CVE-2024-34025
- EPSS 0.03%
- Veröffentlicht 15.05.2024 20:15:13
- Zuletzt bearbeitet 04.08.2025 14:12:56
CyberPower PowerPanel business application code contains a hard-coded set of authentication credentials. This could result in an attacker bypassing authentication and gaining administrator privileges.
CVE-2024-32047
- EPSS 0.21%
- Veröffentlicht 15.05.2024 20:15:12
- Zuletzt bearbeitet 30.07.2025 00:16:34
Hard-coded credentials for the CyberPower PowerPanel test server can be found in the production code. This might result in an attacker gaining access to the testing or production server.
CVE-2024-32053
- EPSS 0.21%
- Veröffentlicht 15.05.2024 20:15:12
- Zuletzt bearbeitet 30.07.2025 00:15:59
Hard-coded credentials are used by the CyberPower PowerPanel platform to authenticate to the database, other services, and the cloud. This could result in an attacker gaining access to services with the privileges of a Powerpanel business appl...
CVE-2024-33625
- EPSS 0.04%
- Veröffentlicht 15.05.2024 20:15:12
- Zuletzt bearbeitet 04.08.2025 14:18:02
CyberPower PowerPanel business application code contains a hard-coded JWT signing key. This could result in an attacker forging JWT tokens to bypass authentication.
CVE-2024-31409
- EPSS 0.25%
- Veröffentlicht 15.05.2024 20:15:11
- Zuletzt bearbeitet 07.08.2025 19:15:28
Certain MQTT wildcards are not blocked on the CyberPower PowerPanel system, which might result in an attacker obtaining data from throughout the system after gaining access to any device.
CVE-2024-31410
- EPSS 0.12%
- Veröffentlicht 15.05.2024 20:15:11
- Zuletzt bearbeitet 30.07.2025 00:23:54
The devices which CyberPower PowerPanel manages use identical certificates based on a hard-coded cryptographic key. This can allow an attacker to impersonate any client in the system and send malicious data.
CVE-2024-31856
- EPSS 0.26%
- Veröffentlicht 15.05.2024 20:15:11
- Zuletzt bearbeitet 30.07.2025 00:20:33
An attacker with certain MQTT permissions can create malicious messages to all CyberPower PowerPanel devices. This could result in an attacker injecting SQL syntax, writing arbitrary files to the system, and executing remote code.
CVE-2024-32042
- EPSS 0.18%
- Veröffentlicht 15.05.2024 20:15:11
- Zuletzt bearbeitet 30.07.2025 00:19:33
The key used to encrypt passwords stored in the database can be found in the CyberPower PowerPanel application code, allowing the passwords to be recovered.
CVE-2024-32737
- EPSS 42.65%
- Veröffentlicht 14.05.2024 15:37:04
- Zuletzt bearbeitet 23.10.2025 12:14:21
A sql injection vulnerability exists in CyberPower PowerPanel Enterprise prior to v2.8.3. An unauthenticated remote attacker can leak sensitive information via the "query_contract_result" function within MCUDBHelper.
CVE-2024-32738
- EPSS 54.69%
- Veröffentlicht 14.05.2024 15:37:04
- Zuletzt bearbeitet 23.10.2025 12:14:57
A sql injection vulnerability exists in CyberPower PowerPanel Enterprise prior to v2.8.3. An unauthenticated remote attacker can leak sensitive information via the "query_ptask_lean" function within MCUDBHelper.