CVE-2022-29951
- EPSS 0.34%
- Veröffentlicht 26.07.2022 22:15:10
- Zuletzt bearbeitet 21.11.2024 07:00:02
JTEKT TOYOPUC PLCs through 2022-04-29 mishandle authentication. They utilize the CMPLink/TCP protocol (configurable on ports 1024-65534 on either TCP or UDP) for a wide variety of engineering purposes such as starting and stopping the PLC, downloadin...
CVE-2022-29958
- EPSS 0.12%
- Veröffentlicht 26.07.2022 22:15:10
- Zuletzt bearbeitet 21.11.2024 07:00:03
JTEKT TOYOPUC PLCs through 2022-04-29 do not ensure data integrity. They utilize the unauthenticated CMPLink/TCP protocol for engineering purposes, including downloading projects and control logic to the PLC. Control logic is downloaded to the PLC on...
CVE-2021-33011
- EPSS 0.07%
- Veröffentlicht 10.09.2021 12:15:07
- Zuletzt bearbeitet 21.11.2024 06:08:07
All versions of the afffected TOYOPUC-PC10 Series,TOYOPUC-Plus Series,TOYOPUC-PC3J/PC2J Series, TOYOPUC-Nano Series products may not be able to properly process an ICMP flood, which may allow an attacker to deny Ethernet communications between affect...
CVE-2021-27458
- EPSS 0.26%
- Veröffentlicht 19.04.2021 22:15:12
- Zuletzt bearbeitet 21.11.2024 05:58:01
If Ethernet communication of the JTEKT Corporation TOYOPUC product series’ (TOYOPUC-PC10 Series: PC10G-CPU TCC-6353: All versions, PC10GE TCC-6464: All versions, PC10P TCC-6372: All versions, PC10P-DP TCC-6726: All versions, PC10P-DP-IO TCC-6752: All...