Loading HuntDB...

Vulnerabilities

CVE-2024-11497

HIGH

An authenticated attacker can use this vulnerability to perform a privilege escalation to gain root access.

Published Jan 14, 2025

CVE-2024-43393

HIGH

A low privileged remote attacker can perform configuration changes of the firewall services, including packet filter, packet forwarding, network access control or NAT through the FW_INCOMING.FROM_IP FW_INCOMING.IN_IP FW_OUTGOING.FROM_IP FW_OUTGOING.IN_IP FW_RULESETS.FROM_IP FW_RULESETS.IN_IP environment variable which can lead to a DoS.

Published Sep 10, 2024

CVE-2024-43392

HIGH

A low privileged remote attacker can perform configuration changes of the firewall services, including packet filter, packet forwarding, network access control or NAT through the FW_INCOMING.FROM_IP FW_INCOMING.IN_IP FW_OUTGOING.FROM_IP FW_OUTGOING.IN_IP environment variable which can lead to a DoS.

Published Sep 10, 2024

CVE-2024-43391

HIGH

A low privileged remote attacker can perform configuration changes of the firewall services, including packet filter, packet forwarding, network access control or NAT through the FW_PORTFORWARDING.SRC_IP environment variable which can lead to a DoS.

Published Sep 10, 2024

CVE-2024-43390

HIGH

A low privileged remote attacker can perform configuration changes of the firewall services, including packet forwarding or NAT through the FW_NAT.IN_IP environment variable which can lead to a DoS.

Published Sep 10, 2024

CVE-2024-43389

HIGH

A low privileged remote attacker can perform configuration changes of the ospf service through OSPF_INTERFACE.SIMPLE_KEY, OSPF_INTERFACE.DIGEST_KEY environment variables which can lead to a DoS.

Published Sep 10, 2024

CVE-2024-43388

HIGH

A low privileged remote attacker with write permissions can reconfigure the SNMP service due to improper input validation.

Published Sep 10, 2024

CVE-2024-43387

HIGH

A low privileged remote attacker can read and write files as root due to improper neutralization of special elements in the variable EMAIL_RELAY_PASSWORD in mGuard devices.

Published Sep 10, 2024

CVE-2024-43386

HIGH

A low privileged remote attacker can trigger the execution of arbitrary OS commands as root due to improper neutralization of special elements in the variable EMAIL_NOTIFICATION.TO in mGuard devices.

Published Sep 10, 2024

CVE-2024-43385

HIGH

A low privileged remote attacker can trigger the execution of arbitrary OS commands as root due to improper neutralization of special elements in the variable PROXY_HTTP_PORT in mGuard devices.

Published Sep 10, 2024

CVE-2024-7699

HIGH

An low privileged remote attacker can execute OS commands with root privileges due to improper neutralization of special elements in user data.

Published Sep 10, 2024

CVE-2024-7698

MEDIUM

A low privileged remote attacker can get access to CSRF tokens of higher privileged users which can be abused to mount CSRF attacks.

Published Sep 10, 2024

CVE-2024-7734

MEDIUM

An unauthenticated remote attacker can exploit the behavior of the pathfinder TCP encapsulation service by establishing a high number of TCP connections to the pathfinder TCP encapsulation service. The impact is limited to blocking of valid IPsec VPN peers.

Published Sep 10, 2024

CVE-2024-6788

HIGH

A remote unauthenticated attacker can use the firmware update feature on the LAN interface of the device to reset the password for the predefined, low-privileged user “user-app” to the default password.

Published Aug 13, 2024

CVE-2024-3913

MEDIUM

An unauthenticated remote attacker can use this vulnerability to change the device configuration due to a file writeable for short time after system startup.

Published Aug 13, 2024

CVE-2024-28137

HIGH

A local attacker with low privileges can perform a privilege escalation with an init script due to a TOCTOU vulnerability.

Published May 14, 2024

CVE-2024-28136

HIGH

A local attacker with low privileges can use a command injection vulnerability to gain root privileges due to improper input validation using the OCPP Remote service.

Published May 14, 2024

CVE-2024-28135

MEDIUM

A low privileged remote attacker can use a command injection vulnerability in the API which performs remote code execution as the user-app user due to improper input validation. The confidentiality is partly affected.

Published May 14, 2024

CVE-2024-28134

HIGH

An unauthenticated remote attacker can extract a session token with a MitM attack and gain web-based management access with the privileges of the currently logged in user due to cleartext transmission of sensitive information. No additional user interaction is required. The access is limited as only non-sensitive information can be obtained but the availability can be seriously affected. 

Published May 14, 2024

CVE-2024-28133

HIGH

A local low privileged attacker can use an untrusted search path in a CHARX system utility to gain root privileges. 

Published May 14, 2024

CVE-2024-26288

HIGH

An unauthenticated remote attacker can influence the communication due to the lack of encryption of sensitive data via a MITM. Charging is not affected.

Published Mar 12, 2024

CVE-2024-26005

MEDIUM

An unauthenticated remote attacker can gain service level privileges through an incomplete cleanup during service restart after a DoS. 

Published Mar 12, 2024

CVE-2024-26004

HIGH

An unauthenticated remote attacker can DoS a control agent due to access of a uninitialized pointer which may prevent or disrupt the charging functionality.

Published Mar 12, 2024

CVE-2024-26003

HIGH

An unauthenticated remote attacker can DoS the control agent due to a out-of-bounds read which may prevent or disrupt the charging functionality. 

