AID
Automation
Information Directory
HomeCVE FeedBrands
AID
Automation Information Directory
CVE data sourced from NIST NVD · Documentation links from official sources
›
Home›CVE Feed
Security Intelligence

Global CVE Feed

Sourced from NIST NVD · Auto-synced every 6 hours

2,506
Total CVEs
493
CRIT
1247
HIGH
675
MED
58
LOW
2,506 entries
CVE-2026-3611CRITICAL

The Honeywell IQ4x building management controller, exposes its full web-based HMI without authentication in its factory-default configuration. With no user module configured, security is disabled by design and the system operates under a System Guest (level 100) context, granting read/write privileges to any party able to reach the HTTP interface. Authentication controls are only enforced after a web user is created via U.htm, which dynamically enables the user module. Because this function is accessible prior to authentication, a remote user can create a new account with administrative read/write permissions enabling the user module and imposing authentication under attacker-controlled credentials. This action can effectively lock legitimate operators out of local and web-based configuration and administration.

Mar 12, 2026
10.0
CVE-2025-9574CRITICAL

Missing Authentication for Critical Function vulnerability in ABB ALS-mini-s4 IP, ABB ALS-mini-s8 IP.This issue affects .  All firmware versions with the Serial Number from 2000 to 5166

Oct 20, 2025
10.0
CVE-2025-3450CRITICAL

An Improper Resource Locking vulnerability in the SDM component of B&R Automation Runtime versions before 6.3 and before Q4.93 may allow an unauthenticated network-based attacker to delete data causing denial of service conditions.

Oct 7, 2025
10.0
CVE-2025-58321CRITICAL

Delta Electronics DIALink has an Directory Traversal Authentication Bypass Vulnerability.

Sep 11, 2025
10.0
CVE-2024-51555CRITICAL

Default Credentail vulnerabilities allows access to an Aspect device using publicly available default credentials since the system does not require the installer to change default credentials.  Affected products: ABB ASPECT - Enterprise v3.07.02; NEXUS Series v3.07.02; MATRIX Series v3.07.02

Dec 5, 2024
10.0
CVE-2024-51551CRITICAL

Default Credentail vulnerabilities in ASPECT on Linux allows access to the product using publicly available default credentials.  Affected products: ABB ASPECT - Enterprise v3.07.02; NEXUS Series v3.07.02; MATRIX Series v3.07.02

Dec 5, 2024
10.0
CVE-2024-51550CRITICAL

Data Validation / Data Sanitization vulnerabilities in Linux allows unvalidated and unsanitized data to be injected in an Aspect device.  Affected products: ABB ASPECT - Enterprise v3.08.02; NEXUS Series v3.08.02; MATRIX Series v3.08.02

Dec 5, 2024
10.0
CVE-2024-51549CRITICAL

Absolute File Traversal vulnerabilities allows access and modification of un-intended resources.  Affected products: ABB ASPECT - Enterprise v3.08.02; NEXUS Series v3.08.02; MATRIX Series v3.08.02

Dec 5, 2024
10.0
CVE-2024-51545CRITICAL

Username Enumeration vulnerabilities allow access to application level username add, delete, modify and list functions.  Affected products: ABB ASPECT - Enterprise v3.08.02; NEXUS Series v3.08.02; MATRIX Series v3.08.02

Dec 5, 2024
10.0
CVE-2024-48840CRITICAL

Unauthorized Access vulnerabilities allow Remote Code Execution.  Affected products: ABB ASPECT - Enterprise v3.08.02; NEXUS Series v3.08.02; MATRIX Series v3.08.02

Dec 5, 2024
10.0
CVE-2024-48839CRITICAL

Improper Input Validation vulnerability allows Remote Code Execution.  Affected products: ABB ASPECT - Enterprise v3.08.02; NEXUS Series v3.08.02; MATRIX Series v3.08.02

Dec 5, 2024
10.0
CVE-2024-11317CRITICAL

Session Fixation vulnerabilities allow an attacker to fix a users session identifier before login providing an opportunity for session takeover on a product.  Affected products: ABB ASPECT - Enterprise v3.08.02; NEXUS Series v3.08.02; MATRIX Series v3.08.02

Dec 5, 2024
10.0
CVE-2024-6298CRITICAL

Unauthorized file access in WEB Server in ABB ASPECT - Enterprise v3.08.01; NEXUS Series v3.08.01 ; MATRIX Series v3.08.01 allows Attacker to execute arbitrary code remotely

Jul 5, 2024
10.0
CVE-2024-6209CRITICAL

Unauthorized file access in WEB Server in ABB ASPECT - Enterprise v3.08.01; NEXUS Series v3.08.01 ; MATRIX Series v3.08.01 allows Attacker to access files unauthorized

Jul 5, 2024
10.0
CVE-2023-4699CRITICAL

Missing Authentication for Critical Function vulnerability in Mitsubishi Electric Corporation MELSEC-F Series CPU modules, MELSEC iQ-F Series, MELSEC iQ-R series CPU modules, MELSEC iQ-R series, MELSEC iQ-L series, MELSEC Q series, MELSEC-L series, Mitsubishi Electric CNC M800V/M80V series, Mitsubishi Electric CNC M800/M80/E80 series and Mitsubishi Electric CNC M700V/M70V/E70 series allows a remote unauthenticated attacker to execute arbitrary commands by sending specific packets to the affected products. This could lead to disclose or tamper with information by reading or writing control programs, or cause a denial-of-service (DoS) condition on the products by resetting the memory contents of the products to factory settings or resetting the products remotely.

Nov 6, 2023
10.0
CVE-2023-3572CRITICAL

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote, unauthenticated attacker may use an attribute of a specific HTTP POST request releated to date/time operations to gain full access to the device.

Aug 8, 2023
10.0
CVE-2023-1424CRITICAL

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series CPU modules and MELSEC iQ-R Series CPU modules allows a remote unauthenticated attacker to cause a denial of service (DoS) condition or execute malicious code on a target product by sending specially crafted packets. A system reset of the product is required for recovery from a denial of service (DoS) condition and malicious code execution.

May 24, 2023
10.0
CVE-2021-38397CRITICAL

Honeywell Experion PKS C200, C200E, C300, and ACE controllers are vulnerable to unrestricted file uploads, which may allow an attacker to remotely execute arbitrary code and cause a denial-of-service condition.

Oct 28, 2022
10.0
CVE-2021-27446CRITICAL

The Weintek cMT product line is vulnerable to code injection, which may allow an unauthenticated remote attacker to execute commands with root privileges on the operation system.

May 16, 2022
10.0
CVE-2021-27476CRITICAL

A vulnerability exists in the SaveConfigFile function of the RACompare Service, which may allow for OS command injection. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary commands in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier.

Mar 23, 2022
10.0
CVE-2021-27474CRITICAL

Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier does not properly restrict all functions relating to IIS remoting services. This vulnerability may allow a remote, unauthenticated attacker to modify sensitive data in FactoryTalk AssetCentre.

Mar 23, 2022
10.0
CVE-2021-27472CRITICAL

A vulnerability exists in the RunSearch function of SearchService service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier, which may allow for the execution of remote unauthenticated arbitrary SQL statements.

Mar 23, 2022
10.0
CVE-2021-27470CRITICAL

A deserialization vulnerability exists in how the LogService.rem service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier verifies serialized data. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary commands in FactoryTalk AssetCentre.

Mar 23, 2022
10.0
CVE-2021-27468CRITICAL

The AosService.rem service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier exposes functions lacking proper authentication. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary SQL statements.

Mar 23, 2022
10.0
CVE-2021-27466CRITICAL

A deserialization vulnerability exists in how the ArchiveService.rem service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier verifies serialized data. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary commands in FactoryTalk AssetCentre.

Mar 23, 2022
10.0
CVE-2021-27464CRITICAL

The ArchiveService.rem service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier exposes functions lacking proper authentication. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary SQL statements.

Mar 23, 2022
10.0
CVE-2021-27462CRITICAL

A deserialization vulnerability exists in how the AosService.rem service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier verifies serialized data. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary commands in FactoryTalk AssetCentre.

Mar 23, 2022
10.0
CVE-2021-27460CRITICAL

Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier components contain .NET remoting endpoints that deserialize untrusted data without sufficiently verifying that the resulting data will be valid. This vulnerability may allow a remote, unauthenticated attacker to gain full access to the FactoryTalk AssetCentre main server and all agent machines.

Mar 23, 2022
10.0
CVE-2021-38454CRITICAL

A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries.

Oct 12, 2021
10.0
CVE-2021-20998CRITICAL

In multiple managed switches by WAGO in different versions without authorization and with specially crafted packets it is possible to create users.

May 13, 2021
10.0
CVE-2020-14516CRITICAL

In Rockwell Automation FactoryTalk Services Platform Versions 6.10.00 and 6.11.00, there is an issue with the implementation of the SHA-256 hashing algorithm with FactoryTalk Services Platform that prevents the user password from being hashed properly.

Mar 18, 2021
10.0
CVE-2020-12522CRITICAL

The reported vulnerability allows an attacker who has network access to the device to execute code with specially crafted packets in WAGO Series PFC 100 (750-81xx/xxx-xxx), Series PFC 200 (750-82xx/xxx-xxx), Series Wago Touch Panel 600 Standard Line (762-4xxx), Series Wago Touch Panel 600 Advanced Line (762-5xxx), Series Wago Touch Panel 600 Marine Line (762-6xxx) with firmware versions <=FW10.

Dec 17, 2020
10.0
CVE-2017-14459CRITICAL

An exploitable OS Command Injection vulnerability exists in the Telnet, SSH, and console login functionality of Moxa AWK-3131A Industrial IEEE 802.11a/b/g/n wireless AP/bridge/client in firmware versions 1.4 to 1.7 (current). An attacker can inject commands via the username parameter of several services (SSH, Telnet, console), resulting in remote, unauthenticated, root-level operating system command execution.

Apr 11, 2018
10.0
CVE-2017-16740CRITICAL

A Buffer Overflow issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1400 Controllers, Series B and C Versions 21.002 and earlier. The stack-based buffer overflow vulnerability has been identified, which may allow remote code execution.

Jan 9, 2018
10.0
CVE-2016-9343CRITICAL

An issue was discovered in Rockwell Automation Logix5000 Programmable Automation Controller FRN 16.00 through 21.00 (excluding all firmware versions prior to FRN 16.00, which are not affected). By sending malformed common industrial protocol (CIP) packet, an attacker may be able to overflow a stack-based buffer and execute code on the controller or initiate a nonrecoverable fault resulting in a denial of service.

Feb 13, 2017
10.0
CVE-2016-8363CRITICAL

An issue was discovered in Moxa OnCell OnCellG3470A-LTE, AWK-1131A/3131A/4131A Series, AWK-3191 Series, AWK-5232/6232 Series, AWK-1121/1127 Series, WAC-1001 V2 Series, WAC-2004 Series, AWK-3121-M12-RTG Series, AWK-3131-M12-RCC Series, AWK-5232-M12-RCC Series, TAP-6226 Series, AWK-3121/4121 Series, AWK-3131/4131 Series, and AWK-5222/6222 Series. User is able to execute arbitrary OS commands on the server.

Feb 13, 2017
10.0
CVE-2016-8352CRITICAL

An issue was discovered in Schneider Electric ConneXium firewalls TCSEFEC23F3F20 all versions, TCSEFEC23F3F21 all versions, TCSEFEC23FCF20 all versions, TCSEFEC23FCF21 all versions, and TCSEFEC2CF3F20 all versions. A stack-based buffer overflow can be triggered during the SNMP login authentication process that may allow an attacker to remotely execute code.

Feb 13, 2017
10.0
CVE-2012-6069CRITICAL

The CoDeSys Runtime Toolkit’s file transfer functionality does not perform input validation, which allows an attacker to access files and directories outside the intended scope. This may allow an attacker to upload and download any file on the device. This could allow the attacker to affect the availability, integrity, and confidentiality of the device.

Jan 21, 2013
10.0
CVE-2026-28363CRITICAL

In OpenClaw before 2026.2.23, tools.exec.safeBins validation for sort could be bypassed via GNU long-option abbreviations (such as --compress-prog) in allowlist mode, leading to approval-free execution paths that were intended to require approval. Only an exact string such as --compress-program was denied.

Feb 27, 2026
9.9
CVE-2025-2605CRITICAL

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Honeywell MB-Secure allows Privilege Abuse. This issue affects MB-Secure: from V11.04 before V12.53 and MB-Secure PRO from V01.06 before V03.09.Honeywell also recommends updating to the most recent version of this product.

May 2, 2025
9.9
CVE-2024-6784CRITICAL

Server-Side Request Forgery vulnerabilities were found providing a potential for access to unauthorized resources and unintended information disclosure.  Affected products: ABB ASPECT - Enterprise v3.08.02; NEXUS Series v3.08.02; MATRIX Series v3.08.02

Dec 5, 2024
9.9
CVE-2024-51548CRITICAL

Dangerous File Upload vulnerabilities allow upload of malicious scripts.  Affected products: ABB ASPECT - Enterprise v3.08.02; NEXUS Series v3.08.02; MATRIX Series v3.08.02

Dec 5, 2024
9.9
CVE-2023-3710CRITICAL

Improper Input Validation vulnerability in Honeywell PM43 on 32 bit, ARM (Printer web page modules) allows Command Injection.This issue affects PM43 versions prior to P10.19.050004. Update to the latest available firmware version of the respective printers to version MR19.5 (e.g. P10.19.050006).

Sep 12, 2023
9.9
CVE-2019-5138CRITICAL

An exploitable command injection vulnerability exists in encrypted diagnostic script functionality of the Moxa AWK-3131A firmware version 1.13. A specially crafted diagnostic script file can cause arbitrary busybox commands to be executed, resulting in remote control over the device. An attacker can send diagnostic while authenticated as a low privilege user to trigger this vulnerability.

Feb 25, 2020
9.9
CVE-2026-3630CRITICAL

Delta Electronics COMMGR2 has Stack-based Buffer Overflow vulnerability.

Mar 9, 2026
9.8
CVE-2024-55026CRITICAL

An issue in the reset_pj.cgi endpoint of Weintek cMT-3072XH2 easyweb v2.1.53, OS v20231011 allows unauthorized attackers to execute arbitrary commands via supplying a crafted GET request.

Mar 3, 2026
9.8
CVE-2024-55024CRITICAL

An authentication bypass vulnerability in the authorization mechanism of Weintek cMT-3072XH2 easyweb v2.1.53, OS v20231011 allows unauthorized attackers to perform Administrative actions using service accounts.

Mar 3, 2026
9.8
CVE-2024-55020CRITICAL

A command injection vulnerability in the DHCP activation feature of Weintek cMT-3072XH2 easyweb Web Version v2.1.53, OS v20231011 allows attackers to execute arbitrary commands with root privileges.

Mar 3, 2026
9.8
CVE-2025-66603CRITICAL

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. The web server accepts the OPTIONS method. An attacker could potentially use this information to carry out other attacks. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Feb 9, 2026
9.8
CVE-2025-66602CRITICAL

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. The web server accepts access by IP address. When a worm that randomly searches for IP addresses intrudes into the network, it could potentially be attacked by the worm. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Feb 9, 2026
9.8
CVE-2025-62582CRITICAL

Delta Electronics DIAView has multiple vulnerabilities.

Jan 16, 2026
9.8
CVE-2025-62581CRITICAL

Delta Electronics DIAView has multiple vulnerabilities.

Jan 16, 2026
9.8
CVE-2022-50926CRITICAL

WAGO 750-8212 PFC200 G2 2ETH RS firmware contains a privilege escalation vulnerability that allows attackers to manipulate user session cookies. Attackers can modify the cookie's 'name' and 'roles' parameters to elevate from ordinary user to administrative privileges without authentication.

Jan 13, 2026
9.8
CVE-2025-34256CRITICAL

Advantech WISE-DeviceOn Server versions prior to 5.4 contain a hard-coded cryptographic key vulnerability. The product uses a static HS512 HMAC secret for signing EIRMMToken JWTs across all installations. The server accepts forged JWTs that need only contain a valid email claim, allowing a remote unauthenticated attacker to generate arbitrary tokens and impersonate any DeviceOn account, including the root super admin. Successful exploitation permits full administrative control of the DeviceOn instance and can be leveraged to execute code on managed agents through DeviceOn’s remote management features.

Dec 5, 2025
9.8
CVE-2022-50593CRITICAL

Advantech iView versions prior to v5.7.04 build 6425 contain a vulnerability within the SNMP management tool that allows for remote attackers to bypass authentication checks and reach a SQL injection vulnerability within the ‘search_term’ parameter to the ‘NetworkServlet’ endpoint. Successful exploitation allows for remote code execution with administrator privileges.

Nov 6, 2025
9.8
CVE-2022-50591CRITICAL

Advantech iView versions prior to v5.7.04 build 6425 contain a vulnerability within the SNMP management tool that allows for remote attackers to bypass authentication checks and reach a SQL injection vulnerability within the ‘ztp_config_id’ parameter to the ‘NetworkServlet’ endpoint. Successful exploitation allows for the exfiltration of user data, included clear text passwords.

Nov 6, 2025
9.8
CVE-2025-3128CRITICAL

A remote unauthenticated attacker who has bypassed authentication could execute arbitrary OS commands to disclose, tamper with, destroy or delete information in Mitsubishi Electric smartRTU, or cause a denial-of service condition on the product.

Aug 21, 2025
9.8
CVE-2025-3699CRITICAL

Missing Authentication for Critical Function vulnerability in Mitsubishi Electric Corporation G-50 all versions, G-50-W all versions, G-50A all versions, GB-50 all versions, GB-50A all versions, GB-24A all versions, G-150AD all versions, AG-150A-A all versions, AG-150A-J all versions, GB-50AD all versions, GB-50ADA-A all versions, GB-50ADA-J all versions, EB-50GU-A all versions, EB-50GU-J all versions, AE-200J all versions, AE-200A all versions, AE-200E all versions, AE-50J all versions, AE-50A all versions, AE-50E all versions, EW-50J all versions, EW-50A all versions, EW-50E all versions, TE-200A all versions, TE-50A all versions, TW-50A all versions, and CMS-RMD-J all versions allows a remote unauthenticated attacker to bypass authentication and then control the air conditioning systems illegally, or disclose information in them by exploiting this vulnerability. In addition, the attacker may tamper with firmware for them using the disclosed information.

Jun 26, 2025
9.8
CVE-2025-1863CRITICAL

Insecure default settings have been found in recorder products provided by Yokogawa Electric Corporation. The default setting of the authentication function is disabled on the affected products. Therefore, when connected to a network with default settings, anyone can access all functions related to settings and operations. As a result, an attacker can illegally manipulate and configure important data such as measured values and settings. This issue affects GX10 / GX20 / GP10 / GP20 Paperless Recorders: R5.04.01 or earlier; GM Data Acquisition System: R5.05.01 or earlier; DX1000 / DX2000 / DX1000N Paperless Recorders: R4.21 or earlier; FX1000 Paperless Recorders: R1.31 or earlier; μR10000 / μR20000 Chart Recorders: R1.51 or earlier; MW100 Data Acquisition Units: All versions; DX1000T / DX2000T Paperless Recorders: All versions; CX1000 / CX2000 Paperless Recorders: All versions.

Apr 18, 2025
9.8
CVE-2025-3495CRITICAL

Delta Electronics COMMGR v1 and v2 uses insufficiently randomized values to generate session IDs (CWE-338). An attacker could easily brute force a session ID and load and execute arbitrary code.

Apr 16, 2025
9.8
CVE-2024-51547CRITICAL

Use of Hard-coded Credentials vulnerability in ABB ASPECT-Enterprise, ABB NEXUS Series, ABB MATRIX Series.This issue affects ASPECT-Enterprise: through 3.*; NEXUS Series: through 3.*; MATRIX Series: through 3.*.

Feb 6, 2025
9.8
CVE-2025-0498CRITICAL

A data exposure vulnerability exists in all versions prior to V15.00.001 of Rockwell Automation FactoryTalk® AssetCentre. The vulnerability exists due to insecure storage of FactoryTalk® Security user tokens, which could allow a threat actor to steal a token and, impersonate another user.

Jan 30, 2025
9.8
CVE-2025-0497CRITICAL

A data exposure vulnerability exists in all versions prior to V15.00.001 of Rockwell Automation FactoryTalk® AssetCentre. The vulnerability exists due to storing credentials in the configuration file of EventLogAttachmentExtractor, ArchiveExtractor, LogCleanUp, or ArchiveLogCleanUp packages.

Jan 30, 2025
9.8
CVE-2025-0477CRITICAL

An encryption vulnerability exists in all versions prior to V15.00.001 of Rockwell Automation FactoryTalk® AssetCentre. The vulnerability exists due to a weak encryption methodology and could allow a threat actor to extract passwords belonging to other users of the application.

Jan 30, 2025
9.8
CVE-2024-9140CRITICAL

Moxa’s cellular routers, secure routers, and network security appliances are affected by a critical vulnerability, CVE-2024-9140. This vulnerability allows OS command injection due to improperly restricted commands, potentially enabling attackers to execute arbitrary code. This poses a significant risk to the system’s security and functionality.

Jan 3, 2025
9.8
CVE-2024-50375CRITICAL

A CWE-306 "Missing Authentication for Critical Function" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The vulnerability can be exploited by remote unauthenticated users capable of interacting with the default "edgserver" service enabled on the access point.

Nov 26, 2024
9.8
CVE-2024-50374CRITICAL

A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The vulnerability can be exploited by remote unauthenticated users capable of interacting with the default "edgserver" service enabled on the access point and malicious commands are executed with root privileges. No authentication is enabled on the service and the source of the vulnerability resides in processing code associated to the "capture_packages" operation.

Nov 26, 2024
9.8
CVE-2024-50373CRITICAL

A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The vulnerability can be exploited by remote unauthenticated users capable of interacting with the default "edgserver" service enabled on the access point and malicious commands are executed with root privileges. No authentication is enabled on the service and the source of the vulnerability resides in processing code associated to the "restore_config_from_utility" operation.

Nov 26, 2024
9.8
CVE-2024-50372CRITICAL

A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The vulnerability can be exploited by remote unauthenticated users capable of interacting with the default "edgserver" service enabled on the access point and malicious commands are executed with root privileges. No authentication is enabled on the service and the source of the vulnerability resides in processing code associated to the "backup_config_to_utility" operation.

Nov 26, 2024
9.8
CVE-2024-50371CRITICAL

A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The vulnerability can be exploited by remote unauthenticated users capable of interacting with the default "edgserver" service enabled on the access point and malicious commands are executed with root privileges. No authentication is enabled on the service and the source of the vulnerability resides in processing code associated to the "wlan_scan" operation.

Nov 26, 2024
9.8
CVE-2024-50370CRITICAL

A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The vulnerability can be exploited by remote unauthenticated users capable of interacting with the default "edgserver" service enabled on the access point and malicious commands are executed with root privileges. No authentication is enabled on the service and the source of the vulnerability resides in processing code associated to the "cfg_cmd_set_eth_conf" operation.

Nov 26, 2024
9.8
CVE-2024-10456CRITICAL

Delta Electronics InfraSuite Device Master versions prior to 1.0.12 are affected by a deserialization vulnerability that targets the Device-Gateway, which could allow deserialization of arbitrary .NET objects prior to authentication.

Oct 30, 2024
9.8
CVE-2024-43699CRITICAL

Delta Electronics DIAEnergie is vulnerable to an SQL injection in the script AM_RegReport.aspx. An unauthenticated attacker may be able to exploit this issue to obtain records contained in the targeted product.

Oct 3, 2024
9.8
CVE-2024-7961CRITICAL

A path traversal vulnerability exists in the Rockwell Automation affected product. If exploited, the threat actor could upload arbitrary files to the server that could result in a remote code execution.

Sep 12, 2024
9.8
CVE-2024-8255CRITICAL

Delta Electronics DTN Soft version 2.0.1 and prior are vulnerable to an attacker achieving remote code execution through a deserialization of untrusted data vulnerability.

Aug 29, 2024
9.8
CVE-2024-7988CRITICAL

A remote code execution vulnerability exists in the Rockwell Automation ThinManager® ThinServer™ that allows a threat actor to execute arbitrary code with System privileges. This vulnerability exists due to the lack of proper data input validation, which allows files to be overwritten.

Aug 26, 2024
9.8
CVE-2024-5989CRITICAL

Due to an improper input validation, an unauthenticated threat actor can send a malicious message to invoke SQL injection into the program and cause a remote code execution condition on the Rockwell Automation ThinManager® ThinServer™.

Jun 25, 2024
9.8
CVE-2024-5988CRITICAL

Due to an improper input validation, an unauthenticated threat actor can send a malicious message to invoke a local or remote executable and cause a remote code execution condition on the Rockwell Automation ThinManager® ThinServer™.

Jun 25, 2024
9.8
CVE-2024-39331CRITICAL

In Emacs before 29.4, org-link-expand-abbrev in lisp/ol.el expands a %(...) link abbrev even when it specifies an unsafe function, such as shell-command-to-string. This affects Org Mode before 9.7.5.

Jun 23, 2024
9.8
CVE-2024-4609CRITICAL

A vulnerability exists in the Rockwell Automation FactoryTalk® View SE Datalog function that could allow a threat actor to inject a malicious SQL statement if the SQL database has no authentication in place or if legitimate credentials were stolen. If exploited, the attack could result in information exposure, revealing sensitive information. Additionally, a threat actor could potentially modify and delete the data in a remote database. An attack would only affect the HMI design time, not runtime.

May 16, 2024
9.8
CVE-2024-3871CRITICAL

The Delta Electronics DVW-W02W2-E2 devices expose a web administration interface to users. This interface implements multiple features that are affected by command injections and stack overflows vulnerabilities. Successful exploitation of these flaws would allow remote unauthenticated attackers to gain remote code execution with elevated privileges on the affected devices. This issue affects DVW-W02W2-E2 through version 2.5.2.

Apr 16, 2024
9.8
CVE-2024-1917CRITICAL

Integer Overflow or Wraparound vulnerability in Mitsubishi Electric Corporation MELSEC-Q Series and MELSEC-L Series CPU modules allows a remote unauthenticated attacker to execute malicious code on a target product by sending a specially crafted packet.

Mar 15, 2024
9.8
CVE-2024-1916CRITICAL

Integer Overflow or Wraparound vulnerability in Mitsubishi Electric Corporation MELSEC-Q Series and MELSEC-L Series CPU modules allows a remote unauthenticated attacker to execute malicious code on a target product by sending a specially crafted packet.

Mar 15, 2024
9.8
CVE-2024-1915CRITICAL

Incorrect Pointer Scaling vulnerability in Mitsubishi Electric Corporation MELSEC-Q Series and MELSEC-L Series CPU modules allows a remote unauthenticated attacker to execute malicious code on a target product by sending a specially crafted packet.

Mar 15, 2024
9.8
CVE-2024-0803CRITICAL

Integer Overflow or Wraparound vulnerability in Mitsubishi Electric Corporation MELSEC-Q Series and MELSEC-L Series CPU modules allows a remote unauthenticated attacker to execute malicious code on a target product by sending a specially crafted packet.

Mar 15, 2024
9.8
CVE-2024-0802CRITICAL

Incorrect Pointer Scaling vulnerability in Mitsubishi Electric Corporation MELSEC-Q Series and MELSEC-L Series CPU modules allows a remote unauthenticated attacker to read arbitrary information from a target product or execute malicious code on a target product by sending a specially crafted packet.

Mar 15, 2024
9.8
CVE-2024-0323CRITICAL

The FTP server used on the B&R Automation Runtime supports unsecure encryption mechanisms, such as SSLv3, TLSv1.0 and TLS1.1. An network-based attacker can exploit the flaws to conduct man-in-the-middle attacks or to decrypt communications between the affected product clients.

Feb 5, 2024
9.8
CVE-2024-21917CRITICAL

A vulnerability exists in Rockwell Automation FactoryTalk® Service Platform that allows a malicious user to obtain the service token and use it for authentication on another FTSP directory. This is due to the lack of digital signing between the FTSP service token and directory.  If exploited, a malicious user could potentially retrieve user information and modify settings without any authentication.

Jan 31, 2024
9.8
CVE-2023-6943CRITICAL

Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') vulnerability in Mitsubishi Electric Corporation EZSocket versions 3.0 to 5.92, GT Designer3 Version1(GOT1000) versions 1.325P and prior, GT Designer3 Version1(GOT2000) versions 1.320J and prior, GX Works2 versions 1.11M to 1.626C, GX Works3 versions 1.106L and prior, MELSOFT Navigator versions 1.04E to 2.102G, MT Works2 versions 1.190Y and prior, MX Component versions 4.00A to 5.007H and MX OPC Server DA/UA all versions allows a remote unauthenticated attacker to execute a malicious code by RPC with a path to a malicious library while connected to the products.

Jan 30, 2024
9.8
CVE-2023-46141CRITICAL

Incorrect Permission Assignment for Critical Resource vulnerability in multiple products of the PHOENIX CONTACT classic line allow an remote unauthenticated attacker to gain full access of the affected device.

Dec 14, 2023
9.8
CVE-2023-0757CRITICAL

Incorrect Permission Assignment for Critical Resource vulnerability in PHOENIX CONTACT MULTIPROG, PHOENIX CONTACT ProConOS eCLR (SDK) allows an unauthenticated remote attacker to upload arbitrary malicious code and gain full access on the affected device.

Dec 14, 2023
9.8
CVE-2023-47207CRITICAL

In Delta Electronics InfraSuite Device Master v.1.0.7, a vulnerability exists that allows an unauthenticated attacker to execute code with local administrator privileges.

Nov 30, 2023
9.8
CVE-2023-39226CRITICAL

In Delta Electronics InfraSuite Device Master v.1.0.7, a vulnerability exists that allows an unauthenticated attacker to execute arbitrary code through a single UDP packet.

Nov 30, 2023
9.8
CVE-2023-5777CRITICAL

Weintek EasyBuilder Pro contains a vulnerability that, even when the private key is immediately deleted after the crash report transmission is finished, the private key is exposed to the public, which could result in obtaining remote control of the crash report server.

Nov 6, 2023
9.8
CVE-2023-43492CRITICAL

In Weintek's cMT3000 HMI Web CGI device, the cgi-bin codesys.cgi contains a stack-based buffer overflow, which could allow an anonymous attacker to hijack control flow and bypass login authentication.

Oct 19, 2023
9.8
CVE-2023-38584CRITICAL

In Weintek's cMT3000 HMI Web CGI device, the cgi-bin command_wb.cgi contains a stack-based buffer overflow, which could allow an anonymous attacker to hijack control flow and bypass login authentication.

Oct 19, 2023
9.8
CVE-2023-5642CRITICAL

Advantech R-SeeNet v2.4.23 allows an unauthenticated remote attacker to read from and write to the snmpmon.ini file, which contains sensitive information.

Oct 18, 2023
9.8
CVE-2023-2262CRITICAL

A buffer overflow vulnerability exists in the Rockwell Automation select 1756-EN* communication devices. If exploited, a threat actor could potentially leverage this vulnerability to perform a remote code execution. To exploit this vulnerability, a threat actor would have to send a maliciously crafted CIP request to device.

Sep 20, 2023
9.8
CVE-2023-2071CRITICAL

Rockwell Automation FactoryTalk View Machine Edition on the PanelView Plus, improperly verifies user’s input, which allows unauthenticated attacker to achieve remote code executed via crafted malicious packets.  The device has the functionality, through a CIP class, to execute exported functions from libraries.  There is a routine that restricts it to execute specific functions from two dynamic link library files.  By using a CIP class, an attacker can upload a self-made library to the device which allows the attacker to bypass the security check and execute any code written in the function.

Sep 12, 2023
9.8
CVE-2023-2917CRITICAL

The Rockwell Automation Thinmanager Thinserver is impacted by an improper input validation vulnerability.  Due to an improper input validation, a path traversal vulnerability exists, via the filename field, when the ThinManager processes a certain function. If exploited, an unauthenticated remote attacker can upload arbitrary files to any directory on the disk drive where ThinServer.exe is installed.  A malicious user could exploit this vulnerability by sending a crafted synchronization protocol message and potentially gain remote code execution abilities.

Aug 17, 2023
9.8
CVE-2023-1437CRITICAL

All versions prior to 9.1.4 of Advantech WebAccess/SCADA are vulnerable to use of untrusted pointers. The RPC arguments the client sent could contain raw memory pointers for the server to use as-is. This could allow an attacker to gain access to the remote file system and the ability to execute commands and overwrite files.

Aug 2, 2023
9.8
CVE-2023-25770CRITICAL

Controller DoS may occur due to buffer overflow when an error is generated in response to a specially crafted message. See Honeywell Security Notification for recommendations on upgrading and versioning.

Jul 13, 2023
9.8
CVE-2023-25178CRITICAL

Controller may be loaded with malicious firmware which could enable remote code execution. See Honeywell Security Notification for recommendations on upgrading and versioning.

Jul 13, 2023
9.8
CVE-2023-25078CRITICAL

Server or Console Station DoS due to heap overflow occurring during the handling of a specially crafted message for a specific configuration operation.  See Honeywell Security Notification for recommendations on upgrading and versioning.

Jul 13, 2023
9.8
CVE-2023-24480CRITICAL

Controller DoS due to stack overflow when decoding a message from the server.  See Honeywell Security Notification for recommendations on upgrading and versioning.

Jul 13, 2023
9.8
CVE-2023-23585CRITICAL

Experion server DoS due to heap overflow occurring during the handling of a specially crafted message for a specific configuration operation.  See Honeywell Security Notification for recommendations on upgrading and versioning.

Jul 13, 2023
9.8
CVE-2023-3595CRITICAL

Where this vulnerability exists in the Rockwell Automation 1756 EN2* and 1756 EN3* ControlLogix communication products, it could allow a malicious user to perform remote code execution with persistence on the target system through maliciously crafted CIP messages. This includes the ability to modify, deny, and exfiltrate data passing through the device.

Jul 12, 2023
9.8
CVE-2023-2611CRITICAL

Advantech R-SeeNet versions 2.4.22 is installed with a hidden root-level user that is not available in the users list. This hidden user has a password that cannot be changed by users.

Jun 22, 2023
9.8
CVE-2023-27396CRITICAL

FINS (Factory Interface Network Service) is a message communication protocol, which is designed to be used in closed FA (Factory Automation) networks, and is used in FA networks composed of OMRON products. Multiple OMRON products that implement FINS protocol contain following security issues -- (1)Plaintext communication, and (2)No authentication required. When FINS messages are intercepted, the contents may be retrieved. When arbitrary FINS messages are injected, any commands may be executed on, or the system information may be retrieved from, the affected device. Affected products and versions are as follows: SYSMAC CS-series CPU Units, all versions, SYSMAC CJ-series CPU Units, all versions, SYSMAC CP-series CPU Units, all versions, SYSMAC NJ-series CPU Units, all versions, SYSMAC NX1P-series CPU Units, all versions, SYSMAC NX102-series CPU Units, all versions, and SYSMAC NX7 Database Connection CPU Units (Ver.1.16 or later)

Jun 19, 2023
9.8
CVE-2023-1698CRITICAL

In multiple products of WAGO a vulnerability allows an unauthenticated, remote attacker to create new users and change the device configuration which can result in unintended behaviour, Denial of Service and full system compromise.

May 15, 2023
9.8
CVE-2023-28697CRITICAL

Moxa MiiNePort E1 has a vulnerability of insufficient access control. An unauthenticated remote user can exploit this vulnerability to perform arbitrary system operation or disrupt service.

Apr 27, 2023
9.8
CVE-2023-1140CRITICAL

Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contain a vulnerability that could allow an attacker to achieve unauthenticated remote code execution in the context of an administrator.

Mar 27, 2023
9.8
CVE-2023-1136CRITICAL

In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an unauthenticated attacker could generate a valid token, which would lead to authentication bypass.

Mar 27, 2023
9.8
CVE-2023-1133CRITICAL

Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contain a vulnerability in which the Device-status service listens on port 10100/ UDP by default. The service accepts the unverified UDP packets and deserializes the content, which could allow an unauthenticated attacker to remotely execute arbitrary code.

Mar 27, 2023
9.8
CVE-2023-27855CRITICAL

In affected versions, a path traversal exists when processing a message in Rockwell Automation's ThinManager ThinServer. An unauthenticated remote attacker could potentially exploit this vulnerability to upload arbitrary files to any directory on the disk drive where ThinServer.exe is installed. The attacker could overwrite existing executable files with attacker-controlled, malicious contents, potentially causing remote code execution.

Mar 22, 2023
9.8
CVE-2022-42971CRITICAL

A CWE-434: Unrestricted Upload of File with Dangerous Type vulnerability exists that could cause remote code execution when the attacker uploads a malicious JSP file. Affected Products: APC Easy UPS Online Monitoring Software (Windows 7, 10, 11 & Windows Server 2016, 2019, 2022 - Versions prior to V2.5-GA), APC Easy UPS Online Monitoring Software (Windows 11, Windows Server 2019, 2022 - Versions prior to V2.5-GA-01-22261), Schneider Electric Easy UPS Online Monitoring Software (Windows 7, 10, 11 & Windows Server 2016, 2019, 2022 - Versions prior to V2.5-GS), Schneider Electric Easy UPS Online Monitoring Software (Windows 11, Windows Server 2019, 2022 - Versions prior to V2.5-GS-01-22261)

Feb 1, 2023
9.8
CVE-2022-42970CRITICAL

A CWE-306: Missing Authentication for Critical Function The software does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources. Affected Products: APC Easy UPS Online Monitoring Software (Windows 7, 10, 11 & Windows Server 2016, 2019, 2022 - Versions prior to V2.5-GA), APC Easy UPS Online Monitoring Software (Windows 11, Windows Server 2019, 2022 - Versions prior to V2.5-GA-01-22261), Schneider Electric Easy UPS Online Monitoring Software (Windows 7, 10, 11 & Windows Server 2016, 2019, 2022 - Versions prior to V2.5-GS), Schneider Electric Easy UPS Online Monitoring Software (Windows 11, Windows Server 2019, 2022 - Versions prior to V2.5-GS-01-22261)

Feb 1, 2023
9.8
CVE-2023-22357CRITICAL

Active debug code exists in OMRON CP1L-EL20DR-D all versions, which may lead to a command that is not specified in FINS protocol being executed without authentication. A remote unauthenticated attacker may read/write in arbitrary area of the device memory, which may lead to overwriting the firmware, causing a denial-of-service (DoS) condition, and/or arbitrary code execution.

Jan 17, 2023
9.8
CVE-2022-41778CRITICAL

Delta Electronics InfraSuite Device Master versions 00.00.01a and prior deserialize user-supplied data provided through the Device-DataCollect service port without proper verification. An attacker could provide malicious serialized objects to execute arbitrary code upon deserialization.

Jan 13, 2023
9.8
CVE-2021-34569CRITICAL

In WAGO I/O-Check Service in multiple products an attacker can send a specially crafted packet containing OS commands to crash the diagnostic tool and write memory.

Nov 9, 2022
9.8
CVE-2022-33321CRITICAL

Cleartext Transmission of Sensitive Information vulnerability due to the use of Basic Authentication for HTTP connections in Mitsubishi Electric consumer electronics products (PHOTOVOLTAIC COLOR MONITOR ECO-GUIDE, HEMS adapter, Wi-Fi Interface, Air Conditioning, Induction hob, Mitsubishi Electric HEMS Energy Measurement Unit, Refrigerator, Remote control with Wi-Fi Interface, BATHROOM THERMO VENTILATOR, Rice cooker, Mitsubishi Electric HEMS control adapter, Energy Recovery Ventilator, Smart Switch, Ventilating Fan, Range hood fan, Energy Measurement Unit and Air Purifier) allows a remote unauthenticated attacker to disclose information in the products or cause a denial of service (DoS) condition as a result by sniffing credential information (username and password). The wide range of models/versions of Mitsubishi Electric consumer electronics products are affected by this vulnerability. As for the affected product models/versions, see the Mitsubishi Electric's advisory which is listed in [References] section.

