9.8

CVE-2021-22640

An attacker can decrypt the Ovarro TBox login password by communication capture and brute force attacks.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
OvarroTwinsoft Version < 12.4
OvarroTbox Lt2-530 Firmware Version < 1.46
   OvarroTbox Lt2-530 Version-
OvarroTbox Lt2-532 Firmware Version < 1.46
   OvarroTbox Lt2-532 Version-
OvarroTbox Lt2-540 Firmware Version < 1.46
   OvarroTbox Lt2-540 Version-
OvarroTbox Ms-cpu32 Firmware Version < 1.46
   OvarroTbox Ms-cpu32 Version-
OvarroTbox Ms-cpu32-s2 Firmware Version < 1.46
   OvarroTbox Ms-cpu32-s2 Version-
OvarroTbox Rm2 Firmware Version < 1.46
   OvarroTbox Rm2 Version-
OvarroTbox Tg2 Firmware Version < 1.46
   OvarroTbox Tg2 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.24% 0.468
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
ics-cert@hq.dhs.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CWE-294 Authentication Bypass by Capture-replay

A capture-replay flaw exists when the design of the product makes it possible for a malicious user to sniff network traffic and bypass authentication by replaying it to the server in question to the same effect as the original message (or with minor changes).

CWE-307 Improper Restriction of Excessive Authentication Attempts

The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame.

CWE-522 Insufficiently Protected Credentials

The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.