Show filters
91 Total Results
Displaying 21-30 of 91
Sort by:
Attacker Value
Unknown
CVE-2023-5767
Disclosure Date: December 04, 2023 (last updated December 08, 2023)
A vulnerability exists in the webserver that affects the
RTU500 series product versions listed below. A malicious
actor could perform cross-site scripting on the webserver
due to an RDT language file being improperly sanitized.
0
Attacker Value
Unknown
CVE-2023-4518
Disclosure Date: December 01, 2023 (last updated September 23, 2024)
A vulnerability exists in the input validation of the GOOSE
messages where out of range values received and processed
by the IED caused a reboot of the device. In order for an
attacker to exploit the vulnerability, goose receiving blocks need
to be configured.
0
Attacker Value
Unknown
CVE-2023-5516
Disclosure Date: November 01, 2023 (last updated November 09, 2023)
Poorly constructed webap requests and URI components with special characters trigger unhandled errors and exceptions, disclosing
information about the underlying technology and other sensitive information details. The website unintentionally reveals sensitive information including technical details like version Info, endpoints,
backend server, Internal IP. etc., which can potentially expose additional attack surface containing other interesting vulnerabilities.
0
Attacker Value
Unknown
CVE-2023-5515
Disclosure Date: November 01, 2023 (last updated November 09, 2023)
The responses for web queries with certain parameters disclose internal path of resources. This information can be used to learn internal structure of the application and to further plot attacks against
web servers and deployed web applications.
0
Attacker Value
Unknown
CVE-2023-5514
Disclosure Date: November 01, 2023 (last updated November 09, 2023)
The response messages received from the eSOMS report generation using certain parameter queries with full file path can be
abused for enumerating the local file system structure.
0
Attacker Value
Unknown
CVE-2023-2622
Disclosure Date: November 01, 2023 (last updated November 09, 2023)
Authenticated clients can read arbitrary files on the MAIN Computer
system using the remote procedure call (RPC) of the InspectSetup
service endpoint. The low privilege client is then allowed to read arbitrary files that they do not have authorization to read.
0
Attacker Value
Unknown
CVE-2023-2621
Disclosure Date: November 01, 2023 (last updated November 09, 2023)
The McFeeder server (distributed as part of SSW package), is susceptible to an arbitrary file write vulnerability on the MAIN computer
system. This vulnerability stems from the use of an outdated version of a third-party library, which is used to extract archives uploaded to McFeeder server. An authenticated malicious client can
exploit this vulnerability by uploading a crafted ZIP archive via the
network to McFeeder’s service endpoint.
0
Attacker Value
Unknown
CVE-2023-4816
Disclosure Date: September 11, 2023 (last updated October 08, 2023)
A vulnerability exists in the Equipment Tag Out authentication, when configured with Single Sign-On (SSO) with password validation in T214. This vulnerability can be exploited by an authenticated user per-forming an Equipment Tag Out holder action (Accept, Release, and Clear) for another user and entering an arbitrary password in the holder action confirmation dialog box. Despite entering an arbitrary password in the confirmation box, the system will execute the selected holder action.
0
Attacker Value
Unknown
CVE-2022-4608
Disclosure Date: July 26, 2023 (last updated October 08, 2023)
A vulnerability exists in HCI IEC 60870-5-104 function included in certain versions of the RTU500 series product. The vulnerability can only be exploited, if the HCI 60870-5-104 is configured with support for IEC 62351-3. After session resumption interval is expired an RTU500 initiated update of session parameters causes an unexpected restart due to a stack overflow.
0
Attacker Value
Unknown
CVE-2022-2502
Disclosure Date: July 26, 2023 (last updated October 08, 2023)
A vulnerability exists in the HCI IEC 60870-5-104 function included in certain versions of the RTU500 series product. The vulnerability can only be exploited, if the HCI 60870-5-104 is configured with support for IEC 62351-5 and the CMU contains the license feature ‘Advanced security’ which must be ordered separately. If these preconditions are fulfilled, an attacker could exploit the vulnerability by sending a specially crafted message to the RTU500, causing the targeted RTU500 CMU to reboot. The vulnerability is caused by a missing input data validation which eventually if exploited causes an internal buffer to overflow in the HCI IEC 60870-5-104 function.
0