Siemens

Sinec Traffic Analyzer

17 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.39%
  • Veröffentlicht 11.06.2024 12:15:17
  • Zuletzt bearbeitet 11.02.2025 11:15:13

A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V1.2). The affected application lacks input validation due to which an attacker can gain access to the Database entries.

  • EPSS 0.2%
  • Veröffentlicht 11.06.2024 12:15:17
  • Zuletzt bearbeitet 11.02.2025 11:15:13

A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V1.2). The affected web server, after a successful login, sets the session cookie on the browser, without applying any security attributes (such as “Se...

  • EPSS 0.18%
  • Veröffentlicht 11.06.2024 12:15:17
  • Zuletzt bearbeitet 11.02.2025 11:15:13

A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V1.2). The affected web server is not enforcing HSTS. This could allow an attacker to perform downgrade attacks exposing confidential information.

  • EPSS 0.39%
  • Veröffentlicht 11.06.2024 12:15:17
  • Zuletzt bearbeitet 11.02.2025 11:15:12

A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V1.2). The affected web server is allowing HTTP methods like PUT and Delete. This could allow an attacker to modify unauthorized files.

  • EPSS 0.33%
  • Veröffentlicht 11.06.2024 12:15:16
  • Zuletzt bearbeitet 11.02.2025 11:15:12

A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V1.2). The affected application does not expire the session. This could allow an attacker to get unauthorized access.

  • EPSS 0.1%
  • Veröffentlicht 11.06.2024 12:15:16
  • Zuletzt bearbeitet 21.11.2024 09:19:56

A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V1.2). The affected web server stored the password in cleartext. This could allow attacker in a privileged position to obtain access passwords.

  • EPSS 0.33%
  • Veröffentlicht 11.06.2024 12:15:16
  • Zuletzt bearbeitet 21.11.2024 09:19:56

A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V1.2). The web interface of the affected devices are vulnerable to Cross-Site Request Forgery(CSRF) attacks. By tricking an authenticated victim user t...