Nov 8, 2022
9.8
CVE-2022-41772CRITICAL

Delta Electronics InfraSuite Device Master Versions 00.00.01a and prior mishandle .ZIP archives containing characters used in path traversal. This path traversal could result in remote code execution.

Oct 31, 2022
9.8
CVE-2022-41688CRITICAL

Delta Electronics InfraSuite Device Master versions 00.00.01a and prior lack proper authentication for functions that create and modify user groups. An attacker could provide malicious serialized objects that could run these functions without authentication to create a new user and add them to the administrator group.

Oct 31, 2022
9.8
CVE-2022-41657CRITICAL

Delta Electronics InfraSuite Device Master Versions 00.00.01a and prior allow attacker provided data already serialized into memory to be used in file operation application programmable interfaces (APIs). This could create arbitrary files, which could be used in API operations and could ultimately result in remote code execution.

Oct 31, 2022
9.8
CVE-2022-40202CRITICAL

The database backup function in Delta Electronics InfraSuite Device Master Versions 00.00.01a and prior lacks proper authentication. An attacker could provide malicious serialized objects which, when deserialized, could activate an opcode for a backup scheduling function without authentication. This function allows the user to designate all function arguments and the file to be executed. This could allow the attacker to start any new process and achieve remote code execution.

Oct 31, 2022
9.8
CVE-2022-38142CRITICAL

Delta Electronics InfraSuite Device Master versions 00.00.01a and prior deserialize user-supplied data provided through the Device-Gateway service port without proper verification. An attacker could provide malicious serialized objects to execute arbitrary code upon deserialization.

Oct 31, 2022
9.8
CVE-2022-3386CRITICAL

Advantech R-SeeNet Versions 2.4.17 and prior are vulnerable to a stack-based buffer overflow. An unauthorized attacker can use an outsized filename to overflow the stack buffer and enable remote code execution.

Oct 27, 2022
9.8
CVE-2022-3385CRITICAL

Advantech R-SeeNet Versions 2.4.17 and prior are vulnerable to a stack-based buffer overflow. An unauthorized attacker can remotely overflow the stack buffer and enable remote code execution.

Oct 27, 2022
9.8
CVE-2022-43775CRITICAL

The HICT_Loop class in Delta Electronics DIAEnergy v1.9 contains a SQL Injection flaw that could allow an attacker to gain code execution on a remote system.

Oct 26, 2022
9.8
CVE-2022-43774CRITICAL

The HandlerPageP_KID class in Delta Electronics DIAEnergy v1.9 contains a SQL Injection flaw that could allow an attacker to gain code execution on a remote system.

Oct 26, 2022
9.8
CVE-2022-30318CRITICAL

Honeywell ControlEdge through R151.1 uses Hard-coded Credentials. According to FSCT-2022-0056, there is a Honeywell ControlEdge hardcoded credentials issue. The affected components are characterized as: SSH. The potential impact is: Remote code execution, manipulate configuration, denial of service. The Honeywell ControlEdge PLC and RTU product line exposes an SSH service on port 22/TCP. Login as root to this service is permitted and credentials for the root user are hardcoded without automatically changing them upon first commissioning. The credentials for the SSH service are hardcoded in the firmware. The credentials grant an attacker access to a root shell on the PLC/RTU, allowing for remote code execution, configuration manipulation and denial of service.

Aug 31, 2022
9.8
CVE-2022-30315CRITICAL

Honeywell Experion PKS Safety Manager (SM and FSC) through 2022-05-06 has Insufficient Verification of Data Authenticity. According to FSCT-2022-0053, there is a Honeywell Experion PKS Safety Manager insufficient logic security controls issue. The affected components are characterized as: Honeywell FSC runtime (FSC-CPU, QPP), Honeywell Safety Builder. The potential impact is: Remote Code Execution, Denial of Service. The Honeywell Experion PKS Safety Manager family of safety controllers utilize the unauthenticated Safety Builder protocol (FSCT-2022-0051) for engineering purposes, including downloading projects and control logic to the controller. Control logic is downloaded to the controller on a block-by-block basis. The logic that is downloaded consists of FLD code compiled to native machine code for the CPU module (which applies to both the Safety Manager and FSC families). Since this logic does not seem to be cryptographically authenticated, it allows an attacker capable of triggering a logic download to execute arbitrary machine code on the controller's CPU module in the context of the runtime. While the researchers could not verify this in detail, the researchers believe that the microprocessor underpinning the FSC and Safety Manager CPU modules is incapable of offering memory protection or privilege separation capabilities which would give an attacker full control of the CPU module. There is no authentication on control logic downloaded to the controller. Memory protection and privilege separation capabilities for the runtime are possibly lacking. The researchers confirmed the issues in question on Safety Manager R145.1 and R152.2 but suspect the issue affects all FSC and SM controllers and associated Safety Builder versions regardless of software or firmware revision. An attacker who can communicate with a Safety Manager controller via the Safety Builder protocol can execute arbitrary code without restrictions on the CPU module, allowing for covert manipulation of control operations and implanting capabilities similar to the TRITON malware (MITRE ATT&CK software ID S1009). A mitigating factor with regards to some, but not all, of the above functionality is that these require the Safety Manager physical keyswitch to be in the right position.

Jul 28, 2022
9.8
CVE-2022-31207CRITICAL

The Omron SYSMAC Cx product family PLCs (CS series, CJ series, and CP series) through 2022-05-18 lack cryptographic authentication. They utilize the Omron FINS (9600/TCP) protocol for engineering purposes, including downloading projects and control logic to the PLC. This protocol has authentication flaws as reported in FSCT-2022-0057. Control logic is downloaded to PLC volatile memory using the FINS Program Area Read and Program Area Write commands or to non-volatile memory using other commands from where it can be loaded into volatile memory for execution. The logic that is loaded into and executed from the user program area exists in compiled object code form. Upon execution, these object codes are first passed to a dedicated ASIC that determines whether the object code is to be executed by the ASIC or the microprocessor. In the former case, the object code is interpreted by the ASIC whereas in the latter case the object code is passed to the microprocessor for object code interpretation by a ROM interpreter. In the abnormal case where the object code cannot be handled by either, an abnormal condition is triggered and the PLC is halted. The logic that is downloaded to the PLC does not seem to be cryptographically authenticated, thus allowing an attacker to manipulate transmitted object code to the PLC and either execute arbitrary object code commands on the ASIC or on the microprocessor interpreter.

Jul 26, 2022
9.8
CVE-2022-31206CRITICAL

The Omron SYSMAC Nx product family PLCs (NJ series, NY series, NX series, and PMAC series) through 2022-005-18 lack cryptographic authentication. These PLCs are programmed using the SYMAC Studio engineering software (which compiles IEC 61131-3 conformant POU code to native machine code for execution by the PLC's runtime). The resulting machine code is executed by a runtime, typically controlled by a real-time operating system. The logic that is downloaded to the PLC does not seem to be cryptographically authenticated, allowing an attacker to manipulate transmitted object code to the PLC and execute arbitrary machine code on the processor of the PLC's CPU module in the context of the runtime. In the case of at least the NJ series, an RTOS and hardware combination is used that would potentially allow for memory protection and privilege separation and thus limit the impact of code execution. However, it was not confirmed whether these sufficiently segment the runtime from the rest of the RTOS.

Jul 26, 2022
9.8
CVE-2022-33318CRITICAL

Deserialization of Untrusted Data vulnerability in Mitsubishi Electric GENESIS64 versions 10.97 to 10.97.1, Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97 to 10.97.1, Mitsubishi Electric ICONICS Suite versions 10.97 to 10.97.1, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite versions 10.97 to 10.97.1, Mitsubishi Electric GENESIS32 versions 9.7 and prior, Mitsubishi Electric Iconics Digital Solutions GENESIS32 versions 9.7 and prior, and Mitsubishi Electric MC Works64 versions 4.04E and prior allows a remote unauthenticated attacker to execute an arbitrary malicious code by sending specially crafted packets to the GENESIS64, ICONICS Suite, GENESIS32, or MC Works64 server.

Jul 20, 2022
9.8
CVE-2022-31806CRITICAL

In CODESYS V2 PLCWinNT and Runtime Toolkit 32 in versions prior to V2.4.7.57 password protection is not enabled by default and there is no information or prompt to enable password protection at login in case no password is set at the controller.

Jun 24, 2022
9.8
CVE-2022-31802CRITICAL

In CODESYS Gateway Server V2 for versions prior to V2.3.9.38 only a part of the the specified password is been compared to the real CODESYS Gateway password. An attacker may perform authentication by specifying a small password that matches the corresponding part of the longer real CODESYS Gateway password.

Jun 24, 2022
9.8
CVE-2022-25163CRITICAL

Improper Input Validation vulnerability in Mitsubishi Electric MELSEC-Q Series QJ71E71-100 first 5 digits of serial number "24061" or prior, Mitsubishi Electric MELSEC-L series LJ71E71-100 first 5 digits of serial number "24061" or prior and Mitsubishi Electric MELSEC iQ-R Series RD81MES96N firmware version "08" or prior allows a remote unauthenticated attacker to cause a denial of service (DoS) condition or execute malicious code on the target products by sending specially crafted packets.

Jun 2, 2022
9.8
CVE-2021-27444CRITICAL

The Weintek cMT product line is vulnerable to various improper access controls, which may allow an unauthenticated attacker to remotely access and download sensitive information and perform administrative actions on behalf of a legitimate administrator.

May 16, 2022
9.8
CVE-2022-1378CRITICAL

Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerability exists in DIAE_pgHandler.ashx. This allows an attacker to inject arbitrary SQL queries, retrieve and modify database contents, and execute system commands.

May 2, 2022
9.8
CVE-2022-1377CRITICAL

Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerability exists in DIAE_rltHandler.ashx. This allows an attacker to inject arbitrary SQL queries, retrieve and modify database contents, and execute system commands.

May 2, 2022
9.8
CVE-2022-1376CRITICAL

Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerability exists in DIAE_privgrpHandler.ashx. This allows an attacker to inject arbitrary SQL queries, retrieve and modify database contents, and execute system commands.

May 2, 2022
9.8
CVE-2022-1375CRITICAL

Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerability exists in DIAE_slogHandler.ashx. This allows an attacker to inject arbitrary SQL queries, retrieve and modify database contents, and execute system commands.

May 2, 2022
9.8
CVE-2022-1374CRITICAL

Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerability exists in DIAE_unHandler.ashx. This allows an attacker to inject arbitrary SQL queries, retrieve and modify database contents, and execute system commands.

May 2, 2022
9.8
CVE-2022-1372CRITICAL

Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerability exists in dlSlog.aspx. This allows an attacker to inject arbitrary SQL queries, retrieve and modify database contents, and execute system commands.

May 2, 2022
9.8
CVE-2022-1371CRITICAL

Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerability exists in ReadRegf. This allows an attacker to inject arbitrary SQL queries, retrieve and modify database contents, and execute system commands.

May 2, 2022
9.8
CVE-2022-1370CRITICAL

Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerability exists in ReadREGbyID. This allows an attacker to inject arbitrary SQL queries, retrieve and modify database contents, and execute system commands.

May 2, 2022
9.8
CVE-2022-1369CRITICAL

Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerability exists in ReadRegIND. This allows an attacker to inject arbitrary SQL queries, retrieve and modify database contents, and execute system commands.

May 2, 2022
9.8
CVE-2022-1367CRITICAL

Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerability exists in Handler_TCV.ashx. This allows an attacker to inject arbitrary SQL queries, retrieve and modify database contents, and execute system commands.

May 2, 2022
9.8
CVE-2022-1366CRITICAL

Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerability exists in HandlerChart.ashx. This allows an attacker to inject arbitrary SQL queries, retrieve and modify database contents, and execute system commands.

May 2, 2022
9.8
CVE-2021-40390CRITICAL

An authentication bypass vulnerability exists in the Web Application functionality of Moxa MXView Series 3.2.4. A specially-crafted HTTP request can lead to unauthorized access. An attacker can send an HTTP request to trigger this vulnerability.

Apr 14, 2022
9.8
CVE-2021-30064CRITICAL

On Schneider Electric ConneXium Tofino Firewall TCSEFEA23F3F22 before 03.23, TCSEFEA23F3F20/21, and Belden Tofino Xenon Security Appliance, an SSH login can succeed with hardcoded default credentials (if the device is in the uncommissioned state).

Apr 3, 2022
9.8
CVE-2021-32976CRITICAL

Five buffer overflows in the built-in web server in Moxa NPort IAW5000A-I/O series firmware version 2.2 or earlier may allow a remote attacker to initiate a denial-of-service attack and execute arbitrary code.

Apr 1, 2022
9.8
CVE-2021-32974CRITICAL

Improper input validation in the built-in web server in Moxa NPort IAW5000A-I/O series firmware version 2.2 or earlier may allow a remote attacker to execute commands.

Apr 1, 2022
9.8
CVE-2022-27175CRITICAL

Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerability that exists in GetCalcTagList. This allows an attacker to inject arbitrary SQL queries, retrieve and modify database contents, and execute system commands.

Mar 29, 2022
9.8
CVE-2022-26887CRITICAL

Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerability exists in DIAE_loopmapHandler.ashx. This allows an attacker to inject arbitrary SQL queries, retrieve and modify database contents, and execute system commands.

Mar 29, 2022
9.8
CVE-2022-26836CRITICAL

Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerability that exists in HandlerExport.ashx/Calendar. This allows an attacker to inject arbitrary SQL queries, retrieve and modify database contents, and execute system commands.

Mar 29, 2022
9.8
CVE-2022-26667CRITICAL

Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerability that exists in GetDemandAnalysisData. This allows an attacker to inject arbitrary SQL queries, retrieve and modify database contents, and execute system commands.

Mar 29, 2022
9.8
CVE-2022-26666CRITICAL

Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerability exists in HandlerECC.ashx. This allows an attacker to inject arbitrary SQL queries, retrieve and modify database contents, and execute system commands.

Mar 29, 2022
9.8
CVE-2022-26514CRITICAL

Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerability that exists in DIAE_tagHandler.ashx. This allows an attacker to inject arbitrary SQL queries, retrieve and modify database contents, and execute system commands.

Mar 29, 2022
9.8
CVE-2022-26349CRITICAL

Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerability that exists in DIAE_eccoefficientHandler.ashx. This allows an attacker to inject arbitrary SQL queries, retrieve and modify database contents, and execute system commands.

Mar 29, 2022
9.8
CVE-2022-26338CRITICAL

Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerability exists in HandlerPageP_KID.ashx. This allows an attacker to inject arbitrary SQL queries, retrieve and modify database contents, and execute system commands.

Mar 29, 2022
9.8
CVE-2022-26069CRITICAL

Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerability that exists in HandlerPage_KID.ashx. This allows an attacker to inject arbitrary SQL queries, retrieve and modify database contents, and execute system commands.

Mar 29, 2022
9.8
CVE-2022-26065CRITICAL

Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerability exists in GetLatestDemandNode. This allows an attacker to inject arbitrary SQL queries, retrieve and modify database contents, and execute system commands.

Mar 29, 2022
9.8
CVE-2022-26059CRITICAL

Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerability that exists in GetQueryData. This allows an attacker to inject arbitrary SQL queries, retrieve and modify database contents, and execute system commands.

Mar 29, 2022
9.8
CVE-2022-26013CRITICAL

Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerability that exists in DIAE_dmdsetHandler.ashx. This allows an attacker to inject arbitrary SQL queries, retrieve and modify database contents, and execute system commands.

Mar 29, 2022
9.8
CVE-2022-25980CRITICAL

Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerability that exists in HandlerCommon.ashx. This allows an attacker to inject arbitrary SQL queries, retrieve and modify database contents, and execute system commands.

Mar 29, 2022
9.8
CVE-2022-25880CRITICAL

Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerability exists in HandlerTag_KID.ashx. This allows an attacker to inject arbitrary SQL queries, retrieve and modify database contents, and execute system commands.

Mar 29, 2022
9.8
CVE-2022-25347CRITICAL

Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) is vulnerable to path traversal attacks, which may allow an attacker to write arbitrary files to locations on the file system.

Mar 29, 2022
9.8
CVE-2022-0923CRITICAL

Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerability that exists in HandlerDialog_KID.ashx. This allows an attacker to inject arbitrary SQL queries, retrieve and modify database contents, and execute system commands.

Mar 29, 2022
9.8
CVE-2022-23402CRITICAL

The following Yokogawa Electric products hard-code the password for CAMS server applications: CENTUM VP versions from R5.01.00 to R5.04.20 and versions from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00

Mar 11, 2022
9.8
CVE-2022-21194CRITICAL

The following Yokogawa Electric products do not change the passwords of the internal Windows accounts from the initial configuration: CENTUM VP versions from R5.01.00 to R5.04.20 and versions from R6.01.00 to R6.08.0, Exaopc versions from R3.72.00 to R3.79.00.

Mar 11, 2022
9.8
CVE-2021-39363CRITICAL

Honeywell HDZP252DI 1.00.HW02.4 and HBW2PER1 1.000.HW01.3 devices allow a video replay attack after ARP cache poisoning has been achieved.

Feb 24, 2022
9.8
CVE-2021-46560CRITICAL

The firmware on Moxa TN-5900 devices through 3.1 allows command injection that could lead to device damage.

Jan 26, 2022
9.8
CVE-2022-23128CRITICAL

Incomplete List of Disallowed Inputs vulnerability in Mitsubishi Electric MC Works64 versions 4.00A (10.95.201.23) to 4.04E (10.95.210.01), ICONICS GENESIS64 versions 10.95.3 to 10.97, ICONICS Hyper Historian versions 10.95.3 to 10.97, ICONICS AnalytiX versions 10.95.3 to 10.97 and ICONICS MobileHMI versions 10.95.3 to 10.97 allows a remote unauthenticated attacker to bypass the authentication of MC Works64, GENESIS64, Hyper Historian, AnalytiX and MobileHMI, and gain unauthorized access to the products, by sending specially crafted WebSocket packets to FrameWorX server, one of the functions of the products.

Jan 21, 2022
9.8
CVE-2021-38389CRITICAL

Advantech WebAccess versions 9.02 and prior are vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute code.

Oct 18, 2021
9.8
CVE-2021-33023CRITICAL

Advantech WebAccess versions 9.02 and prior are vulnerable to a heap-based buffer overflow, which may allow an attacker to remotely execute code.

Oct 18, 2021
9.8
CVE-2021-38458CRITICAL

A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries.

Oct 12, 2021
9.8
CVE-2021-38456CRITICAL

A use of hard-coded password vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to gain access through accounts using default passwords

Oct 12, 2021
9.8
CVE-2021-38408CRITICAL

A stack-based buffer overflow vulnerability in Advantech WebAccess Versions 9.02 and prior caused by a lack of proper validation of the length of user-supplied data may allow remote code execution.

Sep 9, 2021
9.8
CVE-2021-34578CRITICAL

This vulnerability allows an attacker who has access to the WBM to read and write settings-parameters of the device by sending specifically constructed requests without authentication on multiple WAGO PLCs in firmware versions up to FW07.

Aug 31, 2021
9.8
CVE-2021-38393CRITICAL

A Blind SQL injection vulnerability exists in the /DataHandler/HandlerAlarmGroup.ashx endpoint of Delta Electronics DIAEnergie Version 1.7.5 and prior. The application does not properly validate the user-controlled value supplied through the parameter agid before using it as part of an SQL query. A remote, unauthenticated attacker can exploit this issue to execute arbitrary code in the context of NT SERVICE\MSSQLSERVER.

Aug 30, 2021
9.8
CVE-2021-38391CRITICAL

A Blind SQL injection vulnerability exists in the /DataHandler/AM/AM_Handler.ashx endpoint of Delta Electronics DIAEnergie Version 1.7.5 and prior. The application does not properly validate the user-controlled value supplied through the parameter type before using it as part of an SQL query. A remote, unauthenticated attacker can exploit this issue to execute arbitrary code in the context of NT SERVICE\MSSQLSERVER.

Aug 30, 2021
9.8
CVE-2021-38390CRITICAL

A Blind SQL injection vulnerability exists in the /DataHandler/HandlerEnergyType.ashx endpoint of Delta Electronics DIAEnergie Version 1.7.5 and prior. The application does not properly validate the user-controlled value supplied through the parameter egyid before using it as part of an SQL query. A remote, unauthenticated attacker can exploit this issue to execute arbitrary code in the context of NT SERVICE\MSSQLSERVER.

Aug 30, 2021
9.8
CVE-2021-32983CRITICAL

A Blind SQL injection vulnerability exists in the /DataHandler/Handler_CFG.ashx endpoint of Delta Electronics DIAEnergie Version 1.7.5 and prior. The application does not properly validate the user-controlled value supplied through the parameter keyword before using it as part of an SQL query. A remote, unauthenticated attacker can exploit this issue to execute arbitrary code in the context of NT SERVICE\MSSQLSERVER.

Aug 30, 2021
9.8
CVE-2021-32967CRITICAL

Delta Electronics DIAEnergie Version 1.7.5 and prior may allow an attacker to add a new administrative user without being authenticated or authorized, which may allow the attacker to log in and use the device with administrative privileges.

Aug 30, 2021
9.8
CVE-2021-32955CRITICAL

Delta Electronics DIAEnergie Version 1.7.5 and prior allows unrestricted file uploads, which may allow an attacker to remotely execute code.

Aug 30, 2021
9.8
CVE-2021-21805CRITICAL

An OS Command Injection vulnerability exists in the ping.php script functionality of Advantech R-SeeNet v 2.4.12 (20.10.2020). A specially crafted HTTP request can lead to arbitrary OS command execution. An attacker can send a crafted HTTP request to trigger this vulnerability.

Aug 5, 2021
9.8
CVE-2021-33485CRITICAL

CODESYS Control Runtime system before 3.5.17.10 has a Heap-based Buffer Overflow.

Aug 3, 2021
9.8
CVE-2020-20741CRITICAL

Incorrect Access Control in Beckhoff Automation GmbH & Co. KG CX9020 with firmware version CX9020_CB3011_WEC7_HPS_v602_TC31_B4016.6 allows remote attackers to bypass authentication via the "CE Remote Display Tool" as it does not close the incoming connection on the Windows CE side if the credentials are incorrect.

Jul 23, 2021
9.8
CVE-2021-21804CRITICAL

A local file inclusion (LFI) vulnerability exists in the options.php script functionality of Advantech R-SeeNet v 2.4.12 (20.10.2020). A specially crafted HTTP request can lead to arbitrary PHP code execution. An attacker can send a crafted HTTP request to trigger this vulnerability.

Jul 16, 2021
9.8
CVE-2021-30193CRITICAL

CODESYS V2 Web-Server before 1.1.9.20 has an Out-of-bounds Write.

May 25, 2021
9.8
CVE-2021-30192CRITICAL

CODESYS V2 Web-Server before 1.1.9.20 has an Improperly Implemented Security Check.

May 25, 2021
9.8
CVE-2021-30190CRITICAL

CODESYS V2 Web-Server before 1.1.9.20 has Improper Access Control.

May 25, 2021
9.8
CVE-2021-30189CRITICAL

CODESYS V2 Web-Server before 1.1.9.20 has a Stack-based Buffer Overflow.

May 25, 2021
9.8
CVE-2021-30188CRITICAL

CODESYS V2 runtime system SP before 2.4.7.55 has a Stack-based Buffer Overflow.

May 25, 2021
9.8
CVE-2019-18235CRITICAL

Advantech Spectre RT ERT351 Versions 5.1.3 and prior has insufficient login authentication parameters required for the web application may allow an attacker to gain full access using a brute-force password attack.

Mar 17, 2021
9.8
CVE-2021-22681CRITICAL

Rockwell Automation Studio 5000 Logix Designer Versions 21 and later, and RSLogix 5000 Versions 16 through 20 use a key to verify Logix controllers are communicating with Rockwell Automation CompactLogix 1768, 1769, 5370, 5380, 5480: ControlLogix 5550, 5560, 5570, 5580; DriveLogix 5560, 5730, 1794-L34; Compact GuardLogix 5370, 5380; GuardLogix 5570, 5580; SoftLogix 5800. Rockwell Automation Studio 5000 Logix Designer Versions 21 and later and RSLogix 5000: Versions 16 through 20 are vulnerable because an unauthenticated attacker could bypass this verification mechanism and authenticate with Rockwell Automation CompactLogix 1768, 1769, 5370, 5380, 5480: ControlLogix 5550, 5560, 5570, 5580; DriveLogix 5560, 5730, 1794-L34; Compact GuardLogix 5370, 5380; GuardLogix 5570, 5580; SoftLogix 5800.

Mar 3, 2021
9.8
CVE-2021-22658CRITICAL

Advantech iView versions prior to v5.7.03.6112 are vulnerable to a SQL injection, which may allow an attacker to escalate privileges to 'Administrator'.

Feb 11, 2021
9.8
CVE-2021-22652CRITICAL

Access to the Advantech iView versions prior to v5.7.03.6112 configuration are missing authentication, which may allow an unauthorized attacker to change the configuration and obtain code execution.

Feb 11, 2021
9.8
CVE-2020-28144CRITICAL

Certain Moxa Inc products are affected by an improper restriction of operations in EDR-G903 Series Firmware Version 5.5 or lower, EDR-G902 Series Firmware Version 5.5 or lower, and EDR-810 Series Firmware Version 5.6 or lower. Crafted requests sent to the device may allow remote arbitrary code execution.

Feb 3, 2021
9.8
CVE-2020-27265CRITICAL

KEPServerEX: v6.0 to v6.9, ThingWorx Kepware Server: v6.8 and v6.9, ThingWorx Industrial Connectivity: All versions, OPC-Aggregator: All versions, Rockwell Automation KEPServer Enterprise, GE Digital Industrial Gateway Server: v7.68.804 and v7.66, Software Toolbox TOP Server: All 6.x versions are vulnerable to a stack-based buffer overflow. Opening a specifically crafted OPC UA message could allow an attacker to crash the server and remotely execute code.

Jan 14, 2021
9.8
CVE-2020-25196CRITICAL

The built-in WEB server for MOXA NPort IAW5000A-I/O firmware version 2.1 or lower allows SSH/Telnet sessions, which may be vulnerable to brute force attacks to bypass authentication.

Dec 23, 2020
9.8
CVE-2020-25153CRITICAL

The built-in web service for MOXA NPort IAW5000A-I/O firmware version 2.1 or lower does not require users to have strong passwords.

Dec 23, 2020
9.8
CVE-2020-23639CRITICAL

A command injection vulnerability exists in Moxa Inc VPort 461 Series Firmware Version 3.4 or lower that could allow a remote attacker to execute arbitrary commands in Moxa's VPort 461 Series Industrial Video Servers.

Nov 2, 2020
9.8
CVE-2020-16226CRITICAL

Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a malicious actor, which may allow an attacker to remotely execute arbitrary commands.

Oct 5, 2020
9.8
CVE-2020-16245CRITICAL

Advantech iView, Versions 5.7 and prior. The affected product is vulnerable to path traversal vulnerabilities that could allow an attacker to create/download arbitrary files, limit system availability, and remotely execute code.

Aug 25, 2020
9.8
CVE-2020-12007CRITICAL

A specially crafted communication packet sent to the affected devices could allow remote code execution and a denial-of-service condition due to a deserialization vulnerability. This issue affects: Mitsubishi Electric MC Works64 version 4.02C (10.95.208.31) and earlier, all versions; Mitsubishi Electric MC Works32 version 3.00A (9.50.255.02); ICONICS GenBroker64, Platform Services, Workbench, FrameWorX Server version 10.96 and prior; ICONICS GenBroker32 version 9.5 and prior.

Jul 16, 2020
9.8
CVE-2020-12011CRITICAL

A specially crafted communication packet sent to the affected systems could cause a denial-of-service condition or allow remote code execution. This issue affects: Mitsubishi Electric MC Works64 version 4.02C (10.95.208.31) and earlier, all versions; MC Works32 version 3.00A (9.50.255.02); ICONICS GenBroker64, Platform Services, Workbench, FrameWorX Server version 10.96 and prior; GenBroker32 version 9.5 and prior.

Jul 16, 2020
9.8
CVE-2020-10287CRITICAL

The IRC5 family with UAS service enabled comes by default with credentials that can be found on publicly available manuals. ABB considers this a well documented functionality that helps customer set up however, out of our research, we found multiple production systems running these exact default credentials and consider thereby this an exposure that should be mitigated. Moreover, future deployments should consider that these defaults should be forbidden (user should be forced to change them).

Jul 15, 2020
9.8
CVE-2020-14503CRITICAL

Advantech iView, versions 5.6 and prior, has an improper input validation vulnerability. Successful exploitation of this vulnerability could allow an attacker to remotely execute arbitrary code.

Jul 15, 2020
9.8
CVE-2020-14501CRITICAL

Advantech iView, versions 5.6 and prior, has an improper authentication for critical function (CWE-306) issue. Successful exploitation of this vulnerability may allow an attacker to obtain the information of the user table, including the administrator credentials in plain text. An attacker may also delete the administrator account.

Jul 15, 2020
9.8
CVE-2020-14507CRITICAL

Advantech iView, versions 5.6 and prior, is vulnerable to multiple path traversal vulnerabilities that could allow an attacker to create/download arbitrary files, limit system availability, and remotely execute code.

Jul 15, 2020
9.8
CVE-2020-14505CRITICAL

Advantech iView, versions 5.6 and prior, has an improper neutralization of special elements used in a command (“command injection”) vulnerability. Successful exploitation of this vulnerability may allow an attacker to send a HTTP GET or POST request that creates a command string without any validation. The attacker may then remotely execute code.

Jul 15, 2020
9.8
CVE-2020-14497CRITICAL

Advantech iView, versions 5.6 and prior, contains multiple SQL injection vulnerabilities that are vulnerable to the use of an attacker-controlled string in the construction of SQL queries. An attacker could extract user credentials, read or modify information, and remotely execute code.

Jul 15, 2020
9.8
CVE-2020-5599CRITICAL

TCP/IP function included in the firmware of Mitsubishi Electric GOT2000 series (CoreOS with version -Y and earlier installed in GT27 Model, GT25 Model, and GT23 Model) contains an improper neutralization of argument delimiters in a command ('Argument Injection') vulnerability, which may allow a remote attacker to stop the network functions of the products or execute a malicious program via a specially crafted packet.

Jul 7, 2020
9.8
CVE-2020-5595CRITICAL

TCP/IP function included in the firmware of Mitsubishi Electric GOT2000 series (CoreOS with version -Y and earlier installed in GT27 Model, GT25 Model, and GT23 Model) contains a buffer overflow vulnerability, which may allow a remote attacker to stop the network functions of the products or execute a malicious program via a specially crafted packet.

Jul 7, 2020
9.8
CVE-2020-5594CRITICAL

Mitsubishi Electric MELSEC iQ-R, iQ-F, Q, L, and FX series CPU modules all versions contain a vulnerability that allows cleartext transmission of sensitive information between CPU modules and GX Works3 and/or GX Works2 via unspecified vectors.

Jun 23, 2020
9.8
CVE-2020-12022CRITICAL

Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. An improper validation vulnerability exists that could allow an attacker to inject specially crafted input into memory where it can be executed.

May 8, 2020
9.8
CVE-2020-12006CRITICAL

Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple relative path traversal vulnerabilities exist that may allow a low privilege user to overwrite files outside the application’s control.

May 8, 2020
9.8
CVE-2020-12002CRITICAL

Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple stack-based buffer overflow vulnerabilities exist caused by a lack of proper validation of the length of user-supplied data, which may allow remote code execution.

May 8, 2020
9.8
CVE-2020-10638CRITICAL

Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple heap-based buffer overflow vulnerabilities exist caused by a lack of proper validation of the length of user-supplied data, which may allow remote code execution.

May 8, 2020
9.8
CVE-2019-5620CRITICAL

ABB MicroSCADA Pro SYS600 version 9.3 suffers from an instance of CWE-306: Missing Authentication for Critical Function.

Apr 29, 2020
9.8
CVE-2020-8481CRITICAL

For ABB products ABB Ability™ System 800xA and related system extensions versions 5.1, 6.0 and 6.1, Compact HMI versions 5.1 and 6.0, Control Builder Safe 1.0, 1.1 and 2.0, Symphony Plus -S+ Operations 3.0 to 3.2 Symphony Plus -S+ Engineering 1.1 to 2.2, Composer Harmony 5.1, 6.0 and 6.1, Melody Composer 5.3, 6.1/6.2 and SPE for Melody 1.0SPx (Composer 6.3), Harmony OPC Server (HAOPC) Standalone 6.0, 6.1 and 7.0, ABB Ability™ System 800xA/ Advant® OCS Control Builder A 1.3 and 1.4, Advant® OCS AC100 OPC Server 5.1, 6.0 and 6.1, Composer CTK 6.1 and 6.2, AdvaBuild 3.7 SP1 and SP2, OPCServer for MOD 300 (non-800xA) 1.4, OPC Data Link 2.1 and 2.2, Knowledge Manager 8.0, 9.0 and 9.1, Manufacturing Operations Management 1812 and 1909, confidential data is written in an unprotected file. An attacker who successfully exploited this vulnerability could take full control of the computer.

Apr 29, 2020
9.8
CVE-2020-6974CRITICAL

Honeywell Notifier Web Server (NWS) Version 3.50 is vulnerable to a path traversal attack, which allows an attacker to bypass access to restricted directories. Honeywell has released a firmware update to address the problem.

Apr 7, 2020
9.8
CVE-2020-10245CRITICAL

CODESYS V3 web server before 3.5.15.40, as used in CODESYS Control runtime systems, has a buffer overflow.

Mar 26, 2020
9.8
CVE-2020-7007CRITICAL

In Moxa EDS-G516E Series firmware, Version 5.2 or lower, the attacker may execute arbitrary codes or target the device, causing it to go out of service.

Mar 24, 2020
9.8
CVE-2020-6991CRITICAL

In Moxa EDS-G516E Series firmware, Version 5.2 or lower, weak password requirements may allow an attacker to gain access using brute force.

Mar 24, 2020
9.8
CVE-2020-6981CRITICAL

In Moxa EDS-G516E Series firmware, Version 5.2 or lower, an attacker may gain access to the system without proper authentication.

Mar 24, 2020
9.8
CVE-2020-6995CRITICAL

In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, the application utilizes weak password requirements, which may allow an attacker to gain unauthorized access.

Mar 24, 2020
9.8
CVE-2020-6985CRITICAL

In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, these devices use a hard-coded service code for access to the console.

Mar 24, 2020
9.8
CVE-2020-6989CRITICAL

In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, a buffer overflow in the web server allows remote attackers to cause a denial-of-service condition or execute arbitrary code.

Mar 24, 2020
9.8
CVE-2020-6967CRITICAL

In Rockwell Automation all versions of FactoryTalk Diagnostics software, a subsystem of the FactoryTalk Services Platform, FactoryTalk Diagnostics exposes a .NET Remoting endpoint via RNADiagnosticsSrv.exe at TCPtcp/8082, which can insecurely deserialize untrusted data.

Mar 23, 2020
9.8
CVE-2020-6990CRITICAL

Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior, The cryptographic key utilized to help protect the account password is hard coded into the RSLogix 500 binary file. An attacker could identify cryptographic keys and use it for further cryptographic attacks that could ultimately lead to a remote attacker gaining unauthorized access to the controller.

Mar 16, 2020
9.8
CVE-2020-5547CRITICAL

Resource Management Errors vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to stop the network functions or execute malware via a specially crafted packet.

Mar 16, 2020
9.8
CVE-2020-5545CRITICAL

TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to bypass access restriction and to stop the network functions or execute malware via a specially crafted packet.

Mar 16, 2020
9.8
CVE-2020-5544CRITICAL

Null Pointer Dereference vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to stop the network functions or execute malware via a specially crafted packet.

Mar 16, 2020
9.8
CVE-2020-5543CRITICAL

TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier does not properly manage sessions, which allows remote attackers to stop the network functions or execute malware via a specially crafted packet.

Mar 16, 2020
9.8
CVE-2020-5542CRITICAL

Buffer error vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows remote attackers to stop the network functions or execute malware via a specially crafted packet.

Mar 16, 2020
9.8
CVE-2019-9099CRITICAL

An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. A Buffer overflow in the built-in web server allows remote attackers to initiate DoS, and probably to execute arbitrary code (issue 1 of 2).

Mar 11, 2020
9.8
CVE-2019-9096CRITICAL

An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. Insufficient password requirements for the MGate web application may allow an attacker to gain access by brute-forcing account passwords.

Mar 11, 2020
9.8
CVE-2019-9095CRITICAL

An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. An attacker may be able to intercept weakly encrypted passwords and gain administrative access.

Mar 11, 2020
9.8
CVE-2020-5531CRITICAL

Mitsubishi Electric MELSEC C Controller Module and MELIPC Series MI5000 MELSEC-Q Series C Controller Module(Q24DHCCPU-V, Q24DHCCPU-VG User Ethernet port (CH1, CH2): First 5 digits of serial number 21121 or before), MELSEC iQ-R Series C Controller Module / C Intelligent Function Module(R12CCPU-V Ethernet port (CH1, CH2): First 2 digits of serial number 11 or before, and RD55UP06-V Ethernet port: First 2 digits of serial number 08 or before), and MELIPC Series MI5000(MI5122-VW Ethernet port (CH1): First 2 digits of serial number 03 or before, or the firmware version 03 or before) allow remote attackers to cause a denial of service and/or malware being executed via unspecified vectors.

Feb 17, 2020
9.8
CVE-2015-5628CRITICAL

Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50 and earlier, CENTUM CS 3000 Entry R3.09.50 and earlier, CENTUM VP R5.04.20 and earlier, CENTUM VP Entry R5.04.20 and earlier, ProSafe-RS R3.02.10 and earlier, Exaopc R3.72.00 and earlier, Exaquantum R2.85.00 and earlier, Exaquantum/Batch R2.50.30 and earlier, Exapilot R3.96.10 and earlier, Exaplog R3.40.00 and earlier, Exasmoc R4.03.20 and earlier, Exarqe R4.03.20 and earlier, Field Wireless Device OPC Server R2.01.02 and earlier, PRM R3.12.00 and earlier, STARDOM VDS R7.30.01 and earlier, STARDOM OPC Server for Windows R3.40 and earlier, FAST/TOOLS R10.01 and earlier, B/M9000CS R5.05.01 and earlier, B/M9000 VP R7.03.04 and earlier, and FieldMate R1.01 or R1.02 allows remote attackers to execute arbitrary code via a crafted packet.

Feb 5, 2020
9.8
CVE-2015-5627CRITICAL

Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50 and earlier, CENTUM CS 3000 Entry R3.09.50 and earlier, CENTUM VP R5.04.20 and earlier, CENTUM VP Entry R5.04.20 and earlier, ProSafe-RS R3.02.10 and earlier, Exaopc R3.72.00 and earlier, Exaquantum R2.85.00 and earlier, Exaquantum/Batch R2.50.30 and earlier, Exapilot R3.96.10 and earlier, Exaplog R3.40.00 and earlier, Exasmoc R4.03.20 and earlier, Exarqe R4.03.20 and earlier, Field Wireless Device OPC Server R2.01.02 and earlier, PRM R3.12.00 and earlier, STARDOM VDS R7.30.01 and earlier, STARDOM OPC Server for Windows R3.40 and earlier, FAST/TOOLS R10.01 and earlier, B/M9000CS R5.05.01 and earlier, B/M9000 VP R7.03.04 and earlier, and FieldMate R1.01 or R1.02 allows remote attackers to cause a denial of service (process outage) via a crafted packet.

Feb 5, 2020
9.8
CVE-2015-5626CRITICAL

Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50 and earlier, CENTUM CS 3000 Entry R3.09.50 and earlier, CENTUM VP R5.04.20 and earlier, CENTUM VP Entry R5.04.20 and earlier, ProSafe-RS R3.02.10 and earlier, Exaopc R3.72.00 and earlier, Exaquantum R2.85.00 and earlier, Exaquantum/Batch R2.50.30 and earlier, Exapilot R3.96.10 and earlier, Exaplog R3.40.00 and earlier, Exasmoc R4.03.20 and earlier, Exarqe R4.03.20 and earlier, Field Wireless Device OPC Server R2.01.02 and earlier, PRM R3.12.00 and earlier, STARDOM VDS R7.30.01 and earlier, STARDOM OPC Server for Windows R3.40 and earlier, FAST/TOOLS R10.01 and earlier, B/M9000CS R5.05.01 and earlier, B/M9000 VP R7.03.04 and earlier, and FieldMate R1.01 or R1.02 allows remote attackers to cause a denial of service (network-communications outage) via a crafted packet.

Feb 5, 2020
9.8
CVE-2019-5082CRITICAL

An exploitable heap buffer overflow vulnerability exists in the iocheckd service I/O-Check functionality of WAGO PFC200 Firmware version 03.01.07(13), WAGO PFC200 Firmware version 03.00.39(12), and WAGO PFC100 Firmware version 03.00.39(12). A specially crafted set of packets can cause a heap buffer overflow, potentially resulting in code execution. An attacker can send unauthenticated packets to trigger this vulnerability.

Jan 8, 2020
9.8
CVE-2019-16871CRITICAL

Beckhoff Embedded Windows PLCs through 3.1.4024.0, and Beckhoff Twincat on Windows Engineering stations, allow an attacker to achieve Remote Code Execution (as SYSTEM) via the Beckhoff ADS protocol.

Dec 19, 2019
9.8
CVE-2019-5079CRITICAL

An exploitable heap buffer overflow vulnerability exists in the iocheckd service "I/O-Check" functionality of WAGO PFC200 Firmware versions 03.01.07(13) and 03.00.39(12), and WAGO PFC100 Firmware version 03.00.39(12). A specially crafted set of packets can cause a heap buffer overflow, potentially resulting in code execution. An attacker can send unauthenticated packets to trigger this vulnerability.

Dec 18, 2019
9.8
CVE-2019-5075CRITICAL

An exploitable stack buffer overflow vulnerability exists in the command line utility getcouplerdetails of WAGO PFC200 Firmware versions 03.01.07(13) and 03.00.39(12), and WAGO PFC100 Firmware version 03.00.39(12). A specially crafted set of packets sent to the iocheckd service "I/O-Check" can cause a stack buffer overflow in the sub-process getcouplerdetails, resulting in code execution. An attacker can send unauthenticated packets to trigger this vulnerability.

Dec 18, 2019
9.8
CVE-2019-5081CRITICAL

An exploitable heap buffer overflow vulnerability exists in the iocheckd service ''I/O-Chec'' functionality of WAGO PFC 200 Firmware version 03.01.07(13) and 03.00.39(12), and WAGO PFC100 Firmware version 03.00.39(12). A specially crafted set of packets can cause a heap buffer overflow, potentially resulting in code execution. An attacker can send unauthenticated packets to trigger this vulnerability.

Dec 18, 2019
9.8
CVE-2019-5074CRITICAL

An exploitable stack buffer overflow vulnerability exists in the iocheckd service ''I/O-Check'' functionality of WAGO PFC200 Firmware version 03.01.07(13), WAGO PFC200 Firmware version 03.00.39(12) and WAGO PFC100 Firmware version 03.00.39(12). A specially crafted set of packets can cause a stack buffer overflow, resulting in code execution. An attacker can send unauthenticated packets to trigger this vulnerability.

Dec 18, 2019
9.8
CVE-2019-18257CRITICAL

In Advantech DiagAnywhere Server, Versions 3.07.11 and prior, multiple stack-based buffer overflow vulnerabilities exist in the file transfer service listening on the TCP port. Successful exploitation could allow an unauthenticated attacker to execute arbitrary code with the privileges of the user running DiagAnywhere Server.

Dec 17, 2019
9.8
CVE-2019-18269CRITICAL

Omron’s CS and CJ series PLCs have an unrestricted externally accessible lock vulnerability.

Dec 16, 2019
9.8
CVE-2019-18261CRITICAL

In Omron PLC CS series, all versions, Omron PLC CJ series, all versions, and Omron PLC NJ series, all versions, the software does not implement sufficient measures to prevent multiple failed authentication attempts within in a short time frame, making it more susceptible to brute force attacks.

Dec 16, 2019
9.8
CVE-2019-18259CRITICAL

In Omron PLC CJ series, all versions and Omron PLC CS series, all versions, an attacker could spoof arbitrary messages or execute commands.

Dec 16, 2019
9.8
CVE-2019-3951CRITICAL

Advantech WebAccess before 8.4.3 allows unauthenticated remote attackers to execute arbitrary code or cause a denial of service (memory corruption) due to a stack-based buffer overflow when handling IOCTL 70533 RPC messages.

Dec 12, 2019
9.8
CVE-2019-18250CRITICAL

In all versions of ABB Power Generation Information Manager (PGIM) and Plant Connect, the affected product is vulnerable to authentication bypass, which may allow an attacker to remotely bypass authentication and extract credentials from the affected device.

Nov 26, 2019
9.8
CVE-2019-18858CRITICAL

CODESYS 3 web server before 3.5.15.20, as distributed with CODESYS Control runtime systems, has a Buffer Overflow.

Nov 20, 2019
9.8
CVE-2019-18226CRITICAL

Honeywell equIP series and Performance series IP cameras and recorders, A vulnerability exists in the affected products where IP cameras and recorders have a potential replay attack vulnerability as a weak authentication method is retained for compatibility with legacy products.

Oct 31, 2019
9.8
CVE-2019-13551CRITICAL

Advantech WISE-PaaS/RMM, Versions 3.3.29 and prior. Path traversal vulnerabilities are caused by a lack of proper validation of a user-supplied path prior to use in file operations. An attacker can leverage these vulnerabilities to remotely execute code while posing as an administrator.

Oct 31, 2019
9.8
CVE-2019-13547CRITICAL

Advantech WISE-PaaS/RMM, Versions 3.3.29 and prior. There is an unsecured function that allows anyone who can access the IP address to use the function without authentication.

Oct 31, 2019
9.8
CVE-2019-14931CRITICAL

An issue was discovered on Mitsubishi Electric Europe B.V. ME-RTU devices through 2.02 and INEA ME-RTU devices through 3.0. An unauthenticated remote OS Command Injection vulnerability allows an attacker to execute arbitrary commands on the RTU due to the passing of unsafe user supplied data to the RTU's system shell. Functionality in mobile.php provides users with the ability to ping sites or IP addresses via Mobile Connection Test. When the Mobile Connection Test is submitted, action.php is called to execute the test. An attacker can use a shell command separator (;) in the host variable to execute operating system commands upon submitting the test data.

Oct 28, 2019
9.8
CVE-2019-14930CRITICAL

An issue was discovered on Mitsubishi Electric Europe B.V. ME-RTU devices through 2.02 and INEA ME-RTU devices through 3.0. Undocumented hard-coded user passwords for root, ineaadmin, mitsadmin, and maint could allow an attacker to gain unauthorised access to the RTU. (Also, the accounts ineaadmin and mitsadmin are able to escalate privileges to root without supplying a password due to insecure entries in /etc/sudoers on the RTU.)

Oct 28, 2019
9.8
CVE-2019-14929CRITICAL

An issue was discovered on Mitsubishi Electric Europe B.V. ME-RTU devices through 2.02 and INEA ME-RTU devices through 3.0. Stored cleartext passwords could allow an unauthenticated attacker to obtain configured username and password combinations on the RTU due to the weak credentials management on the RTU. An unauthenticated user can obtain the exposed password credentials to gain access to the following services: DDNS service, Mobile Network Provider, and OpenVPN service.

Oct 28, 2019
9.8
CVE-2019-14926CRITICAL

An issue was discovered on Mitsubishi Electric Europe B.V. ME-RTU devices through 2.02 and INEA ME-RTU devices through 3.0. Hard-coded SSH keys allow an attacker to gain unauthorised access or disclose encrypted data on the RTU due to the keys not being regenerated on initial installation or with firmware updates. In other words, these devices use private-key values in /etc/ssh/ssh_host_rsa_key, /etc/ssh/ssh_host_ecdsa_key, and /etc/ssh/ssh_host_dsa_key files that are publicly available from the vendor web sites.

Oct 28, 2019
9.8
CVE-2019-16265CRITICAL

CODESYS V2.3 ENI server up to V3.2.2.24 has a Buffer Overflow.

Oct 25, 2019
9.8
CVE-2019-13548CRITICAL

CODESYS V3 web server, all versions prior to 3.5.14.10, allows an attacker to send specially crafted http or https requests which could cause a stack overflow and create a denial-of-service condition or allow remote code execution.

Sep 13, 2019
9.8
CVE-2019-3975CRITICAL

Stack-based buffer overflow in Advantech WebAccess/SCADA 8.4.1 allows a remote, unauthenticated attacker to execute arbitrary code via a crafted IOCTL 70603 RPC message.

Sep 10, 2019
9.8
CVE-2019-9010CRITICAL

An issue was discovered in 3S-Smart CODESYS V3 products. The CODESYS Gateway does not correctly verify the ownership of a communication channel. All variants of the following CODESYS V3 products in all versions prior to v3.5.14.20 that contain the CmpGateway component are affected, regardless of the CPU type or operating system: CODESYS Control for BeagleBone, CODESYS Control for emPC-A/iMX6, CODESYS Control for IOT2000, CODESYS Control for Linux, CODESYS Control for PFC100, CODESYS Control for PFC200, CODESYS Control for Raspberry Pi, CODESYS Control V3 Runtime System Toolkit, CODESYS Gateway V3, CODESYS V3 Development System.

Aug 15, 2019
9.8
CVE-2019-10938CRITICAL

A vulnerability has been identified in SIPROTEC 5 devices with CPU variants CP200 (All versions < V7.59), SIPROTEC 5 devices with CPU variants CP300 and CP100 (All versions < V8.01), Siemens Power Meters Series 9410 (All versions < V2.2.1), Siemens Power Meters Series 9810 (All versions). An unauthenticated attacker with network access to the device could potentially insert arbitrary code which is executed before firmware verification in the device. At the time of advisory publication no public exploitation of this security vulnerability was known.

Aug 2, 2019
9.8
CVE-2019-10970CRITICAL

In Rockwell Automation PanelView 5510 (all versions manufactured before March 13, 2019 that have never been updated to v4.003, v5.002, or later), a remote, unauthenticated threat actor with access to an affected PanelView 5510 Graphic Display, upon successful exploit, may boot-up the terminal and gain root-level access to the device’s file system.

Jul 11, 2019
9.8
CVE-2018-11425CRITICAL

Memory corruption issue was discovered in Moxa OnCell G3470A-LTE Series version 1.6 Build 18021314 and prior, a different vulnerability than CVE-2018-11424.

Jul 3, 2019
9.8
CVE-2018-11422CRITICAL

Moxa OnCell G3100-HSPA Series version 1.6 Build 17100315 and prior use a proprietary configuration protocol that does not provide confidentiality, integrity, and authenticity security controls. All information is sent in plain text, and can be intercepted and modified. Any commands (including device reboot, configuration download or upload, or firmware upgrade) are accepted and executed by the device without authentication.

Jul 3, 2019
9.8
CVE-2018-11421CRITICAL

Moxa OnCell G3100-HSPA Series version 1.6 Build 17100315 and prior use a proprietary monitoring protocol that does not provide confidentiality, integrity, and authenticity security controls. All information is sent in plain text, and can be intercepted and modified. The protocol is vulnerable to remote unauthenticated disclosure of sensitive information, including the administrator's password. Under certain conditions, it's also possible to retrieve additional information, such as content of HTTP requests to the device, or the previously used password, due to memory leakages.

Jul 3, 2019
9.8
CVE-2018-11420CRITICAL

There is Memory corruption in the web interface of Moxa OnCell G3100-HSPA Series version 1.5 Build 17042015 and prio,r a different vulnerability than CVE-2018-11423.

Jul 3, 2019
9.8
CVE-2018-11426CRITICAL

A weak Cookie parameter is used in the web application of Moxa OnCell G3100-HSPA Series version 1.4 Build 16062919 and prior. An attacker can brute force parameters required to bypass authentication and access the web interface to use all its functions except for password change.

Jul 3, 2019
9.8
CVE-2019-12899CRITICAL

Delta Electronics DeviceNet Builder 2.04 has a User Mode Write AV starting at ntdll!RtlQueueWorkItem+0x00000000000005e3.

Jun 19, 2019
9.8
CVE-2019-12898CRITICAL

Delta Electronics DeviceNet Builder 2.04 has a User Mode Write AV starting at image00400000+0x000000000017a45e.

Jun 19, 2019
9.8
CVE-2019-3954CRITICAL

Stack-based buffer overflow in Advantech WebAccess/SCADA 8.4.0 allows a remote, unauthenticated attacker to execute arbitrary code by sending a crafted IOCTL 81024 RPC call.

Jun 19, 2019
9.8
CVE-2019-3953CRITICAL

Stack-based buffer overflow in Advantech WebAccess/SCADA 8.4.0 allows a remote, unauthenticated attacker to execute arbitrary code by sending a crafted IOCTL 10012 RPC call.

Jun 18, 2019
9.8
CVE-2019-12550CRITICAL

WAGO 852-303 before FW06, 852-1305 before FW06, and 852-1505 before FW03 devices contain hardcoded users and passwords that can be used to login via SSH and TELNET.

Jun 17, 2019
9.8
CVE-2019-12549CRITICAL

WAGO 852-303 before FW06, 852-1305 before FW06, and 852-1505 before FW03 devices contain hardcoded private keys for the SSH daemon. The fingerprint of the SSH host key from the corresponding SSH daemon matches the embedded private key.

Jun 17, 2019
9.8
CVE-2018-10698CRITICAL

An issue was discovered on Moxa AWK-3121 1.14 devices. The device enables an unencrypted TELNET service by default. This allows an attacker who has been able to gain an MITM position to easily sniff the traffic between the device and the user. Also an attacker can easily connect to the TELNET daemon using the default credentials if they have not been changed by the user.

Jun 7, 2019
9.8
CVE-2019-10712CRITICAL

The Web-GUI on WAGO Series 750-88x (750-330, 750-352, 750-829, 750-831, 750-852, 750-880, 750-881, 750-882, 750-884, 750-885, 750-889) and Series 750-87x (750-830, 750-849, 750-871, 750-872, 750-873) devices has undocumented service access.

May 7, 2019
9.8
CVE-2019-6526CRITICAL

Moxa IKS-G6824A series Versions 4.5 and prior, EDS-405A series Version 3.8 and prior, EDS-408A series Version 3.8 and prior, and EDS-510A series Version 3.8 and prior use plaintext transmission of sensitive data, which may allow an attacker to capture sensitive data such as an administrative password.

Apr 15, 2019
9.8
CVE-2019-3940CRITICAL

Advantech WebAccess 8.3.4 is vulnerable to file upload attacks via unauthenticated RPC call. An unauthenticated, remote attacker can use this vulnerability to execute arbitrary code.

Apr 9, 2019
9.8
CVE-2014-9186CRITICAL

A file inclusion vulnerability exists in the confd.exe module in Honeywell Experion PKS R40x before R400.6, R41x before R410.6, and R43x before R430.2, which could lead to accepting an arbitrary file into the function, and potential information disclosure or remote code execution. Honeywell strongly encourages and recommends all customers running unsupported versions of EKPS prior to R400 to upgrade to a supported version.

Apr 8, 2019
9.8
CVE-2014-5435CRITICAL

An arbitrary memory write vulnerability exists in the dual_onsrv.exe module in Honeywell Experion PKS R40x before R400.6, R41x before R410.6, and R43x before R430.2, that could lead to possible remote code execution or denial of service. Honeywell strongly encourages and recommends all customers running unsupported versions of EKPS prior to R400 to upgrade to a supported version.

Apr 8, 2019
9.8
CVE-2019-6552CRITICAL

Advantech WebAccess/SCADA, Versions 8.3.5 and prior. Multiple command injection vulnerabilities, caused by a lack of proper validation of user-supplied data, may allow remote code execution.

Apr 5, 2019
9.8
CVE-2019-6550CRITICAL

Advantech WebAccess/SCADA, Versions 8.3.5 and prior. Multiple stack-based buffer overflow vulnerabilities, caused by a lack of proper validation of the length of user-supplied data, may allow remote code execution.

Apr 5, 2019
9.8
CVE-2018-19282CRITICAL

Rockwell Automation PowerFlex 525 AC Drives 5.001 and earlier allow remote attackers to cause a denial of service by crashing the Common Industrial Protocol (CIP) network stack. The vulnerability allows the attacker to crash the CIP in a way that it does not accept new connections, but keeps the current connections active, which can prevent legitimate users from recovering control.

Apr 4, 2019
9.8
CVE-2019-6553CRITICAL

A vulnerability was found in Rockwell Automation RSLinx Classic versions 4.10.00 and prior. An input validation issue in a .dll file of RSLinx Classic where the data in a Forward Open service request is passed to a fixed size buffer, allowing an attacker to exploit a stack-based buffer overflow condition.

Apr 4, 2019
9.8
CVE-2010-5305CRITICAL

The potential exists for exposure of the product's password used to restrict unauthorized access to Rockwell PLC5/SLC5/0x/RSLogix 1785-Lx and 1747-L5x controllers. The potential exists for an unauthorized programming and configuration client to gain access to the product and allow changes to the product’s configuration or program. When applicable, upgrade product firmware to a version that includes enhanced security functionality compatible with Rockwell Automation's FactoryTalk Security services.

Mar 26, 2019
9.8
CVE-2014-9189CRITICAL

Multiple stack-based buffer overflow vulnerabilities were found in Honeywell Experion PKS all versions prior to R400.6, all versions prior to R410.6, and all versions prior to R430.2 modules that could lead to possible remote code execution, dynamic memory corruption, or denial of service. Honeywell strongly encourages and recommends all customers running unsupported versions of EKPS prior to R400 to upgrade to a supported version.

Mar 25, 2019
9.8
CVE-2014-9187CRITICAL

Multiple heap-based buffer overflow vulnerabilities exist in Honeywell Experion PKS all versions prior to R400.6, all versions prior to R410.6, and all versions prior to R430.2 modules, which could lead to possible remote code execution or denial of service. Honeywell strongly encourages and recommends all customers running unsupported versions of EKPS prior to R400 to upgrade to a supported version.

Mar 25, 2019
9.8
CVE-2019-6563CRITICAL

Moxa IKS and EDS generate a predictable cookie calculated with an MD5 hash, allowing an attacker to capture the administrator's password, which could lead to a full compromise of the device.

Mar 5, 2019
9.8
CVE-2019-6557CRITICAL

Several buffer overflow vulnerabilities have been identified in Moxa IKS and EDS, which may allow remote code execution.

Mar 5, 2019
9.8
CVE-2019-6524CRITICAL

Moxa IKS and EDS do not implement sufficient measures to prevent multiple failed authentication attempts, which may allow an attacker to discover passwords via brute force attack.

Mar 5, 2019
9.8
CVE-2019-9201CRITICAL

Multiple Phoenix Contact devices allow remote attackers to establish TCP sessions to port 1962 and obtain sensitive information or make changes, as demonstrated by using the Create Backup feature to traverse all directories.

Feb 26, 2019
9.8
CVE-2019-5909CRITICAL

License Manager Service of YOKOGAWA products (CENTUM VP (R5.01.00 - R6.06.00), CENTUM VP Entry Class (R5.01.00 - R6.06.00), ProSafe-RS (R3.01.00 - R4.04.00), PRM (R4.01.00 - R4.02.00), B/M9000 VP(R7.01.01 - R8.02.03)) allows remote attackers to bypass access restriction to send malicious files to the PC where License Manager Service runs via unspecified vectors.

Feb 13, 2019
9.8
CVE-2018-13792CRITICAL

Multiple SQL injection vulnerabilities in the monitoring feature in the HTTP API in ABBYY FlexiCapture before 12 Release 2 allow an attacker to execute arbitrary SQL commands via the mask, sortOrder, filter, or Order parameter.

Feb 10, 2019
9.8
CVE-2018-10612CRITICAL

In 3S-Smart Software Solutions GmbH CODESYS Control V3 products prior to version 3.5.14.0, user access management and communication encryption is not enabled by default, which could allow an attacker access to the device and sensitive information, including user credentials.

Jan 29, 2019
9.8
CVE-2018-0651CRITICAL

Buffer overflow in the license management function of YOKOGAWA products (iDefine for ProSafe-RS R1.16.3 and earlier, STARDOM VDS R7.50 and earlier, STARDOM FCN/FCJ Simulator R4.20 and earlier, ASTPLANNER R15.01 and earlier, TriFellows V5.04 and earlier) allows remote attackers to stop the license management function or execute an arbitrary program via unspecified vectors.

Jan 9, 2019
9.8
CVE-2018-18995CRITICAL

Pluto Safety PLC Gateway Ethernet devices ABB GATE-E1 and GATE-E2 all versions do not allow authentication to be configured on administrative telnet or web interfaces, which could enable various effects vectors, including conducting device resets, reading or modifying registers, and changing configuration settings such as IP addresses.

Jan 3, 2019
9.8
CVE-2018-14816CRITICAL

Advantech WebAccess 8.3.1 and earlier has several stack-based buffer overflow vulnerabilities that have been identified, which may allow an attacker to execute arbitrary code.

Oct 23, 2018
9.8
CVE-2018-14806CRITICAL

Advantech WebAccess 8.3.1 and earlier has a path traversal vulnerability which may allow an attacker to execute arbitrary code.

Oct 23, 2018
9.8
CVE-2018-18396CRITICAL

Remote Code Execution in Moxa ThingsPro IIoT Gateway and Device Management Software Solutions version 2.1.

Oct 19, 2018
9.8
CVE-2018-18395CRITICAL

Hidden Token Access in Moxa ThingsPro IIoT Gateway and Device Management Software Solutions version 2.1.

Oct 19, 2018
9.8
CVE-2018-18394CRITICAL

Sensitive Information Stored in Clear Text in Moxa ThingsPro IIoT Gateway and Device Management Software Solutions version 2.1.

Oct 19, 2018
9.8
CVE-2018-18393CRITICAL

Password Management Issue in Moxa ThingsPro IIoT Gateway and Device Management Software Solutions version 2.1.

Oct 19, 2018
9.8
CVE-2018-17900CRITICAL

Yokogawa STARDOM Controllers FCJ, FCN-100, FCN-RTU, FCN-500, All versions R4.10 and prior, The web application improperly protects credentials which could allow an attacker to obtain credentials for remote access to controllers.

Oct 12, 2018
9.8
CVE-2018-14829CRITICAL

Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. This vulnerability may allow a remote threat actor to intentionally send a malformed CIP packet to Port 44818, causing the software application to stop responding and crash. This vulnerability also has the potential to exploit a buffer overflow condition, which may allow the threat actor to remotely execute arbitrary code.

Sep 20, 2018
9.8
CVE-2018-7791CRITICAL

A Permissions, Privileges, and Access Control vulnerability exists in Schneider Electric's Modicon M221 product (all references, all versions prior to firmware V1.6.2.0). The vulnerability allows unauthorized users to overwrite the original password with their password. If an attacker exploits this vulnerability and overwrite the password, the attacker can upload the original program from the PLC.

Aug 29, 2018
9.8
CVE-2018-7790CRITICAL

An Information Management Error vulnerability exists in Schneider Electric's Modicon M221 product (all references, all versions prior to firmware V1.6.2.0). The vulnerability allows unauthorized users to replay authentication sequences. If an attacker exploits this vulnerability and connects to a Modicon M221, the attacker can upload the original program from the PLC.

Aug 29, 2018
9.8
CVE-2018-14805CRITICAL

ABB eSOMS version 6.0.2 may allow unauthorized access to the system when LDAP is set to allow anonymous authentication, and specific key values within the eSOMS web.config file are present. Both conditions are required to exploit this vulnerability.

Aug 29, 2018
9.8
CVE-2018-10592CRITICAL

Yokogawa STARDOM FCJ controllers R4.02 and prior, FCN-100 controllers R4.02 and prior, FCN-RTU controllers R4.02 and prior, and FCN-500 controllers R4.02 and prior utilize hard-coded credentials that could allow an attacker to gain unauthorized administrative access to the device, which could result in remote code execution.

Jul 31, 2018
9.8
CVE-2018-13791CRITICAL

The HTTP API in ABBYY FlexiCapture before 12 Release 1 Update 7 allows an attacker to conduct Access Control attacks via the /FlexiCapture12/Login/Server/SevaUserProfile FlexiCaptureTmsSts2 parameter.

Jul 9, 2018
9.8
CVE-2018-7785CRITICAL

In Schneider Electric U.motion Builder software versions prior to v1.3.4, a remote command injection allows authentication bypass.

Jul 3, 2018
9.8
CVE-2018-7784CRITICAL

In Schneider Electric U.motion Builder software versions prior to v1.3.4, this exploit occurs when the submitted data of an input string is evaluated as a command by the application. In this way, the attacker could execute code, read the stack, or cause a segmentation fault in the running application.

Jul 3, 2018
9.8
CVE-2018-7780CRITICAL

In Schneider Electric Pelco Sarix Professional 1st generation cameras with firmware versions prior to 3.29.69, a buffer overflow vulnerability exist in cgi program "set".

Jul 3, 2018
9.8
CVE-2018-7778CRITICAL

In Schneider Electric Evlink Charging Station versions prior to v3.2.0-12_v1, the Web Interface has an issue that may allow a remote attacker to gain administrative privileges without properly authenticating remote users.

Jul 3, 2018
9.8
CVE-2018-10594CRITICAL

Delta Industrial Automation COMMGR from Delta Electronics versions 1.08 and prior with accompanying PLC Simulators (DVPSimulator EH2, EH3, ES2, SE, SS2 and AHSIM_5x0, AHSIM_5x1) utilize a fixed-length stack buffer where an unverified length value can be read from the network packets via a specific network port, causing the buffer to be overwritten. This may allow remote code execution, cause the application to crash, or result in a denial-of-service condition in the application server.

Jun 26, 2018
9.8
CVE-2018-4846CRITICAL

A vulnerability has been identified in RAPIDLab 1200 systems / RAPIDPoint 400 systems / RAPIDPoint 500 systems (All versions_without_ use of Siemens Healthineers Informatics products), RAPIDLab 1200 Series (All versions < V3.3 _with_ Siemens Healthineers Informatics products), RAPIDPoint 500 systems (All versions >= V3.0 _with_ Siemens Healthineers Informatics products), RAPIDPoint 500 systems (V2.4.X_with_ Siemens Healthineers Informatics products), RAPIDPoint 500 systems (All versions =< V2.3 _with_ Siemens Healthineers Informatics products), RAPIDPoint 400 systems (All versions _with_ Siemens Healthineers Informatics products). A factory account with hardcoded password might allow attackers access to the device over port 5900/tcp. Successful exploitation requires no user interaction or privileges and impacts the confidentiality, integrity, and availability of the affected device. At the time of advisory publication, no public exploitation of this security vulnerability is known. Siemens Healthineers confirms the security vulnerability and provides mitigations to resolve the security issue.

Jun 26, 2018
9.8
CVE-2018-10623CRITICAL

Delta Electronics Delta Industrial Automation DOPSoft version 4.00.04 and prior performs read operations on a memory buffer where the position can be determined by a value read from a .dpa file. This may cause improper restriction of operations within the bounds of the memory buffer, allow remote code execution, alter the intended control flow, allow reading of sensitive information, or cause the application to crash.

Jun 18, 2018
9.8
CVE-2018-10621CRITICAL

Delta Electronics Delta Industrial Automation DOPSoft version 4.00.04 and prior utilizes a fixed-length stack buffer where a value larger than the buffer can be read from a .dpa file into the buffer, causing the buffer to be overwritten. This may allow remote code execution or cause the application to crash.

Jun 18, 2018
9.8
CVE-2018-10617CRITICAL

Delta Electronics Delta Industrial Automation DOPSoft version 4.00.04 and prior utilizes a fixed-length heap buffer where a value larger than the buffer can be read from a .dpa file into the buffer, causing the buffer to be overwritten. This may allow remote code execution or cause the application to crash.

Jun 18, 2018
9.8
CVE-2017-7933CRITICAL

In ABB IP GATEWAY 3.39 and prior, some configuration files contain passwords stored in plain-text, which may allow an attacker to gain unauthorized access.

Jun 6, 2018
9.8
CVE-2017-7931CRITICAL

In ABB IP GATEWAY 3.39 and prior, by accessing a specific uniform resource locator (URL) on the web server, a malicious user is able to access the configuration files and application pages without authentication.

Jun 6, 2018
9.8
CVE-2018-8871CRITICAL

In Delta Electronics Automation TPEditor version 1.89 or prior, parsing a malformed program file may cause heap-based buffer overflow vulnerability, which may allow remote code execution.

May 25, 2018
9.8
CVE-2017-9664CRITICAL

In ABB SREA-01 revisions A, B, C: application versions up to 3.31.5, and SREA-50 revision A: application versions up to 3.32.8, an attacker may access internal files of ABB SREA-01 and SREA-50 legacy remote monitoring tools without any authorization over the network using a HTTP request which refers to files using ../../ relative paths. Once the internal password file is retrieved, the password hash can be identified using a brute force attack. There is also an exploit allowing running of commands after authorization.

May 24, 2018
9.8
CVE-2018-8845CRITICAL

In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, a heap-based buffer overflow vulnerability has been identified, which may allow an attacker to execute arbitrary code.

May 15, 2018
9.8
CVE-2018-7505CRITICAL

In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, a TFTP application has unrestricted file uploads to the web application without authorization, which may allow an attacker to execute arbitrary code.

May 15, 2018
9.8
CVE-2018-7499CRITICAL

In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, several stack-based buffer overflow vulnerabilities have been identified, which may allow an attacker to execute arbitrary code.

May 15, 2018
9.8
CVE-2018-7497CRITICAL

In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, several untrusted pointer dereference vulnerabilities have been identified, which may allow an attacker to execute arbitrary code.

May 15, 2018
9.8
CVE-2018-10589CRITICAL

In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, a path transversal vulnerability has been identified, which may allow an attacker to execute arbitrary code.

May 15, 2018
9.8
CVE-2018-7761CRITICAL

A vulnerability exists in the HTTP request parser in Schneider Electric's Modicon M340, Modicon Premium, Modicon Quantum PLC, BMXNOR0200 which could allow arbitrary code execution.

Apr 18, 2018
9.8
CVE-2018-7760CRITICAL

An authorization bypass vulnerability exists in Schneider Electric's Modicon M340, Modicon Premium, Modicon Quantum PLC, BMXNOR0200. Requests to CGI functions allow malicious users to bypass authorization.

Apr 18, 2018
9.8
CVE-2018-7246CRITICAL

A cleartext transmission of sensitive information vulnerability exists in Schneider Electric's 66074 MGE Network Management Card Transverse installed in MGE UPS and MGE STS. he integrated web server (Port 80/443/TCP) of the affected devices could allow remote attackers to discover an administrative account. If default on device, it is not using a SSL in settings and if multiple request of the page "Access Control" (IP-address device/ups/pas_cont.htm) account data will be sent in cleartext

Apr 18, 2018
9.8
CVE-2018-7243CRITICAL

An authorization bypass vulnerability exists In Schneider Electric's 66074 MGE Network Management Card Transverse installed in MGE UPS and MGE STS. The integrated web server (Port 80/443/TCP) of the affected devices could allow a remote attacker to get a full access to device, bypassing the authorization system.

Apr 18, 2018
9.8
CVE-2018-7242CRITICAL

Vulnerable hash algorithms exists in Schneider Electric's Modicon Premium, Modicon Quantum, Modicon M340, and BMXNOR0200 controllers in all versions of the communication modules. The algorithm used to encrypt the password is vulnerable to hash collision attacks.

Apr 18, 2018
9.8
CVE-2018-7241CRITICAL

Hard coded accounts exist in Schneider Electric's Modicon Premium, Modicon Quantum, Modicon M340, and BMXNOR0200 controllers in all versions of the communication modules.

Apr 18, 2018
9.8
CVE-2016-8717CRITICAL

An exploitable Use of Hard-coded Credentials vulnerability exists in the Moxa AWK-3131A Wireless Access Point running firmware 1.1. The device operating system contains an undocumented, privileged (root) account with hard-coded credentials, giving attackers full control of affected devices.

Apr 2, 2018
9.8
CVE-2018-4841CRITICAL

A vulnerability has been identified in TIM 1531 IRC (All versions < V1.1). A remote attacker with network access to port 80/tcp or port 443/tcp could perform administrative operations on the device without prior authentication. Successful exploitation could allow to cause a denial-of-service, or read and manipulate data as well as configuration settings of the affected device. At the stage of publishing this security advisory no public exploitation is known. Siemens provides mitigations to resolve it.

Mar 29, 2018
9.8
CVE-2018-7238CRITICAL

A buffer overflow vulnerability exist in the web-based GUI of Schneider Electric's Pelco Sarix Professional in all firmware versions prior to 3.29.67 which could allow an unauthenticated, remote attacker to execute arbitrary code.

Mar 9, 2018
9.8
CVE-2018-7233CRITICAL

A vulnerability exists in Schneider Electric's Pelco Sarix Professional in all firmware versions prior to 3.29.67 which could allow execution of commands due to lack of validation of the shell meta characters with the value of 'model_name' or 'mac_address'.

Mar 9, 2018
9.8
CVE-2018-7232CRITICAL

A vulnerability exists in Schneider Electric's Pelco Sarix Professional in all firmware versions prior to 3.29.67 which could allow execution of commands due to lack of validation of the shell meta characters with the value of 'network.ieee8021x.delete_certs'.

Mar 9, 2018
9.8
CVE-2018-7231CRITICAL

A vulnerability exists in Schneider Electric's Pelco Sarix Professional in all firmware versions prior to 3.29.67 which could allow execution of commands due to lack of validation of the shell meta characters with the value of 'system.opkg.remove'.

Mar 9, 2018
9.8
CVE-2018-7229CRITICAL

A vulnerability exists in Schneider Electric's Pelco Sarix Professional in all firmware versions prior to 3.29.67 which could allow an unauthenticated, remote attacker to bypass authentication and gain administrator privileges because the use of hardcoded credentials.

Mar 9, 2018
9.8
CVE-2018-7228CRITICAL

A vulnerability exists in Schneider Electric's Pelco Sarix Professional in all firmware versions prior to 3.29.67 which could allow an unauthenticated, remote attacker to bypass authentication and get the administrator privileges.

Mar 9, 2018
9.8
CVE-2018-5455CRITICAL

A Reliance on Cookies without Validation and Integrity Checking issue was discovered in Moxa OnCell G3100-HSPA Series version 1.4 Build 16062919 and prior. The application allows a cookie parameter to consist of only digits, allowing an attacker to perform a brute force attack bypassing authentication and gaining access to device functions.

Mar 5, 2018
9.8
CVE-2018-5440CRITICAL

A Stack-based Buffer Overflow issue was discovered in 3S-Smart CODESYS Web Server. Specifically: all Microsoft Windows (also WinCE) based CODESYS web servers running stand-alone Version 2.3, or as part of the CODESYS runtime system running prior to Version V1.1.9.19. A crafted request may cause a buffer overflow and could therefore execute arbitrary code on the web server or lead to a denial-of-service condition due to a crash in the web server.

Feb 15, 2018
9.8
CVE-2018-5459CRITICAL

An Improper Authentication issue was discovered in WAGO PFC200 Series 3S CoDeSys Runtime versions 2.3.X and 2.4.X. An attacker can execute different unauthenticated remote operations because of the CoDeSys Runtime application, which is available via network by default on Port 2455. An attacker could execute some unauthenticated commands such as reading, writing, or deleting arbitrary files, or manipulate the PLC application during runtime by sending specially-crafted TCP packets to Port 2455.

Feb 13, 2018
9.8
CVE-2018-6911CRITICAL

The VBWinExec function in Node\AspVBObj.dll in Advantech WebAccess 8.3.0 allows remote attackers to execute arbitrary OS commands via a single argument (aka the command parameter).

Feb 13, 2018
9.8
CVE-2018-6624CRITICAL

OMRON NS devices 1.1 through 1.3 allow remote attackers to bypass authentication via a direct request to the .html file for a specific screen, as demonstrated by monitor.html.

Feb 5, 2018
9.8
CVE-2017-12729CRITICAL

A SQL Injection issue was discovered in Moxa SoftCMS Live Viewer through 1.6. An improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability has been identified. Attackers can exploit this vulnerability to access SoftCMS without knowing the user's password.

Jan 18, 2018
9.8
CVE-2017-16743CRITICAL

An Improper Authorization issue was discovered in PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, and 48xxx Series products running firmware Version 1.0 to 1.32. A remote unauthenticated attacker may be able to craft special HTTP requests allowing an attacker to bypass web-service authentication allowing the attacker to obtain administrative privileges on the device.

Jan 12, 2018
9.8
CVE-2017-16724CRITICAL

A Stack-based Buffer Overflow issue was discovered in Advantech WebAccess versions prior to 8.3. There are multiple instances of a vulnerability that allows too much data to be written to a location on the stack.

Jan 5, 2018
9.8
CVE-2017-9944CRITICAL

A vulnerability has been identified in Siemens 7KT PAC1200 data manager (7KT1260) in all versions < V2.03. The integrated web server (port 80/tcp) of the affected devices could allow an unauthenticated remote attacker to perform administrative operations over the network.

Dec 27, 2017
9.8
CVE-2017-13701CRITICAL

An issue was discovered on MOXA EDS-G512E 5.1 build 16072215 devices. The backup file contains sensitive information in a insecure way. There is no salt for password hashing. Indeed passwords are stored without being ciphered with a timestamped ciphering method.

Nov 23, 2017
9.8
CVE-2017-12739CRITICAL

An issue was discovered on Siemens SICAM RTUs SM-2556 COM Modules with the firmware variants ENOS00, ERAC00, ETA2, ETLS00, MODi00, and DNPi00. The integrated web server (port 80/tcp) of the affected devices could allow unauthenticated remote attackers to execute arbitrary code on the affected device.

Nov 15, 2017
9.8
CVE-2017-14024CRITICAL

A Stack-based Buffer Overflow issue was discovered in Schneider Electric InduSoft Web Studio v8.0 SP2 Patch 1 and prior versions, and InTouch Machine Edition v8.0 SP2 Patch 1 and prior versions. The stack-based buffer overflow vulnerability has been identified, which may allow remote code execution with high privileges.

Nov 13, 2017
9.8
CVE-2017-13997CRITICAL

A Missing Authentication for Critical Function issue was discovered in Schneider Electric InduSoft Web Studio v8.0 SP2 or prior, and InTouch Machine Edition v8.0 SP2 or prior. InduSoft Web Studio provides the capability for an HMI client to trigger script execution on the server for the purposes of performing customized calculations or actions. A remote malicious entity could bypass the server authentication and trigger the execution of an arbitrary command. The command is executed under high privileges and could lead to a complete compromise of the server.

Oct 3, 2017
9.8
CVE-2017-9957CRITICAL

A vulnerability exists in Schneider Electric's U.motion Builder software versions 1.2.1 and prior in which the web service contains a hidden system account with a hardcoded password. An attacker can use this information to log into the system with high-privilege credentials.

Sep 26, 2017
9.8
CVE-2017-7974CRITICAL

A path traversal information disclosure vulnerability exists in Schneider Electric's U.motion Builder software versions 1.2.1 and prior in which an unauthenticated user can execute arbitrary code and exfiltrate files.

Sep 26, 2017
9.8
CVE-2017-7973CRITICAL

A SQL injection vulnerability exists in Schneider Electric's U.motion Builder software versions 1.2.1 and prior in which an unauthenticated user can use calls to various paths allowing performance of arbitrary SQL commands against the underlying database.

Sep 26, 2017
9.8
CVE-2017-12708CRITICAL

An Improper Restriction Of Operations Within The Bounds Of A Memory Buffer issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. Researchers have identified multiple vulnerabilities that allow invalid locations to be referenced for the memory buffer, which may allow an attacker to execute arbitrary code or cause the system to crash.

Aug 30, 2017
9.8
CVE-2017-12706CRITICAL

A stack-based buffer overflow issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. Researchers have identified multiple vulnerabilities where there is a lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer, which could allow an attacker to execute arbitrary code under the context of the process.

Aug 30, 2017
9.8
CVE-2017-12698CRITICAL

An Improper Authentication issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. Specially crafted requests allow a possible authentication bypass that could allow remote code execution.

Aug 30, 2017
9.8
CVE-2015-6473CRITICAL

WAGO IO 750-849 01.01.27 and WAGO IO 750-881 01.02.05 do not contain privilege separation.

Aug 22, 2017
9.8
CVE-2015-6472CRITICAL

WAGO IO 750-849 01.01.27 and 01.02.05, WAGO IO 750-881, and WAGO IO 758-870 have weak credential management.

Aug 22, 2017
9.8
CVE-2017-9939CRITICAL

A vulnerability was discovered in Siemens SiPass integrated (All versions before V2.70) that could allow an attacker with network access to the SiPass integrated server to bypass the authentication mechanism and perform administrative operations.

Aug 8, 2017
9.8
CVE-2017-6869CRITICAL

A vulnerability was discovered in Siemens ViewPort for Web Office Portal before revision number 1453 that could allow an unauthenticated remote user to upload arbitrary code and execute it with the permissions of the operating-system user running the web server by sending specially crafted network packets to port 443/TCP or port 80/TCP.

Aug 8, 2017
9.8
CVE-2017-9629CRITICAL

A Stack-Based Buffer Overflow issue was discovered in Schneider Electric Wonderware ArchestrA Logger, versions 2017.426.2307.1 and prior. The stack-based buffer overflow vulnerability has been identified, which may allow a remote attacker to execute arbitrary code in the context of a highly privileged account.

Jul 7, 2017
9.8
CVE-2017-7903CRITICAL

A Weak Password Requirements issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 programmable-logic controllers 1763-L16AWA, Series A and B, Version 16.00 and prior versions; 1763-L16BBB, Series A and B, Version 16.00 and prior versions; 1763-L16BWA, Series A and B, Version 16.00 and prior versions; and 1763-L16DWD, Series A and B, Version 16.00 and prior versions and Allen-Bradley MicroLogix 1400 programmable logic controllers 1766-L32AWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWAA, Series A and B, Version 16.00 and prior versions; 1766-L32BXB, Series A and B, Version 16.00 and prior versions; 1766-L32BXBA, Series A and B, Version 16.00 and prior versions; and 1766-L32AWAA, Series A and B, Version 16.00 and prior versions. The affected products use a numeric password with a small maximum character size for the password.

Jun 30, 2017
9.8
CVE-2017-7902CRITICAL

A "Reusing a Nonce, Key Pair in Encryption" issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 programmable-logic controllers 1763-L16AWA, Series A and B, Version 16.00 and prior versions; 1763-L16BBB, Series A and B, Version 16.00 and prior versions; 1763-L16BWA, Series A and B, Version 16.00 and prior versions; and 1763-L16DWD, Series A and B, Version 16.00 and prior versions and Allen-Bradley MicroLogix 1400 programmable logic controllers 1766-L32AWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWAA, Series A and B, Version 16.00 and prior versions; 1766-L32BXB, Series A and B, Version 16.00 and prior versions; 1766-L32BXBA, Series A and B, Version 16.00 and prior versions; and 1766-L32AWAA, Series A and B, Version 16.00 and prior versions. The affected product reuses nonces, which may allow an attacker to capture and replay a valid request until the nonce is changed.

Jun 30, 2017
9.8
CVE-2017-7899CRITICAL

An Information Exposure issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 programmable-logic controllers 1763-L16AWA, Series A and B, Version 16.00 and prior versions; 1763-L16BBB, Series A and B, Version 16.00 and prior versions; 1763-L16BWA, Series A and B, Version 16.00 and prior versions; and 1763-L16DWD, Series A and B, Version 16.00 and prior versions and Allen-Bradley MicroLogix 1400 programmable logic controllers 1766-L32AWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWAA, Series A and B, Version 16.00 and prior versions; 1766-L32BXB, Series A and B, Version 16.00 and prior versions; 1766-L32BXBA, Series A and B, Version 16.00 and prior versions; and 1766-L32AWAA, Series A and B, Version 16.00 and prior versions. User credentials are sent to the web server using the HTTP GET method, which may result in the credentials being logged. This could make user credentials available for unauthorized retrieval.

Jun 30, 2017
9.8
CVE-2017-7898CRITICAL

An Improper Restriction of Excessive Authentication Attempts issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 programmable-logic controllers 1763-L16AWA, Series A and B, Version 16.00 and prior versions; 1763-L16BBB, Series A and B, Version 16.00 and prior versions; 1763-L16BWA, Series A and B, Version 16.00 and prior versions; and 1763-L16DWD, Series A and B, Version 16.00 and prior versions and Allen-Bradley MicroLogix 1400 programmable logic controllers 1766-L32AWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWAA, Series A and B, Version 16.00 and prior versions; 1766-L32BXB, Series A and B, Version 16.00 and prior versions; 1766-L32BXBA, Series A and B, Version 16.00 and prior versions; and 1766-L32AWAA, Series A and B, Version 16.00 and prior versions. There are no penalties for repeatedly entering incorrect passwords.

Jun 30, 2017
9.8
CVE-2017-6034CRITICAL

An Authentication Bypass by Capture-Replay issue was discovered in Schneider Electric Modicon Modbus Protocol. Sensitive information is transmitted in cleartext in the Modicon Modbus protocol, which may allow an attacker to replay the following commands: run, stop, upload, and download.

Jun 30, 2017
9.8
CVE-2017-6028CRITICAL

An Insufficiently Protected Credentials issue was discovered in Schneider Electric Modicon PLCs Modicon M241, all firmware versions, and Modicon M251, all firmware versions. Log-in credentials are sent over the network with Base64 encoding leaving them susceptible to sniffing. Sniffed credentials could then be used to log into the web application.

Jun 30, 2017
9.8
CVE-2017-7915CRITICAL

An Improper Restriction of Excessive Authentication Attempts issue was discovered in Moxa OnCell G3110-HSPA Version 1.3 build 15082117 and previous versions, OnCell G3110-HSDPA Version 1.2 Build 09123015 and previous versions, OnCell G3150-HSDPA Version 1.4 Build 11051315 and previous versions, OnCell 5104-HSDPA, OnCell 5104-HSPA, and OnCell 5004-HSPA. An attacker can freely use brute force to determine parameters needed to bypass authentication.

May 29, 2017
9.8
CVE-2017-7913CRITICAL

A Plaintext Storage of a Password issue was discovered in Moxa OnCell G3110-HSPA Version 1.3 build 15082117 and previous versions, OnCell G3110-HSDPA Version 1.2 Build 09123015 and previous versions, OnCell G3150-HSDPA Version 1.4 Build 11051315 and previous versions, OnCell 5104-HSDPA, OnCell 5104-HSPA, and OnCell 5004-HSPA. The application's configuration file contains parameters that represent passwords in plaintext.

May 29, 2017
9.8
CVE-2017-6027CRITICAL

An Arbitrary File Upload issue was discovered in 3S-Smart Software Solutions GmbH CODESYS Web Server. The following versions of CODESYS Web Server, part of the CODESYS WebVisu web browser visualization software, are affected: CODESYS Web Server Versions 2.3 and prior. A specially crafted web server request may allow the upload of arbitrary files (with a dangerous type) to the CODESYS Web Server without authorization which may allow remote code execution.

May 19, 2017
9.8
CVE-2017-6025CRITICAL

A Stack Buffer Overflow issue was discovered in 3S-Smart Software Solutions GmbH CODESYS Web Server. The following versions of CODESYS Web Server, part of the CODESYS WebVisu web browser visualization software, are affected: CODESYS Web Server Versions 2.3 and prior. A malicious user could overflow the stack buffer by providing overly long strings to functions that handle the XML. Because the function does not verify string size before copying to memory, the attacker may then be able to crash the application or run arbitrary code.

May 19, 2017
9.8
CVE-2017-7909CRITICAL

A Use of Client-Side Authentication issue was discovered in Advantech B+B SmartWorx MESR901 firmware versions 1.5.2 and prior. The web interface uses JavaScript to check client authentication and redirect unauthorized users. Attackers may intercept requests and bypass authentication to access restricted web pages.

May 6, 2017
9.8
CVE-2017-5158CRITICAL

An Information Exposure issue was discovered in Schneider Electric Wonderware InTouch Access Anywhere, version 11.5.2 and prior. Credentials may be exposed to external systems via specific URL parameters, as arbitrary destination addresses may be specified.

Apr 20, 2017
9.8
CVE-2017-7689CRITICAL

A Command Injection vulnerability in Schneider Electric homeLYnk Controller exists in all versions before 1.5.0.

Apr 11, 2017
9.8
CVE-2017-7575CRITICAL

Schneider Electric Modicon TM221CE16R 1.3.3.3 devices allow remote attackers to discover the application-protection password via a \x00\x01\x00\x00\x00\x05\x01\x5a\x00\x03\x00 request to the Modbus port (502/tcp). Subsequently the application may be arbitrarily downloaded, modified, and uploaded.

Apr 6, 2017
9.8
CVE-2017-7574CRITICAL

Schneider Electric SoMachine Basic 1.4 SP1 and Schneider Electric Modicon TM221CE16R 1.3.3.3 devices have a hardcoded-key vulnerability. The Project Protection feature is used to prevent unauthorized users from opening an XML protected project file, by prompting the user for a password. This XML file is AES-CBC encrypted; however, the key used for encryption (SoMachineBasicSoMachineBasicSoMa) cannot be changed. After decrypting the XML file with this key, the user password can be found in the decrypted data. After reading the user password, the project can be opened and modified with the Schneider product.

Apr 6, 2017
9.8
CVE-2017-5178CRITICAL

An issue was discovered in Schneider Electric Tableau Server/Desktop Versions 7.0 to 10.1.3 in Wonderware Intelligence Versions 2014R3 and prior. These versions contain a system account that is installed by default. The default system account is difficult to configure with non-default credentials after installation, and changing the default credentials in the embedded Tableau Server is not documented. If Tableau Server is used with Windows integrated security (Active Directory), the software is not vulnerable. However, when Tableau Server is used with local authentication mode, the software is vulnerable. The default system account could be used to gain unauthorized access.

Mar 8, 2017
9.8
CVE-2017-5159CRITICAL

An issue was discovered on Phoenix Contact mGuard devices that have been updated to Version 8.4.0. When updating an mGuard device to Version 8.4.0 via the update-upload facility, the update will succeed, but it will reset the password of the admin user to its default value.

Feb 13, 2017
9.8
CVE-2017-5154CRITICAL

An issue was discovered in Advantech WebAccess Version 8.1. To be able to exploit the SQL injection vulnerability, an attacker must supply malformed input to the WebAccess software. Successful attack could result in administrative access to the application and its data files.

Feb 13, 2017
9.8
CVE-2017-5140CRITICAL

An issue was discovered in Honeywell XL Web II controller XL1000C500 XLWebExe-2-01-00 and prior, and XLWeb 500 XLWebExe-1-02-08 and prior. Password is stored in clear text.

Feb 13, 2017
9.8
CVE-2017-5139CRITICAL

An issue was discovered in Honeywell XL Web II controller XL1000C500 XLWebExe-2-01-00 and prior, and XLWeb 500 XLWebExe-1-02-08 and prior. Any user is able to disclose a password by accessing a specific URL, because of Plaintext Storage of a Password.

Feb 13, 2017
9.8
CVE-2016-9369CRITICAL

An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Firmware can be updated over the network without authentication, which may allow remote code execution.

Feb 13, 2017
9.8
CVE-2016-9366CRITICAL

An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. An attacker can freely use brute force to determine parameters needed to bypass authentication.

Feb 13, 2017
9.8
CVE-2016-9361CRITICAL

An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Administration passwords can be retried without authenticating.

Feb 13, 2017
9.8
CVE-2016-9333CRITICAL

An issue was discovered in Moxa SoftCMS versions prior to Version 1.6. The SoftCMS Application does not properly sanitize input that may allow a remote attacker access to SoftCMS with administrator's privilege through specially crafted input (SQL INJECTION).

Feb 13, 2017
9.8
CVE-2016-8567CRITICAL

An issue was discovered in Siemens SICAM PAS before 8.00. A factory account with hard-coded passwords is present in the SICAM PAS installations. Attackers might gain privileged access to the database over Port 2638/TCP.

Feb 13, 2017
9.8
CVE-2016-5818CRITICAL

An issue was discovered in Schneider Electric PowerLogic PM8ECC device 2.651 and older. Undocumented hard-coded credentials allow access to the device.

Feb 13, 2017
9.8
CVE-2016-5815CRITICAL

An issue was discovered on Schneider Electric IONXXXX series power meters ION73XX series, ION75XX series, ION76XX series, ION8650 series, ION8800 series, and PM5XXX series. No authentication is configured by default. An unauthorized user can access the device management portal and make configuration changes.

Feb 13, 2017
9.8
CVE-2016-9157CRITICAL

A vulnerability in Siemens SICAM PAS (all versions before V8.09) could allow a remote attacker to cause a Denial of Service condition and potentially lead to unauthenticated remote code execution by sending specially crafted packets to port 19234/TCP.

Dec 5, 2016
9.8
CVE-2016-9155CRITICAL

The following SIEMENS branded IP Camera Models CCMW3025, CVMW3025-IR, CFMW3025 prior to version 1.41_SP18_S1; CCPW3025, CCPW5025 prior to version 0.1.73_S1; CCMD3025-DN18 prior to version v1.394_S1; CCID1445-DN18, CCID1445-DN28, CCID1145-DN36, CFIS1425, CCIS1425, CFMS2025, CCMS2025, CVMS2025-IR, CFMW1025, CCMW1025 prior to version v2635_SP1 could allow an attacker with network access to the web server to obtain administrative credentials under certain circumstances.

Nov 22, 2016
9.8
CVE-2016-5799CRITICAL

Moxa OnCell G3100V2 devices before 2.8 and G3111, G3151, G3211, and G3251 devices before 1.7 do not properly restrict authentication attempts, which makes it easier for remote attackers to obtain access via a brute-force attack.

Aug 24, 2016
9.8
CVE-2016-5792CRITICAL

SQL injection vulnerability in Moxa SoftCMS before 1.5 allows remote attackers to execute arbitrary SQL commands via unspecified fields.

Aug 8, 2016
9.8
CVE-2016-4522CRITICAL

SQL injection vulnerability in Rockwell Automation FactoryTalk EnergyMetrix before 2.20.00 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.

Jul 28, 2016
9.8
CVE-2016-5743CRITICAL

Siemens SIMATIC WinCC before 7.3 Update 10 and 7.4 before Update 1, SIMATIC BATCH before 8.1 SP1 Update 9 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.1 Update 3 as distributed in SIMATIC PCS 7 through 8.1 SP1, SIMATIC OpenPCS 7 before 8.2 Update 1 as distributed in SIMATIC PCS 7 8.2, and SIMATIC WinCC Runtime Professional before 13 SP1 Update 9 allow remote attackers to execute arbitrary code via crafted packets.

Jul 22, 2016
9.8
CVE-2016-5804CRITICAL

Moxa MGate MB3180 before 1.8, MGate MB3280 before 2.7, MGate MB3480 before 2.6, MGate MB3170 before 2.5, and MGate MB3270 before 2.7 use weak encryption, which allows remote attackers to bypass authentication via a brute-force series of guesses for a parameter value.

Jul 15, 2016
9.8
CVE-2016-4520CRITICAL

Schneider Electric Pelco Digital Sentry Video Management System with firmware before 7.14 has hardcoded credentials, which allows remote attackers to obtain access, and consequently execute arbitrary code, via unspecified vectors.

Jul 15, 2016
9.8
CVE-2016-4503CRITICAL

Moxa Device Server Web Console 5232-N allows remote attackers to bypass authentication, and consequently modify settings and data, via vectors related to reading a cookie parameter containing a UserId value.

Jul 12, 2016
9.8
CVE-2016-2275CRITICAL

The web interface on Advantech/B+B SmartWorx VESP211-EU devices with firmware 1.7.2 and VESP211-232 devices with firmware 1.5.1 and 1.7.2 relies on the client to implement access control, which allows remote attackers to perform administrative actions via modified JavaScript code.

Feb 21, 2016
9.8
CVE-2016-0868CRITICAL

Stack-based buffer overflow on Rockwell Automation Allen-Bradley MicroLogix 1100 devices A through 15.000 and B before 15.002 allows remote attackers to execute arbitrary code via a crafted web request.

Jan 28, 2016
9.8
CVE-2016-0859CRITICAL

Integer overflow in the Kernel service in Advantech WebAccess before 8.1 allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted RPC request.

Jan 15, 2016
9.8
CVE-2016-0857CRITICAL

Multiple heap-based buffer overflows in Advantech WebAccess before 8.1 allow remote attackers to execute arbitrary code via unspecified vectors.

Jan 15, 2016
9.8
CVE-2016-0856CRITICAL

Multiple stack-based buffer overflows in Advantech WebAccess before 8.1 allow remote attackers to execute arbitrary code via unspecified vectors.

Jan 15, 2016
9.8
CVE-2016-0854CRITICAL

Unrestricted file upload vulnerability in the uploadImageCommon function in the UploadAjaxAction script in the WebAccess Dashboard Viewer in Advantech WebAccess before 8.1 allows remote attackers to write to files of arbitrary types via unspecified vectors.

Jan 15, 2016
9.8
CVE-2015-7938CRITICAL

Advantech EKI-132x devices with firmware before 2015-12-31 allow remote attackers to bypass authentication via unspecified vectors.

Jan 9, 2016
9.8
CVE-2012-6068CRITICAL

The Runtime Toolkit in CODESYS Runtime System 2.3.x and 2.4.x does not require authentication, which allows remote attackers to execute commands via the command-line interface in the TCP listener service or transfer files via requests to the TCP listener service.

Jan 21, 2013
9.8
CVE-2012-0931CRITICAL

Schneider Electric Modicon Quantum PLC does not perform authentication between the Unity software and PLC, which allows remote attackers to cause a denial of service or possibly execute arbitrary code via unspecified vectors.

Jan 28, 2012
9.8
CVE-2025-66606CRITICAL

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product does not properly encode URLs. An attacker could tamper with web pages or execute malicious scripts. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Feb 9, 2026
9.6
CVE-2025-10571CRITICAL

Authentication Bypass Using an Alternate Path or Channel vulnerability in ABB ABB Ability Edgenius.This issue affects ABB Ability Edgenius: 3.2.0.0, 3.2.1.1.

Nov 20, 2025
9.6
CVE-2024-6515CRITICAL

Web browser interface may manipulate application username/password in clear text or Base64 encoding providing a higher probability of unintended credentails exposure.  Affected products: ABB ASPECT - Enterprise v3.08.02; NEXUS Series v3.08.02; MATRIX Series v3.08.02

Dec 5, 2024
9.6
CVE-2024-4008CRITICAL

FDSK Leak in ABB, Busch-Jaeger, FTS Display (version 1.00) and BCU (version 1.3.0.33) allows attacker to take control via access to local KNX Bus-System

Jun 5, 2024
9.6
CVE-2023-3526CRITICAL

In PHOENIX CONTACTs TC ROUTER and TC CLOUD CLIENT in versions prior to 2.07.2 as well as CLOUD CLIENT 1101T-TX/TX prior to 2.06.10 an unauthenticated remote attacker could use a reflective XSS within the license viewer page of the devices in order to execute code in the context of the user's browser.

Aug 8, 2023
9.6
CVE-2023-2746CRITICAL

The Rockwell Automation Enhanced HIM software contains an API that the application uses that is not protected sufficiently and uses incorrect Cross-Origin Resource Sharing (CORS) settings and, as a result, is vulnerable to a Cross Site Request Forgery (CSRF) attack. To exploit this vulnerability, a malicious user would have to convince a user to click on an untrusted link through a social engineering attack or successfully perform a Cross Site Scripting Attack (XSS). Exploitation of a CSRF could potentially lead to sensitive information disclosure and full remote access to the affected products.

Jul 11, 2023
9.6
CVE-2022-4126CRITICAL

Use of Default Password vulnerability in ABB RCCMD on Windows, Linux, MacOS allows Try Common or Default Usernames and Passwords.This issue affects RCCMD: before 4.40 230207.

Mar 27, 2023
9.6
CVE-2025-2523CRITICAL

The Honeywell Experion PKS and OneWireless WDM contains an Integer Underflow vulnerability in the component Control Data Access (CDA). An attacker could potentially exploit this vulnerability, leading to a Communication Channel Manipulation, which could result in a failure during subtraction allowing remote code execution. Honeywell recommends updating to the most recent version of Honeywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1 and OneWireless: 322.5 and 331.1. The affected Experion PKS products are C300 PCNT02, C300 PCNT05, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E. The Experion PKS versions affected are from 520.1 through 520.2 TCU9 and from 530 through 530 TCU3. The OneWireless WDM affected versions are 322.1 through 322.4 and 330.1 through 330.3.

Jul 10, 2025
9.4
CVE-2024-48845CRITICAL

Weak Password Reset Rules vulnerabilities where found providing a potiential for the storage of weak passwords that could facilitate unauthorized admin/application access.  Affected products: ABB ASPECT - Enterprise v3.07.02; NEXUS Series v3.07.02; MATRIX Series v3.07.02

Dec 5, 2024
9.4
CVE-2024-9137CRITICAL

The affected product lacks an authentication check when sending commands to the server via the Moxa service. This vulnerability allows an attacker to execute specified commands, potentially leading to unauthorized downloads or uploads of configuration files and system compromise.

Oct 14, 2024
9.4
CVE-2023-1834CRITICAL

Rockwell Automation was made aware that Kinetix 5500 drives, manufactured between May 2022 and January 2023, and are running v7.13 may have the telnet and FTP ports open by default.  This could potentially allow attackers unauthorized access to the device through the open ports.

May 11, 2023
9.4
CVE-2021-27442CRITICAL

The Weintek cMT product line is vulnerable to a cross-site scripting vulnerability, which could allow an unauthenticated remote attacker to inject malicious JavaScript code.

May 16, 2022
9.4
CVE-2020-8479CRITICAL

For the Central Licensing Server component used in ABB products ABB Ability™ System 800xA and related system extensions versions 5.1, 6.0 and 6.1, Compact HMI versions 5.1 and 6.0, Control Builder Safe 1.0, 1.1 and 2.0, Symphony Plus -S+ Operations 3.0 to 3.2 Symphony Plus -S+ Engineering 1.1 to 2.2, Composer Harmony 5.1, 6.0 and 6.1, Melody Composer 5.3, 6.1/6.2 and SPE for Melody 1.0SPx (Composer 6.3), Harmony OPC Server (HAOPC) Standalone 6.0, 6.1 and 7.0, ABB Ability™ System 800xA/ Advant® OCS Control Builder A 1.3 and 1.4, Advant® OCS AC100 OPC Server 5.1, 6.0 and 6.1, Composer CTK 6.1 and 6.2, AdvaBuild 3.7 SP1 and SP2, OPCServer for MOD 300 (non-800xA) 1.4, OPC Data Link 2.1 and 2.2, Knowledge Manager 8.0, 9.0 and 9.1, Manufacturing Operations Management 1812 and 1909, ABB AbilityTM SCADAvantage versions 5.1 to 5.6.5. an XML External Entity Injection vulnerability exists that allows an attacker to read or call arbitrary files from the license server and/or from the network and also block the license handling.

Apr 29, 2020
9.4
CVE-2019-19108CRITICAL

An authentication weakness in the SNMP service in B&R Automation Runtime versions 2.96, 3.00, 3.01, 3.06 to 3.10, 4.00 to 4.63, 4.72 and above allows unauthenticated users to modify the configuration of B&R products via SNMP.

Apr 20, 2020
9.4
CVE-2020-8768CRITICAL

An issue was discovered on Phoenix Contact Emalytics Controller ILC 2050 BI before 1.2.3 and BI-L before 1.2.3 devices. There is an insecure mechanism for read and write access to the configuration of the device. The mechanism can be discovered by examining a link on the website of the device.

Feb 17, 2020
9.4
CVE-2023-4088CRITICAL

Incorrect Default Permissions vulnerability in Mitsubishi Electric Corporation multiple FA engineering software products allows a malicious local attacker to execute a malicious code, resulting in information disclosure, tampering with and deletion, or a denial-of-service (DoS) condition, if the product is installed in a folder other than the default installation folder.

Sep 20, 2023
9.3
CVE-2023-0104CRITICAL

The listed versions for Weintek EasyBuilder Pro are vulnerable to a ZipSlip attack caused by decompiling a malicious project file. This may allow an attacker to gain control of the user’s computer or gain access to sensitive data.  

Feb 22, 2023
9.3
CVE-2024-4009CRITICAL

Replay Attack in ABB, Busch-Jaeger, FTS Display (version 1.00) and BCU (version 1.3.0.33) allows attacker to capture/replay KNX telegram to local KNX Bus-System

Jun 5, 2024
9.2
CVE-2025-3755CRITICAL

Improper Validation of Specified Index, Position, or Offset in Input vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series CPU modules allows a remote unauthenticated attacker to read information in the product, to cause a Denial-of-Service (DoS) condition in MELSOFT connection, or to stop the operation of the CPU module (causing a DoS condtion on the CPU module), by sending specially crafted packets. The product is needed to reset for recovery.

May 29, 2025
9.1
CVE-2024-51554CRITICAL

Default Credentail vulnerabilities in ASPECT on Linux allows access to the product using publicly available default credentials.  Affected products: ABB ASPECT - Enterprise v3.08.02; NEXUS Series v3.08.02; MATRIX Series v3.08.02

Dec 5, 2024
9.1
CVE-2024-7960CRITICAL

The Rockwell Automation affected product contains a vulnerability that allows a threat actor to view sensitive information and change settings. The vulnerability exists due to having an incorrect privilege matrix that allows users to have access to functions they should not.

Sep 12, 2024
9.1
CVE-2023-5389CRITICAL

An attacker could potentially exploit this vulnerability, leading to the ability to modify files on Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC . This exploit could be used to write a file that may result in unexpected behavior based on configuration changes or updating of files that could result in subsequent execution of a malicious application if triggered. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning. 

Jan 30, 2024
9.1
CVE-2023-4562CRITICAL

Improper Authentication vulnerability in Mitsubishi Electric Corporation MELSEC-F Series main modules allows a remote unauthenticated attacker to obtain sequence programs from the product or write malicious sequence programs or improper data in the product without authentication by sending illegitimate messages.

Oct 13, 2023
9.1
CVE-2023-0811CRITICAL

Omron CJ1M unit v4.0 and prior has improper access controls on the memory region where the UM password is stored. If an adversary issues a PROGRAM AREA WRITE command to a specific memory region, they could overwrite the password. This may lead to disabling UM protections or setting a non-ASCII password (non-keyboard characters) and preventing an engineer from viewing or modifying the user program.

Mar 16, 2023
9.1
CVE-2022-3843CRITICAL

In WAGO Unmanaged Switch (852-111/000-001) in firmware version 01 an undocumented configuration interface without authorization allows an remote attacker to read system information and configure a limited set of parameters.

Feb 16, 2023
9.1
CVE-2022-29830CRITICAL

Use of Hard-coded Cryptographic Key vulnerability in Mitsubishi Electric GX Works3 versions from 1.000A to 1.095Z, and Motion Control Setting(GX Works3 related software) versions from 1.000A to 1.065T allows a remote unauthenticated attacker to disclose or tamper with sensitive information. As a result, unauthenticated attackers may obtain information about project files illegally.

Nov 25, 2022
9.1
CVE-2021-34566CRITICAL

In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to crash the iocheck process and write memory resulting in loss of integrity and DoS.

Nov 9, 2022
9.1
CVE-2021-38395CRITICAL

Honeywell Experion PKS C200, C200E, C300, and ACE controllers are vulnerable to improper neutralization of special elements in output, which may allow an attacker to remotely execute arbitrary code and cause a denial-of-service condition.

Oct 28, 2022
9.1
CVE-2022-30317CRITICAL

Honeywell Experion LX through 2022-05-06 has Missing Authentication for a Critical Function. According to FSCT-2022-0055, there is a Honeywell Experion LX Control Data Access (CDA) EpicMo protocol with unauthenticated functionality issue. The affected components are characterized as: Honeywell Control Data Access (CDA) EpicMo (55565/TCP). The potential impact is: Firmware manipulation, Denial of service. The Honeywell Experion LX Distributed Control System (DCS) utilizes the Control Data Access (CDA) EpicMo protocol (55565/TCP) for device diagnostics and maintenance purposes. This protocol does not have any authentication features, allowing any attacker capable of communicating with the ports in question to invoke (a subset of) desired functionality. There is no authentication functionality on the protocol in question. An attacker capable of invoking the protocols' functionalities could issue firmware download commands potentially allowing for firmware manipulation and reboot devices causing denial of service.

Aug 31, 2022
9.1
CVE-2022-29898CRITICAL

On various RAD-ISM-900-EN-* devices by PHOENIX CONTACT an admin user could use the configuration file uploader in the WebUI to execute arbitrary code with root privileges on the OS due to an improper validation of an integrity check value in all versions of the firmware.

May 11, 2022
9.1
CVE-2022-29897CRITICAL

On various RAD-ISM-900-EN-* devices by PHOENIX CONTACT an admin user could use the traceroute utility integrated in the WebUI to execute arbitrary code with root privileges on the OS due to an improper input validation in all versions of the firmware.

May 11, 2022
9.1
CVE-2022-25158CRITICAL

Cleartext Storage of Sensitive Information vulnerability in Mitsubishi Electric MELSEC iQ-F series FX5U(C) CPU all versions, Mitsubishi Electric MELSEC iQ-F series FX5UJ CPU all versions, Mitsubishi Electric MELSEC iQ-R series R00/01/02CPU all versions, Mitsubishi Electric MELSEC iQ-R series R04/08/16/32/120(EN)CPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120SFCPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PCPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PSFCPU all versions, Mitsubishi Electric MELSEC iQ-R series RJ71C24(-R2/R4) all versions, Mitsubishi Electric MELSEC iQ-R series RJ71EN71 all versions, Mitsubishi Electric MELSEC iQ-R series RJ71GF11-T2 all versions, Mitsubishi Electric MELSEC iQ-R series RJ71GP21(S)-SX all versions, Mitsubishi Electric MELSEC iQ-R series RJ72GF15-T2 all versions, Mitsubishi Electric MELSEC Q series Q03UDECPU all versions, Mitsubishi Electric MELSEC Q series Q04/06/10/13/20/26/50/100UDEHCPU all versions, Mitsubishi Electric MELSEC Q series Q03/04/06/13/26UDVCPU all versions, Mitsubishi Electric MELSEC Q series Q04/06/13/26UDPVCPU all versions, Mitsubishi Electric MELSEC Q series QJ71C24N(-R2/R4) all versions, Mitsubishi Electric MELSEC Q series QJ71E71-100 all versions, Mitsubishi Electric MELSEC L series L02/06/26CPU(-P) all versions, Mitsubishi Electric MELSEC L series L26CPU-(P)BT all versions, Mitsubishi Electric MELSEC L series LJ71C24(-R2) all versions, Mitsubishi Electric MELSEC L series LJ71E71-100 all versions and Mitsubishi Electric MELSEC L series LJ72GF15-T2 all versions allows a remote attacker to disclose or tamper with a file in which password hash is saved in cleartext.

Apr 1, 2022
9.1
CVE-2022-25157CRITICAL

Use of Password Hash Instead of Password for Authentication vulnerability in Mitsubishi Electric MELSEC iQ-F series FX5U(C) CPU all versions, Mitsubishi Electric MELSEC iQ-F series FX5UJ CPU all versions, Mitsubishi Electric MELSEC iQ-R series R00/01/02CPU all versions, Mitsubishi Electric MELSEC iQ-R series R04/08/16/32/120(EN)CPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120SFCPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PCPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PSFCPU all versions, Mitsubishi Electric MELSEC iQ-R series R16/32/64MTCPU all versions, Mitsubishi Electric MELSEC iQ-R series RJ71C24(-R2/R4) all versions, Mitsubishi Electric MELSEC iQ-R series RJ71EN71 all versions, Mitsubishi Electric MELSEC iQ-R series RJ71GF11-T2 all versions, Mitsubishi Electric MELSEC iQ-R series RJ71GP21(S)-SX all versions, Mitsubishi Electric MELSEC iQ-R series RJ72GF15-T2 all versions, Mitsubishi Electric MELSEC Q series Q03UDECPU all versions, Mitsubishi Electric MELSEC Q series Q04/06/10/13/20/26/50/100UDEHCPU all versions, Mitsubishi Electric MELSEC Q series Q03/04/06/13/26UDVCPU all versions, Mitsubishi Electric MELSEC Q series Q04/06/13/26UDPVCPU all versions, Mitsubishi Electric MELSEC Q series QJ71C24N(-R2/R4) all versions, Mitsubishi Electric MELSEC Q series QJ71E71-100 all versions, Mitsubishi Electric MELSEC L series L02/06/26CPU(-P) all versions, Mitsubishi Electric MELSEC L series L26CPU-(P)BT all versions, Mitsubishi Electric MELSEC L series LJ71C24(-R2) all versions, Mitsubishi Electric MELSEC L series LJ71E71-100 all versions and Mitsubishi Electric MELSEC L series LJ72GF15-T2 all versions allows a remote unauthenticated attacker to disclose or tamper with the information in the product by using an eavesdropped password hash.

Apr 1, 2022
9.1
CVE-2020-25176CRITICAL

Some commands used by the Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x eXchange Layer (IXL) protocol perform various file operations in the file system. Since the parameter pointing to the file name is not checked for reserved characters, it is possible for a remote, unauthenticated attacker to traverse an application’s directory, which could lead to remote code execution.

Mar 18, 2022
9.1
CVE-2021-34584CRITICAL

Crafted web server requests can be utilised to read partial stack or heap memory or may trigger a denial-of- service condition due to a crash in the CODESYS V2 web server prior to V1.1.9.22.

Oct 26, 2021
9.1
CVE-2021-20597CRITICAL

Insufficiently Protected Credentials vulnerability in Mitsubishi Electric MELSEC iQ-R series Safety CPU modules R08/16/32/120SFCPU firmware versions "26" and prior and Mitsubishi Electric MELSEC iQ-R series SIL2 Process CPU modules R08/16/32/120PSFCPU firmware versions "11" and prior allows a remote unauthenticated attacker to login to the target unauthorizedly by sniffing network traffic and obtaining credentials when registering user information in the target or changing a password.

Aug 6, 2021
9.1
CVE-2021-30194CRITICAL

CODESYS V2 Web-Server before 1.1.9.20 has an Out-of-bounds Read.

May 25, 2021
9.1
CVE-2021-21001CRITICAL

On WAGO PFC200 devices in different firmware versions with special crafted packets an authorised attacker with network access to the device can access the file system with higher privileges.

May 24, 2021
9.1
CVE-2021-25848CRITICAL

Improper validation of the length field of LLDP-MED TLV in userdisk/vport_lldpd in Moxa Camera VPort 06EC-2V Series, version 1.1, allows information disclosure to attackers due to using fixed loop counter variable without checking the actual available length via a crafted lldp packet.

May 10, 2021
9.1
CVE-2021-25847CRITICAL

Improper validation of the length field of LLDP-MED TLV in userdisk/vport_lldpd in Moxa Camera VPort 06EC-2V Series, version 1.1, allows information disclosure to attackers due to controllable loop counter variable via a crafted lldp packet.

May 10, 2021
9.1
CVE-2020-27267CRITICAL

KEPServerEX v6.0 to v6.9, ThingWorx Kepware Server v6.8 and v6.9, ThingWorx Industrial Connectivity (all versions), OPC-Aggregator (all versions), Rockwell Automation KEPServer Enterprise, GE Digital Industrial Gateway Server v7.68.804 and v7.66, and Software Toolbox TOP Server all 6.x versions, are vulnerable to a heap-based buffer overflow. Opening a specifically crafted OPC UA message could allow an attacker to crash the server and potentially leak data.

Jan 14, 2021
9.1
CVE-2020-27263CRITICAL

KEPServerEX: v6.0 to v6.9, ThingWorx Kepware Server: v6.8 and v6.9, ThingWorx Industrial Connectivity: All versions, OPC-Aggregator: All versions, Rockwell Automation KEPServer Enterprise, GE Digital Industrial Gateway Server: v7.68.804 and v7.66, Software Toolbox TOP Server: All 6.x versions, are vulnerable to a heap-based buffer overflow. Opening a specifically crafted OPC UA message could allow an attacker to crash the server and potentially leak data.

Jan 14, 2021
9.1
CVE-2020-12506CRITICAL

Improper Authentication vulnerability in WAGO 750-8XX series with FW version <= FW03 allows an attacker to change the settings of the devices by sending specifically constructed requests without authentication This issue affects: WAGO 750-362, WAGO 750-363, WAGO 750-823, WAGO 750-832/xxx-xxx, WAGO 750-862, WAGO 750-891, WAGO 750-890/xxx-xxx in versions FW03 and prior versions.

Sep 30, 2020
9.1
CVE-2020-12013CRITICAL

A specially crafted WCF client that interfaces to the may allow the execution of certain arbitrary SQL commands remotely. This affects: Mitsubishi Electric MC Works64 Version 4.02C (10.95.208.31) and earlier, all versions; Mitsubishi Electric MC Works32 Version 3.00A (9.50.255.02); ICONICS GenBroker64, Platform Services, Workbench, FrameWorX Server v10.96 and prior; ICONICS GenBroker32 v9.5 and prior.

Jul 16, 2020
9.1
CVE-2019-19106CRITICAL

Improper implementation of Access Control in ABB Telephone Gateway TG/S 3.2 and Busch-Jaeger 6186/11 Telefon-Gateway allows an unauthorized user to access data marked as restricted, such as viewing or editing user profiles and application settings.

Apr 22, 2020
9.1
CVE-2019-19104CRITICAL

The web server in ABB Telephone Gateway TG/S 3.2 and Busch-Jaeger 6186/11 Telefon-Gateway allows access to different endpoints of the application without authenticating by accessing a specific uniform resource locator (URL) , violating the access-control (ACL) rules. This issue allows obtaining sensitive information that may aid in further attacks and privilege escalation.

Apr 22, 2020
9.1
CVE-2020-6972CRITICAL

In Notifier Web Server (NWS) Version 3.50 and earlier, the Honeywell Fire Web Server’s authentication may be bypassed by a capture-replay attack from a web browser.

Mar 24, 2020
9.1
CVE-2019-5161CRITICAL

An exploitable remote code execution vulnerability exists in the Cloud Connectivity functionality of WAGO PFC200 versions 03.02.02(14), 03.01.07(13), and 03.00.39(12). A specially crafted XML file will direct the Cloud Connectivity service to download and execute a shell script with root privileges.

Mar 11, 2020
9.1
CVE-2019-5160CRITICAL

An exploitable improper host validation vulnerability exists in the Cloud Connectivity functionality of WAGO PFC200 Firmware versions 03.02.02(14), 03.01.07(13), and 03.00.39(12). A specially crafted HTTPS POST request can cause the software to connect to an unauthorized host, resulting in unauthorized access to firmware update functionality. An attacker can send an authenticated HTTPS POST request to direct the Cloud Connectivity software to connect to an attacker controlled Azure IoT Hub node.

Mar 11, 2020
9.1
CVE-2019-5080CRITICAL

An exploitable denial-of-service vulnerability exists in the iocheckd service "I/O-Check" functionality of WAGO PFC 200 Firmware versions 03.01.07(13) and 03.00.39(12), and WAGO PFC100 Firmware version 03.00.39(12). A single packet can cause a denial of service and weaken credentials resulting in the default documented credentials being applied to the device. An attacker can send an unauthenticated packet to trigger this vulnerability.

