source-url stringlengths 62 64 | Prompt stringlengths 762 25.3k | Correct Answer stringlengths 74 7.83k | vulnerability-overview stringlengths 186 24.7k |
|---|---|---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-02 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an attacker to retrieve sensitive credentials and control the entire CCTV system. | 3.2.1INSUFFICIENTLY PROTECTED CREDENTIALS CWE-522 CP Plus KVMS Pro versions 2.01.0.T.190521 and prior are vulnerable to sensitive credentials being leaked because they are insufficiently protected. CVE-2023-1518has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector str... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-03 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could lead to privilege escalation, unauthorized execution of actions, a denial-of-service condition, or retrieval of sensitive information. | 3.2.1CROSS-SITE SCRIPTING CWE-79 An unauthenticated remote attacker could provide a malicious link and trick an unsuspecting user into clicking on it. If clicked, the attacker could execute the malicious JavaScript (JS) payload in the targets security context. CVE-2023-28650has been assigned to this vulnerability. A CV... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-04 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could result in a denial-of-service condition, as well as the loss, addition, or modification of dashboards or report files in the IGSS Report folder. Successful exploitation of these vulnerabilities could also allow remote code execution, potentially resulting in loss o... | 3.2.1MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306 A vulnerability in Schneider Electric Data Server TCP interface could allow the creation of a malicious report file in the IGSS project report directory, and this could lead to remote code execution when an unsuspecting user opens the malicious report. CVE-2023-... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-05 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow an attacker to take control of the product or execute arbitrary code. | 3.2.1CROSS-SITE REQUEST FORGERY (CSRF) CWE-352 There are several fields in the web pages where a user can enter arbitrary text, such as a description of an alarm or a rectifier. These represent a cross site scripting vulnerability where JavaScript code can be entered as the description with the potential of causing sys... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-06 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow an attacker to gain unauthorized access, retrieve sensitive information, modify data, cause a denial-of-service, and/or gain administrative control. | 3.2.1 INSUFFICIENT ENTROPY CWE-331 Osprey Pump Controller versions prior to release 20230518 are vulnerable to a predictable weak session token generation algorithm and could aid in authentication and authorization bypass. This could allow a cyber threat actor to hijack a session by predicting the session ID and gain u... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-080-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an attacker to escalate privileges in the affected devices default configuration, resulting in remote code execution or deleting system files and folders. | 3.2.1 DESERIALIZATION OF UNTRUSTED DATA CWE-502 N6854A Geolocation Server versions 2.4.2 are vulnerable to untrusted data deserialization, which may allow a malicious actor to escalate privileges in the affected devices default configuration and achieve remote code execution. CVE-2023-1399has been assigned to this vuln... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-080-02 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow an unauthenticated attacker to obtain access to files and credentials, escalate privileges, and remotely execute arbitrary code. | 3.2.1 DESERIALIZATION OF UNTRUSTED DATA CWE-502 Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contain a vulnerability in which the Device-status service listens on port 10100/ UDP by default. The service accepts the unverified UDP packets and deserializes the content, which could allow an unauthent... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-080-05 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow an attacker to obtain sensitive information from the target device. | 3.2.1IMPROPER RESTRICTION OF XML EXTERNAL ENTITY REFERENCE CWE-611 Versions of VISAM VBASE Automation Base prior to 11.7.5 may disclose information if a valid user opens a specially crafted file. CVE-2022-41696has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been calculated; the CVSS vector stri... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-080-06 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow an attacker to potentially perform remote code execution on the target system/device or crash the software. | 3.2.1IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY ('PATH TRAVERSAL') CWE-22 In affected versions, a path traversal exists when processing a message. An unauthenticated remote attacker could potentially exploit this vulnerability to upload arbitrary files to any directory on the disk drive where ThinServe... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-080-07 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow an attacker to cause a denial-of-service condition or disclose sensitive data. | 3.2.1GENERATION OF ERROR MESSAGE CONTAINING SENSITIVE INFORMATION CWE-209 Stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in function.c in GNU Compiler Collection (GCC) 4.1 through 8 (under certain circumstances) generate instruction sequences when targeting ARM targets that spill the address of the st... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-075-02 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow authenticated remote attackers to access restricted data or execute arbitrary database queries via an SQL injection attack. | 3.2.1MISSING AUTHORIZATION CWE-862 In the affected application, the client query handler fails to check for proper permissions for specific read queries. This could allow authenticated remote attackers to access restricted data. CVE-2023-27462has been assigned to this vulnerability. A CVSS v3 base score of 3.1 has been... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-075-03 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow authenticated remote attackers to perform unauthorized actions. | 3.2.1MISSING AUTHORIZATION CWE-862 The client query handler of the affected application fails to check for proper permissions for specific write queries. This could allow an authenticated remote attacker to perform unauthorized actions. CVE-2023-27309has been assigned to this vulnerability. A CVSS v3 base score of 5.0 ... