due to a stack overflow.
Attacker Value
Unknown

CVE-2022-2502

Disclosure Date: July 26, 2023 (last updated October 08, 2023)
A vulnerability exists in the HCI IEC 60870-5-104 function included in certain versions of the RTU500 series product. The vulnerability can only be exploited, if the HCI 60870-5-104 is configured with support for IEC 62351-5 and the CMU contains the license feature ‘Advanced security’ which must be ordered separately. If these preconditions are fulfilled, an attacker could exploit the vulnerability by sending a specially crafted message to the RTU500, causing the targeted RTU500 CMU to reboot. The vulnerability is caused by a missing input data validation which eventually if exploited causes an internal buffer to overflow in the HCI IEC 60870-5-104 function.