Dec 18, 2019
9.1
CVE-2019-5078CRITICAL

An exploitable denial of service vulnerability exists in the iocheckd service "I/O-Check" functionality of WAGO PFC200 Firmware versions 03.01.07(13) and 03.00.39(12), and WAGO PFC100 Firmware version 03.00.39(12). A specially crafted set of packets can cause a denial of service, resulting in the device entering an error state where it ceases all network communications. An attacker can send unauthenticated packets to trigger this vulnerability.

Dec 18, 2019
9.1
CVE-2019-5077CRITICAL

An exploitable denial-of-service vulnerability exists in the iocheckd service ‘’I/O-Chec’’ functionality of WAGO PFC 200 Firmware versions 03.01.07(13) and 03.00.39(12), and WAGO PFC 100 Firmware version 03.00.39(12). A specially crafted set of packets can cause a denial of service, resulting in the device entering an error state where it ceases all network communications. An attacker can send unauthenticated packets to trigger this vulnerability.

Dec 18, 2019
9.1
CVE-2019-6522CRITICAL

Moxa IKS and EDS fails to properly check array bounds which may allow an attacker to read device memory on arbitrary addresses, and may allow an attacker to retrieve sensitive data or cause device reboot.

Mar 5, 2019
9.1
CVE-2017-16726CRITICAL

Beckhoff TwinCAT supports communication over ADS. ADS is a protocol for industrial automation in protected environments. ADS has not been designed to achieve security purposes and therefore does not include any encryption algorithms because of their negative effect on performance and throughput. An attacker can forge arbitrary ADS packets when legitimate ADS traffic is observable.

Jun 27, 2018
9.1
CVE-2018-10730CRITICAL

All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 are prone to OS command injection.

May 17, 2018
9.1
CVE-2018-7245CRITICAL

An improper authorization vulnerability exists In Schneider Electric's 66074 MGE Network Management Card Transverse installed in MGE UPS and MGE STS. The integrated web server (Port 80/443/TCP) of the affected devices could allow a remote attacker to change UPS control and shutdown parameters or other critical settings without authorization.

Apr 18, 2018
9.1
CVE-2018-7237CRITICAL

A vulnerability exists in Schneider Electric's Pelco Sarix Professional in all firmware versions prior to 3.29.67 which could allow a remote attacker to delete arbitrary system file due to lack of validation of the /login/bin/set_param to the file name with the value of 'system.delete.sd_file'

Mar 9, 2018
9.1
CVE-2017-16727CRITICAL

A Credentials Management issue was discovered in Moxa NPort W2150A versions prior to 1.11, and NPort W2250A versions prior to 1.11. The default password is empty on the device. An unauthorized user can access the device without a password. An unauthorized user has the ability to completely compromise the confidentiality and integrity of the wireless traffic.

Dec 22, 2017
9.1
CVE-2017-6026CRITICAL

A Use of Insufficiently Random Values issue was discovered in Schneider Electric Modicon PLCs Modicon M241, firmware versions prior to Version 4.0.5.11, and Modicon M251, firmware versions prior to Version 4.0.5.11. The session numbers generated by the web application are lacking randomization and are shared between several users. This may allow a current session to be compromised.

Jun 30, 2017
9.1
CVE-2016-8721CRITICAL

An exploitable OS Command Injection vulnerability exists in the web application 'ping' functionality of Moxa AWK-3131A Wireless Access Points running firmware 1.1. Specially crafted web form input can cause an OS Command Injection resulting in complete compromise of the vulnerable device. An attacker can exploit this vulnerability remotely.

Apr 20, 2017
9.1
CVE-2017-5152CRITICAL

An issue was discovered in Advantech WebAccess Version 8.1. By accessing a specific uniform resource locator (URL) on the web server, a malicious user is able to access pages unrestricted (AUTHENTICATION BYPASS).

Feb 13, 2017
9.1
CVE-2017-5142CRITICAL

An issue was discovered in Honeywell XL Web II controller XL1000C500 XLWebExe-2-01-00 and prior, and XLWeb 500 XLWebExe-1-02-08 and prior. A user with low privileges is able to open and change the parameters by accessing a specific URL because of Improper Privilege Management.

Feb 13, 2017
9.1
CVE-2016-9362CRITICAL

An issue was discovered in WAGO 750-8202/PFC200 prior to FW04 (released August 2015), WAGO 750-881 prior to FW09 (released August 2016), and WAGO 0758-0874-0000-0111. By accessing a specific uniform resource locator (URL) on the web server, a malicious user is able to edit and to view settings without authenticating.

Feb 13, 2017
9.1
CVE-2016-8565CRITICAL

Siemens Automation License Manager (ALM) before 5.3 SP3 allows remote attackers to write to files, rename files, create directories, or delete directories via crafted packets.

Oct 13, 2016
9.1
CVE-2014-5415CRITICAL

Beckhoff Embedded PC images before 2014-10-22 and Automation Device Specification (ADS) TwinCAT components might allow remote attackers to obtain access via the (1) Windows CE Remote Configuration Tool, (2) CE Remote Display service, or (3) TELNET service.

Oct 5, 2016
9.1
CVE-2014-5414CRITICAL

Beckhoff Embedded PC images before 2014-10-22 and Automation Device Specification (ADS) TwinCAT components do not restrict the number of authentication attempts, which makes it easier for remote attackers to obtain access via a brute-force attack.

Oct 5, 2016
9.1
CVE-2024-6516CRITICAL

Cross Site Scripting vulnerabilities where found providing a potential for malicious scripts to be injected into a client browser.  Affected products: ABB ASPECT - Enterprise v3.08.02; NEXUS Series v3.08.02; MATRIX Series v3.08.02

Dec 5, 2024
9.0
CVE-2024-21915CRITICAL

A privilege escalation vulnerability exists in Rockwell Automation FactoryTalk® Service Platform (FTSP). If exploited, a malicious user with basic user group privileges could potentially sign into the software and receive FTSP Administrator Group privileges. A threat actor could potentially read and modify sensitive data, delete data and render the FTSP system unavailable.

Feb 16, 2024
9.0
CVE-2023-4203CRITICAL

Advantech EKI-1524, EKI-1522, EKI-1521 devices through 1.21 are affected by a Stored Cross-Site Scripting vulnerability, which can be triggered by authenticated users in the ping tool of the web-interface.

Aug 8, 2023
9.0
CVE-2023-4202CRITICAL

Advantech EKI-1524, EKI-1522, EKI-1521 devices through 1.21 are affected by a Stored Cross-Site Scripting vulnerability, which can be triggered by authenticated users in the device name field of the web-interface.

Aug 8, 2023
9.0
CVE-2022-0947CRITICAL

A vulnerability in ABB ARG600 Wireless Gateway series that could allow an attacker to exploit the vulnerability by remotely connecting to the serial port gateway, and/or protocol converter, depending on the configuration.

May 10, 2022
9.0
CVE-2020-12029CRITICAL

All versions of FactoryTalk View SE do not properly validate input of filenames within a project directory. A remote, unauthenticated attacker may be able to execute a crafted file on a remote endpoint that may result in remote code execution (RCE). Rockwell Automation recommends applying patch 1126289. Before installing this patch, the patch rollup dated 06 Apr 2020 or later MUST be applied. 1066644 – Patch Roll-up for CPR9 SRx.

Jul 20, 2020
9.0
CVE-2018-10731CRITICAL

All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 are prone to buffer overflows when handling very large cookies (a different vulnerability than CVE-2018-10728).

May 17, 2018
9.0
CVE-2017-2684CRITICAL

Siemens SIMATIC Logon prior to V1.5 SP3 Update 2 could allow an attacker with knowledge of a valid user name, and physical or network access to the affected system, to bypass the application-level authentication.

Feb 22, 2017
9.0
CVE-2015-7937HIGH

Stack-based buffer overflow in the GoAhead Web Server on Schneider Electric Modicon M340 PLC BMXNOx and BMXPx devices allows remote attackers to execute arbitrary code via a long password in HTTP Basic Authentication data.

Dec 21, 2015
10.0
CVE-2015-6476HIGH

Advantech EKI-122x-BE devices with firmware before 1.65, EKI-132x devices with firmware before 1.98, and EKI-136x devices with firmware before 1.27 have hardcoded SSH keys, which makes it easier for remote attackers to obtain access via an SSH session.

Nov 7, 2015
10.0
CVE-2015-6459HIGH

Absolute path traversal vulnerability in the download feature in FileDownloadServlet in GE Digital Energy MDS PulseNET and MDS PulseNET Enterprise before 3.1.5 allows remote attackers to read or delete arbitrary files via a full pathname.

Sep 18, 2015
10.0
CVE-2014-9208HIGH

Multiple stack-based buffer overflows in unspecified DLL files in Advantech WebAccess before 8.0.1 allow remote attackers to execute arbitrary code via unknown vectors.

Sep 11, 2015
10.0
CVE-2015-0984HIGH

Directory traversal vulnerability in the FTP server on Honeywell Excel Web XL1000C50 52 I/O, XL1000C100 104 I/O, XL1000C500 300 I/O, XL1000C1000 600 I/O, XL1000C50U 52 I/O UUKL, XL1000C100U 104 I/O UUKL, XL1000C500U 300 I/O UUKL, and XL1000C1000U 600 I/O UUKL controllers before 2.04.01 allows remote attackers to read files under the web root, and consequently obtain administrative login access, via a crafted pathname.

Mar 31, 2015
10.0
CVE-2014-8385HIGH

Buffer overflow on Advantech EKI-1200 gateways with firmware before 1.63 allows remote attackers to execute arbitrary code via unspecified vectors.

Feb 13, 2015
10.0
CVE-2015-1449HIGH

Buffer overflow in the integrated web server on Siemens Ruggedcom WIN51xx devices with firmware before SS4.4.4624.35, WIN52xx devices with firmware before SS4.4.4624.35, WIN70xx devices with firmware before BS4.4.4621.32, and WIN72xx devices with firmware before BS4.4.4621.32 allows remote attackers to execute arbitrary code via unspecified vectors.

Feb 2, 2015
10.0
CVE-2015-1448HIGH

The integrated management service on Siemens Ruggedcom WIN51xx devices with firmware before SS4.4.4624.35, WIN52xx devices with firmware before SS4.4.4624.35, WIN70xx devices with firmware before BS4.4.4621.32, and WIN72xx devices with firmware before BS4.4.4621.32 allows remote attackers to bypass authentication and perform administrative actions via unspecified vectors.

Feb 2, 2015
10.0
CVE-2014-9198HIGH

The FTP server on the Schneider Electric ETG3000 FactoryCast HMI Gateway with firmware through 1.60 IR 04 has hardcoded credentials, which makes it easier for remote attackers to obtain access via an FTP session.

Jan 27, 2015
10.0
CVE-2014-9197HIGH

The Schneider Electric ETG3000 FactoryCast HMI Gateway with firmware before 1.60 IR 04 stores rde.jar under the web root with insufficient access control, which allows remote attackers to obtain sensitive setup and configuration information via a direct request.

Jan 27, 2015
10.0
CVE-2014-9195HIGH

Phoenix Contact ProConOs and MultiProg do not require authentication, which allows remote attackers to execute arbitrary commands via protocol-compliant traffic.

Jan 17, 2015
10.0
CVE-2014-9190HIGH

Stack-based buffer overflow in Schneider Electric Wonderware InTouch Access Anywhere Server 10.6 and 11.0 allows remote attackers to execute arbitrary code via a request for a filename that does not exist.

Jan 10, 2015
10.0
CVE-2014-9188HIGH

Buffer overflow in an ActiveX control in MDraw30.ocx in Schneider Electric ProClima before 6.1.7 allows remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-8513 and CVE-2014-8514. NOTE: this may be clarified later based on details provided by researchers.

Dec 27, 2014
10.0
CVE-2014-8511HIGH

Buffer overflow in an ActiveX control in Atx45.ocx in Schneider Electric ProClima before 6.1.7 allows remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-8512. NOTE: this may be clarified later based on details provided by researchers.

Dec 27, 2014
10.0
CVE-2014-8551HIGH

The WinCC server in Siemens SIMATIC WinCC 7.0 through SP3, 7.2 before Update 9, and 7.3 before Update 2; SIMATIC PCS 7 7.1 through SP4, 8.0 through SP2, and 8.1; and TIA Portal 13 before Update 6 allows remote attackers to execute arbitrary code via crafted packets.

Nov 26, 2014
10.0
CVE-2014-0754HIGH

Directory traversal vulnerability in SchneiderWEB on Schneider Electric Modicon PLC Ethernet modules 140CPU65x Exec before 5.5, 140NOC78x Exec before 1.62, 140NOE77x Exec before 6.2, BMXNOC0401 before 2.05, BMXNOE0100 before 2.9, BMXNOE0110x Exec before 6.0, TSXETC101 Exec before 2.04, TSXETY4103x Exec before 5.7, TSXETY5103x Exec before 5.9, TSXP57x ETYPort Exec before 5.7, and TSXP57x Ethernet Copro Exec before 5.5 allows remote attackers to visit arbitrary resources via a crafted HTTP request.

Oct 3, 2014
10.0
CVE-2013-6920HIGH

Siemens SINAMICS S/G controllers with firmware before 4.6.11 do not require authentication for FTP and TELNET sessions, which allows remote attackers to bypass intended access restrictions via TCP traffic to port (1) 21 or (2) 23.

Dec 7, 2013
10.0
CVE-2013-5944HIGH

The integrated web server on Siemens SCALANCE X-200 switches with firmware before 4.5.0 and X-200IRT switches with firmware before 5.1.0 does not properly enforce authentication requirements, which allows remote attackers to perform administrative actions via requests to the management interface.

Oct 3, 2013
10.0
CVE-2013-4652HIGH

Unspecified vulnerability in the command-line management interface on Siemens Scalance W7xx devices with firmware before 4.5.4 allows remote attackers to bypass authentication and execute arbitrary code via a (1) SSH or (2) TELNET connection.

Aug 1, 2013
10.0
CVE-2013-4781HIGH

core/getLog.php on the Siemens Enterprise OpenScape Branch appliance and OpenScape Session Border Controller (SBC) before 2 R0.32.0, and 7 before 7 R1.7.0, allows remote attackers to execute arbitrary commands via unspecified vectors.

Jul 18, 2013
10.0
CVE-2013-2781HIGH

Use-after-free vulnerability in the server application in 3S CODESYS Gateway 2.3.9.27 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via unspecified vectors.

May 23, 2013
10.0
CVE-2012-4715HIGH

Buffer overflow in LogReceiver.exe in Rockwell Automation RSLinx Enterprise CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a UDP packet with a certain integer length value that is (1) too large or (2) too small, leading to improper handling by Logger.dll.

Apr 18, 2013
10.0
CVE-2013-2762HIGH

The Schneider Electric Magelis XBT HMI controller has a default password for authentication of configuration uploads, which makes it easier for remote attackers to bypass intended access restrictions via crafted configuration data.

Apr 4, 2013
10.0
CVE-2013-0659HIGH

The debugging feature on the Siemens CP 1604 and CP 1616 interface cards with firmware before 2.5.2 allows remote attackers to execute arbitrary code via a crafted packet to UDP port 17185.

Apr 1, 2013
10.0
CVE-2012-4708HIGH

Stack-based buffer overflow in 3S CODESYS Gateway-Server before 2.3.9.27 allows remote attackers to execute arbitrary code via a crafted packet.

Feb 24, 2013
10.0
CVE-2012-4707HIGH

3S CODESYS Gateway-Server before 2.3.9.27 allows remote attackers to execute arbitrary code via vectors that trigger an out-of-bounds memory access.

Feb 24, 2013
10.0
CVE-2012-4705HIGH

Directory traversal vulnerability in 3S CODESYS Gateway-Server before 2.3.9.27 allows remote attackers to execute arbitrary code via vectors involving a crafted pathname.

Feb 24, 2013
10.0
CVE-2012-4704HIGH

Array index error in 3S CODESYS Gateway-Server before 2.3.9.27 allows remote attackers to execute arbitrary code via a crafted packet.

Feb 24, 2013
10.0
CVE-2013-0658HIGH

Heap-based buffer overflow in RFManagerService.exe in Schneider Electric Accutech Manager 2.00.1 and earlier allows remote attackers to execute arbitrary code via a crafted HTTP request.

Feb 15, 2013
10.0
CVE-2012-6437HIGH

The device does not properly authenticate users and the potential exists for a remote user to upload a new firmware image to the Ethernet card, whether it is a corrupt or legitimate firmware image. Successful exploitation of this vulnerability could cause loss of availability, integrity, and confidentiality and a disruption in communications with other connected devices. Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400

Jan 24, 2013
10.0
CVE-2013-0657HIGH

Stack-based buffer overflow in Schneider Electric Interactive Graphical SCADA System (IGSS) 10 and earlier allows remote attackers to execute arbitrary code by sending TCP port-12397 data that does not comply with a protocol.

Jan 21, 2013
10.0
CVE-2012-5409HIGH

AscoServer.exe in the server in Siemens SiPass integrated MP2.6 and earlier does not properly handle IOCP RPC messages received over an Ethernet network, which allows remote attackers to write data to any memory location and consequently execute arbitrary code via crafted messages, as demonstrated by an arbitrary pointer dereference attack or a buffer overflow attack.

Nov 1, 2012
10.0
CVE-2012-4879HIGH

The Linux Console on the WAGO I/O System 758 model 758-870, 758-874, 758-875, and 758-876 Industrial PC (IPC) devices has a default password of wago for the (1) root and (2) admin accounts, (3) a default password of user for the user account, and (4) a default password of guest for the guest account, which makes it easier for remote attackers to obtain login access via a TELNET session, a different vulnerability than CVE-2012-3013.

Sep 7, 2012
10.0
CVE-2012-3013HIGH

WAGO I/O System 758 model 758-870, 758-874, 758-875, and 758-876 Industrial PC (IPC) devices have default passwords for unspecified Web Based Management accounts, which makes it easier for remote attackers to obtain administrative access via a TCP session.

Sep 7, 2012
10.0
CVE-2012-1799HIGH

The web server on the Siemens Scalance S Security Module firewall S602 V2, S612 V2, and S613 V2 with firmware before 2.3.0.3 does not limit the rate of authentication attempts, which makes it easier for remote attackers to obtain access via a brute-force attack on the administrative password.

Apr 18, 2012
10.0
CVE-2012-0245HIGH

Multiple stack-based buffer overflows in RobNetScanHost.exe in ABB Robot Communications Runtime before 5.14.02, as used in ABB Interlink Module, IRC5 OPC Server, PC SDK, PickMaster 3 and 5, RobView 5, RobotStudio, WebWare SDK, and WebWare Server, allow remote attackers to execute arbitrary code via a crafted (1) 0xA or (2) 0xE Netscan packet.

Mar 9, 2012
10.0
CVE-2012-0243HIGH

Buffer overflow in an ActiveX control in bwocxrun.ocx in Advantech/BroadWin WebAccess before 7.0 allows remote attackers to execute arbitrary code by leveraging the ability to write arbitrary content to any pathname.

Feb 21, 2012
10.0
CVE-2012-0242HIGH

Format string vulnerability in Advantech/BroadWin WebAccess before 7.0 allows remote attackers to execute arbitrary code via format string specifiers in a message string.

Feb 21, 2012
10.0
CVE-2012-0240HIGH

GbScriptAddUp.asp in Advantech/BroadWin WebAccess before 7.0 does not properly perform authentication, which allows remote attackers to execute arbitrary code via unspecified vectors.

Feb 21, 2012
10.0
CVE-2012-0238HIGH

Stack-based buffer overflow in opcImg.asp in Advantech/BroadWin WebAccess before 7.0 allows remote attackers to execute arbitrary code via unspecified vectors.

Feb 21, 2012
10.0
CVE-2011-4526HIGH

Buffer overflow in an ActiveX control in Advantech/BroadWin WebAccess before 7.0 might allow remote attackers to execute arbitrary code via a long string value in unspecified parameters.

Feb 21, 2012
10.0
CVE-2011-4525HIGH

Advantech/BroadWin WebAccess before 7.0 allows remote attackers to trigger the extraction of arbitrary web content into a batch file on a client system, and execute this batch file, via unspecified vectors.

Feb 21, 2012
10.0
CVE-2011-4524HIGH

Buffer overflow in Advantech/BroadWin WebAccess before 7.0 allows remote attackers to execute arbitrary code via a long string value in unspecified parameters.

Feb 21, 2012
10.0
CVE-2011-1914HIGH

Buffer overflow in the Advantech ADAM OLE for Process Control (OPC) Server ActiveX control in ADAM OPC Server before 3.01.012, Modbus RTU OPC Server before 3.01.010, and Modbus TCP OPC Server before 3.01.010 allows remote attackers to execute arbitrary code via unspecified vectors.

Feb 21, 2012
10.0
CVE-2011-4041HIGH

webvrpcs.exe in Advantech/BroadWin WebAccess allows remote attackers to execute arbitrary code or obtain a security-code value via a long string in an RPC request to TCP port 4592.

Feb 6, 2012
10.0
CVE-2011-4514HIGH

The TELNET daemon in Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime does not perform authentication, which makes it easier for remote attackers to obtain access via a TCP session.

Feb 3, 2012
10.0
CVE-2011-4513HIGH

Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime allow user-assisted remote attackers to execute arbitrary code via a crafted project file, related to the HMI web server and runtime loader.

Feb 3, 2012
10.0
CVE-2011-4509HIGH

The HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime has an improperly selected default password for the administrator account, which makes it easier for remote attackers to obtain access via a brute-force approach involving many HTTP requests.

Feb 3, 2012
10.0
CVE-2011-5007HIGH

Stack-based buffer overflow in the CmpWebServer component in 3S CoDeSys 3.4 SP4 Patch 2 and earlier, as used on the ABB AC500 PLC and possibly other products, allows remote attackers to execute arbitrary code via a long URI to TCP port 8080.

Dec 25, 2011
10.0
CVE-2011-4861HIGH

The modbus_125_handler function in the Schneider Electric Quantum Ethernet Module on the NOE 771 device (aka the Quantum 140NOE771* module) allows remote attackers to install arbitrary firmware updates via a MODBUS 125 function code to TCP port 502.

Dec 17, 2011
10.0
CVE-2011-4860HIGH

The ComputePassword function in the Schneider Electric Quantum Ethernet Module on the NOE 771 device (aka the Quantum 140NOE771* module) generates the password for the fwupgrade account by performing a calculation on the MAC address, which makes it easier for remote attackers to obtain access via a (1) ARP request message or (2) Neighbor Solicitation message.

Dec 17, 2011
10.0
CVE-2011-4859HIGH

The Schneider Electric Quantum Ethernet Module, as used in the Quantum 140NOE771* and 140CPU65* modules, the Premium TSXETY* and TSXP57* modules, the M340 BMXNOE01* and BMXP3420* modules, and the STB DIO STBNIC2212 and STBNIP2* modules, uses hardcoded passwords for the (1) AUTCSE, (2) AUT_CSE, (3) fdrusers, (4) ftpuser, (5) loader, (6) nic2212, (7) nimrohs2212, (8) nip2212, (9) noe77111_v500, (10) ntpupdate, (11) pcfactory, (12) sysdiag, (13) target, (14) test, (15) USER, and (16) webserver accounts, which makes it easier for remote attackers to obtain access via the (a) TELNET, (b) Windriver Debug, or (c) FTP port.

Dec 17, 2011
10.0
CVE-2010-4742HIGH

Stack-based buffer overflow in a certain ActiveX control in MediaDBPlayback.DLL 2.2.0.5 in the Moxa ActiveX SDK allows remote attackers to execute arbitrary code via a long PlayFileName property value.

Feb 18, 2011
10.0
CVE-2011-0488HIGH

Stack-based buffer overflow in NTWebServer.exe in the test web service in InduSoft NTWebServer, as distributed in Advantech Studio 6.1 and InduSoft Web Studio 7.0, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a long request to TCP port 80.

Jan 18, 2011
10.0
CVE-2010-2965HIGH

The WDB target agent debug service in Wind River VxWorks 6.x, 5.x, and earlier, as used on the Rockwell Automation 1756-ENBT series A with firmware 3.2.6 and 3.6.1 and other products, allows remote attackers to read or modify arbitrary memory locations, perform function calls, or manage tasks via requests to UDP port 17185, a related issue to CVE-2005-3804.

Aug 5, 2010
10.0
CVE-2009-3739HIGH

Multiple unspecified vulnerabilities on the Rockwell Automation AB Micrologix 1100 and 1400 controllers allow remote attackers to obtain privileged access or cause a denial of service (halt) via unknown vectors.

Jan 19, 2010
10.0
CVE-2008-6993HIGH

Siemens Gigaset WLAN Camera 1.27 has an insecure default password, which allows remote attackers to conduct unauthorized activities. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.

Aug 19, 2009
10.0
CVE-2008-6916HIGH

Siemens SpeedStream 5200 with NetPort Software 1.1 allows remote attackers to bypass authentication via an invalid Host header, possibly involving a trailing dot in the hostname.

Aug 7, 2009
10.0
CVE-2008-5848HIGH

The Advantech ADAM-6000 module has 00000000 as its default password, which makes it easier for remote attackers to obtain access through an HTTP session, and (1) monitor or (2) control the module's Modbus/TCP I/O activity.

Jan 6, 2009
10.0
CVE-2008-2474HIGH

Buffer overflow in x87 before 3.5.5 in ABB Process Communication Unit 400 (PCU400) 4.4 through 4.6 allows remote attackers to execute arbitrary code via a crafted packet using the (1) IEC60870-5-101 or (2) IEC60870-5-104 communication protocol to the X87 web interface.

Sep 29, 2008
10.0
CVE-2000-0704HIGH

Buffer overflow in SGI Omron WorldView Wnn allows remote attackers to execute arbitrary commands via long JS_OPEN, JS_MKDIR, or JS_FILE_INFO commands.

Oct 20, 2000
10.0
CVE-2015-7908HIGH

Honeywell Midas gas detectors before 1.13b3 and Midas Black gas detectors before 2.13b3 allow remote attackers to discover cleartext passwords by sniffing the network.

Dec 21, 2015
9.3
CVE-2015-5386HIGH

Siemens SICAM MIC devices with firmware before 2404 allow remote attackers to bypass authentication and obtain administrative access via unspecified HTTP requests.

Jul 16, 2015
9.3
CVE-2014-0769HIGH

The Festo CECX-X-C1 Modular Master Controller with CoDeSys and CECX-X-M1 Modular Controller with CoDeSys and SoftMotion do not require authentication for connections to certain TCP ports, which allows remote attackers to (1) modify the configuration via a request to the debug service on port 4000 or (2) delete log entries via a request to the log service on port 4001.

Apr 25, 2014
9.3
CVE-2014-0760HIGH

The Festo CECX-X-C1 Modular Master Controller with CoDeSys and CECX-X-M1 Modular Controller with CoDeSys and SoftMotion provide an undocumented access method involving the FTP protocol, which could allow a remote attacker to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors.

Apr 25, 2014
9.3
CVE-2014-2731HIGH

Multiple unspecified vulnerabilities in the integrated web server in Siemens SINEMA Server before 12 SP1 allow remote attackers to execute arbitrary code via HTTP traffic to port (1) 4999 or (2) 80.

Apr 19, 2014
9.3
CVE-2013-0662HIGH

Multiple stack-based buffer overflows in ModbusDrv.exe in Schneider Electric Modbus Serial Driver 1.10 through 3.2 allow remote attackers to execute arbitrary code via a large buffer-size value in a Modbus Application Header.

Apr 1, 2014
9.3
CVE-2014-0781HIGH

Heap-based buffer overflow in BKCLogSvr.exe in Yokogawa CENTUM CS 3000 R3.09.50 and earlier allows remote attackers to execute arbitrary code via crafted UDP packets.

Mar 14, 2014
9.3
CVE-2013-2817HIGH

An ActiveX control in IcoLaunch.dll in Mitsubishi Electric Automation MC-WorX Suite 8.02 allows user-assisted remote attackers to execute arbitrary programs via a crafted HTML document in conjunction with a Login Client button click.

Feb 24, 2014
9.3
CVE-2013-2782HIGH

Schneider Electric Trio J-Series License Free Ethernet Radio with firmware 3.6.0 through 3.6.3 uses the same AES encryption key across different customers' installations, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging knowledge of this key from another installation.

Aug 28, 2013
9.3
CVE-2013-5021HIGH

Multiple absolute path traversal vulnerabilities in National Instruments cwui.ocx, as used in National Instruments LabWindows/CVI 2012 SP1 and earlier, National Instruments LabVIEW 2012 SP1 and earlier, the Data Analysis component in ABB DataManager 1 through 6.3.6, and other products allow remote attackers to create and execute arbitrary files via a full pathname in an argument to the ExportStyle method in the (1) CWNumEdit, (2) CWGraph, (3) CWBoolean, (4) CWSlide, or (5) CWKnob ActiveX control, in conjunction with file content in the (a) Caption or (b) FormatString property value.

Aug 6, 2013
9.3
CVE-2012-6440HIGH

The Web server password authentication mechanism used by the products is vulnerable to a MitM and Replay attack. Successful exploitation of this vulnerability will allow unauthorized access of the product’s Web server to view and alter product configuration and diagnostics information. Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400

Jan 24, 2013
9.3
CVE-2013-0655HIGH

The client in Schneider Electric Software Update (SESU) Utility 1.0.x and 1.1.x does not ensure that updates have a valid origin, which allows man-in-the-middle attackers to spoof updates, and consequently execute arbitrary code, by modifying the data stream on TCP port 80.

Jan 21, 2013
9.3
CVE-2011-4876HIGH

Directory traversal vulnerability in HmiLoad in the runtime loader in Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime, when Transfer Mode is enabled, allows remote attackers to execute, read, create, modify, or delete arbitrary files via a .. (dot dot) in a string.

Feb 3, 2012
9.3
CVE-2011-4875HIGH

Stack-based buffer overflow in HmiLoad in the runtime loader in Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime, when Transfer Mode is enabled, allows remote attackers to execute arbitrary code via vectors related to Unicode strings.

Feb 3, 2012
9.3
CVE-2011-4508HIGH

The HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime generates predictable authentication tokens for cookies, which makes it easier for remote attackers to bypass authentication via a crafted cookie.

Feb 3, 2012
9.3
CVE-2011-4055HIGH

Buffer overflow in the WebClient ActiveX control in Siemens Tecnomatix FactoryLink 6.6.1 (aka 6.6 SP1), 7.5.217 (aka 7.5 SP2), and 8.0.2.54 allows remote attackers to execute arbitrary code via a long string in a parameter associated with the location URL.

Jan 8, 2012
9.3
CVE-2011-4034HIGH

Buffer overflow in the Steema TeeChart ActiveX control, as used in Schneider Electric Vijeo Historian 4.30 and earlier, CitectHistorian 4.30 and earlier, and CitectSCADAReports 4.10 and earlier, allows remote attackers to execute arbitrary code or cause a denial of service via unspecified vectors.

Dec 2, 2011
9.3
CVE-2011-3321HIGH

Heap-based buffer overflow in the Siemens WinCC Runtime Advanced Loader, as used in SIMATIC WinCC flexible Runtime and SIMATIC WinCC (TIA Portal) Runtime Advanced, allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted packet to TCP port 2308.

Sep 16, 2011
9.3
CVE-2011-2530HIGH

Buffer overflow in RSEds.dll in RSHWare.exe in the EDS Hardware Installation Tool 1.0.5.1 and earlier in Rockwell Automation RSLinx Classic before 2.58 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed .eds file.

Jun 22, 2011
9.3
CVE-2011-0340HIGH

Multiple buffer overflows in the ISSymbol ActiveX control in ISSymbol.ocx 61.6.0.0 and 301.1009.2904.0 in the ISSymbol virtual machine, as distributed in Advantech Studio 6.1 SP6 61.6.01.05, InduSoft Web Studio before 7.0+SP1, and InduSoft Thin Client 7.0, allow remote attackers to execute arbitrary code via a long (1) InternationalOrder, (2) InternationalSeparator, or (3) LogFileName property value; or (4) a long bstrFileName argument to the OpenScreen method.

May 4, 2011
9.3
CVE-2011-0331HIGH

Use-after-free vulnerability in the addOSPLext method in the Honeywell ScanServer ActiveX control 780.0.20.5 allows remote attackers to execute arbitrary code via a crafted HTML document.

Mar 22, 2011
9.3
CVE-2010-4741HIGH

Stack-based buffer overflow in MDMUtil.dll in MDMTool.exe in MDM Tool before 2.3 in Moxa Device Manager allows remote MDM Gateways to execute arbitrary code via crafted data in a session on TCP port 54321.

Feb 18, 2011
9.3
CVE-2015-3974HIGH

EasyIO EasyIO-30P-SF controllers with firmware before 0.5.21 and 2.x before 2.0.5.21, as used in Accutrol, Bar-Tech Automation, Infocon/EasyIO, Honeywell Automation India, Johnson Controls, SyxthSENSE, Transformative Wave Technologies, Tridium Asia Pacific, and Tridium Europe products, have a hardcoded password, which makes it easier for remote attackers to obtain access via unspecified vectors.

Sep 28, 2015
9.0
CVE-2015-6456HIGH

GE Digital Energy MDS PulseNET and MDS PulseNET Enterprise before 3.1.5 have hardcoded credentials for a support account, which allows remote attackers to obtain administrative access, and consequently execute arbitrary code, by leveraging knowledge of the password.

Sep 18, 2015
9.0
CVE-2015-4051HIGH

Beckhoff IPC Diagnostics before 1.8 does not properly restrict access to functions in /config, which allows remote attackers to cause a denial of service (reboot or shutdown), create arbitrary users, or possibly have unspecified other impact via a crafted request, as demonstrated by a beckhoff.com:service:cxconfig:1#Write SOAP action to /upnpisapi.

Jun 8, 2015
9.0
CVE-2014-8387HIGH

cgi/utility.cgi in Advantech EKI-6340 2.05 Wi-Fi Mesh Access Point allows remote authenticated users to execute arbitrary commands via shell metacharacters in the pinghost parameter to ping.cgi.

Nov 20, 2014
9.0
CVE-2014-2366HIGH

upAdminPg.asp in Advantech WebAccess before 7.2 allows remote authenticated users to discover credentials by reading HTML source code.

Jul 19, 2014
9.0
CVE-2014-0783HIGH

Stack-based buffer overflow in BKHOdeq.exe in Yokogawa CENTUM CS 3000 R3.09.50 and earlier allows remote attackers to execute arbitrary code via a crafted TCP packet.

Mar 14, 2014
9.0
CVE-2026-32059HIGH

OpenClaw version 2026.2.22-2 prior to 2026.2.23 tools.exec.safeBins validation for sort command fails to properly validate GNU long-option abbreviations, allowing attackers to bypass denied-flag checks via abbreviated options. Remote attackers can execute sort commands with abbreviated long options to skip approval requirements in allowlist mode.

Mar 11, 2026
8.8
CVE-2024-55022HIGH

Weintek cMT-3072XH2 easyweb v2.1.53, OS v20231011 was discovered to contain an authenticated command injection vulnerability via the HMI Name parameter.

Mar 3, 2026
8.8
CVE-2025-10314HIGH

Incorrect Default Permissions vulnerability in Mitsubishi Electric Corporation FREQSHIP-mini for Windows versions 8.0.0 to 8.0.2 allows a local attacker to execute arbitrary code with system privileges by replacing service executable files (EXE) or DLLs in the installation directory with specially crafted files. As a result, the attacker may be able to disclose, tamper with, delete, or destroy information stored on the PC where the affected product is installed, or cause a Denial of Service (DoS) condition on the affected system.

Feb 5, 2026
8.8
CVE-2025-4676HIGH

Incorrect Implementation of Authentication Algorithm vulnerability in ABB WebPro SNMP Card PowerValue, ABB WebPro SNMP Card PowerValue UL.This issue affects WebPro SNMP Card PowerValue: through 1.1.8.K; WebPro SNMP Card PowerValue UL: through 1.1.8.K.

Jan 7, 2026
8.8
CVE-2025-14849HIGH

Advantech WebAccess/SCADA  is vulnerable to unrestricted file upload, which may allow an attacker to remotely execute arbitrary code.

Dec 18, 2025
8.8
CVE-2025-10205HIGH

Use of a One-Way Hash with a Predictable Salt vulnerability in ABB FLXEON.This issue affects FLXEON: through 9.3.5. and newer versions

Sep 17, 2025
8.8
CVE-2025-9065HIGH

A server-side request forgery security issue exists within Rockwell Automation ThinManager® software due to the lack of input sanitization. Authenticated attackers can exploit this vulnerability by specifying external SMB paths, exposing the ThinServer® service account NTLM hash.

Sep 9, 2025
8.8
CVE-2025-53515HIGH

A vulnerability exists in Advantech iView that allows for SQL injection and remote code execution through NetworkServlet.archiveTrap(). This issue requires an authenticated attacker with at least user-level privileges. Certain input parameters are not sanitized, allowing an attacker to perform SQL injection and potentially execute code in the context of the 'nt authority\local service' account.

Jul 11, 2025
8.8
CVE-2025-53475HIGH

A vulnerability exists in Advantech iView that could allow for SQL injection and remote code execution through NetworkServlet.getNextTrapPage(). This issue requires an authenticated attacker with at least user-level privileges. Certain parameters in this function are not properly sanitized, allowing an attacker to perform SQL injection and potentially execute code in the context of the 'nt authority\local service' account.

Jul 11, 2025
8.8
CVE-2025-52577HIGH

A vulnerability exists in Advantech iView that could allow SQL injection and remote code execution through NetworkServlet.archiveTrapRange(). This issue requires an authenticated attacker with at least user-level privileges. Certain input parameters are not properly sanitized, allowing an attacker to perform SQL injection and potentially execute code in the context of the 'nt authority\local service' account.

Jul 11, 2025
8.8
CVE-2024-41969HIGH

A low privileged remote attacker may modify the configuration of the CODESYS V3 service through a missing authentication vulnerability which could lead to full system access and/or DoS.

Nov 18, 2024
8.8
CVE-2024-42417HIGH

Delta Electronics DIAEnergie is vulnerable to an SQL injection in the script Handler_CFG.ashx. An authenticated attacker may be able to exploit this issue to cause delay in the targeted product.

Oct 3, 2024
8.8
CVE-2024-38308HIGH

Advantech ADAM 5550's web application includes a "logs" page where all the HTTP requests received are displayed to the user. The device doesn't correctly neutralize malicious code when parsing HTTP requests to generate page output.

Sep 27, 2024
8.8
CVE-2024-8533HIGH

A privilege escalation vulnerability exists in the Rockwell Automation affected products. The vulnerability occurs due to improper default file permissions allowing users to exfiltrate credentials and escalate privileges.

Sep 12, 2024
8.8
CVE-2024-45044HIGH

Bareos is open source software for backup, archiving, and recovery of data for operating systems. When a command ACL is in place and a user executes a command in bconsole using an abbreviation (i.e. "w" for "whoami") the ACL check did not apply to the full form (i.e. "whoami") but to the abbreviated form (i.e. "w"). If the command ACL is configured with negative ACL that should forbid using the "whoami" command, you could still use "w" or "who" as a command successfully. Fixes for the problem are shipped in Bareos versions 23.0.4, 22.1.6 and 21.1.11. If only positive command ACLs are used without any negation, the problem does not occur.

Sep 10, 2024
8.8
CVE-2020-11640HIGH

AdvaBuild uses a command queue to launch certain operations. An attacker who gains access to the command queue can use it to launch an attack by running any executable on the AdvaBuild node. The executables that can be run are not limited to AdvaBuild specific executables.  Improper Privilege Management vulnerability in ABB Advant MOD 300 AdvaBuild.This issue affects Advant MOD 300 AdvaBuild: from 3.0 through 3.7 SP2.

Jul 23, 2024
8.8
CVE-2024-39883HIGH

Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. If a target visits a malicious page or opens a malicious file an attacker can leverage this vulnerability to execute code in the context of the current process.

