8.8
CVE-2018-7782
- EPSS 0.21%
- Veröffentlicht 03.07.2018 14:29:01
- Zuletzt bearbeitet 21.11.2024 04:12:43
- Quelle cybersecurity@se.com
- Teams Watchlist Login
- Unerledigt Login
In Schneider Electric Pelco Sarix Professional 1st generation cameras with firmware versions prior to 3.29.69, authenticated users can view passwords in clear text.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Schneider-electric ≫ Imps110-1 Firmware Version < 3.29.69
Schneider-electric ≫ Imps110-1e Firmware Version < 3.29.69
Schneider-electric ≫ Imps110-1er Firmware Version < 3.29.69
Schneider-electric ≫ Ibps110-1er Firmware Version < 3.29.69
Schneider-electric ≫ Imp1110-1 Firmware Version < 3.29.69
Schneider-electric ≫ Imp1110-1e Firmware Version < 3.29.69
Schneider-electric ≫ Imp1110-1er Firmware Version < 3.29.69
Schneider-electric ≫ Ibp1110-1er Firmware Version < 3.29.69
Schneider-electric ≫ Imp219-1 Firmware Version < 3.29.69
Schneider-electric ≫ Imp219-1e Firmware Version < 3.29.69
Schneider-electric ≫ Imp219-1er Firmware Version < 3.29.69
Schneider-electric ≫ Ibp219-1er Firmware Version < 3.29.69
Schneider-electric ≫ Imp319-1 Firmware Version < 3.29.69
Schneider-electric ≫ Imp319-1e Firmware Version < 3.29.69
Schneider-electric ≫ Imp319-1er Firmware Version < 3.29.69
Schneider-electric ≫ Ibp319-1er Firmware Version < 3.29.69
Schneider-electric ≫ Imp519-1 Firmware Version < 3.29.69
Schneider-electric ≫ Imp519-1e Firmware Version < 3.29.69
Schneider-electric ≫ Imp519-1er Firmware Version < 3.29.69
Schneider-electric ≫ Ibp519-1er Firmware Version < 3.29.69
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.21% | 0.404 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 4 | 8 | 2.9 |
AV:N/AC:L/Au:S/C:P/I:N/A:N
|
CWE-522 Insufficiently Protected Credentials
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.