8.1

CVE-2018-17935

All versions of Telecrane F25 Series Radio Controls before 00.0A use fixed codes that are reproducible by sniffing and re-transmission. This can lead to unauthorized replay of a command, spoofing of an arbitrary message, or keeping the controlled load in a permanent "stop" state.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
TelecraneF25-2s Firmware Version < 00.0a
   TelecraneF25-2s Version-
TelecraneF25-2d Firmware Version < 00.0a
   TelecraneF25-2d Version-
TelecraneF25-4s Firmware Version < 00.0a
   TelecraneF25-4s Version-
TelecraneF25-4d Firmware Version < 00.0a
   TelecraneF25-4d Version-
TelecraneF25-6s Firmware Version < 00.0a
   TelecraneF25-6s Version-
TelecraneF25-6d Firmware Version < 00.0a
   TelecraneF25-6d Version-
TelecraneF25-8s Firmware Version < 00.0a
   TelecraneF25-8s Version-
TelecraneF25-8d Firmware Version < 00.0a
   TelecraneF25-8d Version-
TelecraneF25-10s Firmware Version < 00.0a
   TelecraneF25-10s Version-
TelecraneF25-10d Firmware Version < 00.0a
   TelecraneF25-10d Version-
TelecraneF25-60 Firmware Version < 00.0a
   TelecraneF25-60 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.26% 0.493
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 8.1 2.8 5.2
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
nvd@nist.gov 4.8 6.5 4.9
AV:A/AC:L/Au:N/C:N/I:P/A:P
CWE-294 Authentication Bypass by Capture-replay

A capture-replay flaw exists when the design of the product makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes).