Dataprobe

Iboot-pdu8a-2n15 Firmware

18 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.11%
  • Veröffentlicht 14.08.2023 05:15:09
  • Zuletzt bearbeitet 21.11.2024 08:16:49

The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier uses hard-coded credentials for all interactions with the internal Postgres database. A malicious agent with the ability to execute operating system commands on the device can ...

  • EPSS 0.07%
  • Veröffentlicht 14.08.2023 05:15:09
  • Zuletzt bearbeitet 21.11.2024 08:16:49

The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier is vulnerable to authentication bypass in the REST API due to the mishandling of special characters when parsing credentials.Successful exploitation allows the malicious agent ...

  • EPSS 0.08%
  • Veröffentlicht 14.08.2023 04:15:11
  • Zuletzt bearbeitet 21.11.2024 08:16:49

The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier uses hard-coded credentials for all interactions with the internal Postgres database.A malicious agent with the ability to execute operating system commands on the device can l...

  • EPSS 0.19%
  • Veröffentlicht 14.08.2023 04:15:10
  • Zuletzt bearbeitet 21.11.2024 08:16:49

The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier contains a buffer overflow vulnerability in the librta.so.0.0.0 library.Successful exploitation could cause denial of service or unexpected behavior with respect to all interac...

  • EPSS 0.45%
  • Veröffentlicht 14.08.2023 04:15:10
  • Zuletzt bearbeitet 21.11.2024 08:16:49

The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier is vulnerable to command injection via the `user-name` URL parameter. An authenticated malicious agent can exploit this vulnerability to execute arbitrary command on the underl...

  • EPSS 0.15%
  • Veröffentlicht 14.08.2023 04:15:10
  • Zuletzt bearbeitet 21.11.2024 08:16:48

The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier is vulnerable to authentication bypass. By manipulating the IP address field in the "iBootPduSiteAuth" cookie, a malicious agent can direct the device to connect to a rouge dat...

  • EPSS 0.06%
  • Veröffentlicht 22.05.2023 23:15:09
  • Zuletzt bearbeitet 21.11.2024 07:30:59

The affected product exposes multiple sensitive data fields of the affected product. An attacker can use the SNMP command to get device mac address and login as admin.

  • EPSS 0.11%
  • Veröffentlicht 22.05.2023 23:15:09
  • Zuletzt bearbeitet 21.11.2024 07:31:42

The iBoot device’s basic discovery protocol assists in initial device configuration. The discovery protocol shows basic information about devices on the network and allows users to perform configuration changes.

  • EPSS 0.11%
  • Veröffentlicht 22.05.2023 23:15:09
  • Zuletzt bearbeitet 21.11.2024 07:31:42

A proprietary protocol for iBoot devices is used for control and keepalive commands. The function compares the username and password; it also contains the configuration data for the user specified. If the user does not exist, then it sends a value fo...

  • EPSS 0.64%
  • Veröffentlicht 22.05.2023 23:15:09
  • Zuletzt bearbeitet 21.11.2024 07:30:51

The affected product is vulnerable to a stack-based buffer overflow which could lead to a denial of service or remote code execution.