Jul 9, 2024
8.8
CVE-2024-39882HIGH

Delta Electronics CNCSoft-G2 lacks proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. If a target visits a malicious page or opens a malicious file an attacker can leverage this vulnerability to execute code in the context of the current process.

Jul 9, 2024
8.8
CVE-2024-39881HIGH

Delta Electronics CNCSoft-G2 lacks proper validation of user-supplied data, which can result in a memory corruption condition. If a target visits a malicious page or opens a malicious file an attacker can leverage this vulnerability to execute code in the context of the current process.

Jul 9, 2024
8.8
CVE-2024-4007HIGH

Default credential in install package in ABB ASPECT; NEXUS Series; MATRIX Series version 3.07 allows attacker to login to product instances wrongly configured.

Jul 1, 2024
8.8
CVE-2023-51603HIGH

Honeywell Saia PG5 Controls Suite CAB File Parsing Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Honeywell Saia PG5 Controls Suite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of CAB files. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current user. . Was ZDI-CAN-18592.

May 3, 2024
8.8
CVE-2023-51599HIGH

Honeywell Saia PG5 Controls Suite Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Honeywell Saia PG5 Controls Suite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of ZIP files. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current user. . Was ZDI-CAN-18412.

May 3, 2024
8.8
CVE-2024-34033HIGH

Delta Electronics DIAEnergie has insufficient input validation which makes it possible to perform a path traversal attack and write outside of the intended directory. If a file name is specified that already exists on the file system, then the original file will be overwritten.

May 3, 2024
8.8
CVE-2024-34032HIGH

Delta Electronics DIAEnergie is vulnerable to an SQL injection vulnerability that exists in the GetDIACloudList endpoint. An authenticated attacker can exploit this issue to potentially compromise the system on which DIAEnergie is deployed.

May 3, 2024
8.8
CVE-2024-34031HIGH

Delta Electronics DIAEnergie is vulnerable to an SQL injection vulnerability that exists in the script Handler_CFG.ashx. An authenticated attacker can exploit this issue to potentially compromise the system on which DIAEnergie is deployed.

May 3, 2024
8.8
CVE-2023-43824HIGH

A stack based buffer overflow exists in Delta Electronics Delta Industrial Automation DOPSoft when parsing the wTitleTextLen field of a DPS file. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to open a specially crafted DPS file to achieve remote code execution.

Jan 18, 2024
8.8
CVE-2023-43823HIGH

A stack based buffer overflow exists in Delta Electronics Delta Industrial Automation DOPSoft when parsing the wTTitleLen field of a DPS file. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to open a specially crafted DPS file to achieve remote code execution.

Jan 18, 2024
8.8
CVE-2023-43822HIGH

A stack based buffer overflow exists in Delta Electronics Delta Industrial Automation DOPSoft when parsing the wLogTitlesTimeLen field of a DPS file. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to open a specially crafted DPS file to achieve remote code execution.

Jan 18, 2024
8.8
CVE-2023-43821HIGH

A stack based buffer overflow exists in Delta Electronics Delta Industrial Automation DOPSoft when parsing the wLogTitlesActionLen field of a DPS file. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to open a specially crafted DPS file to achieve remote code execution.

Jan 18, 2024
8.8
CVE-2023-43820HIGH

A stack based buffer overflow exists in Delta Electronics Delta Industrial Automation DOPSoft when parsing the wLogTitlesPrevValueLen field of a DPS file. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to open a specially crafted DPS file to achieve remote code execution.

Jan 18, 2024
8.8
CVE-2023-43819HIGH

A stack based buffer overflow exists in Delta Electronics Delta Industrial Automation DOPSoft when parsing the InitialMacroLen field of a DPS file. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to open a specially crafted DPS file to achieve remote code execution.

Jan 18, 2024
8.8
CVE-2023-43818HIGH

A buffer overflow exists in Delta Electronics Delta Industrial Automation DOPSoft. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to open a specially crafted DPS file to achieve remote code execution.

Jan 18, 2024
8.8
CVE-2023-50466HIGH

An authenticated command injection vulnerability in Weintek cMT2078X easyweb Web Version v2.1.3, OS v20220215 allows attackers to execute arbitrary code or access sensitive information via injecting a crafted payload into the HMI Name parameter.

Dec 19, 2023
8.8
CVE-2023-46690HIGH

In Delta Electronics InfraSuite Device Master v.1.0.7, a vulnerability exists that allows an attacker to write to any file to any location of the filesystem, which could lead to remote code execution.

Nov 30, 2023
8.8
CVE-2023-40145HIGH

In Weintek's cMT3000 HMI Web CGI device, an anonymous attacker can execute arbitrary commands after login to the device.

Oct 19, 2023
8.8
CVE-2023-29463HIGH

The JMX Console within the Rockwell Automation Pavilion8 is exposed to application users and does not require authentication. If exploited, a malicious user could potentially retrieve other application users’ session data and or log users out of their session.

Sep 12, 2023
8.8
CVE-2023-37861HIGH

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 an authenticated remote attacker can execute code with root permissions with a specially crafted HTTP POST when uploading a certificate to the device.

Aug 9, 2023
8.8
CVE-2023-3573HIGH

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with low privileges may use a command injection in a HTTP POST request releated to font configuration operations to gain full access to the device.

Aug 8, 2023
8.8
CVE-2023-3571HIGH

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with low privileges may use a specific HTTP POST releated to certificate operations to gain full access to the device.

Aug 8, 2023
8.8
CVE-2023-3570HIGH

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with low privileges may use a specific HTTP DELETE request to gain full access to the device.

Aug 8, 2023
8.8
CVE-2022-4046HIGH

In CODESYS Control in multiple versions a improper restriction of operations within the bounds of a memory buffer allow an remote attacker with user privileges to gain full access of the device.

Aug 3, 2023
8.8
CVE-2023-3663HIGH

In CODESYS Development System versions from 3.5.11.20 and before 3.5.19.20 a missing integrity check might allow an unauthenticated remote attacker to manipulate the content of notifications received via HTTP by the CODESYS notification server.

Aug 3, 2023
8.8
CVE-2023-3983HIGH

An authenticated SQL injection vulnerability exists in Advantech iView versions prior to v5.7.4 build 6752. An authenticated remote attacker can bypass checks in com.imc.iview.utils.CUtils.checkSQLInjection() to perform blind SQL injection.

Jul 31, 2023
8.8
CVE-2023-2072HIGH

The Rockwell Automation PowerMonitor 1000 contains stored cross-site scripting vulnerabilities within the web page of the product.  The vulnerable pages do not require privileges to access and can be injected with code by an attacker which could be used to leverage an attack on an authenticated user resulting in remote code execution and potentially the complete loss of confidentiality, integrity, and availability of the product.

Jul 11, 2023
8.8
CVE-2023-3256HIGH

Advantech R-SeeNet versions 2.4.22 allows low-level users to access and load the content of local files.

Jun 22, 2023
8.8
CVE-2023-0863HIGH

Improper Authentication vulnerability in ABB Terra AC wallbox (UL40/80A), ABB Terra AC wallbox (UL32A), ABB Terra AC wallbox (CE) (Terra AC MID), ABB Terra AC wallbox (CE) Terra AC Juno CE, ABB Terra AC wallbox (CE) Terra AC PTB, ABB Terra AC wallbox (CE) Symbiosis, ABB Terra AC wallbox (JP).This issue affects Terra AC wallbox (UL40/80A): from 1.0;0 through 1.5.5; Terra AC wallbox (UL32A) : from 1.0;0 through 1.6.5; Terra AC wallbox (CE) (Terra AC MID): from 1.0;0 through 1.6.5; Terra AC wallbox (CE) Terra AC Juno CE: from 1.0;0 through 1.6.5; Terra AC wallbox (CE) Terra AC PTB : from 1.0;0 through 1.5.25; Terra AC wallbox (CE) Symbiosis: from 1.0;0 through 1.2.7; Terra AC wallbox (JP): from 1.0;0 through 1.6.5.

May 17, 2023
8.8
CVE-2022-47390HIGH

An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.

May 15, 2023
8.8
CVE-2022-47389HIGH

An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.

May 15, 2023
8.8
CVE-2022-47388HIGH

An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.

May 15, 2023
8.8
CVE-2022-47387HIGH

An authenticated remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.

May 15, 2023
8.8
CVE-2022-47386HIGH

An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.

May 15, 2023
8.8
CVE-2022-47385HIGH

An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpAppForce Component of multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.

May 15, 2023
8.8
CVE-2022-47384HIGH

An authenticated remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.

May 15, 2023
8.8
CVE-2022-47383HIGH

An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.

May 15, 2023
8.8
CVE-2022-47382HIGH

An authenticated remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.

May 15, 2023
8.8
CVE-2022-47381HIGH

An authenticated remote attacker may use a stack based out-of-bounds write vulnerability in multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.

May 15, 2023
8.8
CVE-2022-47380HIGH

An authenticated remote attacker may use a stack based  out-of-bounds write vulnerability in multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution.

May 15, 2023
8.8
CVE-2022-47379HIGH

An authenticated, remote attacker may use a out-of-bounds write vulnerability in multiple CODESYS products in multiple versions to write data into memory which can lead to a denial-of-service condition, memory overwriting, or remote code execution.

May 15, 2023
8.8
CVE-2023-2575HIGH

Advantech EKI-1524, EKI-1522, EKI-1521 devices through 1.21 are affected by a Stack-based Buffer Overflow vulnerability, which can be triggered by authenticated users via a crafted POST request.

May 8, 2023
8.8
CVE-2023-2574HIGH

Advantech EKI-1524, EKI-1522, EKI-1521 devices through 1.21 are affected by an command injection vulnerability in the device name input field, which can be triggered by authenticated users via a crafted POST request.

May 8, 2023
8.8
CVE-2023-2573HIGH

Advantech EKI-1524, EKI-1522, EKI-1521 devices through 1.21 are affected by an command injection vulnerability in the NTP server input field, which can be triggered by authenticated users via a crafted POST request.

May 8, 2023
8.8
CVE-2023-1109HIGH

In Phoenix Contacts ENERGY AXC PU Web service an authenticated restricted user of the web frontend can access, read, write and create files throughout the file system using specially crafted URLs via the upload and download functionality of the web service. This may lead to full control of the service.

Apr 17, 2023
8.8
CVE-2023-1144HIGH

Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contains an improper access control vulnerability in which an attacker can use the Device-Gateway service and bypass authorization, which could result in privilege escalation.

Mar 27, 2023
8.8
CVE-2023-1143HIGH

In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use Lua scripts, which could allow an attacker to remotely execute arbitrary code.

Mar 27, 2023
8.8
CVE-2023-1141HIGH

Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contain a command injection vulnerability that could allow an attacker to inject arbitrary commands, which could result in remote code execution.

Mar 27, 2023
8.8
CVE-2023-1139HIGH

Delta Electronics InfraSuite Device Master versions prior to 1.0.5 are affected by a deserialization vulnerability targeting the Device-gateway service, which could allow deserialization of requests prior to authentication, resulting in remote code execution.

Mar 27, 2023
8.8
CVE-2022-4224HIGH

In multiple products of CODESYS v3 in multiple versions a remote low privileged user could utilize this vulnerability to read and modify system files and OS resources or DoS the device.

Mar 23, 2023
8.8
CVE-2018-25048HIGH

The CODESYS runtime system in multiple versions allows an remote low privileged attacker to use a path traversal vulnerability to access and modify all system files as well as DoS the device.

Mar 23, 2023
8.8
CVE-2023-0228HIGH

Improper Authentication vulnerability in ABB Symphony Plus S+ Operations.This issue affects Symphony Plus S+ Operations: from 2.X through 2.1 SP2, 2.2, from 3.X through 3.3 SP1, 3.3 SP2.

Mar 2, 2023
8.8
CVE-2023-0444HIGH

A privilege escalation vulnerability exists in Delta Electronics InfraSuite Device Master 00.00.02a. A default user 'User', which is in the 'Read Only User' group, can view the password of another default user 'Administrator', which is in the 'Administrator' group. This allows any lower privileged user to log in as an administrator.

Jan 26, 2023
8.8
CVE-2022-42139HIGH

Delta Electronics DVW-W02W2-E2 1.5.0.10 is vulnerable to Command Injection via Crafted URL.

Dec 14, 2022
8.8
CVE-2022-43506HIGH

SQL Injection in HandlerTag_KID.ashx in Delta Electronics DIAEnergie versions prior to v1.9.02.001 allows an attacker to inject SQL queries via Network

Nov 17, 2022
8.8
CVE-2022-43457HIGH

SQL Injection in HandlerPage_KID.ashx in Delta Electronics DIAEnergie versions prior to v1.9.02.001 allows an attacker to inject SQL queries via Network

Nov 17, 2022
8.8
CVE-2022-43452HIGH

SQL Injection in FtyInfoSetting.aspx in Delta Electronics DIAEnergie versions prior to v1.9.02.001 allows an attacker to inject SQL queries via Network

Nov 17, 2022
8.8
CVE-2022-43447HIGH

SQL Injection in AM_EBillAnalysis.aspx in Delta Electronics DIAEnergie versions prior to v1.9.02.001 allows an attacker to inject SQL queries via Network

Nov 17, 2022
8.8
CVE-2022-41775HIGH

SQL Injection in Handler_CFG.ashx in Delta Electronics DIAEnergie versions prior to v1.9.02.001 allows an attacker to inject SQL queries via Network

Nov 17, 2022
8.8
CVE-2022-41779HIGH

Delta Electronics InfraSuite Device Master versions 00.00.01a and prior deserialize network packets without proper verification. If the device connects to an attacker-controlled server, the attacker could send maliciously crafted packets that would be deserialized and executed, leading to remote code execution.

Oct 31, 2022
8.8
CVE-2022-41644HIGH

Delta Electronics InfraSuite Device Master versions 00.00.01a and prior lacks authentication for a function that changes group privileges. An attacker could use this to create a denial-of-service state or escalate their own privileges.

Oct 31, 2022
8.8
CVE-2022-3158HIGH

Rockwell Automation FactoryTalk VantagePoint versions 8.0, 8.10, 8.20, 8.30, 8.31 are vulnerable to an input validation vulnerability. The FactoryTalk VantagePoint SQL Server lacks input validation when users enter SQL statements to retrieve information from the back-end database. If successfully exploited, this could allow a user with basic user privileges to perform remote code execution on the server.

Oct 17, 2022
8.8
CVE-2022-38743HIGH

Rockwell Automation FactoryTalk VantagePoint versions 8.0, 8.10, 8.20, 8.30, 8.31 are vulnerable to an improper access control vulnerability. The FactoryTalk VantagePoint SQL Server account could allow a malicious user with read-only privileges to execute SQL statements in the back-end database. If successfully exploited, this could allow the attacker to execute arbitrary code and gain access to restricted data.

Oct 17, 2022
8.8
CVE-2022-2333HIGH

If an attacker manages to trick a valid user into loading a malicious DLL, the attacker may be able to achieve code execution in Honeywell SoftMaster version 4.51 application’s context and permissions.

Sep 16, 2022
8.8
CVE-2022-30243HIGH

Honeywell Alerton Visual Logic through 2022-05-04 allows unauthenticated programming writes from remote users. This enables code to be stored on the controller and then run without verification. A user with malicious intent can send a crafted packet to change and/or stop the program without the knowledge of other users, altering the controller's function. After the programming change, the program needs to be overwritten in order for the controller to restore its original operational function.

Jul 15, 2022
8.8
CVE-2022-32143HIGH

In multiple CODESYS products, file download and upload function allows access to internal files in the working directory e.g. firmware files of the PLC. All requests are processed on the controller only if no level 1 password is configured on the controller or if remote attacker has previously successfully authenticated himself to the controller. A successful Attack may lead to a denial of service, change of local files, or drain of confidential Information. User interaction is not required

Jun 24, 2022
8.8
CVE-2022-32138HIGH

In multiple CODESYS products, a remote attacker may craft a request which may cause an unexpected sign extension, resulting in a denial-of-service condition or memory overwrite.

Jun 24, 2022
8.8
CVE-2022-32137HIGH

In multiple CODESYS products, a low privileged remote attacker may craft a request, which may cause a heap-based buffer overflow, resulting in a denial-of-service condition or memory overwrite. User interaction is not required.

Jun 24, 2022
8.8
CVE-2022-22729HIGH

CAMS for HIS Server contained in the following Yokogawa Electric products improperly authenticate the receiving packets. The authentication may be bypassed via some crafted packets: CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, and Exaopc versions from R3.72.00 to R3.79.00.

Mar 11, 2022
8.8
CVE-2022-21808HIGH

Path traversal vulnerability exists in CAMS for HIS Server contained in the following Yokogawa Electric products: CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00.

Mar 11, 2022
8.8
CVE-2022-22509HIGH

In Phoenix Contact FL SWITCH Series 2xxx in version 3.00 an incorrect privilege assignment allows an low privileged user to enable full access to the device configuration.

Feb 2, 2022
8.8
CVE-2021-40396HIGH

A privilege escalation vulnerability exists in the installation of Advantech DeviceOn/iService 1.1.7. A specially-crafted file can be replaced in the system to escalate privileges to NT SYSTEM authority. An attacker can provide a malicious file to trigger this vulnerability.

Jan 28, 2022
8.8
CVE-2021-40389HIGH

A privilege escalation vulnerability exists in the installation of Advantech DeviceOn/iEdge Server 1.0.2. A specially-crafted file can be replaced in the system to escalate privileges to NT SYSTEM authority. An attacker can provide a malicious file to trigger this vulnerability.

Jan 28, 2022
8.8
CVE-2021-40388HIGH

A privilege escalation vulnerability exists in Advantech SQ Manager Server 1.0.6. A specially-crafted file can be replaced in the system to escalate privileges to NT SYSTEM authority. An attacker can provide a malicious file to trigger this vulnerability.

Jan 28, 2022
8.8
CVE-2021-21917HIGH

An exploitable SQL injection vulnerability exist in the ‘group_list’ page of the Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted HTTP request at '‘ord’ parameter. An attacker can make authenticated HTTP requests to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery.

Dec 22, 2021
8.8
CVE-2021-21916HIGH

An exploitable SQL injection vulnerability exist in the ‘group_list’ page of the Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted HTTP request at 'description_filter’ parameter. An attacker can make authenticated HTTP requests to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery.

Dec 22, 2021
8.8
CVE-2021-21915HIGH

An exploitable SQL injection vulnerability exist in the ‘group_list’ page of the Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted HTTP request at ‘company_filter’ parameter. An attacker can make authenticated HTTP requests to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery.

Dec 22, 2021
8.8
CVE-2021-38418HIGH

Delta Electronics DIALink versions 1.2.4.0 and prior runs by default on HTTP, which may allow an attacker to be positioned between the traffic and perform a machine-in-the-middle attack to access information without authorization.

Nov 3, 2021
8.8
CVE-2021-39279HIGH

Certain MOXA devices allow Authenticated Command Injection via /forms/web_importTFTP. This affects WAC-2004 1.7, WAC-1001 2.1, WAC-1001-T 2.1, OnCell G3470A-LTE-EU 1.7, OnCell G3470A-LTE-EU-T 1.7, TAP-323-EU-CT-T 1.3, TAP-323-US-CT-T 1.3, TAP-323-JP-CT-T 1.3, WDR-3124A-EU 2.3, WDR-3124A-EU-T 2.3, WDR-3124A-US 2.3, and WDR-3124A-US-T 2.3.

Sep 7, 2021
8.8
CVE-2021-20994HIGH

In multiple managed switches by WAGO in different versions an attacker may trick a legitimate user to click a link to inject possible malicious code into the Web-Based Management.

May 13, 2021
8.8
CVE-2021-29238HIGH

CODESYS Automation Server before 1.16.0 allows cross-site request forgery (CSRF).

May 3, 2021
8.8
CVE-2020-13555HIGH

An exploitable local privilege elevation vulnerability exists in the file system permissions of Advantech WebAccess/SCADA 9.0.1 installation. In COM Server Application Privilege Escalation, an attacker can either replace binary or loaded modules to execute code with NT SYSTEM privilege.

Feb 17, 2021
8.8
CVE-2020-13553HIGH

An exploitable local privilege elevation vulnerability exists in the file system permissions of Advantech WebAccess/SCADA 9.0.1 installation. In webvrpcs Run Key Privilege Escalation in installation folder of WebAccess, an attacker can either replace binary or loaded modules to execute code with NT SYSTEM privilege.

Feb 17, 2021
8.8
CVE-2020-13552HIGH

An exploitable local privilege elevation vulnerability exists in the file system permissions of Advantech WebAccess/SCADA 9.0.1 installation. In privilege escalation via multiple service executables in installation folder of WebAccess, an attacker can either replace binary or loaded modules to execute code with NT SYSTEM privilege.

Feb 17, 2021
8.8
CVE-2020-13551HIGH

An exploitable local privilege elevation vulnerability exists in the file system permissions of Advantech WebAccess/SCADA 9.0.1 installation. In privilege escalation via PostgreSQL executable, an attacker can either replace binary or loaded modules to execute code with NT SYSTEM privilege.

Feb 17, 2021
8.8
CVE-2020-27261HIGH

The Omron CX-One Version 4.60 and prior is vulnerable to a stack-based buffer overflow, which may allow an attacker to remotely execute arbitrary code.

Feb 9, 2021
8.8
CVE-2020-27259HIGH

The Omron CX-One Version 4.60 and prior may allow an attacker to supply a pointer to arbitrary memory locations, which may allow an attacker to remotely execute arbitrary code.

Feb 9, 2021
8.8
CVE-2020-25198HIGH

The built-in WEB server for MOXA NPort IAW5000A-I/O firmware version 2.1 or lower has incorrectly implemented protections from session fixation, which may allow an attacker to gain access to a session and hijack it by stealing the user’s cookies.

Dec 23, 2020
8.8
CVE-2020-25194HIGH

The built-in WEB server for MOXA NPort IAW5000A-I/O firmware version 2.1 or lower has improper privilege management, which may allow an attacker with user privileges to perform requests with administrative privileges.

Dec 23, 2020
8.8
CVE-2020-12519HIGH

On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS an attacker can use this vulnerability i.e. to open a reverse shell with root privileges.

Dec 17, 2020
8.8
CVE-2020-12517HIGH

On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS an authenticated low privileged user could embed malicious Javascript code to gain admin rights when the admin user visits the vulnerable website (local privilege escalation).

Dec 17, 2020
8.8
CVE-2020-12033HIGH

In Rockwell Automation FactoryTalk Services Platform, all versions, the redundancy host service (RdcyHost.exe) does not validate supplied identifiers, which could allow an unauthenticated, adjacent attacker to execute remote COM objects with elevated privileges.

Jun 23, 2020
8.8
CVE-2020-12026HIGH

Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple relative path traversal vulnerabilities exist that may allow a low privilege user to overwrite files outside the application’s control.

May 8, 2020
8.8
CVE-2020-6081HIGH

An exploitable code execution vulnerability exists in the PLC_Task functionality of 3S-Smart Software Solutions GmbH CODESYS Runtime 3.5.14.30. A specially crafted network request can cause remote code execution. An attacker can send a malicious packet to trigger this vulnerability.

May 7, 2020
8.8
CVE-2020-8477HIGH

The installations for ABB System 800xA Information Manager versions 5.1, 6.0 to 6.0.3.2 and 6.1 wrongly contain an auxiliary component. An attacker is able to use this for an XSS-like attack to an authenticated local user, which might lead to execution of arbitrary code.

Apr 22, 2020
8.8
CVE-2020-10607HIGH

In Advantech WebAccess, Versions 8.4.2 and prior. A stack-based buffer overflow vulnerability caused by a lack of proper validation of the length of user-supplied data may allow remote code execution.

Mar 27, 2020
8.8
CVE-2020-6982HIGH

In Honeywell WIN-PAK 4.7.2, Web and prior versions, the header injection vulnerability has been identified, which may allow remote code execution.

Mar 24, 2020
8.8
CVE-2020-7005HIGH

In Honeywell WIN-PAK 4.7.2, Web and prior versions, the affected product is vulnerable to a cross-site request forgery, which may allow an attacker to remotely execute arbitrary code.

Mar 24, 2020
8.8
CVE-2020-5546HIGH

Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware version 1.0.7 and earlier allows an attacker on the same network segment to stop the network functions or execute malware via a specially crafted packet.

Mar 16, 2020
8.8
CVE-2020-9436HIGH

PHOENIX CONTACT TC ROUTER 3002T-4G through 2.05.3, TC ROUTER 2002T-3G through 2.05.3, TC ROUTER 3002T-4G VZW through 2.05.3, TC ROUTER 3002T-4G ATT through 2.05.3, TC CLOUD CLIENT 1002-4G through 2.03.17, and TC CLOUD CLIENT 1002-TXTX through 1.03.17 devices allow authenticated users to inject system commands through a modified POST request to a specific URL.

Mar 12, 2020
8.8
CVE-2019-9102HIGH

An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. A predictable mechanism of generating tokens allows remote attackers to bypass the cross-site request forgery (CSRF) protection mechanism.

Mar 11, 2020
8.8
CVE-2019-5162HIGH

An exploitable improper access control vulnerability exists in the iw_webs account settings functionality of the Moxa AWK-3131A firmware version 1.13. A specially crafted user name entry can cause the overwrite of an existing user account password, resulting in remote shell access to the device as that user. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.

Feb 25, 2020
8.8
CVE-2019-5153HIGH

An exploitable remote code execution vulnerability exists in the iw_webs configuration parsing functionality of the Moxa AWK-3131A firmware version 1.13. A specially crafted user name entry can cause an overflow of an error message buffer, resulting in remote code execution. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.

Feb 25, 2020
8.8
CVE-2019-5143HIGH

An exploitable format string vulnerability exists in the iw_console conio_writestr functionality of the Moxa AWK-3131A firmware version 1.13. A specially crafted time server entry can cause an overflow of the time server buffer, resulting in remote code execution. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.

Feb 25, 2020
8.8
CVE-2019-5141HIGH

An exploitable command injection vulnerability exists in the iw_webs functionality of the Moxa AWK-3131A firmware version 1.13. A specially crafted iw_serverip parameter can cause user input to be reflected in a subsequent iw_system call, resulting in remote control over the device. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.

Feb 25, 2020
8.8
CVE-2019-5140HIGH

An exploitable command injection vulnerability exists in the iwwebs functionality of the Moxa AWK-3131A firmware version 1.13. A specially crafted diagnostic script file name can cause user input to be reflected in a subsequent iwsystem call, resulting in remote control over the device. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.

Feb 25, 2020
8.8
CVE-2019-5136HIGH

An exploitable privilege escalation vulnerability exists in the iw_console functionality of the Moxa AWK-3131A firmware version 1.13. A specially crafted menu selection string can cause an escape from the restricted console, resulting in system access as the root user. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.

Feb 25, 2020
8.8
CVE-2020-8997HIGH

Older generation Abbott FreeStyle Libre sensors allow remote attackers within close proximity to enable write access to memory via a specific NFC unlock command. NOTE: The vulnerability is not present in the FreeStyle Libre 14-day in the U.S (announced in August 2018) and FreeStyle Libre 2 outside the U.S (announced in October 2018).

Feb 16, 2020
8.8
CVE-2020-8858HIGH

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Moxa MGate 5105-MB-EIP firmware version 4.1. Authentication is required to exploit this vulnerability. The specific flaw exists within the DestIP parameter within MainPing.asp. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9552.

Feb 14, 2020
8.8
CVE-2019-10995HIGH

ABB CP651 HMI products revision BSP UN30 v1.76 and prior implement hidden administrative accounts that are used during the provisioning phase of the HMI interface.

Jan 14, 2020
8.8
CVE-2019-18251HIGH

In Omron CX-Supervisor, Versions 3.5 (12) and prior, Omron CX-Supervisor ships with Teamviewer Version 5.0.8703 QS. This version of Teamviewer is vulnerable to an obsolete function vulnerability requiring user interaction to exploit.

Nov 26, 2019
8.8
CVE-2019-9008HIGH

An issue was discovered in 3S-Smart CODESYS V3 through 3.5.12.30. A user with low privileges can take full control over the runtime.

Sep 17, 2019
8.8
CVE-2019-9013HIGH

An issue was discovered in 3S-Smart CODESYS V3 products. The application may utilize non-TLS based encryption, which results in user credentials being insufficiently protected during transport. All variants of the following CODESYS V3 products in all versions containing the CmpUserMgr component are affected regardless of the CPU type or operating system: CODESYS Control for BeagleBone, CODESYS Control for emPC-A/iMX6, CODESYS Control for IOT2000, CODESYS Control for Linux, CODESYS Control for PFC100, CODESYS Control for PFC200, CODESYS Control for Raspberry Pi, CODESYS Control RTE V3, CODESYS Control RTE V3 (for Beckhoff CX), CODESYS Control Win V3 (also part of the CODESYS Development System setup), CODESYS V3 Simulation Runtime (part of the CODESYS Development System), CODESYS Control V3 Runtime System Toolkit, CODESYS HMI V3.

Aug 15, 2019
8.8
CVE-2019-10961HIGH

In Advantech WebAccess HMI Designer Version 2.1.9.23 and prior, processing specially crafted MCR files lacking proper validation of user supplied data may cause the system to write outside the intended buffer area, allowing remote code execution.

Aug 2, 2019
8.8
CVE-2018-11427HIGH

CSRF tokens are not used in the web application of Moxa OnCell G3100-HSPA Series version 1.4 Build 16062919 and prior, which makes it possible to perform CSRF attacks on the device administrator.

Jul 3, 2019
8.8
CVE-2019-7225HIGH

The ABB HMI components implement hidden administrative accounts that are used during the provisioning phase of the HMI interface. These credentials allow the provisioning tool "Panel Builder 600" to flash a new interface and Tags (MODBUS coils) mapping to the HMI. These credentials are the idal123 password for the IdalMaster account, and the exor password for the exor account. These credentials are used over both HTTP(S) and FTP. There is no option to disable or change these undocumented credentials. An attacker can use these credentials to login to ABB HMI to read/write HMI configuration files and also to reset the device. This affects ABB CP635 HMI, CP600 HMIClient, Panel Builder 600, IDAL FTP server, IDAL HTTP server, and multiple other HMI components.

Jun 27, 2019
8.8
CVE-2019-7226HIGH

The ABB IDAL HTTP server CGI interface contains a URL that allows an unauthenticated attacker to bypass authentication and gain access to privileged functions. Specifically, /cgi/loginDefaultUser creates a session in an authenticated state and returns the session ID along with what may be the username and cleartext password of the user. An attacker can then supply an IDALToken value in a cookie, which will allow them to perform privileged operations such as restarting the service with /cgi/restart. A GET request to /cgi/loginDefaultUser may result in "1 #S_OK IDALToken=532c8632b86694f0232a68a0897a145c admin admin" or a similar response.

Jun 27, 2019
8.8
CVE-2019-7228HIGH

The ABB IDAL HTTP server mishandles format strings in a username or cookie during the authentication process. Attempting to authenticate with the username %25s%25p%25x%25n will crash the server. Sending %08x.AAAA.%08x.%08x will log memory content from the stack.

Jun 27, 2019
8.8
CVE-2019-7232HIGH

The ABB IDAL HTTP server is vulnerable to a buffer overflow when a long Host header is sent in a web request. The Host header value overflows a buffer and overwrites a Structured Exception Handler (SEH) address. An unauthenticated attacker can submit a Host header value of 2047 bytes or more to overflow the buffer and overwrite the SEH address, which can then be leveraged to execute attacker-controlled code on the server.

Jun 24, 2019
8.8
CVE-2019-7230HIGH

The ABB IDAL FTP server mishandles format strings in a username during the authentication process. Attempting to authenticate with the username %s%p%x%d will crash the server. Sending %08x.AAAA.%08x.%08x will log memory content from the stack.

Jun 24, 2019
8.8
CVE-2019-12870HIGH

An issue was discovered in PHOENIX CONTACT PC Worx through 1.86, PC Worx Express through 1.86, and Config+ through 1.86. A manipulated PC Worx or Config+ project file could lead to an Uninitialized Pointer and remote code execution. The attacker needs to get access to an original PC Worx or Config+ project file to be able to manipulate it. After manipulation, the attacker needs to exchange the original file with the manipulated one on the application programming workstation.

Jun 24, 2019
8.8
CVE-2019-12869HIGH

An issue was discovered in PHOENIX CONTACT PC Worx through 1.86, PC Worx Express through 1.86, and Config+ through 1.86. A manipulated PC Worx or Config+ project file could lead to an Out-Of-Bounds Read, Information Disclosure, and remote code execution. The attacker needs to get access to an original PC Worx or Config+ project file to be able to manipulate it. After manipulation, the attacker needs to exchange the original file with the manipulated one on the application programming workstation.

Jun 24, 2019
8.8
CVE-2019-12871HIGH

An issue was discovered in PHOENIX CONTACT PC Worx through 1.86, PC Worx Express through 1.86, and Config+ through 1.86. A manipulated PC Worx or Config+ project file could lead to a Use-After-Free and remote code execution. The attacker needs to get access to an original PC Worx or Config+ project file to be able to manipulate it. After manipulation, the attacker needs to exchange the original file with the manipulated one on the application programming workstation.

Jun 24, 2019
8.8
CVE-2019-6584HIGH

A vulnerability has been identified in SIEMENS LOGO!8 (6ED1052-xyyxx-0BA8 FS:01 to FS:06 / Firmware version V1.80.xx and V1.81.xx), SIEMENS LOGO!8 (6ED1052-xyy08-0BA0 FS:01 / Firmware version < V1.82.02). The integrated webserver does not invalidate the Session ID upon user logout. An attacker that successfully extracted a valid Session ID is able to use it even after the user logs out. The security vulnerability could be exploited by an attacker in a privileged network position who is able to read the communication between the affected device and the user or by an attacker who is able to obtain valid Session IDs through other means. The user must invoke a session to the affected device. At the time of advisory publication no public exploitation of this security vulnerability was known.

Jun 12, 2019
8.8
CVE-2018-10703HIGH

An issue was discovered on Moxa AWK-3121 1.14 devices. It provides functionality so that an administrator can run scripts on the device to troubleshoot any issues. However, the same functionality allows an attacker to execute commands on the device. The POST parameter "iw_serverip" is susceptible to buffer overflow. By crafting a packet that contains a string of 480 characters, it is possible for an attacker to execute the attack.

Jun 7, 2019
8.8
CVE-2018-10702HIGH

An issue was discovered on Moxa AWK-3121 1.14 devices. It provides functionality so that an administrator can run scripts on the device to troubleshoot any issues. However, the same functionality allows an attacker to execute commands on the device. The POST parameter "iw_filename" is susceptible to command injection via shell metacharacters.

Jun 7, 2019
8.8
CVE-2018-10701HIGH

An issue was discovered on Moxa AWK-3121 1.14 devices. It provides functionality so that an administrator can run scripts on the device to troubleshoot any issues. However, the same functionality allows an attacker to execute commands on the device. The POST parameter "iw_filename" is susceptible to buffer overflow. By crafting a packet that contains a string of 162 characters, it is possible for an attacker to execute the attack.

Jun 7, 2019
8.8
CVE-2018-10699HIGH

An issue was discovered on Moxa AWK-3121 1.14 devices. The Moxa AWK 3121 provides certfile upload functionality so that an administrator can upload a certificate file used for connecting to the wireless network. However, the same functionality allows an attacker to execute commands on the device. The POST parameter "iw_privatePass" is susceptible to this injection. By crafting a packet that contains shell metacharacters, it is possible for an attacker to execute the attack.

Jun 7, 2019
8.8
CVE-2018-10697HIGH

An issue was discovered on Moxa AWK-3121 1.14 devices. The Moxa AWK 3121 provides ping functionality so that an administrator can execute ICMP calls to check if the network is working correctly. However, the same functionality allows an attacker to execute commands on the device. The POST parameter "srvName" is susceptible to this injection. By crafting a packet that contains shell metacharacters, it is possible for an attacker to execute the attack.

Jun 7, 2019
8.8
CVE-2018-10696HIGH

An issue was discovered on Moxa AWK-3121 1.14 devices. The device provides a web interface to allow an administrator to manage the device. However, this interface is not protected against CSRF attacks, which allows an attacker to trick an administrator into executing actions without his/her knowledge, as demonstrated by the forms/iw_webSetParameters and forms/webSetMainRestart URIs.

Jun 7, 2019
8.8
CVE-2018-10695HIGH

An issue was discovered on Moxa AWK-3121 1.14 devices. It provides alert functionality so that an administrator can send emails to his/her account when there are changes to the device's network. However, the same functionality allows an attacker to execute commands on the device. The POST parameters "to1,to2,to3,to4" are all susceptible to buffer overflow. By crafting a packet that contains a string of 678 characters, it is possible for an attacker to execute the attack.

Jun 7, 2019
8.8
CVE-2018-10693HIGH

An issue was discovered on Moxa AWK-3121 1.14 devices. It provides ping functionality so that an administrator can execute ICMP calls to check if the network is working correctly. However, the same functionality allows an attacker to execute commands on the device. The POST parameter "srvName" is susceptible to a buffer overflow. By crafting a packet that contains a string of 516 characters, it is possible for an attacker to execute the attack.

Jun 7, 2019
8.8
CVE-2018-13993HIGH

The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions 1.0 to 1.34 is prone to CSRF.

May 7, 2019
8.8
CVE-2019-9744HIGH

An issue was discovered on PHOENIX CONTACT FL NAT SMCS 8TX, FL NAT SMN 8TX, FL NAT SMN 8TX-M, and FL NAT SMN 8TX-M-DMG devices. There is unauthorized access to the WEB-UI by attackers arriving from the same source IP address as an authenticated user, because this IP address is used as a session identifier.

Mar 26, 2019
8.8
CVE-2019-9743HIGH

An issue was discovered on PHOENIX CONTACT RAD-80211-XD and RAD-80211-XD/HP-BUS devices. Command injection can occur in the WebHMI component.

Mar 26, 2019
8.8
CVE-2015-6458HIGH

Moxa SoftCMS 1.3 and prior is susceptible to a buffer overflow condition that may crash or allow remote code execution. Moxa released SoftCMS version 1.4 on June 1, 2015, to address the vulnerability.

Mar 21, 2019
8.8
CVE-2015-6457HIGH

Moxa SoftCMS 1.3 and prior is susceptible to a buffer overflow condition that may crash or allow remote code execution. Moxa released SoftCMS version 1.4 on June 1, 2015, to address the vulnerability.

Mar 21, 2019
8.8
CVE-2019-6561HIGH

Cross-site request forgery has been identified in Moxa IKS and EDS, which may allow for the execution of unauthorized actions on the device.

Mar 5, 2019
8.8
CVE-2018-19660HIGH

An exploitable authenticated command-injection vulnerability exists in the web server functionality of Moxa NPort W2x50A products with firmware before 2.2 Build_18082311. A specially crafted HTTP POST request to /goform/webSettingProfileSecurity can result in running OS commands as the root user.

Dec 6, 2018
8.8
CVE-2018-19659HIGH

An exploitable authenticated command-injection vulnerability exists in the web server functionality of Moxa NPort W2x50A products with firmware before 2.2 Build_18082311. A specially crafted HTTP POST request to /goform/net_WebPingGetValue can result in running OS commands as the root user. This is similar to CVE-2017-12120.

Dec 6, 2018
8.8
CVE-2018-15704HIGH

Advantech WebAccess 8.3.2 and below is vulnerable to a stack buffer overflow vulnerability. A remote authenticated attacker could potentially exploit this vulnerability by sending a crafted HTTP request to broadweb/system/opcImg.asp.

Oct 22, 2018
8.8
CVE-2018-18392HIGH

Privilege Escalation via Broken Access Control in Moxa ThingsPro IIoT Gateway and Device Management Software Solutions version 2.1.

Oct 19, 2018
8.8
CVE-2018-18391HIGH

User Privilege Escalation in Moxa ThingsPro IIoT Gateway and Device Management Software Solutions version 2.1.

