Opto22

Snap Pac S1 Firmware

5 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.11%
  • Veröffentlicht 24.08.2023 17:15:09
  • Zuletzt bearbeitet 21.11.2024 08:20:00

The File Transfer Protocol (FTP) port is open by default in the SNAP PAC S1 Firmware version R10.3b. This could allow an adversary to access some device files.

  • EPSS 0.09%
  • Veröffentlicht 24.08.2023 17:15:09
  • Zuletzt bearbeitet 21.11.2024 08:20:00

An adversary could crash the entire device by sending a large quantity of ICMP requests if the controller has the built-in web server enabled but does not have the built-in web server completely set up and configured for the SNAP PAC S1 Firmware vers...

  • EPSS 0.09%
  • Veröffentlicht 24.08.2023 17:15:09
  • Zuletzt bearbeitet 21.11.2024 08:20:00

An adversary could cause a continuous restart loop to the entire device by sending a large quantity of HTTP GET requests if the controller has the built-in web server enabled but does not have the built-in web server completely set up and configured ...

  • EPSS 0.08%
  • Veröffentlicht 24.08.2023 17:15:08
  • Zuletzt bearbeitet 21.11.2024 08:20:00

There is no limit on the number of login attempts in the web server for the SNAP PAC S1 Firmware version R10.3b. This could allow for a brute-force attack on the built-in web server login.

  • EPSS 0.06%
  • Veröffentlicht 24.08.2023 17:15:08
  • Zuletzt bearbeitet 21.11.2024 08:20:00

There are no requirements for setting a complex password in the built-in web server of the SNAP PAC S1 Firmware version R10.3b, which could allow for a successful brute force attack if users don't set up complex credentials.