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-075-04 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow an attacker to read memory contents, decrypt RSA-encrypted messages, or create a denial-of-service condition. | 3.2.1INADEQUATE ENCRYPTION STRENGTH CWE-326 A timing-based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP, and RSASVE. After a suff... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-075-05 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow unauthenticated remote attackers to bypass authentication and gain access to the application. | 3.2.1INCORRECT IMPLEMENTATION OF AUTHENTICATION ALGORITHM CWE-303 The affected versions of the module insufficiently verify the SAML assertions. This could allow unauthenticated remote attackers to bypass authentication and get access to the application. CVE-2023-25957has been assigned to this vulnerability. A CVSS v3 ... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-075-06 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could disclose sensitive information, allow privilege escalation, or allow remote code execution. | 3.2.1COMMAND INJECTION CWE-77 While a backup is in progress, malicious users could enter a system command along with a backup configuration, which could result in the execution of unwanted commands. CVE-2022-46361has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector s... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-075-07 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an unauthorized user to read the connected devices Modbus TCP Server AOI information. | 3.2.1EXPOSURE OF SENSITIVE INFORMATION TO AN UNAUTHORIZED ACTOR CWE-200 Versions of Rockwell Automation Modbus TCP Server AOI prior to 2.04.00 are vulnerable to an unauthorized user sending a malformed message that could cause the controller to respond with a copy of the most recent response to the last valid request. ... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-073-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow an attacker to bypass user memory protections by writing to a specific memory address. An attacker can also overwrite passwords and lock engineers from reading their own memory regions. | 3.2.1IMPROPER ACCESS CONTROL CWE-284 Omron CJ1M unit v4.0 and prior has improper access controls on the memory region where the UM password is stored. If an adversary issues a PROGRAM AREA WRITE command to a specific memory region, they could overwrite the password. This may lead to disabling UM protections or setting ... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-073-02 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could lead to code execution or a denial-of-service condition. Products using Autodesk FBX SDK software are affected by these vulnerabilities. | 3.2.1OUT-OF-BOUNDS READ CWE-125 An out-of-bounds read vulnerability in versions of Autodesk FBX SDK prior to version 2020 could result in code execution or information disclosure through maliciously crafted FBX files. This vulnerability, if exploited alongside other vulnerabilities, could also result in code execution ... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-073-03 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow for privilege escalation and full control of the system. | 3.2.1IMPROPER CONTROL OF GENERATION OF CODE ('CODE INJECTION') CWE-94 GE Digital Proficy iFIX 2022, GE Digital Proficy iFIX v6.1, and GE Digital Proficy iFIX v6.5 are vulnerable to code injection, which may allow an attacker to insert malicious configuration files in the expected web server execution path and gain full... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-073-04 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an unauthenticated user to read data, cause a denial of service, and tamper with alarm states. | 3.2.1IMPROPER AUTHORIZATION CWE-285 The listed versions of AVEVA Plant SCADA and AVEVA Telemetry Server contain an improper authorization vulnerability, which if exploited, could allow an unauthenticated user to remotely read data, cause a denial-of-service condition, and tamper with alarm states. CVE-2023-1256has been... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-068-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could cause loss of sensitive information, unauthorized access, and grant full administrative control to an attacker. | 3.2.1 GENERATION OF PREDICTABLE IV WITH CBC CWE-329 Akuvox E11 contains a function that encrypts messages which are then forwarded. The IV vector and the key are static, and this may allow an attacker to decrypt messages. CVE-2023-0343has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigne... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-068-03 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an unauthorized client to connect to the S+ Operations servers (human machine interface (HMI) network), to act as a legitimate S+ Operations client. | 3.2.1 IMPROPER AUTHENTICATION CWE-287 An unauthorized client able to connect to the ABB S+ Operations servers (HMI network) can act as a legitimate S+ Operations client, reading any data and changing its configuration, which could result in corruption of data, unauthorized disclosure of information, unexpected operatio... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-068-02 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an attacker to execute arbitrary code to exfiltrate data and perform any action within the user's browser session. | 3.2.1 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 A reflected cross-site scripting (XSS) vulnerability exists in System Diagnostics Manager of B&R Automation Runtime versions >=3.00 and <=C4.93 that enables a remote attacker to execute arbitrary JavaScript in the context ... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-068-04 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an attacker to deny application usage when reading a specially constructed file. | 3.2.1 NULL POINTER DEREFERENCE CWE-476 STEPTools v18SP1 ifcmesh library (v18.1) is affected due to a null pointer dereference, which could allow an attacker to deny application usage when reading a specially constructed file, resulting in an application crash. CVE-2023-0973has been assigned to this vulnerability. A CVS... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-068-05 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could cause the Intelligent Electronic Device (IED) to restart, causing a temporary denial-of-service condition. | 3.2.1 INSUFFICIENT VERIFICATION OF DATA AUTHENTICITY CWE-345 The Hitachi Energy Relion update package signature validation contains an improper access control vulnerability. A tampered update package could cause the IED to restart. After a restart, the device returns to normal operation. An attacker could exploit the v... