8.8
CVE-2018-7782
- EPSS 0.21%
- Veröffentlicht 03.07.2018 14:29:01
- Zuletzt bearbeitet 21.11.2024 04:12:43
- Quelle cybersecurity@se.com
- CVE-Watchlists
- Unerledigt
In Schneider Electric Pelco Sarix Professional 1st generation cameras with firmware versions prior to 3.29.69, authenticated users can view passwords in clear text.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Schneider-electric ≫ Imps110-1 Firmware Version < 3.29.69
Schneider-electric ≫ Imps110-1e Firmware Version < 3.29.69
Schneider-electric ≫ Imps110-1er Firmware Version < 3.29.69
Schneider-electric ≫ Ibps110-1er Firmware Version < 3.29.69
Schneider-electric ≫ Imp1110-1 Firmware Version < 3.29.69
Schneider-electric ≫ Imp1110-1e Firmware Version < 3.29.69
Schneider-electric ≫ Imp1110-1er Firmware Version < 3.29.69
Schneider-electric ≫ Ibp1110-1er Firmware Version < 3.29.69
Schneider-electric ≫ Imp219-1 Firmware Version < 3.29.69
Schneider-electric ≫ Imp219-1e Firmware Version < 3.29.69
Schneider-electric ≫ Imp219-1er Firmware Version < 3.29.69
Schneider-electric ≫ Ibp219-1er Firmware Version < 3.29.69
Schneider-electric ≫ Imp319-1 Firmware Version < 3.29.69
Schneider-electric ≫ Imp319-1e Firmware Version < 3.29.69
Schneider-electric ≫ Imp319-1er Firmware Version < 3.29.69
Schneider-electric ≫ Ibp319-1er Firmware Version < 3.29.69
Schneider-electric ≫ Imp519-1 Firmware Version < 3.29.69
Schneider-electric ≫ Imp519-1e Firmware Version < 3.29.69
Schneider-electric ≫ Imp519-1er Firmware Version < 3.29.69
Schneider-electric ≫ Ibp519-1er Firmware Version < 3.29.69
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.21% | 0.404 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 4 | 8 | 2.9 |
AV:N/AC:L/Au:S/C:P/I:N/A:N
|
CWE-522 Insufficiently Protected Credentials
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.