You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on May 14, 2024. It is now read-only.
"Description": "The update that Microsoft has released for meltdown on x64 versions of Windows 7 and Windows Server 2008 R2 incorrectly sets the permission bit for memory accessible from unprivileged user space. As a result, such platforms that have the meltdown update installed, which was released in January 2018 will not properly protect the contents of system memory..",
40
+
"ID": "VU#277400",
41
+
"IDNumber": "277400",
42
+
"IPProtocol": "",
43
+
"Impact": "An attacker with the ability to run code on an affected platform as an unprivileged user may be able to read from and write to the entire contents of system memory. Exploit code that uses this vulnerability to escalate privileges from an unprivileged user to SYSTEM privileges is publicly available.",
44
+
"Keywords": [
45
+
"total meltdown",
46
+
"totalmeltdown"
47
+
],
48
+
"Overview": "When the Microsoft update for meltdown is installed on a Windows 7 x64 or Windows Server 2008 R2 x64 system, an unprivileged process may be able to read and write the entire memory space available to the Windows kernel.",
"Description": "CWE 798: \u200bUse of Hard-Coded Credentials - CVE\u20132018-5399\nThe DCU 210E firmware contains an undocumented Dropbear SSH server with a hardcoded username and password. The password is easily susceptible to cracking. CWE-346:\u200bOrigin Validation Error - CVE\u20132018-5400\nThe Auto-Maskin products utilize an undocumented custom protocol to set up Modbus communications with other devices without validating those devices. CWE-319:\u200b Cleartext Transmission of Sensitive Information - CVE\u20132018-5401\nThe devices transmit process control information via unencrypted Modbus communications. CWE-319:\u200b Cleartext Transmission of Sensitive Information - CVE\u20132018-5402\nThe embedded webserver uses unencrypted plaintext for the transmission of the administrator PIN.",
45
+
"ID": "VU#176301",
46
+
"IDNumber": "176301",
47
+
"IPProtocol": "",
48
+
"Impact": "An attacker can exploit this vulnerability to observe information about configurations, settings, what sensors are present and in use, and other information. An attacker can send arbitrary ModBus (control) information to the engine control units.",
49
+
"Keywords": "[VRF#18-09-KTDMW]",
50
+
"Overview": "Auto-Maskin RP remote panels and DCU controls units are used to monitor and control ship engines. The units have several authentication and encryption vulnerabilities which can allow attackers to access the units and control connected engines.",
51
+
"References": "",
52
+
"Resolution": "CERT/CC is currently unaware of an update to address the vulnerabilities.",
53
+
"Revision": 14,
54
+
"SystemsAffectedPreamble": "",
55
+
"ThanksAndCredit": "Thanks to Brian Satira and Brian Olson for reporting this vulnerability.",
56
+
"Title": "Auto-Maskin DCU 210E RP 210E and Marine Pro Observer App",
57
+
"US-CERTTechnicalAlert": "",
58
+
"VRDA_D1_DirectReport": "1",
59
+
"VRDA_D1_Impact": "",
60
+
"VRDA_D1_Population": "",
61
+
"VulnerabilityCount": 1,
62
+
"Workarounds": "Critical control devices such as these should only be accessible via private, carefully secured networks."
"Description": "CWE-306: Missing Authentication for Critical Function - CVE-2018-5393 EAP Controller for Linux utilizes a Java remote method invocation (RMI) service for remote control. The RMI interface does not require any authentication before use. Remote attackers can implement deserialization attacks through the RMI protocol. Successful attacks may allow a remote attacker to remotely control the target server and execute Java functions or bytecode. CWE-502: Deserialization of Untrusted Data - CVE-2015-6420 EAP Controller for Linux bundles a vulnerable version of Apache commons-collections v3.2.1 with the software, which appears to be the root cause of the vulnerability. Therefore, EAP Controller v2.5.3 and earlier are vulnerable to CVE-2015-6420 as documented in VU#576313. EAP Controller v2.5.3 and earlier for Linux are affected by both vulnerabilities.",
43
+
"ID": "VU#581311",
44
+
"IDNumber": "581311",
45
+
"IPProtocol": "",
46
+
"Impact": "A Java application or library with the Apache Commons Collections library in its classpath may be coerced into executing arbitrary Java functions or bytecode.",
47
+
"Keywords": [
48
+
"eap",
49
+
"deserialization",
50
+
"java",
51
+
"rmi",
52
+
"commons-collections"
53
+
],
54
+
"Overview": "The TP-LINK EAP Controller is TP-LINK's software for remotely controlling wireless access point devices. EAP Controller for Linux lacks user authentication for RMI service commands, as well as utilizes an outdated vulnerable version of Apache commons-collections, which may allow an attacker to implement deserialization attacks and control the EAP Controller server.",
"Resolution": "There is currently no available update to EAP Controller to fully address the vulnerability. However, affected users may take the following actions to help mitigate and reduce risk. As described in VU#576313, updating the vulnerable libraries does not necessarily eliminate the vulnerability in all scenarios.",
63
+
"Revision": 97,
64
+
"SystemsAffectedPreamble": "",
65
+
"ThanksAndCredit": "Thanks to Liu Zhu, of Huawei Weiran Lab for reporting this vulnerability.",
66
+
"Title": "TP-Link EAP Controller lacks RMI authentication and is vulnerable to deserialization attacks",
67
+
"US-CERTTechnicalAlert": "",
68
+
"VRDA_D1_DirectReport": "0",
69
+
"VRDA_D1_Impact": "",
70
+
"VRDA_D1_Population": "",
71
+
"VulnerabilityCount": 1,
72
+
"Workarounds": "Update Apache commons-collections Affected users should update the system Apache commons-collections library to at least version 3.2.2 or 4.1. For details, please see VU#576313. Update the JRE version of EAP Affected users should also update the Java Runtime Environment (JRE) used by EAP to the latest available version. Recent versions of JRE have improved deserialization protection features."
0 commit comments