7.5
CVE-2022-2005
- EPSS 0.11%
- Veröffentlicht 31.08.2022 16:15:10
- Zuletzt bearbeitet 21.11.2024 07:00:09
- Quelle ics-cert@hq.dhs.gov
- CVE-Watchlists
- Unerledigt
AutomationDirect C-more EA9 HTTP webserver uses an insecure mechanism to transport credentials from client to web server, which may allow an attacker to obtain the login credentials and login as a valid user. This issue affects: AutomationDirect C-more EA9 EA9-T6CL versions prior to 6.73; EA9-T6CL-R versions prior to 6.73; EA9-T7CL versions prior to 6.73; EA9-T7CL-R versions prior to 6.73; EA9-T8CL versions prior to 6.73; EA9-T10CL versions prior to 6.73; EA9-T10WCL versions prior to 6.73; EA9-T12CL versions prior to 6.73; EA9-T15CL versions prior to 6.73; EA9-RHMI versions prior to 6.73; EA9-PGMSW versions prior to 6.73;
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Automationdirect ≫ C-more Ea9-t6cl Firmware Version < 6.73
Automationdirect ≫ C-more Ea9-t6cl-r Firmware Version < 6.73
Automationdirect ≫ C-more Ea9-t7cl Firmware Version < 6.73
Automationdirect ≫ C-more Ea9-t7cl-r Firmware Version < 6.73
Automationdirect ≫ C-more Ea9-t8cl Firmware Version < 6.73
Automationdirect ≫ C-more Ea9-t10cl Firmware Version < 6.73
Automationdirect ≫ C-more Ea9-t10wcl Firmware Version < 6.73
Automationdirect ≫ C-more Ea9-t12cl Firmware Version < 6.73
Automationdirect ≫ C-more Ea9-t15cl Firmware Version < 6.73
Automationdirect ≫ C-more Ea9-t15cl-r Firmware Version < 6.73
Automationdirect ≫ C-more Ea9-rhmi Firmware Version < 6.73
Automationdirect ≫ C-more Ea9-pgmsw Firmware Version < 6.73
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.11% | 0.3 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
| ics-cert@hq.dhs.gov | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
CWE-319 Cleartext Transmission of Sensitive Information
The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.