Описание
These Sinapsi devices do not check if users that visit pages within the device have properly authenticated. By directly visiting the pages within the device, attackers can gain unauthorized access with administrative privileges.
Ссылки
- Exploit
- Exploit
- Exploit
- Exploit
- US Government Resource
Уязвимые конфигурации
Конфигурация 1Версия до 2.0.2870 (включая)
Одновременно
cpe:2.3:o:sinapsitech:sinapsi_firmware:*:*:*:*:*:*:*:*
Одно из
cpe:2.3:h:sinapsitech:esolar_duo_photovoltaic_system_monitor:-:*:*:*:*:*:*:*
cpe:2.3:h:sinapsitech:esolar_light_photovoltaic_system_monitor:-:*:*:*:*:*:*:*
cpe:2.3:h:sinapsitech:esolar_photovoltaic_system_monitor:-:*:*:*:*:*:*:*
EPSS
Процентиль: 94%
0.15425
Средний
9.4 Critical
CVSS2
10 Critical
CVSS2
Дефекты
CWE-287
CWE-264
Связанные уязвимости
github
больше 3 лет назад
The management web pages on the Sinapsi eSolar Light Photovoltaic System Monitor (aka Schneider Electric Ezylog photovoltaic SCADA management server), Sinapsi eSolar, and Sinapsi eSolar DUO with firmware before 2.0.2870_2.2.12 do not require authentication, which allows remote attackers to obtain administrative access via a direct request, as demonstrated by a request to ping.php.
EPSS
Процентиль: 94%
0.15425
Средний
9.4 Critical
CVSS2
10 Critical
CVSS2
Дефекты
CWE-287
CWE-264