Copeland

E3 Supervisory Controller Firmware

9 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Veröffentlicht 02.09.2025 11:26:35
  • Zuletzt bearbeitet 01.10.2025 18:20:33

E3 Site Supervisor Control (firmware version < 2.31F01) firmware upgrade packages are unsigned. An attacker can forge malicious firmware upgrade packages. An attacker with admin access to the application services can install a malicious firmware upgr...

  • EPSS 0.06%
  • Veröffentlicht 02.09.2025 11:26:23
  • Zuletzt bearbeitet 01.10.2025 18:23:48

E3 Site Supervisor Control (firmware version < 2.31F01) generates the root linux password on each boot. An attacker can generate the root linux password for a vulnerable device based on known or easy to fetch parameters.

  • EPSS 0.04%
  • Veröffentlicht 02.09.2025 11:26:08
  • Zuletzt bearbeitet 01.10.2025 18:25:16

E3 Site Supervisor Control (firmware version < 2.31F01) contains a hidden API call in the application services that enables SSH and Shellinabox, which exist but are disabled by default. An attacker with admin access to the application services can ut...

  • EPSS 0.09%
  • Veröffentlicht 02.09.2025 11:25:54
  • Zuletzt bearbeitet 01.10.2025 18:25:49

E3 Site Supervisor Control (firmware version < 2.31F01) MGW contains an API call that lacks input validation. An attacker can use this command to continuously crash the application services.

  • EPSS 0.11%
  • Veröffentlicht 02.09.2025 11:25:39
  • Zuletzt bearbeitet 01.10.2025 18:26:57

E3 Site Supervisor Control (firmware version < 2.31F01) has a floor plan feature that allows for an unauthenticated attacker to upload floor plan files. By uploading a specially crafted floor plan file, an attacker can inject a stored XSS to the floo...

  • EPSS 0.05%
  • Veröffentlicht 02.09.2025 11:25:22
  • Zuletzt bearbeitet 01.10.2025 18:27:05

E3 Site Supervisor Control (firmware version < 2.31F01) RCI service contains an API call to read users info, which returns all usernames and password hashes for the application services.

  • EPSS 0.17%
  • Veröffentlicht 02.09.2025 11:25:01
  • Zuletzt bearbeitet 01.10.2025 18:27:30

E3 Site Supervisor Control (firmware version < 2.31F01) has a floor plan feature that allows for an unauthenticated attacker to upload floor plan files. By uploading a specially crafted floor plan file, an attacker can access any file from the E3 fil...

  • EPSS 0.06%
  • Veröffentlicht 02.09.2025 11:24:32
  • Zuletzt bearbeitet 01.10.2025 18:27:55

E3 Site Supervisor Control (firmware version < 2.31F01) application services (MGW and RCI) uses client side hashing for authentication. An attacker can authenticate by obtaining only the password hash.

  • EPSS 0.06%
  • Veröffentlicht 02.09.2025 11:23:59
  • Zuletzt bearbeitet 10.10.2025 14:18:29

E3 Site Supervisor (firmware version < 2.31F01) has a default admin user "ONEDAY" with a daily generated password. An attacker can predictably generate the password for ONEDAY. The oneday user cannot be deleted or modified by any user.