Published Mar 12, 2024

CVE-2024-26002

HIGH

An improper input validation in the Qualcom plctool allows a local attacker with low privileges to gain root access by changing the ownership of specific files.

Published Mar 12, 2024

CVE-2024-26001

HIGH

An unauthenticated remote attacker can write memory out of bounds due to improper input validation in the MQTT stack. The brute force attack is not always successful because of memory randomization.

Published Mar 12, 2024

CVE-2024-26000

MEDIUM

An unauthenticated remote attacker can read memory out of bounds due to improper input validation in the MQTT stack. The brute force attack is not always successful because of memory randomization.

Published Mar 12, 2024

CVE-2024-25999

HIGH

An unauthenticated local attacker can perform a privilege escalation due to improper input validation in the OCPP agent service. 

Published Mar 12, 2024

CVE-2024-25998

HIGH

An unauthenticated remote attacker can perform a command injection in the OCPP Service with limited privileges due to improper input validation.

Published Mar 12, 2024

CVE-2024-25997

MEDIUM

An unauthenticated remote attacker can perform a log injection due to improper input validation. Only a certain log file is affected.

Published Mar 12, 2024

CVE-2024-25996

MEDIUM

An unauthenticated remote attacker can perform a remote code execution due to an origin validation error. The access is limited to the service user.

Published Mar 12, 2024

CVE-2024-25995

CRITICAL

An unauthenticated remote attacker can modify configurations to perform a remote code execution, gain root rights or perform an DoS due to improper input validation.

Published Mar 12, 2024

CVE-2024-25994

MEDIUM

An unauthenticated remote attacker can upload a arbitrary script file due to improper input validation. The upload destination is fixed and is write only.

Published Mar 12, 2024

CVE-2023-46144

MEDIUM

A download of code without integrity check vulnerability in PLCnext products allows an remote attacker with low privileges to compromise integrity on the affected engineering station and the connected devices.

Published Dec 14, 2023

CVE-2023-46143

HIGH

Download of Code Without Integrity Check vulnerability in PHOENIX CONTACT classic line PLCs allows an unauthenticated remote attacker to modify some or all applications on a PLC.

Published Dec 14, 2023

CVE-2023-46142

HIGH

A incorrect permission assignment for critical resource vulnerability in PLCnext products allows an remote attacker with low privileges to gain full access on the affected devices.

Published Dec 14, 2023

CVE-2023-46141

CRITICAL

Incorrect Permission Assignment for Critical Resource vulnerability in multiple products of the PHOENIX CONTACT classic line allow an remote unauthenticated attacker to gain full access of the affected device.

Published Dec 14, 2023

CVE-2023-5592

HIGH

Download of Code Without Integrity Check vulnerability in PHOENIX CONTACT MULTIPROG, PHOENIX CONTACT ProConOS eCLR (SDK) allows an unauthenticated remote attacker to download and execute applications without integrity checks on the device which may result in a complete loss of integrity.

Published Dec 14, 2023

CVE-2023-0757

CRITICAL

Incorrect Permission Assignment for Critical Resource vulnerability in PHOENIX CONTACT MULTIPROG, PHOENIX CONTACT ProConOS eCLR (SDK) allows an unauthenticated remote attacker to upload arbitrary malicious code and gain full access on the affected device.

Published Dec 14, 2023

CVE-2023-37858

MEDIUM

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 an authenticated, remote attacker with admin privileges is able to read hardcoded cryptographic keys allowing to decrypt an encrypted web application login password.

Published Aug 09, 2023

CVE-2023-37857

LOW

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 an authenticated, remote attacker with admin privileges is able to read hardcoded cryptographic keys allowing the attacker to create valid session cookies. These session-cookies created by the attacker are not sufficient to obtain a valid session on the device.

Published Aug 09, 2023

CVE-2023-37855

MEDIUM

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with low privileges is able to gain limited read-access to the device-filesystem within the embedded Qt browser.

Published Aug 09, 2023

CVE-2023-37856

MEDIUM

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with low privileges is able to gain limited read-access to the device-filesystem through a configuration dialog within the embedded Qt browser .

Published Aug 09, 2023

CVE-2023-37863

HIGH

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with SNMPv2 write privileges may use an a special SNMP request to gain full access to the device.

Published Aug 09, 2023

CVE-2023-37859

HIGH

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 the SNMP daemon is running with root privileges allowing a remote attacker with knowledge of the SNMPv2 r/w community string to execute system commands as root.

Published Aug 09, 2023

CVE-2023-37864

HIGH

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with SNMPv2 write privileges may use an a special SNMP request to gain full access to the device.

Published Aug 09, 2023

CVE-2023-37862

HIGH

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 an unauthenticated remote attacker can access upload-functions of the HTTP API. This might cause certificate errors for SSL-connections and might result in a partial denial-of-service.

Published Aug 09, 2023

CVE-2023-37860

HIGH

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote unauthenticated attacker can obtain the r/w community string of the SNMPv2 daemon.

Published Aug 09, 2023

CVE-2023-37861

HIGH

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 an authenticated remote attacker can execute code with root permissions with a specially crafted HTTP POST when uploading a certificate to the device.

Published Aug 09, 2023

CVE-2023-3569

MEDIUM

In PHOENIX CONTACTs TC ROUTER and TC CLOUD CLIENT in versions prior to 2.07.2 as well as CLOUD CLIENT 1101T-TX/TX prior to 2.06.10 an authenticated remote attacker with admin privileges could upload a crafted XML file which causes a denial-of-service.

Published Aug 08, 2023