Boschrexroth

Ctrlx Hmi Web Panel Wr2107 Firmware

9 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.1%
  • Veröffentlicht 25.10.2023 18:17:36
  • Zuletzt bearbeitet 21.11.2024 08:27:54

The Android Client application, when enrolled to the AppHub server, connects to an MQTT broker to exchange messages and receive commands to execute on the HMI device. The protocol builds on top of MQTT to implement the remote management of the devi...

  • EPSS 0.12%
  • Veröffentlicht 25.10.2023 18:17:35
  • Zuletzt bearbeitet 21.11.2024 08:27:28

The vulnerability allows a low privileged user that have access to the device when locked in Kiosk mode to install an arbitrary Android application and leverage it to have access to critical device settings such as the device power management or even...

  • EPSS 0.11%
  • Veröffentlicht 25.10.2023 18:17:35
  • Zuletzt bearbeitet 21.11.2024 08:27:28

The Android Client application, when enrolled to the AppHub server,connects to an MQTT broker without enforcing any server authentication.  This issue allows an attacker to force the Android Client application to connect to a malicious MQTT brok...

  • EPSS 0.12%
  • Veröffentlicht 25.10.2023 18:17:33
  • Zuletzt bearbeitet 21.11.2024 08:26:34

The Android Client application, when enrolled with the define method 1(the user manually inserts the server ip address), use HTTP protocol to retrieve sensitive information (ip address and credentials to connect to a remote MQTT broker entity) inste...

  • EPSS 0.04%
  • Veröffentlicht 25.10.2023 18:17:33
  • Zuletzt bearbeitet 21.11.2024 08:26:44

The Android Client application, when enrolled with the define method 1 (the user manually inserts the server ip address), use HTTP protocol to retrieve sensitive information (ip address and credentials to connect to a remote MQTT broker entity) inst...

  • EPSS 0.07%
  • Veröffentlicht 25.10.2023 18:17:31
  • Zuletzt bearbeitet 21.11.2024 08:21:59

The vulnerability allows an unprivileged(untrusted) third-party application to interact with a content-provider unsafely exposed by the Android Agent application, potentially modifying sensitive settings of the Android Client application itself.

  • EPSS 0.06%
  • Veröffentlicht 25.10.2023 18:17:31
  • Zuletzt bearbeitet 21.11.2024 08:24:08

The vulnerability allows a low privileged (untrusted) application to modify a critical system property that should be denied, in order to enable the ADB (Android Debug Bridge) protocol to be exposed on the network, exploiting it to gain a privileged...

  • EPSS 0.13%
  • Veröffentlicht 25.10.2023 18:17:30
  • Zuletzt bearbeitet 21.11.2024 08:20:55

The vulnerability allows an unprivileged user with access to the subnet of the TPC-110W device to gain a root shell on the device itself abusing the lack of authentication of the ‘su’ binary file installed on the device that can be accessed through...

  • EPSS 0.07%
  • Veröffentlicht 25.10.2023 18:17:30
  • Zuletzt bearbeitet 21.11.2024 08:21:10

The vulnerability allows an unprivileged (untrusted) third- party application to arbitrary modify the server settings of the Android Client application, inducing it to connect to an attacker - controlled malicious server.This is possible by forging a...