Opto22

Softpac Project

5 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.28%
  • Veröffentlicht 14.05.2020 21:15:13
  • Zuletzt bearbeitet 21.11.2024 04:55:42

Opto 22 SoftPAC Project Version 9.6 and prior. SoftPAC communication does not include any credentials. This allows an attacker with network access to directly communicate with SoftPAC, including, for example, stopping the service remotely.

  • EPSS 0.07%
  • Veröffentlicht 14.05.2020 21:15:13
  • Zuletzt bearbeitet 21.11.2024 04:59:10

Opto 22 SoftPAC Project Version 9.6 and prior. Paths specified within the zip files used to update the SoftPAC firmware are not sanitized. As a result, an attacker with user privileges can gain arbitrary file write access with system access.

  • EPSS 0.08%
  • Veröffentlicht 14.05.2020 21:15:13
  • Zuletzt bearbeitet 21.11.2024 04:59:10

Opto 22 SoftPAC Project Version 9.6 and prior. SoftPAC’s firmware files’ signatures are not verified upon firmware update. This allows an attacker to replace legitimate firmware files with malicious files.

  • EPSS 0.22%
  • Veröffentlicht 14.05.2020 21:15:12
  • Zuletzt bearbeitet 21.11.2024 04:55:41

Opto 22 SoftPAC Project Version 9.6 and prior. SoftPACAgent communicates with SoftPACMonitor over network Port 22000. However, this port is open without any restrictions. This allows an attacker with network access to control the SoftPACAgent service...

  • EPSS 0.47%
  • Veröffentlicht 14.05.2020 21:15:12
  • Zuletzt bearbeitet 21.11.2024 04:55:42

Opto 22 SoftPAC Project Version 9.6 and prior. SoftPAC does not specify the path of multiple imported .dll files. Therefore, an attacker can replace them and execute code whenever the service starts.