Show filters
13 Total Results
Displaying 1-10 of 13
Sort by:
Attacker Value
Unknown

CVE-2023-40710

Disclosure Date: August 24, 2023 (last updated February 25, 2025)
An adversary could cause a continuous restart loop to the entire device by sending a large quantity of HTTP GET requests if the controller has the built-in web server enabled but does not have the built-in web server completely set up and configured for the SNAP PAC S1 Firmware version R10.3b
Attacker Value
Unknown

CVE-2023-40709

Disclosure Date: August 24, 2023 (last updated February 25, 2025)
An adversary could crash the entire device by sending a large quantity of ICMP requests if the controller has the built-in web server enabled but does not have the built-in web server completely set up and configured for the SNAP PAC S1 Firmware version R10.3b
Attacker Value
Unknown

CVE-2023-40708

Disclosure Date: August 24, 2023 (last updated February 25, 2025)
The File Transfer Protocol (FTP) port is open by default in the SNAP PAC S1 Firmware version R10.3b. This could allow an adversary to access some device files.
Attacker Value
Unknown

CVE-2023-40707

Disclosure Date: August 24, 2023 (last updated February 25, 2025)
There are no requirements for setting a complex password in the built-in web server of the SNAP PAC S1 Firmware version R10.3b, which could allow for a successful brute force attack if users don't set up complex credentials.
Attacker Value
Unknown

CVE-2023-40706

Disclosure Date: August 24, 2023 (last updated February 25, 2025)
There is no limit on the number of login attempts in the web server for the SNAP PAC S1 Firmware version R10.3b. This could allow for a brute-force attack on the built-in web server login.
Attacker Value
Unknown

CVE-2020-10620

Disclosure Date: May 14, 2020 (last updated February 21, 2025)
Opto 22 SoftPAC Project Version 9.6 and prior. SoftPAC communication does not include any credentials. This allows an attacker with network access to directly communicate with SoftPAC, including, for example, stopping the service remotely.
Attacker Value
Unknown

CVE-2020-10616

Disclosure Date: May 14, 2020 (last updated February 21, 2025)
Opto 22 SoftPAC Project Version 9.6 and prior. SoftPAC does not specify the path of multiple imported .dll files. Therefore, an attacker can replace them and execute code whenever the service starts.
Attacker Value
Unknown

CVE-2020-12046

Disclosure Date: May 14, 2020 (last updated February 21, 2025)
Opto 22 SoftPAC Project Version 9.6 and prior. SoftPAC’s firmware files’ signatures are not verified upon firmware update. This allows an attacker to replace legitimate firmware files with malicious files.
Attacker Value
Unknown

CVE-2020-10612

Disclosure Date: May 14, 2020 (last updated February 21, 2025)
Opto 22 SoftPAC Project Version 9.6 and prior. SoftPACAgent communicates with SoftPACMonitor over network Port 22000. However, this port is open without any restrictions. This allows an attacker with network access to control the SoftPACAgent service including updating SoftPAC firmware, starting or stopping service, or writing to certain registry values.
Attacker Value
Unknown

CVE-2020-12042

Disclosure Date: May 14, 2020 (last updated February 21, 2025)
Opto 22 SoftPAC Project Version 9.6 and prior. Paths specified within the zip files used to update the SoftPAC firmware are not sanitized. As a result, an attacker with user privileges can gain arbitrary file write access with system access.