Количество 3
Количество 3
CVE-2017-11402
An issue has been discovered on the Belden Hirschmann Tofino Xenon Security Appliance before 03.2.00. Design flaws in OPC classic and in custom netfilter modules allow an attacker to remotely activate rules on the firewall and to connect to any TCP port of a protected asset, thus bypassing the firewall. The attack methodology is a crafted OPC dynamic port shift.
GHSA-g5fp-55mr-fxj5
An issue has been discovered on the Belden Hirschmann Tofino Xenon Security Appliance before 03.2.00. Design flaws in OPC classic and in custom netfilter modules allow an attacker to remotely activate rules on the firewall and to connect to any TCP port of a protected asset, thus bypassing the firewall. The attack methodology is a crafted OPC dynamic port shift.
BDU:2018-00087
Уязвимость реализации протокола OPC Classic межсетевого экрана Tofino Xenon Security Appliance, позволяющая нарушителю подключиться к произвольному TCP-порту защищаемого объекта
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2017-11402 An issue has been discovered on the Belden Hirschmann Tofino Xenon Security Appliance before 03.2.00. Design flaws in OPC classic and in custom netfilter modules allow an attacker to remotely activate rules on the firewall and to connect to any TCP port of a protected asset, thus bypassing the firewall. The attack methodology is a crafted OPC dynamic port shift. | CVSS3: 9.8 | 0% Низкий | около 8 лет назад | |
GHSA-g5fp-55mr-fxj5 An issue has been discovered on the Belden Hirschmann Tofino Xenon Security Appliance before 03.2.00. Design flaws in OPC classic and in custom netfilter modules allow an attacker to remotely activate rules on the firewall and to connect to any TCP port of a protected asset, thus bypassing the firewall. The attack methodology is a crafted OPC dynamic port shift. | CVSS3: 9.8 | 0% Низкий | больше 3 лет назад | |
BDU:2018-00087 Уязвимость реализации протокола OPC Classic межсетевого экрана Tofino Xenon Security Appliance, позволяющая нарушителю подключиться к произвольному TCP-порту защищаемого объекта | CVSS3: 9.8 | 0% Низкий | больше 8 лет назад |
Уязвимостей на страницу