Описание
An issue was discovered on V-Zug Combi-Steam MSLQ devices before Ethernet R07 and before WLAN R05. By default, the communication to the web service is unencrypted via http. An attacker is able to intercept and sniff communication to the web service.
Ссылки
- Permissions RequiredThird Party Advisory
- Permissions RequiredThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до ethernet_r07 (исключая)
Одновременно
cpe:2.3:o:vzug:combi-stream_mslq_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:vzug:combi-stream_mslq:-:*:*:*:*:*:*:*
Конфигурация 2Версия до wlan_r05 (исключая)
Одновременно
cpe:2.3:o:vzug:combi-stream_mslq_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:vzug:combi-stream_mslq:-:*:*:*:*:*:*:*
EPSS
Процентиль: 36%
0.00148
Низкий
9.1 Critical
CVSS3
5 Medium
CVSS2
Дефекты
CWE-319
Связанные уязвимости
github
больше 3 лет назад
An issue was discovered on V-Zug Combi-Steam MSLQ devices before Ethernet R07 and before WLAN R05. By default, the communication to the web service is unencrypted via http. An attacker is able to intercept and sniff communication to the web service.
EPSS
Процентиль: 36%
0.00148
Низкий
9.1 Critical
CVSS3
5 Medium
CVSS2
Дефекты
CWE-319