Oct 19, 2018
8.8
CVE-2018-16282HIGH

A command injection vulnerability in the web server functionality of Moxa EDR-810 V4.2 build 18041013 allows remote attackers to execute arbitrary OS commands with root privilege via the caname parameter to the /xml/net_WebCADELETEGetValue URI.

Sep 20, 2018
8.8
CVE-2018-12980HIGH

An issue was discovered on WAGO e!DISPLAY 762-3000 through 762-3003 devices with firmware before FW 02. The vulnerability allows an authenticated user to upload arbitrary files to the file system with the permissions of the web server.

Jul 12, 2018
8.8
CVE-2018-13793HIGH

Multiple Cross Site Request Forgery (CSRF) vulnerabilities in the HTTP API in ABBYY FlexiCapture before 12 Release 1 Update 7 exist in Web Verification, Web Scanning, Web Capture, Monitoring and Administration, and Login.

Jul 9, 2018
8.8
CVE-2018-7782HIGH

In Schneider Electric Pelco Sarix Professional 1st generation cameras with firmware versions prior to 3.29.69, authenticated users can view passwords in clear text.

Jul 3, 2018
8.8
CVE-2018-7781HIGH

In Schneider Electric Pelco Sarix Professional 1st generation cameras with firmware versions prior to 3.29.69, by sending a specially crafted request an authenticated user can view password in clear text and results in privilege escalation.

Jul 3, 2018
8.8
CVE-2018-7777HIGH

The vulnerability is due to insufficient handling of update_file request parameter on update_module.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. A remote, authenticated attacker can exploit this vulnerability by sending a crafted request to the target server.

Jul 3, 2018
8.8
CVE-2018-7774HIGH

The vulnerability exists within processing of localize.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. The underlying SQLite database query is subject to SQL injection on the username input parameter.

Jul 3, 2018
8.8
CVE-2018-7773HIGH

The vulnerability exists within processing of nfcserver.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. The underlying SQLite database query is subject to SQL injection on the sessionid input parameter.

Jul 3, 2018
8.8
CVE-2018-7772HIGH

The vulnerability exists within processing of applets which are exposed on the web service in Schneider Electric U.motion Builder software versions prior to v1.3.4. The underlying SQLite database query to determine whether a user is logged in is subject to SQL injection on the loginSeed parameter, which can be embedded in the HTTP cookie of the request.

Jul 3, 2018
8.8
CVE-2018-7769HIGH

The vulnerability exists within processing of xmlserver.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. The underlying SQLite database query is subject to SQL injection on the id input parameter.

Jul 3, 2018
8.8
CVE-2018-7768HIGH

The vulnerability exists within processing of loadtemplate.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. The underlying SQLite database query is subject to SQL injection on the tpl input parameter.

Jul 3, 2018
8.8
CVE-2018-7767HIGH

The vulnerability exists within processing of editobject.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. The underlying SQLite database query is subject to SQL injection on the type input parameter.

Jul 3, 2018
8.8
CVE-2018-7766HIGH

The vulnerability exists within processing of track_getdata.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. The underlying SQLite database query is subject to SQL injection on the id input parameter.

Jul 3, 2018
8.8
CVE-2018-7765HIGH

The vulnerability exists within processing of track_import_export.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. The underlying SQLite database query is subject to SQL injection on the object_id input parameter.

Jul 3, 2018
8.8
CVE-2018-4845HIGH

A vulnerability has been identified in RAPIDLab 1200 systems / RAPIDPoint 400 systems / RAPIDPoint 500 systems (All versions_without_ use of Siemens Healthineers Informatics products), RAPIDLab 1200 Series (All versions < V3.3 _with_ Siemens Healthineers Informatics products), RAPIDPoint 500 systems (All versions >= V3.0 _with_ Siemens Healthineers Informatics products), RAPIDPoint 500 systems (V2.4.X_with_ Siemens Healthineers Informatics products), RAPIDPoint 500 systems (All versions =< V2.3 _with_ Siemens Healthineers Informatics products), RAPIDPoint 400 systems (All versions _with_ Siemens Healthineers Informatics products). Remote attackers with either local or remote credentialed access to the "Remote View" feature might be able to elevate their privileges, compromising confidentiality, integrity, and availability of the system. No special skills or user interaction are required to perform this attack. At the time of advisory publication, no public exploitation of this security vulnerability is known. Siemens Healthineers confirms the security vulnerability and provides mitigations to resolve the security issue.

Jun 26, 2018
8.8
CVE-2017-7906HIGH

In ABB IP GATEWAY 3.39 and prior, the web server does not sufficiently verify that a request was performed by the authenticated user, which may allow an attacker to launch a request impersonating that user.

Jun 6, 2018
8.8
CVE-2017-14434HIGH

An exploitable command injection vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted HTTP POST can cause a privilege escalation resulting in root shell. An attacker can inject OS commands into the remoteNetmask0= parameter in the "/goform/net\_Web\_get_value" uri to trigger this vulnerability.

May 14, 2018
8.8
CVE-2017-14433HIGH

An exploitable command injection vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted HTTP POST can cause a privilege escalation resulting in root shell. An attacker can inject OS commands into the remoteNetwork0= parameter in the "/goform/net\_Web\_get_value" uri to trigger this vulnerability.

May 14, 2018
8.8
CVE-2017-14432HIGH

An exploitable command injection vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted HTTP POST can cause a privilege escalation resulting in root shell. An attacker can inject OS commands into the openvpnServer0_tmp= parameter in the "/goform/net\_Web\_get_value" uri to trigger this vulnerability.

May 14, 2018
8.8
CVE-2017-12126HIGH

An exploitable cross-site request forgery vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted HTTP packet can cause cross-site request forgery. An attacker can create malicious HTML to trigger this vulnerability.

May 14, 2018
8.8
CVE-2017-12125HIGH

An exploitable command injection vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted HTTP POST can cause a privilege escalation resulting in root shell. An attacker can inject OS commands into the CN= parm in the "/goform/net_WebCSRGen" uri to trigger this vulnerability.

May 14, 2018
8.8
CVE-2017-12123HIGH

An exploitable clear text transmission of password vulnerability exists in the web server and telnet functionality of Moxa EDR-810 V4.1 build 17030317. An attacker can look at network traffic to get the admin password for the device. The attacker can then use the credentials to login as admin.

May 14, 2018
8.8
CVE-2017-12121HIGH

An exploitable command injection vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted HTTP POST can cause a privilege escalation resulting in root shell. An attacker can inject OS commands into the rsakey\_name= parm in the "/goform/WebRSAKEYGen" uri to trigger this vulnerability.

May 14, 2018
8.8
CVE-2017-12120HIGH

An exploitable command injection vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted HTTP POST can cause a privilege escalation, resulting in a root shell. An attacker can inject OS commands into the ip= parm in the "/goform/net_WebPingGetValue" URI to trigger this vulnerability.

May 14, 2018
8.8
CVE-2018-7509HIGH

WPLSoft in Delta Electronics versions 2.45.0 and prior writes data from a file outside the bounds of the intended buffer space, which could cause memory corruption or may allow remote code execution.

May 4, 2018
8.8
CVE-2018-7507HIGH

WPLSoft in Delta Electronics versions 2.45.0 and prior utilizes a fixed length heap buffer where a value larger than the buffer can be read from a file into the buffer, causing the buffer to be overwritten, which may allow remote code execution or cause the application to crash.

May 4, 2018
8.8
CVE-2018-7494HIGH

WPLSoft in Delta Electronics versions 2.45.0 and prior utilizes a fixed length stack buffer where a value larger than the buffer can be read from a file into the buffer, causing the buffer to be overwritten, which may allow remote code execution or cause the application to crash.

May 4, 2018
8.8
CVE-2017-12712HIGH

The authentication algorithm in Abbott Laboratories pacemakers manufactured prior to Aug 28, 2017, which involves an authentication key and time stamp, can be compromised or bypassed, which may allow a nearby attacker to issue unauthorized commands to the pacemaker via RF communications. CVSS v3 base score: 7.5, CVSS vector string: AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H. Abbott has developed a firmware update to help mitigate the identified vulnerabilities.

Apr 25, 2018
8.8
CVE-2018-7240HIGH

A vulnerability exists in Schneider Electric's Modicon Quantum in all versions of the communication modules which could allow arbitrary code execution. An FTP command used to upgrade the firmware of the module can be misused to cause a denial of service, or in extreme cases, to load a malicious firmware.

Apr 18, 2018
8.8
CVE-2018-7230HIGH

A XML external entity (XXE) vulnerability exists in the import.cgi of the web interface component of the Schneider Electric's Pelco Sarix Professional in all firmware versions prior to 3.29.67.

Mar 9, 2018
8.8
CVE-2017-17888HIGH

cgi-bin/write.cgi in Anti-Web through 3.8.7, as used on NetBiter / HMS, Ouman EH-net, Alliance System WS100 --> AWU 500, Sauter ERW100F001, Carlo Gavazzi SIU-DLG, AEDILIS SMART-1, SYXTHSENSE WebBiter, ABB SREA, and ASCON DY WebServer devices, allows remote authenticated users to execute arbitrary OS commands via crafted multipart/form-data content, a different vulnerability than CVE-2017-9097.

Dec 27, 2017
8.8
CVE-2017-16731HIGH

An Unprotected Transport of Credentials issue was discovered in ABB Ellipse 8.3 through Ellipse 8.9 released prior to December 2017 (including Ellipse Select). A vulnerability exists in the authentication of Ellipse to LDAP/AD using the LDAP protocol. An attacker could exploit the vulnerability by sniffing local network traffic, allowing the discovery of authentication credentials.

Dec 20, 2017
8.8
CVE-2017-7969HIGH

A cross-site request forgery vulnerability exists on the Secure Gateway component of Schneider Electric's PowerSCADA Anywhere v1.0 redistributed with PowerSCADA Expert v8.1 and PowerSCADA Expert v8.2 and Citect Anywhere version 1.0 for multiple state-changing requests. This type of attack requires some level of social engineering in order to get a legitimate user to click on or access a malicious link/site containing the CSRF attack.

Sep 26, 2017
8.8
CVE-2017-12704HIGH

A heap-based buffer overflow issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. Researchers have identified multiple vulnerabilities where there is a lack of proper validation of the length of user-supplied data prior to copying it to the heap-based buffer, which could allow an attacker to execute arbitrary code under the context of the process.

Aug 30, 2017
8.8
CVE-2017-12702HIGH

An Externally Controlled Format String issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. String format specifiers based on user provided input are not properly validated, which could allow an attacker to execute arbitrary code.

Aug 30, 2017
8.8
CVE-2017-6328HIGH

The Symantec Messaging Gateway before 10.6.3-267 can encounter an issue of cross site request forgery (also known as one-click attack and is abbreviated as CSRF or XSRF), which is a type of malicious exploit of a website where unauthorized commands are transmitted from a user that the web application trusts. A CSRF attack attempts to exploit the trust that a specific website has in a user's browser.

Aug 11, 2017
8.8
CVE-2017-7966HIGH

A DLL Hijacking vulnerability in the programming software in Schneider Electric's SoMachine HVAC v2.1.0 allows a remote attacker to execute arbitrary code on the targeted system. The vulnerability exists due to the improper loading of a DLL.

Jun 7, 2017
8.8
CVE-2017-7917HIGH

A Cross-Site Request Forgery issue was discovered in Moxa OnCell G3110-HSPA Version 1.3 build 15082117 and previous versions, OnCell G3110-HSDPA Version 1.2 Build 09123015 and previous versions, OnCell G3150-HSDPA Version 1.4 Build 11051315 and previous versions, OnCell 5104-HSDPA, OnCell 5104-HSPA, and OnCell 5004-HSPA. The application does not sufficiently verify if a request was intentionally provided by the user who submitted the request, which could allow an attacker to modify the configuration of the device.

May 29, 2017
8.8
CVE-2017-5156HIGH

A Cross-Site Request Forgery issue was discovered in Schneider Electric Wonderware InTouch Access Anywhere, version 11.5.2 and prior. The client request may be forged from a different site. This will allow an external site to access internal RDP systems on behalf of the currently logged in user.

Apr 20, 2017
8.8
CVE-2016-8718HIGH

An exploitable Cross-Site Request Forgery vulnerability exists in the Web Application functionality of Moxa AWK-3131A Wireless Access Point running firmware 1.1. A specially crafted form can trick a client into making an unintentional request to the web server which will be treated as an authentic request.

Apr 12, 2017
8.8
CVE-2017-5671HIGH

Honeywell Intermec PM23, PM42, PM43, PC23, PC43, PD43, and PC42 industrial printers before 10.11.013310 and 10.12.x before 10.12.013309 have /usr/bin/lua installed setuid to the itadmin account, which allows local users to conduct a BusyBox jailbreak attack and obtain root privileges by overwriting the /etc/shadow file.

Mar 29, 2017
8.8
CVE-2017-2689HIGH

Siemens RUGGEDCOM ROX I (all versions) allow an authenticated user to bypass access restrictions in the web interface at port 10000/TCP to obtain privileged file system access or change configuration settings.

Mar 29, 2017
8.8
CVE-2017-2688HIGH

The integrated web server in Siemens RUGGEDCOM ROX I (all versions) at port 10000/TCP could allow remote attackers to perform actions with the privileges of an authenticated user, provided the targeted user has an active session and is induced into clicking on a malicious link or into visiting a malicious website, aka CSRF.

Mar 29, 2017
8.8
CVE-2017-2682HIGH

The Siemens web application RUGGEDCOM NMS < V1.2 on port 8080/TCP and 8081/TCP could allow a remote attacker to perform a Cross-Site Request Forgery (CSRF) attack, potentially allowing an attacker to execute administrative operations, provided the targeted user has an active session and is induced to trigger a malicious request.

Feb 27, 2017
8.8
CVE-2016-9365HIGH

An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Requests are not verified to be intentionally submitted by the proper user (CROSS-SITE REQUEST FORGERY).

Feb 13, 2017
8.8
CVE-2016-5809HIGH

An issue was discovered on Schneider Electric IONXXXX series power meters ION73XX series, ION75XX series, ION76XX series, ION8650 series, ION8800 series, and PM5XXX series. There is no CSRF Token generated to authenticate the user during a session. Successful exploitation of this vulnerability can allow unauthorized configuration changes to be made and saved.

Feb 13, 2017
8.8
CVE-2016-5793HIGH

Unquoted Windows search path vulnerability in Moxa Active OPC Server before 2.4.19 allows local users to gain privileges via a Trojan horse executable file in the %SYSTEMDRIVE% directory.

Sep 24, 2016
8.8
CVE-2016-2285HIGH

Cross-site request forgery (CSRF) vulnerability on Moxa MiiNePort_E1_4641 devices with firmware 1.1.10 Build 09120714, MiiNePort_E1_7080 devices with firmware 1.1.10 Build 09120714, MiiNePort_E2_1242 devices with firmware 1.1 Build 10080614, MiiNePort_E2_4561 devices with firmware 1.1 Build 10080614, and MiiNePort E3 devices with firmware 1.0 Build 11071409 allows remote attackers to hijack the authentication of arbitrary users.

May 31, 2016
8.8
CVE-2015-3946HIGH

Cross-site request forgery (CSRF) vulnerability in Advantech WebAccess before 8.1 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.

Jan 15, 2016
8.8
CVE-2025-53418HIGH

Delta Electronics COMMGR has Stack-based Buffer Overflow vulnerability.

Aug 26, 2025
8.6
CVE-2025-2521HIGH

The Honeywell Experion PKS and OneWireless WDM contains a Memory Buffer vulnerability in the component Control Data Access (CDA). An attacker could potentially exploit this vulnerability, leading to an Overread Buffers, which could result in improper index validation against buffer borders leading to remote code execution. Honeywell recommends updating to the most recent version of Honeywell Experion PKS: 520.2 TCU9 HF1 and 530.1 TCU3 HF1 and OneWireless: 322.5 and 331.1. The affected Experion PKS products are C300 PCNT02, C300 PCNT05, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E. The Experion PKS versions affected are from 520.1 through 520.2 TCU9 and from 530 through 530 TCU3.The OneWireless WDM affected versions are 322.1 through 322.4 and 330.1 through 330.3.

Jul 10, 2025
8.6
CVE-2024-3493HIGH

A specific malformed fragmented packet type (fragmented packets may be generated automatically by devices that send large amounts of data) can cause a major nonrecoverable fault (MNRF) Rockwell Automation's ControlLogix 5580, Guard Logix 5580, CompactLogix 5380, and 1756-EN4TR. If exploited, the affected product will become unavailable and require a manual restart to recover it. Additionally, an MNRF could result in a loss of view and/or control of connected devices.

Apr 15, 2024
8.6
CVE-2024-21916HIGH

A denial-of-service vulnerability exists in specific Rockwell Automation ControlLogix ang GuardLogix controllers. If exploited, the product could potentially experience a major nonrecoverable fault (MNRF). The device will restart itself to recover from the MNRF.

Jan 31, 2024
8.6
CVE-2022-45790HIGH

The Omron FINS protocol has an authenticated feature to prevent access to memory regions. Authentication is susceptible to bruteforce attack, which may allow an adversary to gain access to protected memory. This access can allow overwrite of values including programmed logic.

Jan 22, 2024
8.6
CVE-2023-2423HIGH

A vulnerability was discovered in the Rockwell Automation Armor PowerFlex device when the product sends communications to the local event log. Threat actors could exploit this vulnerability by sending an influx of network commands, causing the product to generate an influx of event log traffic at a high rate. If exploited, the product would stop normal operations and self-reset creating a denial-of-service condition. The error code would need to be cleared prior to resuming normal operations.

Aug 8, 2023
8.6
CVE-2023-0426HIGH

ABB is aware of vulnerabilities in the product versions listed below. An update is available that resolves the reported vulnerabilities in the product versions under maintenance. An attacker who successfully exploited one or more of these vulnerabilities could cause the product to stop or make the product inaccessible. Stack-based Buffer Overflow vulnerability in ABB Freelance controllers AC 700F (conroller modules), ABB Freelance controllers AC 900F (controller modules).This issue affects:  Freelance controllers AC 700F:  from 9.0;0 through V9.2 SP2, through Freelance 2013, through Freelance 2013SP1, through Freelance 2016, through Freelance 2016SP1, through Freelance 2019 , through Freelance 2019 SP1, through Freelance 2019 SP1 FP1;  Freelance controllers AC 900F:  through Freelance 2013, through Freelance 2013SP1, through Freelance 2016, through Freelance 2016SP1, through Freelance 2019, through Freelance 2019 SP1, through Freelance 2019 SP1 FP1.

Aug 7, 2023
8.6
CVE-2023-0425HIGH

ABB is aware of vulnerabilities in the product versions listed below. An update is available that resolves the reported vulnerabilities in the product versions under maintenance. An attacker who successfully exploited one or more of these vulnerabilities could cause the product to stop or make the product inaccessible.  Numeric Range Comparison Without Minimum Check vulnerability in ABB Freelance controllers AC 700F (Controller modules), ABB Freelance controllers AC 900F (controller modules).This issue affects: Freelance controllers AC 700F:  from 9.0;0 through V9.2 SP2, through Freelance 2013, through Freelance 2013SP1, through Freelance 2016, through Freelance 2016SP1, through Freelance 2019, through Freelance 2019 SP1, through Freelance 2019 SP1 FP1;  Freelance controllers AC 900F:  Freelance 2013, through Freelance 2013SP1, through Freelance 2016, through Freelance 2016SP1, through Freelance 2019, through Freelance 2019 SP1, through Freelance 2019 SP1 FP1.

Aug 7, 2023
8.6
CVE-2022-3752HIGH

An unauthorized user could use a specially crafted sequence of Ethernet/IP messages, combined with heavy traffic loading to cause a denial-of-service condition in Rockwell Automation Logix controllers resulting in a major non-recoverable fault. If the target device becomes unavailable, a user would have to clear the fault and redownload the user project file to bring the device back online and continue normal operation.

Dec 19, 2022
8.6
CVE-2022-3157HIGH

A vulnerability exists in the Rockwell Automation controllers that allows a malformed CIP request to cause a major non-recoverable fault (MNRF) and a denial-of-service condition (DOS).

Dec 16, 2022
8.6
CVE-2022-40265HIGH

Improper Input Validation vulnerability in Mitsubishi Electric Corporation MELSEC iQ-R Series RJ71EN71 Firmware version "65" and prior and Mitsubishi Electric Corporation MELSEC iQ-R Series R04/08/16/32/120ENCPU Network Part Firmware version "65" and prior allows a remote unauthenticated attacker to cause a Denial of Service condition by sending specially crafted packets. A system reset is required for recovery.

Nov 30, 2022
8.6
CVE-2022-25164HIGH

Cleartext Storage of Sensitive Information vulnerability in Mitsubishi Electric GX Works3 versions from 1.000A to 1.095Z and Mitsubishi Electric MX OPC UA Module Configurator-R versions 1.08J and prior allows a remote unauthenticated attacker to disclose sensitive information. As a result, unauthenticated attackers can gain unauthorized access to the MELSEC CPU module and the MELSEC OPC UA server module.

Nov 25, 2022
8.6
CVE-2022-2465HIGH

Rockwell Automation ISaGRAF Workbench software versions 6.0 through 6.6.9 are affected by a Deserialization of Untrusted Data vulnerability. ISaGRAF Workbench does not limit the objects that can be deserialized. This vulnerability allows attackers to craft a malicious serialized object that, if opened by a local user in ISaGRAF Workbench, may result in remote code execution. This vulnerability requires user interaction to be successfully exploited.

Aug 25, 2022
8.6
CVE-2022-25161HIGH

Improper Input Validation vulnerability in Mitsubishi Electric MELSEC iQ-F series FX5U-xMy/z(x=32,64,80, y=T,R, z=ES,DS,ESS,DSS) with serial number 17X**** or later and versions prior to 1.270, Mitsubishi Electric Mitsubishi Electric MELSEC iQ-F series FX5U-xMy/z(x=32,64,80, y=T,R, z=ES,DS,ESS,DSS) with serial number 179**** and prior and versions prior to 1.073, MELSEC iQ-F series FX5UC-xMy/z(x=32,64,96, y=T,R, z=D,DSS) with serial number 17X**** or later and versions prior to 1.270, Mitsubishi Electric MELSEC iQ-F series FX5UC-xMy/z(x=32,64,96, y=T,R, z=D,DSS) with serial number 179**** and prior and versions prior to 1.073, Mitsubishi Electric MELSEC iQ-F series FX5UC-32MT/DS-TS versions prior to 1.270, Mitsubishi Electric MELSEC iQ-F series FX5UC-32MT/DSS-TS versions prior to 1.270, Mitsubishi Electric MELSEC iQ-F series FX5UC-32MR/DS-TS versions prior to 1.270, Mitsubishi Electric MELSEC iQ-F series FX5UJ-xMy/z(x=24,40,60, y=T,R, z=ES,ESS) versions prior to 1.030, Mitsubishi Electric MELSEC iQ-F series FX5UJ-xMy/ES-A(x=24,40,60, y=T,R) versions prior to 1.031 and Mitsubishi Electric MELSEC iQ-F series FX5S-xMy/z(x=30,40,60,80, y=T,R, z=ES,ESS) version 1.000 allows a remote unauthenticated attacker to cause a DoS condition for the product's program execution or communication by sending specially crafted packets. System reset of the product is required for recovery.

May 18, 2022
8.6
CVE-2021-22275HIGH

Buffer Overflow vulnerability in B&R Automation Runtime webserver allows an unauthenticated network-based attacker to stop the cyclic program on the device and cause a denial of service.

May 13, 2022
8.6
CVE-2021-27475HIGH

Rockwell Automation Connected Components Workbench v12.00.00 and prior does not limit the objects that can be deserialized. This vulnerability allows attackers to craft a malicious serialized object that, if opened by a local user in Connected Components Workbench, may result in remote code execution. This vulnerability requires user interaction to be successfully exploited.

Mar 23, 2022
8.6
CVE-2021-33012HIGH

Rockwell Automation MicroLogix 1100, all versions, allows a remote, unauthenticated attacker sending specially crafted commands to cause the PLC to fault when the controller is switched to RUN mode, which results in a denial-of-service condition. If successfully exploited, this vulnerability will cause the controller to fault whenever the controller is switched to RUN mode.

Jul 9, 2021
8.6
CVE-2021-22659HIGH

Rockwell Automation MicroLogix 1400 Version 21.6 and below may allow a remote unauthenticated attacker to send a specially crafted Modbus packet allowing the attacker to retrieve or modify random values in the register. If successfully exploited, this may lead to a buffer overflow resulting in a denial-of-service condition. The FAULT LED will flash RED and communications may be lost. Recovery from denial-of-service condition requires the fault to be cleared by the user.

Mar 25, 2021
8.6
CVE-2020-24685HIGH

An unauthenticated specially crafted packet sent by an attacker over the network will cause a denial-of-service (DoS) vulnerability. Vulnerability allows attacker to stop the PLC. After stopping (ERR LED flashing red), physical access to the PLC is required in order to restart the application. This issue affects: ABB AC500 V2 products with onboard Ethernet version 2.8.4 and prior versions.

Feb 9, 2021
8.6
CVE-2019-13538HIGH

3S-Smart Software Solutions GmbH CODESYS V3 Library Manager, all versions prior to 3.5.16.0, allows the system to display active library content without checking its validity, which may allow the contents of manipulated libraries to be displayed or executed. The issue also exists for source libraries, but 3S-Smart Software Solutions GmbH strongly recommends distributing compiled libraries only.

Sep 17, 2019
8.6
CVE-2018-13990HIGH

The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions prior to 1.35 is vulnerable to brute-force attacks, because of Improper Restriction of Excessive Authentication Attempts.

May 6, 2019
8.6
CVE-2018-17924HIGH

Rockwell Automation MicroLogix 1400 Controllers and 1756 ControlLogix Communications Modules An unauthenticated, remote threat actor could send a CIP connection request to an affected device, and upon successful connection, send a new IP configuration to the affected device even if the controller in the system is set to Hard RUN mode. When the affected device accepts this new IP configuration, a loss of communication occurs between the device and the rest of the system as the system traffic is still attempting to communicate with the device via the overwritten IP address.

Dec 7, 2018
8.6
CVE-2017-9627HIGH

An Uncontrolled Resource Consumption issue was discovered in Schneider Electric Wonderware ArchestrA Logger, versions 2017.426.2307.1 and prior. The uncontrolled resource consumption vulnerability could allow an attacker to exhaust the memory resources of the machine, causing a denial of service.

Jul 7, 2017
8.6
CVE-2017-7901HIGH

A Predictable Value Range from Previous Values issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 programmable-logic controllers 1763-L16AWA, Series A and B, Version 16.00 and prior versions; 1763-L16BBB, Series A and B, Version 16.00 and prior versions; 1763-L16BWA, Series A and B, Version 16.00 and prior versions; and 1763-L16DWD, Series A and B, Version 16.00 and prior versions and Allen-Bradley MicroLogix 1400 programmable logic controllers 1766-L32AWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWAA, Series A and B, Version 16.00 and prior versions; 1766-L32BXB, Series A and B, Version 16.00 and prior versions; 1766-L32BXBA, Series A and B, Version 16.00 and prior versions; and 1766-L32AWAA, Series A and B, Version 16.00 and prior versions. Insufficiently random TCP initial sequence numbers are generated, which may allow an attacker to predict the numbers from previous values. This may allow an attacker to spoof or disrupt TCP connections, resulting in a denial of service for the target device.

Jun 30, 2017
8.6
CVE-2017-7914HIGH

A Missing Authorization issue was discovered in Rockwell Automation PanelView Plus 6 700-1500 6.00.04, 6.00.05, 6.00.42, 6.00-20140306, 6.10.20121012, 6.10-20140122, 7.00-20121012, 7.00-20130108, 7.00-20130325, 7.00-20130619, 7.00-20140128, 7.00-20140310, 7.00-20140429, 7.00-20140621, 7.00-20140729, 7.00-20141022, 8.00-20140730, and 8.00-20141023. There is no authorization check when connecting to the device, allowing an attacker remote access.

Jun 14, 2017
8.6
CVE-2017-5143HIGH

An issue was discovered in Honeywell XL Web II controller XL1000C500 XLWebExe-2-01-00 and prior, and XLWeb 500 XLWebExe-1-02-08 and prior. A user without authenticating can make a directory traversal attack by accessing a specific URL.

Feb 13, 2017
8.6
CVE-2016-8368HIGH

An issue was discovered in Mitsubishi Electric Automation MELSEC-Q series Ethernet interface modules QJ71E71-100, all versions, QJ71E71-B5, all versions, and QJ71E71-B2, all versions. The affected Ethernet interface module is connected to a MELSEC-Q PLC, which may allow a remote attacker to connect to the PLC via Port 5002/TCP and cause a denial of service, requiring the PLC to be reset to resume operation. This is caused by an Unrestricted Externally Accessible Lock.

Feb 13, 2017
8.6
CVE-2016-5814HIGH

Buffer overflow in Rockwell Automation RSLogix Micro Starter Lite, RSLogix Micro Developer, RSLogix 500 Starter Edition, RSLogix 500 Standard Edition, and RSLogix 500 Professional Edition allows remote attackers to execute arbitrary code via a crafted RSS project file.

Sep 19, 2016
8.6
CVE-2015-7907HIGH

Directory traversal vulnerability in the web server on Honeywell Midas gas detectors before 1.13b3 and Midas Black gas detectors before 2.13b3 allows remote attackers to bypass authentication, and write to a configuration file or trigger a calibration or test, via unspecified vectors.

Dec 21, 2015
8.6
CVE-2024-5650HIGH

DLL Hijacking vulnerability has been found in CENTUM CAMS Log server provided by Yokogawa Electric Corporation. If an attacker is somehow able to intrude into a computer that installed affected product or access to a shared folder, by replacing the DLL file with a tampered one, it is possible to execute arbitrary programs with the authority of the SYSTEM account. The affected products and versions are as follows: CENTUM CS 3000 R3.08.10 to R3.09.50 CENTUM VP R4.01.00 to R4.03.00, R5.01.00 to R5.04.20, R6.01.00 to R6.11.10.

Jun 17, 2024
8.5
CVE-2021-32960HIGH

Rockwell Automation FactoryTalk Services Platform v6.11 and earlier, if FactoryTalk Security is enabled and deployed contains a vulnerability that may allow a remote, authenticated attacker to bypass FactoryTalk Security policies based on the computer name. If successfully exploited, this may allow an attacker to have the same privileges as if they were logged on to the client machine.

Apr 1, 2022
8.5
CVE-2015-6464HIGH

The administrative web interface on Moxa EDS-405A and EDS-408A switches with firmware before 3.6 allows remote authenticated users to bypass a read-only protection mechanism by using Firefox with a web-developer plugin.

Sep 11, 2015
8.5
CVE-2013-0664HIGH

The FactoryCast service on the Schneider Electric Quantum 140NOE77111 and 140NWM10000, M340 BMXNOE0110x, and Premium TSXETY5103 PLC modules allows remote authenticated users to send Modbus messages, and consequently execute arbitrary code, by embedding these messages in SOAP HTTP POST requests.

Apr 4, 2013
8.5
CVE-2012-6439HIGH

When an affected product receives a valid CIP message from an unauthorized or unintended source to Port 2222/TCP, Port 2222/UDP, Port 44818/TCP, or Port 44818/UDP that changes the product’s configuration and network parameters, a DoS condition can occur. This situation could cause loss of availability and a disruption of communication with other connected devices.  Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400

Jan 24, 2013
8.5
CVE-2012-3009HIGH

Siemens COMOS before 9.1 Patch 413, 9.2 before Update 03 Patch 023, and 10.0 before Patch 005 allows remote authenticated users to obtain database administrative access via unspecified method calls.

Aug 16, 2012
8.5
CVE-2011-4879HIGH

miniweb.exe in the HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime does not properly handle URIs beginning with a 0xfa character, which allows remote attackers to read data from arbitrary memory locations or cause a denial of service (application crash) via a crafted POST request.

Feb 3, 2012
8.5
CVE-2025-13779HIGH

Missing authentication for critical function vulnerability in ABB AWIN GW100 rev.2, ABB AWIN GW120.This issue affects AWIN GW100 rev.2: 2.0-0, 2.0-1; AWIN GW120: 1.2-0, 1.2-1.

Mar 13, 2026
8.3
CVE-2025-13777HIGH

Authentication bypass by capture-replay vulnerability in ABB AWIN GW100 rev.2, ABB AWIN GW120.This issue affects AWIN GW100 rev.2: 2.0-0, 2.0-1; AWIN GW120: 1.2-0, 1.2-1.

Mar 13, 2026
8.3
CVE-2025-41659HIGH

A low-privileged attacker can remotely access the PKI folder of the CODESYS Control runtime system and thus read and write certificates and its keys. This allows sensitive data to be extracted or to accept certificates as trusted. Although all services remain available, only unencrypted communication is possible if the certificates are deleted.

Aug 4, 2025
8.3
CVE-2024-0220HIGH

B&R Automation Studio Upgrade Service and B&R Technology Guarding use insufficient cryptography for communication to the upgrade and the licensing servers. A network-based attacker could exploit the vulnerability to execute arbitrary code on the products or sniff sensitive data.

Feb 22, 2024
8.3
CVE-2021-22289HIGH

Improper Input Validation vulnerability in the project upload mechanism in B&R Automation Studio version >=4.0 may allow an unauthenticated network attacker to execute code.

Aug 11, 2022
8.3
CVE-2020-14496HIGH

Successful exploitation of this vulnerability for multiple Mitsubishi Electric Factory Automation Engineering Software Products of various versions could allow an attacker to escalate privilege and execute malicious programs, which could cause a denial-of-service condition, and allow information to be disclosed, tampered with, and/or destroyed.

May 19, 2022
8.3
CVE-2020-14523HIGH

Multiple Mitsubishi Electric Factory Automation products have a vulnerability that allows an attacker to execute arbitrary code.

Feb 11, 2022
8.3
CVE-2020-14521HIGH

Multiple Mitsubishi Electric Factory Automation engineering software products have a malicious code execution vulnerability. A malicious attacker could use this vulnerability to obtain information, modify information, and cause a denial-of-service condition.

Feb 11, 2022
8.3
CVE-2019-7229HIGH

The ABB CP635 HMI uses two different transmission methods to upgrade its firmware and its software components: "Utilization of USB/SD Card to flash the device" and "Remote provisioning process via ABB Panel Builder 600 over FTP." Neither of these transmission methods implements any form of encryption or authenticity checks against the new firmware HMI software binary files.

Jun 24, 2019
8.3
CVE-2015-6481HIGH

The login function in the RequestController class in Moxa OnCell Central Manager before 2.2 has a hardcoded root password, which allows remote attackers to obtain administrative access via a login session.

Dec 21, 2015
8.3
CVE-2015-6480HIGH

The MessageBrokerServlet servlet in Moxa OnCell Central Manager before 2.2 does not require authentication, which allows remote attackers to obtain administrative access via a command, as demonstrated by the addUserAndGroup action.

Dec 21, 2015
8.3
CVE-2014-3888HIGH

Stack-based buffer overflow in BKFSim_vhfd.exe in Yokogawa CENTUM CS 1000, CENTUM CS 3000 R3.09.50 and earlier, CENTUM VP R5.03.20 and earlier, Exaopc R3.72.00 and earlier, B/M9000CS R5.05.01 and earlier, and B/M9000 VP R7.03.01 and earlier, when FCS/Test Function is enabled, allows remote attackers to execute arbitrary code via a crafted packet.

Jul 10, 2014
8.3
CVE-2014-0782HIGH

Stack-based buffer overflow in BKESimmgr.exe in the Expanded Test Functions package in Yokogawa CENTUM CS 1000, CENTUM CS 3000 Entry Class R3.09.50 and earlier, CENTUM VP R5.03.00 and earlier, CENTUM VP Entry Class R5.03.00 and earlier, Exaopc R3.71.02 and earlier, B/M9000CS R5.05.01 and earlier, and B/M9000 VP R7.03.01 and earlier allows remote attackers to execute arbitrary code via a crafted packet.

May 16, 2014
8.3
CVE-2014-2250HIGH

The random-number generator on Siemens SIMATIC S7-1200 CPU PLC devices with firmware before 4.0 does not have sufficient entropy, which makes it easier for remote attackers to defeat cryptographic protection mechanisms and hijack sessions via unspecified vectors, a different vulnerability than CVE-2014-2251.

Mar 24, 2014
8.3
CVE-2014-2251HIGH

The random-number generator on Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 does not have sufficient entropy, which makes it easier for remote attackers to defeat cryptographic protection mechanisms and hijack sessions via unspecified vectors.

Mar 16, 2014
8.3
CVE-2014-0784HIGH

Stack-based buffer overflow in BKBCopyD.exe in Yokogawa CENTUM CS 3000 R3.09.50 and earlier allows remote attackers to execute arbitrary code via a crafted TCP packet.

Mar 14, 2014
8.3
CVE-2013-6925HIGH

The integrated HTTPS server in Siemens RuggedCom ROS before 3.12.2 allows remote attackers to hijack web sessions by predicting a session id value.

Dec 17, 2013
8.3
CVE-2013-5709HIGH

The authentication implementation in the web server on Siemens SCALANCE X-200 switches with firmware before 5.0.0 does not use a sufficient source of entropy for generating values of random numbers, which makes it easier for remote attackers to hijack sessions by predicting a value.

Sep 17, 2013
8.3
CVE-2025-1924HIGH

A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation. If affected product receive maliciously crafted packets, a DoS attack may cause Vnet/IP communication functions to stop or arbitrary programs to be executed. The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier

Feb 13, 2026
8.2
CVE-2025-11774HIGH

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in the software keyboard function (hereinafter referred to as "keypad function") of Mitsubishi Electric GENESIS64 versions 10.97.2 CFR3 and prior, Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97.2 CFR3 and prior, Mitsubishi Electric ICONICS Suite versions 10.97.2 CFR3 and prior, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite versions 10.97.2 CFR3 and prior, Mitsubishi Electric MobileHMI versions 10.97.2 CFR3 and prior, Mitsubishi Electric Iconics Digital Solutions MobileHMI versions 10.97.2 CFR3 and prior, and Mitsubishi Electric MC Works64 all versions allows a local attacker to execute arbitrary executable files (EXE) when a legitimate user uses the keypad function by tampering with the configuration file for the function. This could allow the attacker to disclose, tamper with, delete, or destroy information stored on the PC where the affected product is installed, or cause a denial-of-service (DoS) condition on the system, through the execution of the EXE.

Dec 19, 2025
8.2
CVE-2025-3947HIGH

The Honeywell Experion PKS contains an Integer Underflow vulnerability in the component Control Data Access (CDA). An attacker could potentially exploit this vulnerability, leading to Input Data Manipulation, which could result in improper integer data value checking during subtraction leading to a denial of service. Honeywell recommends updating to the most recent version of Honeywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1. The affected Experion PKS products are C300 PCNT02, C300 PCNT05, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E. The Experion PKS versions affected are from 520.1 through 520.2 TCU9 and from 530 through 530 TCU3.

Jul 10, 2025
8.2
CVE-2025-3946HIGH

The Honeywell Experion PKS and OneWireless WDM contains a Deployment of Wrong Handler vulnerability in the component Control Data Access (CDA). An attacker could potentially exploit this vulnerability, leading to Input Data Manipulation, which could result in incorrect handling of packets leading to remote code execution. Honeywell recommends updating to the most recent version of Honeywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1 and OneWireless: 322.5 and 331.1. The affected Experion PKS products are C300 PCNT02, C300 PCNT05, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E. The Experion PKS versions affected are from 520.1 through 520.2 TCU9 and from 530 through 530 TCU3. The OneWireless WDM affected versions are 322.1 through 322.4 and 330.1 through 330.3.

