Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vx39-fw57-q8mc

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 10

Описание

A vulnerability has been identified in TIM 1531 IRC (All version < V2.0). The devices was missing proper authentication on port 102/tcp, although configured. Successful exploitation requires an attacker to be able to send packets to port 102/tcp of the affected device. No user interaction and no user privileges are required to exploit the vulnerability. At the time of advisory publication no public exploitation of this vulnerability was known.

A vulnerability has been identified in TIM 1531 IRC (All version < V2.0). The devices was missing proper authentication on port 102/tcp, although configured. Successful exploitation requires an attacker to be able to send packets to port 102/tcp of the affected device. No user interaction and no user privileges are required to exploit the vulnerability. At the time of advisory publication no public exploitation of this vulnerability was known.

EPSS

Процентиль: 86%
0.02916
Низкий

10 Critical

CVSS3

Дефекты

CWE-287

Связанные уязвимости

CVSS3: 10
nvd
около 7 лет назад

A vulnerability has been identified in TIM 1531 IRC (All version < V2.0). The devices was missing proper authentication on port 102/tcp, although configured. Successful exploitation requires an attacker to be able to send packets to port 102/tcp of the affected device. No user interaction and no user privileges are required to exploit the vulnerability. At the time of advisory publication no public exploitation of this vulnerability was known.

CVSS3: 10
fstec
около 7 лет назад

Уязвимость микропрограммного обеспечения коммутационного модуля Siemens TIM, связанная с отсутствием аутентификации для критичной функции сетевого сервиса на порту 102/TCP, позволяющая нарушителю выполнять произвольные административные операции

EPSS

Процентиль: 86%
0.02916
Низкий

10 Critical

CVSS3

Дефекты

CWE-287