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-061-03 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an attacker to open control cabinets secured with Rittal locks. | 3.2.1IMPROPER ACCESS CONTROL CWE-284 A malicious actor can clone access cards used to open control cabinets secured with Rittal CMC III locks. CVE-2022-40633 has been assigned to this vulnerability. A CVSS v3 base score of 4.8 has been calculated; the CVSS vector string is (AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N). |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-061-02 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow commands performed using pre-login execution and with root permissions. | 3.2.1 COMMAND INJECTION CWE-77 Baicells Nova 436Q, Nova 430E, Nova 430I, and Neutrino 430 LTE TDD eNodeB devices with firmware versions through QRTB 2.12.7 are vulnerable to remote shell code exploitation via HTTP command injections. Commands are performed using pre-login execution and with root permissions. CVE-2023-0... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-061-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an unauthenticated attacker to login to an FTP server or web server by obtaining plaintext credentials stored in project files. | 4.2.1 PLAINTEXT STORAGE OF A PASSWORD CWE-256 --------- Begin Update A Part 3 of 4 --------- Mitsubishi Electric MELSEC iQ-F, iQ-R, Q, and L series are vulnerable to an information disclosure vulnerability due to plaintext storage of a password. --------- End Update A Part 3 of 4 --------- CVE-2023-0457 has been assign... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-139-01-0 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could cause a denial-of-service condition by sending specially crafted packets. A system reset is required for recovery. | 4.2.1 IMPROPER INPUT VALIDATION CWE-20 The affected product is vulnerable to a specially crafted packet, which may allow an attacker to cause a denial-of-service condition where a system reset is required for recovery. CVE-2022-25161 has been assigned to this vulnerability. A CVSS v3 base score of 8.6 has been assigned... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-059-02 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could cause part of GWS fail to start, allow unauthorized actors to run scripts, and/or cause a denial-of-service condition. | 3.2.1IMPROPER INPUT VALIDATION CWE-20 A vulnerability exists in the ICCP stack due to validation flaw in the process establishing the ICCP communication. The validation flaw will cause a denial-of-service condition when ICCP of SYS600 is requested to forward any data item updates with timestamps too far in the future. ... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-059-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could cause affected modules to stop working. | 3.2.1NULL POINTER DEREFERENCE CWE-476 A NULL pointer dereference was found in affected versions of OpenLDAP. An unauthenticated attacker could remotely crash the slapd process by sending a specially crafted request, causing a denial-of-service condition on the user authentication function. Note: Local authentication wi... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-052-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow a malicious attacker to make unidentified impacts such as authentication bypass, information disclosure, denial-of-service, or bypass IP address authentication. | 3.2.1INCONSISTENT INTERPRETATION OF HTTP REQUESTS ('HTTP REQUEST/RESPONSE SMUGGLING') CWE-444 MELSOFT iQ AppPortal: v1.00A to 1.29F contains a flaw that could result in unidentified impacts such as authentication bypass, information disclosure, or a denial-of-service condition in Apache HTTP Server used by VisualSVN Se... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-047-02 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow remote attackers to cause a denial-of-service condition. | 3.2.1IMPROPER INPUT VALIDATION CWE-20 SCALANCE X200 IRT Products all versions prior to V5.5.0 use an SNMP agent (snmp_agent.c) in net-snmp before 5.4.1 that could allow remote attackers to cause a denial-of-service (CPU and memory consumption) via a GETBULK request with a large max-repeaters value. CVE-2007-5846has bee... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-047-03 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could lead to a denial-of-service condition. | 3.2.1OS COMMAND INJECTION CWE-78 The c_rehash script does not properly sanitize shell metacharacters, and command injection is possible as a result. CVE-2022-1292has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated. The CVSS vector string is (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-047-04 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could lead to a denial-of-service condition. | 3.2.1IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119 ImportedSymbols in debug/macho (for Open or OpenFat) in Go before 1.16.10 and 1.17.x before 1.17.3 accesses a memory location after the end of a buffer, aka an out-of-bounds slice situation. CVE-2021-41771has been assigned to this vuln... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-047-05 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an authenticated user to escalate privileges by injecting arbitrary commands executed with root privileges. | 3.2.1IMPROPER INPUT VALIDATION CWE-20 Affected devices improperly sanitize user input on the telnet command line interface. This could allow an authenticated user to escalate privileges by injecting arbitrary commands executed with root privileges. CVE-2022-31808has been assigned to this vulnerability. A CVSS v3 base s... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-047-06 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow an attacker to execute code in the context of the current process. | 3.2.1OUT-OF-BOUNDS READ CWE-125 The affected application contains an out-of-bounds read past the end of an allocated structure while parsing specially crafted X_T files. This could allow an attacker to execute code in the context of the current process. CVE-2022-39157has been assigned to this vulnerability. A CVSS v3 b... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-047-07 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an attacker to escalate privileges when tricking a legitimate user to start the service from an attacker-controlled path. | 3.2.1UNTRUSTED SEARCH PATH CWE-426 Affected applications contain an untrusted search path vulnerability that could allow an attacker to escalate privileges when tricking a legitimate user to start the service from an attacker-controlled path. CVE-2022-35868has been assigned to this vulnerability. A CVSS v3 base score o... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-047-08 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow an attacker to take full control of the product and its data. | 3.2.1TIME-OF-CHECK TIME-OF-USE (TOCTOU) RACE CONDITION CWE-367 DMA attacks on the parameter buffer used by the PnpSmm driver could change the contents after parameter values have been checked, but before they are used (e.g. a TOCTOU attack). This issue was discovered by Insyde engineering during asecurity review. CVE-2... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-047-09 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow a privileged user to potentially enable escalation of privilege via local access. | 3.2.1TIME-OF-CHECK TIME-OF-USE (TOCTOU) RACE CONDITION CWE-367 Siemens SIMATIC industrial products versions listed above contain a time-of-check time-of-use race condition in the BIOS firmware for some Intel processors, which could allow a privileged user to potentially enable escalation of privilege via local access. ... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-047-10 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow a malicious cyber actor to execute arbitrary code on the target system or cause a denial-of-service condition. | 3.2.1BUFFER COPY WITHOUT CHECKING SIZE OF INPUT ('CLASSIC BUFFER OVERFLOW') CWE-120 Cache validation service in COMOS is vulnerable to structured exception handler (SEH)-based buffer overflow. This could allow a malicious cyber actor to execute arbitrary code on the target system or cause a denial-of-service condition.... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-047-12 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow a malicious cyber actor to open a JT file with any of the affected products, leading to application crash or arbitrary code execution. | 3.2.1STACK-BASED BUFFER OVERFLOW CWE-121 Versions of JT Open, JT Utilities, and Parasolid software are affected by a stack overflow vulnerability while parsing specially crafted JT files. A malicious cyber actor could execute code in the context of the current process. CVE-2022-47936has been assigned to this vulnerabil... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-047-13 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an attacker to create an out-of-bounds write condition. | 3.2.1OUT-OF-BOUNDS WRITE CWE-787 The Sub-IoT implementation of the DASH 7 Alliance protocol has a vulnerability that can lead to an out-of-bounds write. If the protocol has been compiled using default settings, this will only grant the attacker access to allocated but unused memory. However, if it was configured using ... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-045-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an attacker to gain control of the users machine or gain sensitive information. | 3.2.1PATH TRAVERSAL: '\..\FILENAME' CWE-29 The listed versions for Weintek EasyBuilder Pro are vulnerable to a ZipSlip attack caused by decompiling a malicious project file. This may allow an attacker to gain control of the users computer or gain access to sensitive data. CVE-2023-0104has been assigned to this vulnerab... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-040-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow an attacker to inject malicious JavaScript and execute arbitrary code remotely, which could result in a loss of sensitive information. | 3.2.1IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 Control By Web X-400 devices are vulnerable to a cross-site scripting attack, which could result in private and session information being transferred to the attacker. CVE-2023-23553has been assigned to this vulnerability. A... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-040-02 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow an attacker to steal Programmable Logic Controller (PLC) information, cause users to lose communication with the PLC, modify PLC code, obtain credentials, and create a denial-of-service condition. | 3.2.1MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306 LS ELECTRIC XBC-DN32U with operating system version 01.80 is missing authentication to perform critical functions to the PLC. This could allow an attacker to change the PLC's mode arbitrarily. CVE-2023-22803has been assigned to this vulnerability. A CVSS v3 base... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-040-04 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could lead to an attacker executing arbitrary code via malicious project files. | 3.2.1OUT-OF-BOUNDS READ CWE-125 Cscape Envision RV version 4.60 is vulnerable to an out-of-bounds read vulnerability when parsing project (i.e. HMI) files. The product lacks proper validation of user-supplied data, which could result in reads past the end of allocated data structures. An attacker could leverage these v... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-040-03 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow an attacker to access cookies and take over the user's session. | 3.2.1SENSITIVE COOKIE WITHOUT 'HTTPONLY' FLAG CWE-1004 System Configuration Tool (SCT) versions 14 and 15 are vulnerable during a cross-site scripting attack. This could allow an attacker to access cookies and take control of an affected system. CVE-2022-21939has been assigned to this vulnerability. A CVSS v3 base scor... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-037-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an attacker to gain unauthorized access to the servers. | 3.2.1USE OF HARD-CODED CREDENTIALS CWE-798 The affected product, Echelon SmartServer 2.2 with i.LON Vision 2.2, stores cleartext credentials in a file, which could allow an attacker to obtain cleartext usernames and passwords of the SmartServer. If the attacker obtains the file, then the credentials could be used to co... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-033-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow remote code execution. | 3.2.1STACK-BASED BUFFER OVERFLOW CWE-121 Delta Electronics DIAScreen versions 1.2.1.23 and prior are vulnerable to a stack-based buffer overflow, which could allow an attacker to remotely execute arbitrary code. CVE-2023-0250has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the C... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-033-02 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow attackers to perform unintended operations through clickjacking (an attack that tricks users into clicking an invisible or disguised webpage element) or allow attackers to disclose sensitive information from their browsers or impersonate legitimate users by a... | 3.2.1AUTHENTICATION BYPASS BY SPOOFING CWE-290 This vulnerability could allow an attacker to impersonate legitimate users by abusing inappropriate HTML attributes or cause users' browsers to disclose sensitive information. CVE-2022-40269has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calcu... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-033-03 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an attacker to execute arbitrary commands. | 3.2.1COMMAND INJECTION CWE-77 Baicells Nova 227, Nova 233, Nova 243 LTE TDD eNodeB devices and Nova 246 with firmware through RTS/RTD 3.6.6 are vulnerable to remote shell code exploitation via HTTP command injections. Commands are executed using pre-login execution and executed with root permissions. CVE-2023-24508has ... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-033-04 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow a threat actor with low privileges to gain root access to the device, which could then allow them to send malicious commands to managed devices. | 3.2.1IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN OS COMMAND ('OS COMMAND INJECTION') CWE-78 The web server of the affected device is vulnerable to authenticated command injection via POST parameters. A threat actor could gain full access to the underlying operating system (OS) of the device. If the device is... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-033-05 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow an attacker with low privileges to gain root access or allow an unauthenticated attacker to perform remote code execution. | 3.2.1IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN OS COMMAND ('OS COMMAND INJECTION') CWE-78 The web configuration service of the affected device contains an authenticated command injection vulnerability. It can be used to execute system commands on the operating system (OS) from the device in the context of ... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-221-01-0 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could create a denial-of-service condition or enable arbitrary code execution. | 4.2.1 LOOP WITH UNREACHABLE EXIT CONDITION ('INFINITE LOOP') CWE-835 A vulnerability in OpenSSL creates the potential for an infinite loop in the affected product, which could lead to a denial-of-service condition. CVE-2022-0778has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the ... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-031-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow for remote code execution. | 3.2.1STACK-BASED BUFFER OVERFLOW CWE-121 Delta Electronics DOPSoft versions 4.00.16.22 and prior are vulnerable to a stack-based buffer overflow, which could allow an attacker to remotely execute arbitrary code when a malformed file is introduced to the software. CVE-2023-0123has been assigned to this vulnerability. A ... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-026-07 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could cause a denial-of-service condition for the end user that the cookie was modified for. | 3.2.1 RELIANCE ON COOKIES WITHOUT VALIDATION AND INTEGRITY CWE-784 Landis+Gyr E850 (ZMQ200) web application navigation depends on the value of the session cookie. The web application could become inaccessible for the user if an attacker changes the cookie values. CVE-2022-3083 has been assigned to this vulnerability. A... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-026-06 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could have a high impact on the confidentiality, integrity, and availability of the vulnerable devices. | 3.2.1 INFINITE LOOP CWE-835 A denial-of-service vulnerability exists in the GoAhead web server. To exploit this vulnerability, a malicious user could send specially crafted HTTP requests and trigger an infinite loop in the process. If exploited, the targeted device could crash. CVE-2019-5097 has been assigned to this v... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-026-05 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an attacker to gain unauthorized access to a robot controller. | 3.2.1 ACTIVE DEBUG CODE CWE-489 An authentication bypass vulnerability due to active debug code exists in Mitsubishi Electric MELFA SD/SQ series and F-series controllers for industrial robots. An attacker could gain unauthorized access to a robot controller by performing an unauthorized telnet login. CVE-2022-33323 has... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-026-04 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow a loss of sensitive information and could allow remote code execution. | 3.2.1 IMPROPER NEUTRALIZATION OF ARGUMENT DELIMITERS IN A COMMAND ('ARGUMENT INJECTION') CWE-88 AirLink router versions with ALEOS software are vulnerable when users with valid ACEManager credentials and access to the ACEManager interface could manipulate the IP logging operation to execute arbitrary shell commands on ... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-026-03 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could lead to remote code execution on the device, password brute force, and bricking of the device. | 3.2.1 IMPROPER RESTRICTION OF EXCESSIVE AUTHENTICATION ATTEMPTS CWE-307 Snap One Wattbox WB-300-IP-3 versions WB10.9a17 and prior could bypass the brute force protection, allowing multiple attempts to force a login. CVE-2023-24020 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; t... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-026-02 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could result in a remote unauthenticated attacker gaining full control over traffic lights. | 4.2.1 IMPROPER ACCESS CONTROL CWE-284 --------- Begin Update A Part 2 of 4 --------- Econolite EOS versions prior to 3.2.23 lack a password requirement for gaining READONLY access to log files and certain database and configuration files. One such file contains tables with MD5 hashes and usernames for all defined users... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-026-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could cause a buffer overflow condition, which could allow remote code execution. | 3.2.1STACK-BASED BUFFER OVERFLOW CWE-121 All versions prior to Delta Electronics CNCSoft version 1.01.34 (running ScreenEditor versions 1.01.5 and prior) are vulnerable to a stack-based buffer overflow, which could allow an attacker to remotely execute arbitrary code. CVE-2022-4634 has been assigned to this vulnerabili... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-017-02 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an attacker to access the WEB server function by guessing the random numbers used for authentication. | 4.2.1PREDICTABLE SEED IN PSEUDO-RANDOM NUMBER GENERATOR (PRNG) CWE-337 Mitsubishi Electric MELSEC iQ-F and iQ-R Series products both contain an authentication bypass vulnerability in the WEB server function due to predictable seed in the pseudo-random number generator. CVE-2022-40267 has been assigned to this vulnerabi... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-024-02 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an attacker to obtain sensitive information on the target system. | 3.2.1WEAK ENCODING FOR PASSWORD CWE-261 SOCOMEC MODULYS GP Netvision versions 7.20 and prior lack strong encryption for credentials on HTTP connections, which could result in threat actors obtaining sensitive information. CVE-2023-0356has been assigned to this vulnerability. A CVSS v3 base score of 5.7 has been calcula... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-024-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow an attacker to write arbitrary project files to a programmable logic controller (PLC) and gain code execution privileges. | 3.2.1RELATIVE PATH TRAVERSAL CWE-23 A zip slip vulnerability in XINJE XD/E Series PLC Program Tool up to version v3.5.1 could provide an attacker with arbitrary file write privilege when opening a specially crafted project file. This vulnerability can be triggered by manually opening an infected project file, or by ini... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-019-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could result in a denial-of-service condition on both the logging function of the device and its associated server. | 3.2.1 RELIANCE ON UNCONTROLLED COMPONENT CWE-1357 The affected versions of PCU400 rely on a version of OpenSSL that contains a buffer overflow vulnerability. A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signa... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-017-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could crash the device after access, cause a buffer overflow condition, and allow remote code execution. | 3.2.1AUTHENTICATION BYPASS USING AN ALTERNATE PATH OR CHANNEL CWE-288 Even if the authentication fails for local service authentication, the requested command could still execute regardless of authentication status. CVE-2022-46732 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated;... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-017-03 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow an attacker to read and write arbitrary files from the file system of the affected component and to ultimately execute arbitrary code on the device. | 3.2.1 OS COMMAND INJECTION CWE-78 In addition to the c_rehash shell command injection identified in CVE-2022-1292, code review found further circumstances where the c_rehash script does not properly sanitize shell metacharacters to prevent command injection. When CVE-2022-1292 was fixed, code review did not discover ot... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-347-03 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow a remote attacker to send specially crafted requests and cause a loss of sensitive information. | 4.2.1 OS COMMAND INJECTION CWE-78 CONPROSYS HMI System versions 3.4.4 and prior are vulnerable to an OS Command Injection, which could allow an unauthenticated remote attacker to send specially crafted requests that could execute commands on the server. CVE-2022-44456 has been assigned to this vulnerability. A CVSS v3 ... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-012-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow an attacker to obtain unauthorized access to the server, alter information, create a denial-of-service condition, gain escalated privileges, and execute arbitrary code. | 3.2.1 USE OF HARD-CODED PASSWORD CWE-259 Sewios Real-Time Location System (RTLS) Studio version 2.0.0 up to and including version 2.6.2 contains hard-coded passwords for select users in the applications database. This could allow a remote attacker to login to the database with unrestricted access. CVE-2022-45444 has be... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-012-02 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow an unauthorized user to leak login credentials and download files. In some circumstances, an unauthorized user can use login credentials to achieve remote code execution. | 3.2.1 EXPOSURE OF SENSITIVE INFORMATION TO AN UNAUTHORIZED ACTOR CWE-200 RONDS EPM version 1.19.5 has a vulnerability in which a function could allow unauthenticated users to leak credentials. In some circumstances, an attacker can exploit this vulnerability to execute operating system (OS) commands. CVE-2022-3091 has ... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-012-04 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow attackers to perform actions via HTTP without validity checks. | 3.2.1CROSS-SITE REQUEST FORGERY (CSRF) CWE-352 Panasonic Sanyo CCTV Network Cameras versions 1.02-05 and 2.03-0x are vulnerable to CSRFs that can be exploited to allow an attacker to perform changes with administrator level privileges. CVE-2022-4621 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 h... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-012-06 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could result in exposed credentials in plain text to unauthenticated users. | 3.2.1INSUFFICIENTLY PROTECTED CREDENTIALS CWE-522 Under certain circumstances, the affected versions of Johnson Controls Metasys ADS/ADX/OAS Servers could expose plaintext credentials through application programmable interface (API) calls. CVE-2021-36204 has been assigned to this vulnerability. A CVSS v3 base score of ... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-012-07 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an attacker to gain unauthorized access to any Power BI reports installed or manipulate asset issue comments on assets. | 3.2.1IMPROPER ACCESS CONTROL CWE-284 Hitachi Energy Lumada APM has a flaw in the access control mechanism implementation on the Limited Engineer role, granting access to the embedded Power BI reports feature. This could allow an unauthorized user to access information by gaining unauthorized access to any installed Pow... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-012-05 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow unauthorized visibility to sensitive information and remote code execution. | 3.2.1MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306 SAUTER Controls Nova 200220 Series with firmware version 3.3-006 and prior and BACnetstac version 4.2.1 and prior allows the execution of commands without credentials. As Telnet and file transfer protocol (FTP) are the only protocols available for device managem... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-012-03 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow a message queuing telemetry transport (MQTT) command injection, unauthorized disclosure of sensitive device information, and remote code execution. If properly chained, these vulnerabilities could result in an unauthorized remote user fully compromising every... | 3.2.1CLEARTEXT TRANSMISSION OF SENSITIVE INFORMATION CWE-319 The affected products use an unsecured channel to communicate with the cloud platform by default. An unauthorized user could intercept this communication and steal sensitive information such as configuration information and MQTT credentials; this could allow ... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-012-08 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an attacker with physical access to the device to replace the boot image of the device and execute arbitrary code. | 3.2.1MISSING IMMUTABLE ROOT OF TRUST IN HARDWARE CWE-1326 The affected devices do not contain an immutable root of trust in hardware. Due to this, the integrity of the code executed on the device cannot be validated during load-time. An attacker with physical access to the device could use this to replace the boot imag... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-012-09 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an attacker to gain sensitive information by tricking users into accessing a malicious link. | 3.2.1IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 The affected module is vulnerable to reflected cross-site scripting (XSS) attacks. This could allow an attacker to extract sensitive information by tricking users into accessing a malicious link. CVE-2022-46823 has been ass... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-012-10 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow an attacker to modify and rename license files, extract licenses, and overwrite arbitrary files on the target system, potentially leading to privilege escalation and remote code execution. | 3.2.1EXTERNAL CONTROL OF FILE NAME OR PATH CWE-73 The affected components allow the renaming of license files with user input without authentication. This could allow an unauthenticated remote attacker to rename and move files as a SYSTEM user. CVE-2022-43513 has been assigned to this vulnerability. A CVSS v3 base scor... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-012-11 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an attacker to execute code while parsing files in different formats. | 3.2.1IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119 The DOCMGMT.DLL contains a memory corruption vulnerability that could be triggered while parsing files in different file formats such as PAR, ASM, DFT. This could allow an attacker to execute code in the context of the current process.... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-010-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an attacker to read sensitive data on the built-in web servers of the affected devices. | 3.2.1 IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY ('PATH TRAVERSAL') CWE-22 Black Box KVM Firmware version 3.4.31307 on models ACR1000A-R-R2, ACR1000A-T-R2, ACR1002A-T, ACR1002A-R, and ACR1020A-T is vulnerable to path traversal, which may allow an attacker to steal user credentials and other sensitive i... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-298-07 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow an unauthenticated attacker to remotely execute code, cause a denial-of-service condition by remotely deleting files or changing group privileges, or remotely read and write files, all with local administrator privileges. | 4.2.1 DESERIALIZATION OF UNTRUSTED DATA CWE-502 Delta Electronics InfraSuite Device Master versions 00.00.01a and prior deserialize user-supplied data provided through the Device-DataCollect service port without proper verification. An attacker could provide malicious serialized objects to execute arbitrary code upon d... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-005-02 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow an unauthorized user to obtain sensitive information and gain access to the network elements managed by the FOXMAN-UN, and could cause an availability issue on affected FOXMAN-UN products. | 3.2.1 INADEQUATE ENCRYPTION STRENGTH CWE-326 The affected Hitachi Energy FOXMAN-UN products use the DES cypher to encrypt user credentials used to access the network elements. DES is no longer considered secure due to a short 56-bit key, which could allow the cypher to be decrypted in a short time. CVE-2021-40341 has b... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-005-03 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could cause a denial-of-service condition or unauthorized remote arbitrary code execution. | 3.2.1 RELIANCE ON UNCONTROLLED COMPONENT CWE-1357 The affected versions of Lumada APM rely on a version of OpenSSL that contains a buffer overflow vulnerability. A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain s... |
https://www.cisa.gov/news-events/ics-advisories/icsa-23-005-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow an unauthorized user to obtain sensitive information and gain access to the network elements managed by the UNEM and could cause availability issue on affected UNEM products. | 3.2.1 INADEQUATE ENCRYPTION STRENGTH CWE-326 Affected Hitachi Energy UNEM products use the DES cypher to encrypt user credentials used to access the network elements. DES is no longer considered secure because it uses a short 56-bit key, which could allow the cypher to be decrypted in a short time. CVE-2021-40341 has b... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-356-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an attacker to obtain login credentials and access the product remotely. | 3.2.1 USE OF PASSWORD HASH WITH INSUFFICIENT COMPUTATIONAL EFFORT CWE-916 Priva TopControl Suite versions up to 8.7.8.0 are vulnerable to secure shell (SSH) credentials being deciphered. An attacker could calculate the login credentials for the Priva product and login remotely. CVE-2022-3010 has been assigned to this v... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-356-02 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow a malicious user to perform remote code execution, potentially impacting the confidentiality, integrity, and availability of the software. | 3.2.1 IMPROPER ACCESS CONTROL CWE-284 Studio 5000 Logix Emulate v.20-33 users are granted elevated permissions on certain product services. Due to this misconfiguration, a malicious user could potentially achieve remote code execution on the targeted software. CVE-2022-3156 has been assigned to this vulnerability. A CV... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-356-03 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow a remote attacker to cause a denial-of-service condition in the module's ethernet communication. | 3.2.1IMPROPER RESOURCE SHUTDOWN OR RELEASE CWE-404 A denial-of-service vulnerability due to improper resource shutdown or release exists in Mitsubishi Electric MELSEC iQ-R, iQ-L series CPU module, and MELIPC series. This vulnerability could allow a remote attacker to cause a denial-of-service condition in the module's ... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-356-04 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow arbitrary code execution or loss of sensitive information if a user opens a specially crafted CX-P file. | 3.2.1 OUT-OF-BOUNDS WRITE CWE-787 CX-Programmer is vulnerable to a Out-of-bounds Write when a user opens a specially crafted CXP file. This could cause a loss of sensitive information or arbitrary code execution. CVE-2022-43509 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the ... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-354-03 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow an unauthorized user to access the email account, SIM card, and other data sources associated with the affected device. | 4.2.1CLEARTEXT STORAGE OF SENSITIVE INFORMATION CWE-312 A cleartext storage of sensitive information vulnerability exists in PcVue versions 8.10 through 15.2.3. This could allow an unauthorized user to access the email and short messaging service (SMS) accounts configuration files to discover the associated simple mail... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-354-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code. | 3.2.1 OUT-OF-BOUNDS WRITE CWE-787 Fuji Electric Tellus Lite V-Simulator versions 4.0.12.0 and prior are vulnerable to an out-of-bounds write which may allow an attacker to execute arbitrary code. CVE-2022-3087 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector stri... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-354-02 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could potentially lead to degradation in availability of the controller and/or a possible major nonrecoverable fault. | 3.2.1 IMPROPER INPUT VALIDATION CWE-20 An improper input validation vulnerability exists in affected versions of Rockwell Automation controllers that could allow a malformed CIP request to cause a major nonrecoverable fault and a denial-of-service condition. CVE-2022-3157 has been assigned to this vulnerability. A CVSS... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-354-04 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could create a denial-of-service condition or allow for remote code execution. | 3.2.1 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 The affected products have an unauthenticated stored cross-site scripting vulnerability in the embedded webserver. The payload is transferred to the controller over simple network management protocol (SNMP) and is rendered... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-354-05 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow a remote unauthenticated user to add files, delete files, or change file permissions. | 3.2.1 COMMAND INJECTION CWE-77 The webserver in Delta DX-3021 versions prior to 1.24 is vulnerable to command injection through the network diagnosis page. This vulnerability could allow a remote unauthenticated user to add files, delete files, and change file permissions. CVE-2022-4616 has been assigned to this vulner... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-349-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an attacker to obtain credentials and gain access to system data. | 4.2.1 INSUFFICIENTLY PROTECTED CREDENTIALS CWE-522 Prosys OPC UA Simulation server v5.03-64 does not sufficiently protect credentials, which could allow an attacker to obtain user credentials and gain access to system data. CVE-2022-2967 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calc... |
https://www.cisa.gov/news-events/ics-advisories/icsa-18-163-02 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these cross-site scripting vulnerabilities could allow an attacker to store script code on the website and execute cross-site scripting (XSS), affecting the websites confidentiality, integrity, and availability. However, no known public exploits specifically target these vulnerabilities. High... | 4.2.1 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION CWE-79 A remote, authenticated attacker with access to the configuration web server could store script code on the website, provided the HRP redundancy option is set. This code could be executed in the web browser of users visiting this website (XSS), af... |
https://www.cisa.gov/news-events/ics-advisories/icsa-20-042-07 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an attacker to perform administrative actions. | 4.2.1 PROTECTION MECHANISM FAILURE CWE-693 The device does not send the X-Frame-Option header in the administrative web interface, which makes it vulnerable to click-jacking attacks. CVE-2019-13924 has been assigned to this vulnerability. A CVSS v3 base score of 4.2 has been calculated; the CVSS vector string is (AV:N/... |
https://www.cisa.gov/news-events/ics-advisories/icsa-21-012-02 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow an attacker to execute a man-in-the-middle attack and decrypt previously captured traffic. | 4.2.1 USE OF HARD-CODED CRYPTOGRAPHIC KEY CWE-321 Devices create a new unique key upon factory reset, except when used with C-PLUG. When used with C-PLUG the devices use the hardcoded private RSA-key shipped with the firmware-image. An attacker could exploit this vulnerability to create a man-in-the-middle situation an... |
https://www.cisa.gov/news-events/ics-advisories/icsa-19-283-02 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could cause a denial-of-service condition. | 4.2.1 UNCONTROLLED RESOURCE CONSUMPTION ('RESOURCE EXHAUSTION') CWE-400 An unauthenticated attacker sending a large amount of specially crafted UDP packets may trigger a denial-of-service condition. CVE-2019-10936 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector st... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.