Jul 10, 2025
8.2
CVE-2024-51544HIGH

Service Control vulnerabilities allow access to service restart requests and vm configuration settings.  Affected products: ABB ASPECT - Enterprise v3.08.02; NEXUS Series v3.08.02; MATRIX Series v3.08.02

Dec 5, 2024
8.2
CVE-2024-51543HIGH

Information Disclosure vulnerabilities allow access to application configuration information.  Affected products: ABB ASPECT - Enterprise v3.08.02; NEXUS Series v3.08.02; MATRIX Series v3.08.02

Dec 5, 2024
8.2
CVE-2024-51542HIGH

Configuration Download vulnerabilities allow access to dependency configuration information.  Affected products: ABB ASPECT - Enterprise v3.08.02; NEXUS Series v3.08.02; MATRIX Series v3.08.02

Dec 5, 2024
8.2
CVE-2024-51541HIGH

Local File Inclusion vulnerabilities allow access to sensitive system information.  Affected products: ABB ASPECT - Enterprise v3.08.02; NEXUS Series v3.08.02; MATRIX Series v3.08.02

Dec 5, 2024
8.2
CVE-2024-48847HIGH

MD5 Checksum Bypass vulnerabilities where found exploiting a weakness in the way an application dependency calculates or validates MD5 checksum hashes.  Affected products: ABB ASPECT - Enterprise v3.08.01; NEXUS Series v3.08.01; MATRIX Series v3.08.01

Dec 5, 2024
8.2
CVE-2024-1220HIGH

A stack-based buffer overflow in the built-in web server in Moxa NPort W2150A/W2250A Series firmware version 2.3 and prior allows a remote attacker to exploit the vulnerability by sending crafted payload to the web service. Successful exploitation of the vulnerability could result in denial of service.

Mar 6, 2024
8.2
CVE-2023-5131HIGH

A heap buffer-overflow exists in Delta Electronics ISPSoft. An anonymous attacker can exploit this vulnerability by enticing a user to open a specially crafted DVP file to achieve code execution.

Jan 18, 2024
8.2
CVE-2023-5130HIGH

A buffer overflow vulnerability exists in Delta Electronics WPLSoft. An anonymous attacker can exploit this vulnerability by enticing a user to open a specially crafted DVP file to achieve code execution.

Jan 18, 2024
8.2
CVE-2023-29464HIGH

FactoryTalk Linx, in the Rockwell Automation PanelView Plus, allows an unauthenticated threat actor to read data from memory via crafted malicious packets. Sending a size larger than the buffer size results in leakage of data from memory resulting in an information disclosure. If the size is large enough, it causes communications over the common industrial protocol to become unresponsive to any type of packet, resulting in a denial-of-service to FactoryTalk Linx over the common industrial protocol.

Oct 13, 2023
8.2
CVE-2023-37862HIGH

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 an unauthenticated remote attacker can access upload-functions of the HTTP API. This might cause certificate errors for SSL-connections and might result in a partial denial-of-service.

Aug 9, 2023
8.2
CVE-2021-34567HIGH

In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to provoke a denial of service and an limited out-of-bounds read.

Nov 9, 2022
8.2
CVE-2022-2044HIGH

MOXA NPort 5110: Firmware Versions 2.10 is vulnerable to an out-of-bounds write that may allow an attacker to overwrite values in memory, causing a denial-of-service condition or potentially bricking the device.

Aug 31, 2022
8.2
CVE-2022-33319HIGH

Out-of-bounds Read vulnerability in Mitsubishi Electric GENESIS64 versions 10.97 to 10.97.1, Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97 to 10.97.1, Mitsubishi Electric ICONICS Suite versions 10.97 to 10.97.1, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite versions 10.97 to 10.97.1, Mitsubishi Electric GENESIS32 versions 9.7 and prior, Mitsubishi Electric Iconics Digital Solutions GENESIS32 versions 9.7 and prior, and Mitsubishi Electric MC Works64 versions 4.04E and prior allows a remote unauthenticated attacker to disclose information on memory or cause a Denial of Service (DoS) condition by sending specially crafted packets to the GENESIS64, ICONICS Suite, GENESIS32, or MC Works64 server.

Jul 20, 2022
8.2
CVE-2021-20595HIGH

Improper Restriction of XML External Entity Reference vulnerability in Mitsubishi Electric Air Conditioning System/Centralized Controllers (G-50A Ver.3.35 and prior, GB-50A Ver.3.35 and prior, GB-24A Ver.9.11 and prior, AG-150A-A Ver.3.20 and prior, AG-150A-J Ver.3.20 and prior, GB-50ADA-A Ver.3.20 and prior, GB-50ADA-J Ver.3.20 and prior, EB-50GU-A Ver 7.09 and prior, EB-50GU-J Ver 7.09 and prior, AE-200A Ver 7.93 and prior, AE-200E Ver 7.93 and prior, AE-50A Ver 7.93 and prior, AE-50E Ver 7.93 and prior, EW-50A Ver 7.93 and prior, EW-50E Ver 7.93 and prior, TE-200A Ver 7.93 and prior, TE-50A Ver 7.93 and prior, TW-50A Ver 7.93 and prior, CMS-RMD-J Ver.1.30 and prior), Air Conditioning System/Expansion Controllers (PAC-YG50ECA Ver.2.20 and prior) and Air Conditioning System/BM adapter(BAC-HD150 Ver.2.21 and prior) allows a remote unauthenticated attacker to disclose some of data in the air conditioning system or cause a DoS condition by sending specially crafted packets.

Jul 13, 2021
8.2
CVE-2020-12505HIGH

Improper Authentication vulnerability in WAGO 750-8XX series with FW version <= FW07 allows an attacker to change some special parameters without authentication. This issue affects: WAGO 750-852, WAGO 750-880/xxx-xxx, WAGO 750-881, WAGO 750-831/xxx-xxx, WAGO 750-882, WAGO 750-885/xxx-xxx, WAGO 750-889 in versions FW07 and below.

Sep 30, 2020
8.2
CVE-2020-12499HIGH

In PHOENIX CONTACT PLCnext Engineer version 2020.3.1 and earlier an improper path sanitation vulnerability exists on import of project files.

Jul 21, 2020
8.2
CVE-2019-18352HIGH

Improper access control exists on PHOENIX CONTACT FL NAT 2208 devices before V2.90 and FL NAT 2304-2GC-2SFP devices before V2.90 when using MAC-based port security.

Feb 18, 2020
8.2
CVE-2018-13992HIGH

The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions 1.0 to 1.34 allows for plaintext transmission (HTTP) of user credentials by default.

May 7, 2019
8.2
CVE-2017-12069HIGH

An XXE vulnerability has been identified in OPC Foundation UA .NET Sample Code before 2017-03-21 and Local Discovery Server (LDS) before 1.03.367. Among the affected products are Siemens SIMATIC PCS7 (All versions V8.1 and earlier), SIMATIC WinCC (All versions < V7.4 SP1), SIMATIC WinCC Runtime Professional (All versions < V14 SP1), SIMATIC NET PC Software, and SIMATIC IT Production Suite. By sending specially crafted packets to the OPC Discovery Server at port 4840/tcp, an attacker might cause the system to access various resources chosen by the attacker.

Aug 30, 2017
8.2
CVE-2017-2683HIGH

A non-privileged user of the Siemens web application RUGGEDCOM NMS < V1.2 on port 8080/TCP and 8081/TCP could perform a persistent Cross-Site Scripting (XSS) attack, potentially resulting in obtaining administrative permissions.

Feb 27, 2017
8.2
CVE-2025-14510HIGH

Incorrect Implementation of Authentication Algorithm vulnerability in ABB ABB Ability OPTIMAX.This issue affects ABB Ability OPTIMAX: 6.1, 6.2, from 6.3.0 before 6.3.1-251120, from 6.4.0 before 6.4.1-251120.

Jan 16, 2026
8.1
CVE-2025-14850HIGH

Advantech WebAccess/SCADA is vulnerable to directory traversal, which may allow an attacker to delete arbitrary files.

Dec 18, 2025
8.1
CVE-2023-5404HIGH

Server receiving a malformed message can cause a pointer to be overwritten which can result in a remote code execution or failure. See Honeywell Security Notification for recommendations on upgrading and versioning.

Apr 17, 2024
8.1
CVE-2023-5403HIGH

Server hostname translation to IP address manipulation which could lead to an attacker performing remote code execution or causing a failure. See Honeywell Security Notification for recommendations on upgrading and versioning.

Apr 17, 2024
8.1
CVE-2023-5401HIGH

Server receiving a malformed message based on a using the specified key values can cause a stack overflow vulnerability which could lead to an attacker performing remote code execution or causing a failure. See Honeywell Security Notification for recommendations on upgrading and versioning.

Apr 17, 2024
8.1
CVE-2023-5400HIGH

Server receiving a malformed message based on a using the specified key values can cause a heap overflow vulnerability which could lead to an attacker performing remote code execution or causing a failure.  See Honeywell Security Notification for recommendations on upgrading and versioning.

Apr 17, 2024
8.1
CVE-2023-5397HIGH

Server receiving a malformed message to create a new connection could lead to an attacker performing remote code execution or causing a failure. See Honeywell Security Notification for recommendations on upgrading and versioning.

Apr 17, 2024
8.1
CVE-2023-5395HIGH

Server receiving a malformed message that uses the hostname in an internal table may cause a stack overflow resulting in possible remote code execution. See Honeywell Security Notification for recommendations on upgrading and versioning.

Apr 17, 2024
8.1
CVE-2023-1841HIGH

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Honeywell MPA2 Access Panel (Web server modules) allows XSS Using Invalid Characters.This issue affects MPA2 Access Panel all version prior to R1.00.08.05.  Honeywell released firmware update package MPA2 firmware R1.00.08.05 which addresses this vulnerability. This version and all later versions correct the reported vulnerability.

Feb 29, 2024
8.1
CVE-2022-38742HIGH

Rockwell Automation ThinManager ThinServer versions 11.0.0 - 13.0.0 is vulnerable to a heap-based buffer overflow. An attacker could send a specifically crafted TFTP or HTTPS request, causing a heap-based buffer overflow that crashes the ThinServer process. If successfully exploited, this could expose the server to arbitrary remote code execution.

Sep 23, 2022
8.1
CVE-2022-34838HIGH

Storing Passwords in a Recoverable Format vulnerability in ABB Zenon 8.20 allows an attacker who successfully exploit the vulnerability may add or alter data points and corresponding attributes. Once such engineering data is used the data visualization will be altered for the end user.

Aug 24, 2022
8.1
CVE-2022-0902HIGH

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in flow computer and remote controller products of ABB ( RMC-100 (Standard), RMC-100-LITE, XIO, XFCG5 , XRCG5 , uFLOG5 , UDC) allows an attacker who successfully exploited this vulnerability could insert and run arbitrary code in an affected system node.

Jul 21, 2022
8.1
CVE-2022-32142HIGH

Multiple CODESYS Products are prone to a out-of bounds read or write access. A low privileged remote attacker may craft a request with invalid offset, which can cause an out-of-bounds read or write access, resulting in denial-of-service condition or local memory overwrite, which can lead to a change of local files. User interaction is not required.

Jun 24, 2022
8.1
CVE-2022-1965HIGH

Multiple products of CODESYS implement a improper error handling. A low privilege remote attacker may craft a request, which is not properly processed by the error handling. In consequence, the file referenced by the request could be deleted. User interaction is not required.

Jun 24, 2022
8.1
CVE-2022-22515HIGH

A remote, authenticated attacker could utilize the control program of the CODESYS Control runtime system to use the vulnerability in order to read and modify the configuration file(s) of the affected products.

Apr 7, 2022
8.1
CVE-2022-25159HIGH

Authentication Bypass by Capture-replay vulnerability in Mitsubishi Electric MELSEC iQ-F series FX5U(C) CPU all versions, Mitsubishi Electric MELSEC iQ-F series FX5UJ CPU all versions, Mitsubishi Electric MELSEC iQ-R series R00/01/02CPU all versions, Mitsubishi Electric MELSEC iQ-R series R04/08/16/32/120(EN)CPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120SFCPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PCPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PSFCPU all versions, Mitsubishi Electric MELSEC iQ-R series R16/32/64MTCPU all versions, Mitsubishi Electric MELSEC iQ-R series RJ71C24(-R2/R4) all versions, Mitsubishi Electric MELSEC iQ-R series RJ71EN71 all versions, Mitsubishi Electric MELSEC iQ-R series RJ72GF15-T2 all versions, Mitsubishi Electric MELSEC Q series Q03/04/06/13/26UDVCPU all versions, Mitsubishi Electric MELSEC Q series Q04/06/13/26UDPVCPU all versions, Mitsubishi Electric MELSEC Q series QJ71C24N(-R2/R4) all versions and Mitsubishi Electric MELSEC Q series QJ71E71-100 all versions allows a remote unauthenticated attacker to login to the product by replay attack.

Apr 1, 2022
8.1
CVE-2022-25156HIGH

Use of Weak Hash vulnerability in Mitsubishi Electric MELSEC iQ-F series FX5U(C) CPU all versions, Mitsubishi Electric MELSEC iQ-F series FX5UJ CPU all versions, Mitsubishi Electric MELSEC iQ-R series R00/01/02CPU all versions, Mitsubishi Electric MELSEC iQ-R series R04/08/16/32/120(EN)CPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120SFCPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PCPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PSFCPU all versions, Mitsubishi Electric MELSEC iQ-R series RJ71C24(-R2/R4) all versions, Mitsubishi Electric MELSEC iQ-R series RJ71EN71 all versions, Mitsubishi Electric MELSEC iQ-R series RJ72GF15-T2 all versions, Mitsubishi Electric MELSEC Q series Q03UDECPU all versions, Mitsubishi Electric MELSEC Q series Q04/06/10/13/20/26/50/100UDEHCPU all versions, Mitsubishi Electric MELSEC Q series Q03/04/06/13/26UDVCPU all versions, Mitsubishi Electric MELSEC Q series Q04/06/13/26UDPVCPU all versions, Mitsubishi Electric MELSEC Q series QJ71C24N(-R2/R4) all versions, Mitsubishi Electric MELSEC Q series QJ71E71-100 all versions, Mitsubishi Electric MELSEC Q series QJ72BR15 all versions, Mitsubishi Electric MELSEC Q series QJ72LP25(-25/G/GE) all versions, Mitsubishi Electric MELSEC L series L02/06/26CPU(-P) all versions, Mitsubishi Electric MELSEC L series L26CPU-(P)BT all versions, Mitsubishi Electric MELSEC L series LJ71C24(-R2) all versions, Mitsubishi Electric MELSEC L series LJ71E71-100 all versions and Mitsubishi Electric MELSEC L series LJ72GF15-T2 all versions allows a remote unauthenticated attacker to login to the product by using a password reversed from a previously eavesdropped password hash.

Apr 1, 2022
8.1
CVE-2022-25155HIGH

Use of Password Hash Instead of Password for Authentication vulnerability in Mitsubishi Electric MELSEC iQ-F series FX5U(C) CPU all versions, Mitsubishi Electric MELSEC iQ-F series FX5UJ CPU all versions, Mitsubishi Electric MELSEC iQ-R series R00/01/02CPU all versions, Mitsubishi Electric MELSEC iQ-R series R04/08/16/32/120(EN)CPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120SFCPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PCPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PSFCPU all versions, Mitsubishi Electric MELSEC iQ-R series RJ71GN11-T2 all versions, Mitsubishi Electric MELSEC iQ-R series RJ71GN11-EIP all versions, Mitsubishi Electric MELSEC iQ-R series RJ71C24(-R2/R4) all versions, Mitsubishi Electric MELSEC iQ-R series RJ71EN71 all versions, Mitsubishi Electric MELSEC iQ-R series RJ72GF15-T2 all versions, Mitsubishi Electric MELSEC Q series Q03UDECPU all versions, Mitsubishi Electric MELSEC Q series Q04/06/10/13/20/26/50/100UDEHCPU all versions, Mitsubishi Electric MELSEC Q series Q03/04/06/13/26UDVCPU all versions, Mitsubishi Electric MELSEC Q series Q04/06/13/26UDPVCPU all versions, Mitsubishi Electric MELSEC Q series QJ71C24N(-R2/R4) all versions, Mitsubishi Electric MELSEC Q series QJ71E71-100 all versions, Mitsubishi Electric MELSEC Q series QJ72BR15 all versions, Mitsubishi Electric MELSEC Q series QJ72LP25(-25/G/GE) all versions, Mitsubishi Electric MELSEC L series L02/06/26CPU(-P) all versions, Mitsubishi Electric MELSEC L series L26CPU-(P)BT all versions, Mitsubishi Electric MELSEC L series LJ71C24(-R2) all versions, Mitsubishi Electric MELSEC L series LJ71E71-100 all versions and Mitsubishi Electric MELSEC L series LJ72GF15-T2 all versions allows a remote unauthenticated attacker to login to the product by replaying an eavesdropped password hash.

Apr 1, 2022
8.1
CVE-2022-22151HIGH

CAMS for HIS Log Server contained in the following Yokogawa Electric products fails to properly neutralize log outputs: CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, and Exaopc versions from R3.72.00 to R3.79.00.

Mar 11, 2022
8.1
CVE-2022-22145HIGH

CAMS for HIS Log Server contained in the following Yokogawa Electric products is vulnerable to uncontrolled resource consumption. CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00.

Mar 11, 2022
8.1
CVE-2022-21177HIGH

There is a path traversal vulnerability in CAMS for HIS Log Server contained in the following Yokogawa Electric products: CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, andfrom R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00.

Mar 11, 2022
8.1
CVE-2021-34595HIGH

A crafted request with invalid offsets may cause an out-of-bounds read or write access in CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56, resulting in a denial-of-service condition or local memory overwrite.

Oct 26, 2021
8.1
CVE-2019-13533HIGH

In Omron PLC CJ series, all versions, and Omron PLC CS series, all versions, an attacker could monitor traffic between the PLC and the controller and replay requests that could result in the opening and closing of industrial valves.

Dec 16, 2019
8.1
CVE-2018-10694HIGH

An issue was discovered on Moxa AWK-3121 1.14 devices. The device provides a Wi-Fi connection that is open and does not use any encryption mechanism by default. An administrator who uses the open wireless connection to set up the device can allow an attacker to sniff the traffic passing between the user's computer and the device. This can allow an attacker to steal the credentials passing over the HTTP connection as well as TELNET traffic. Also an attacker can MITM the response and infect a user's computer very easily as well.

Jun 7, 2019
8.1
CVE-2018-10690HIGH

An issue was discovered on Moxa AWK-3121 1.14 devices. The device by default allows HTTP traffic thus providing an insecure communication mechanism for a user connecting to the web server. This allows an attacker to sniff the traffic easily and allows an attacker to compromise sensitive data such as credentials.

Jun 7, 2019
8.1
CVE-2018-19616HIGH

An issue was discovered in Rockwell Automation Allen-Bradley PowerMonitor 1000. An unauthenticated user can add/edit/remove administrators because access control is implemented on the client side via a disabled attribute for a BUTTON element.

Dec 26, 2018
8.1
CVE-2018-17896HIGH

Yokogawa STARDOM Controllers FCJ, FCN-100, FCN-RTU, FCN-500, All versions R4.10 and prior, The affected controllers utilize hard-coded credentials which may allow an attacker gain unauthorized access to the maintenance functions and obtain or modify information. This attack can be executed only during maintenance work.

Oct 12, 2018
8.1
CVE-2018-10728HIGH

All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 are prone to buffer overflows (a different vulnerability than CVE-2018-10731).

May 17, 2018
8.1
CVE-2018-8872HIGH

In Schneider Electric Triconex Tricon MP model 3008 firmware versions 10.0-10.4, system calls read directly from memory addresses within the control program area without any verification. Manipulating this data could allow attacker data to be copied anywhere within memory.

May 4, 2018
8.1
CVE-2014-8422HIGH

The web-based management (WBM) interface in Unify (former Siemens) OpenStage SIP and OpenScape Desk Phone IP V3 devices before R3.32.0 generates session cookies with insufficient entropy, which makes it easier for remote attackers to hijack sessions via a brute-force attack.

Apr 12, 2018
8.1
CVE-2018-7236HIGH

A vulnerability exists in Schneider Electric's Pelco Sarix Professional in all firmware versions prior to 3.29.67 which could enable SSH service due to lack of authentication for /login/bin/set_param could enable SSH service.

Mar 9, 2018
8.1
CVE-2017-9963HIGH

A cross-site request forgery vulnerability exists on the Secure Gateway component of Schneider Electric's PowerSCADA Anywhere v1.0 redistributed with PowerSCADA Expert v8.1 and PowerSCADA Expert v8.2 and Citect Anywhere version 1.0 for multiple state-changing requests. This type of attack requires some level of social engineering in order to get a legitimate user to click on or access a malicious link/site containing the CSRF attack.

Feb 12, 2018
8.1
CVE-2017-14263HIGH

Honeywell NVR devices allow remote attackers to create a user account in the admin group by leveraging access to a guest account to obtain a session ID, and then sending that session ID in a userManager.addUser request to the /RPC2 URI. The attacker can login to the device with that new user account to fully control the device.

Sep 11, 2017
8.1
CVE-2017-9940HIGH

A vulnerability was discovered in Siemens SiPass integrated (All versions before V2.70) that could allow an attacker with access to a low-privileged user account to read or write files on the file system of the SiPass integrated server over the network.

Aug 8, 2017
8.1
CVE-2017-6868HIGH

An Improper Authentication issue was discovered in Siemens SIMATIC CP 44x-1 RNA, all versions prior to 1.4.1. An unauthenticated remote attacker may be able to perform administrative actions on the Communication Process (CP) of the RNA series module, if network access to Port 102/TCP is available and the configuration file for the CP is stored on the RNA's CPU.

Jul 7, 2017
8.1
CVE-2016-8712HIGH

An exploitable nonce reuse vulnerability exists in the Web Application functionality of Moxa AWK-3131A Wireless AP running firmware 1.1. The device uses one nonce for all session authentication requests and only changes the nonce if the web application has been idle for 300 seconds.

Apr 13, 2017
8.1
CVE-2016-8379HIGH

An issue was discovered in Moxa ioLogik E1210, firmware Version V2.4 and prior, ioLogik E1211, firmware Version V2.3 and prior, ioLogik E1212, firmware Version V2.4 and prior, ioLogik E1213, firmware Version V2.5 and prior, ioLogik E1214, firmware Version V2.4 and prior, ioLogik E1240, firmware Version V2.3 and prior, ioLogik E1241, firmware Version V2.4 and prior, ioLogik E1242, firmware Version V2.4 and prior, ioLogik E1260, firmware Version V2.4 and prior, ioLogik E1262, firmware Version V2.4 and prior, ioLogik E2210, firmware versions prior to V3.13, ioLogik E2212, firmware versions prior to V3.14, ioLogik E2214, firmware versions prior to V3.12, ioLogik E2240, firmware versions prior to V3.12, ioLogik E2242, firmware versions prior to V3.12, ioLogik E2260, firmware versions prior to V3.13, and ioLogik E2262, firmware versions prior to V3.12. Users are restricted to using short passwords.

Feb 13, 2017
8.1
CVE-2016-8372HIGH

An issue was discovered in Moxa ioLogik E1210, firmware Version V2.4 and prior, ioLogik E1211, firmware Version V2.3 and prior, ioLogik E1212, firmware Version V2.4 and prior, ioLogik E1213, firmware Version V2.5 and prior, ioLogik E1214, firmware Version V2.4 and prior, ioLogik E1240, firmware Version V2.3 and prior, ioLogik E1241, firmware Version V2.4 and prior, ioLogik E1242, firmware Version V2.4 and prior, ioLogik E1260, firmware Version V2.4 and prior, ioLogik E1262, firmware Version V2.4 and prior, ioLogik E2210, firmware versions prior to V3.13, ioLogik E2212, firmware versions prior to V3.14, ioLogik E2214, firmware versions prior to V3.12, ioLogik E2240, firmware versions prior to V3.12, ioLogik E2242, firmware versions prior to V3.12, ioLogik E2260, firmware versions prior to V3.13, and ioLogik E2262, firmware versions prior to V3.12. A password is transmitted in a format that is not sufficiently secure.

Feb 13, 2017
8.1
CVE-2016-8360HIGH

An issue was discovered in Moxa SoftCMS versions prior to Version 1.6. A specially crafted URL request sent to the SoftCMS ASP Webserver can cause a double free condition on the server allowing an attacker to modify memory locations and possibly cause a denial of service or the execution of arbitrary code.

Feb 13, 2017
8.1
CVE-2016-9160HIGH

A vulnerability in SIEMENS SIMATIC WinCC (All versions < SIMATIC WinCC V7.2) and SIEMENS SIMATIC PCS 7 (All versions < SIMATIC PCS 7 V8.0 SP1) could allow a remote attacker to crash an ActiveX component or leak parts of the application memory if a user is tricked into clicking on a malicious link under certain conditions.

Dec 17, 2016
8.1
CVE-2016-0858HIGH

Race condition in Advantech WebAccess before 8.1 allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow) via a crafted request.

Jan 15, 2016
8.1
CVE-2015-6467HIGH

Advantech WebAccess before 8.1 allows remote attackers to execute arbitrary code via vectors involving a browser plugin.

Jan 15, 2016
8.1
CVE-2015-3947HIGH

SQL injection vulnerability in Advantech WebAccess before 8.1 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors.

Jan 15, 2016
8.1
CVE-2021-22291HIGH

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in ABB EIBPORT V3 KNX, ABB EIBPORT V3 KNX GSM.This issue affects EIBPORT V3 KNX: before 3.9.2; EIBPORT V3 KNX GSM: before 3.9.2.

Oct 7, 2025
8.0
CVE-2024-39275HIGH

Cookies of authenticated Advantech ADAM-5630 users remain as active valid cookies when a session is closed. Forging requests with a legitimate cookie, even if the session was terminated, allows an unauthorized attacker to act with the same level of privileges of the legitimate user.

Sep 27, 2024
8.0
CVE-2024-28948HIGH

Advantech ADAM-5630 contains a cross-site request forgery (CSRF) vulnerability. It allows an attacker to partly circumvent the same origin policy, which is designed to prevent different websites from interfering with each other.

Sep 27, 2024
8.0
CVE-2022-30244HIGH

Honeywell Alerton Ascent Control Module (ACM) through 2022-05-04 allows unauthenticated programming writes from remote users. This enables code to be store on the controller and then run without verification. A user with malicious intent can send a crafted packet to change and/or stop the program without the knowledge of other users, altering the controller's function. After the programming change, the program needs to be overwritten in order for the controller to restore its original operational function.

Jul 15, 2022
8.0
CVE-2018-7771HIGH

The vulnerability exists within processing of editscript.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. A directory traversal vulnerability allows a caller with standard user privileges to write arbitrary php files anywhere in the web service directory tree.

Jul 3, 2018
8.0
CVE-2017-12129HIGH

An exploitable Weak Cryptography for Passwords vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317. An attacker could intercept weakly encrypted passwords and could brute force them.

May 14, 2018
8.0
CVE-2013-6926HIGH

The integrated HTTPS server in Siemens RuggedCom ROS before 3.12.2 allows remote authenticated users to bypass intended restrictions on administrative actions by leveraging access to a (1) guest or (2) operator account.

Dec 17, 2013
8.0
CVE-2026-3094HIGH

Delta Electronics CNCSoft-G2 lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.

Mar 4, 2026
7.8
CVE-2026-0975HIGH

Delta Electronics DIAView has Command Injection vulnerability.

Jan 16, 2026
7.8
CVE-2025-14252HIGH

An Improper Access Control vulnerability in Advantech SUSI driver (susi.sys) allows attackers to read/write arbitrary memory, I/O ports, and MSRs, resulting in privilege escalation, arbitrary code execution, and information disclosure. This issue affects Advantech SUSI: 5.0.24335 and prior.

Dec 16, 2025
7.8
CVE-2025-41700HIGH

An unauthenticated attacker can trick a local user into executing arbitrary code by opening a deliberately manipulated CODESYS project file with a CODESYS development system. This arbitrary code is executed in the user context.

Dec 1, 2025
7.8
CVE-2025-40827HIGH

A vulnerability has been identified in Siemens Software Center (All versions < V3.5), Solid Edge SE2025 (All versions < V225.0 Update 10). The affected application is vulnerable to DLL hijacking. This could allow an attacker to execute arbitrary code via placing a crafted DLL file on the system.

Nov 11, 2025
7.8
CVE-2025-9068HIGH

A security issue exists within the Rockwell Automation Driver Package x64 Microsoft Installer File (MSI) repair functionality, installed with FTLinx. Authenticated attackers with valid Windows Users credentials can initiate a repair and hijack the resulting console window for vbpinstall.exe. This allows the launching of a command prompt running with SYSTEM-level privileges, allowing full access to all files, processes, and system resources.

Oct 14, 2025
7.8
CVE-2025-59300HIGH

Delta Electronics DIAScreen lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.

Oct 3, 2025
7.8
CVE-2025-59299HIGH

Delta Electronics DIAScreen lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.

Oct 3, 2025
7.8
CVE-2025-59298HIGH

Delta Electronics DIAScreen lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.

Oct 3, 2025
7.8
CVE-2025-59297HIGH

Delta Electronics DIAScreen lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.

Oct 3, 2025
7.8
CVE-2025-58319HIGH

Delta Electronics CNCSoft-G2 lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.

Sep 24, 2025
7.8
CVE-2025-58317HIGH

Delta Electronics CNCSoft-G2 lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.

Sep 24, 2025
7.8
CVE-2025-53419HIGH

Delta Electronics COMMGR has Code Injection vulnerability.

Aug 26, 2025
7.8
CVE-2025-7033HIGH

A memory abuse issue exists in the Rockwell Automation Arena® Simulation. A custom file can force Arena Simulation to read and write past the end of memory space. Successful use requires user action, such as opening a bad file or webpage. If used, a threat actor could execute code or disclose information.

Aug 5, 2025
7.8
CVE-2025-7032HIGH

A memory abuse issue exists in the Rockwell Automation Arena® Simulation. A custom file can force Arena Simulation to read and write past the end of memory space. Successful use requires user action, such as opening a bad file or webpage. If used, a threat actor could execute code or disclose information.

Aug 5, 2025
7.8
CVE-2025-7025HIGH

A memory abuse issue exists in the Rockwell Automation Arena® Simulation. A custom file can force Arena Simulation to read and write past the end of memory space. Successful use requires user action, such as opening a bad file or webpage. If used, a threat actor could execute code or disclose information.

Aug 5, 2025
7.8
CVE-2025-6377HIGH

A remote code execution security issue exists in the Rockwell Automation Arena®.  A crafted DOE file can force Arena Simulation to write beyond the boundaries of an allocated object. Exploitation requires user interaction, such as opening a malicious file within the software. If exploited, a threat actor could execute arbitrary code on the target system. The software must run under the context of the administrator in order to cause worse case impact. This is reflected in the Rockwell CVSS score, as AT:P.

Jul 9, 2025
7.8
CVE-2025-6376HIGH

A remote code execution security issue exists in the Rockwell Automation Arena®.  A crafted DOE file can force Arena Simulation to write beyond the boundaries of an allocated object. Exploitation requires user interaction, such as opening a malicious file within the software. If exploited, a threat actor could execute arbitrary code on the target system. The software must run under the context of the administrator in order to cause worse case impact. This is reflected in the Rockwell CVSS score, as AT:P.

Jul 9, 2025
7.8
CVE-2025-53416HIGH

Delta Electronics DTN Soft Project File Parsing Deserialization of Untrusted Data Remote Code Execution

Jun 30, 2025
7.8
CVE-2025-53415HIGH

Delta Electronics DTM Soft Project File Parsing Deserialization of Untrusted Data Remote Code Execution

Jun 30, 2025
7.8
CVE-2025-3394HIGH

Incorrect Permission Assignment for Critical Resource vulnerability in ABB Automation Builder.This issue affects Automation Builder: through 2.8.0.

Apr 30, 2025
7.8
CVE-2025-4125HIGH

Delta Electronics ISPSoft version 3.20 is vulnerable to an Out-Of-Bounds Write vulnerability that could allow an attacker to execute arbitrary code when parsing ISP file.

Apr 30, 2025
7.8
CVE-2025-4124HIGH

Delta Electronics ISPSoft version 3.20 is vulnerable to an Out-Of-Bounds Write vulnerability that could allow an attacker to execute arbitrary code when parsing ISP file.

Apr 30, 2025
7.8
CVE-2025-22884HIGH

Delta Electronics ISPSoft version 3.20 is vulnerable to a Stack-Based buffer overflow vulnerability that could allow an attacker to execute arbitrary code when parsing DVP file.

Apr 30, 2025
7.8
CVE-2025-22883HIGH

Delta Electronics ISPSoft version 3.20 is vulnerable to an Out-Of-Bounds Write vulnerability that could allow an attacker to execute arbitrary code when parsing DVP file.

Apr 30, 2025
7.8
CVE-2025-22882HIGH

Delta Electronics ISPSoft version 3.20 is vulnerable to a Stack-Based buffer overflow vulnerability that could allow an attacker to leverage debugging logic to execute arbitrary code when parsing CBDGL file.

Apr 30, 2025
7.8
CVE-2025-3617HIGH

A privilege escalation vulnerability exists in the Rockwell Automation ThinManager. When the software starts up, files are deleted in the temporary folder causing the Access Control Entry of the directory to inherit permissions from the parent directory. If exploited, a threat actor could inherit elevated privileges.

Apr 15, 2025
7.8
CVE-2025-3289HIGH

A local code execution vulnerability exists in the Rockwell Automation Arena® due to a stack-based memory buffer overflow. The flaw is result of improper validation of user-supplied data. If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file.

Apr 8, 2025
7.8
CVE-2025-3288HIGH

A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor being able to read outside of the allocated memory buffer. The flaw is a result of improper validation of user-supplied data.  If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file.

Apr 8, 2025
7.8
CVE-2025-3287HIGH

A local code execution vulnerability exists in the Rockwell Automation Arena® due to a stack-based memory buffer overflow. The flaw is result of improper validation of user-supplied data. If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file.

Apr 8, 2025
7.8
CVE-2025-3286HIGH

A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor being able to read outside of the allocated memory buffer. The flaw is a result of improper validation of user-supplied data.  If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file.

Apr 8, 2025
7.8
CVE-2025-3285HIGH

A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor being able to read outside of the allocated memory buffer. The flaw is a result of improper validation of user-supplied data.  If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file.

Apr 8, 2025
7.8
CVE-2025-2829HIGH

A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor being able to write outside of the allocated memory buffer. The flaw is a result of improper validation of user-supplied data.  If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file.

Apr 8, 2025
7.8
CVE-2025-2293HIGH

A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor being able to write outside of the allocated memory buffer. The flaw is a result of improper validation of user-supplied data.  If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file.

Apr 8, 2025
7.8
CVE-2025-2288HIGH

A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor being able to write outside of the allocated memory buffer. The flaw is a result of improper validation of user-supplied data.  If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file.

Apr 8, 2025
7.8
CVE-2025-2287HIGH

A local code execution vulnerability exists in the Rockwell Automation Arena®  due to an uninitialized pointer. The flaw is result of improper validation of user-supplied data. If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file.

Apr 8, 2025
7.8
CVE-2025-2286HIGH

A local code execution vulnerability exists in the Rockwell Automation Arena®  due to an uninitialized pointer. The flaw is result of improper validation of user-supplied data. If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file.

Apr 8, 2025
7.8
CVE-2025-2285HIGH

A local code execution vulnerability exists in the Rockwell Automation Arena®  due to an uninitialized pointer. The flaw is result of improper validation of user-supplied data. If exploited a threat actor can disclose information and execute arbitrary code on the system. To exploit the vulnerability a legitimate user must open a malicious DOE file.

Apr 8, 2025
7.8
CVE-2025-22881HIGH

Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. If a target visits a malicious page or opens a malicious file an attacker can leverage this vulnerability to execute code in the context of the current process.

Feb 26, 2025
7.8
CVE-2025-22880HIGH

Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. If a target visits a malicious page or opens a malicious file an attacker can leverage this vulnerability to execute code in the context of the current process.

Feb 7, 2025
7.8
CVE-2024-12836HIGH

Delta Electronics DRASimuCAD STP File Parsing Type Confusion Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Electronics DRASimuCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of STP files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22450.

Dec 30, 2024
7.8
CVE-2024-12835HIGH

Delta Electronics DRASimuCAD ICS File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Electronics DRASimuCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of ICS files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22415.

Dec 30, 2024
7.8
CVE-2024-12834HIGH

Delta Electronics DRASimuCAD STP File Parsing Type Confusion Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Electronics DRASimuCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of STP files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22414.

Dec 30, 2024
7.8
CVE-2024-12677HIGH

Delta Electronics DTM Soft deserializes objects, which could allow an attacker to execute arbitrary code.

Dec 20, 2024
7.8
CVE-2024-12175HIGH

Another “use after free” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to use a resource that was already used. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.

Dec 19, 2024
7.8
CVE-2024-12130HIGH

An “out of bounds read” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to read beyond the boundaries of an allocated memory. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.

Dec 5, 2024
7.8
CVE-2024-11156HIGH

An “out of bounds write” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to write beyond the boundaries of allocated memory in a DOE file. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.

Dec 5, 2024
7.8
CVE-2024-11155HIGH

A “use after free” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to use a resource that was already used. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.

Dec 5, 2024
7.8
CVE-2024-9852HIGH

Uncontrolled Search Path Element vulnerability in Mitsubishi Electric GENESIS64 all versions, Mitsubishi Electric Iconics Digital Solutions GENESIS64 all versions, Mitsubishi Electric ICONICS Suite all versions, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite all versions, Mitsubishi Electric MC Works64 all versions, Mitsubishi Electric GENESIS32 all versions, and Mitsubishi Electric Iconics Digital Solutions GENESIS32 all versions allows a local authenticated attacker to execute a malicious code by storing a specially crafted DLL in a specific folder. This could lead to disclose, tamper with, destroy, or delete information in the affected products, or cause a denial of service (DoS) condition on the products.

Nov 28, 2024
7.8
CVE-2024-8299HIGH

Uncontrolled Search Path Element vulnerability in Mitsubishi Electric GENESIS64 all versions, Mitsubishi Electric Iconics Digital Solutions GENESIS64 all versions, Mitsubishi Electric ICONICS Suite all versions, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite all versions, Mitsubishi Electric MC Works64 all versions, Mitsubishi Electric GENESIS32 all versions, and Mitsubishi Electric Iconics Digital Solutions GENESIS32 all versions allows a local authenticated attacker to execute a malicious code by storing a specially crafted DLL in a specific folder. This could lead to disclose, tamper with, destroy, or delete information in the affected products, or cause a denial of service (DoS) condition on the products.

Nov 28, 2024
7.8
CVE-2024-47131HIGH

If an attacker tricks a valid user into running Delta Electronics DIAScreen with a file containing malicious code, a stack-based buffer overflow in BACnetObjectInfo can be exploited, allowing the attacker to remotely execute arbitrary code.

Nov 11, 2024
7.8
CVE-2024-39605HIGH

If an attacker tricks a valid user into running Delta Electronics DIAScreen with a file containing malicious code, a stack-based buffer overflow in BACnetParameter can be exploited, allowing the attacker to remotely execute arbitrary code.

Nov 11, 2024
7.8
CVE-2024-39354HIGH

If an attacker tricks a valid user into running Delta Electronics DIAScreen with a file containing malicious code, a stack-based buffer overflow in CEtherIPTagItem can be exploited, allowing the attacker to remotely execute arbitrary code.

Nov 11, 2024
7.8
CVE-2024-7587HIGH

Incorrect Default Permissions vulnerability in GenBroker32, which is included in the installers for Mitsubishi Electric GENESIS64 versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97.3 and prior, Mitsubishi Electric ICONICS Suite versions 10.97.3 and prior, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite versions 10.97.3 and prior, Mitsubishi Electric GENESIS32 versions 9.70.300.23 and prior, Mitsubishi Electric Iconics Digital Solutions GENESIS32 versions 9.70.300.23 and prior, and Mitsubishi Electric MC Works64 all versions allows a local authenticated attacker to disclose or tamper with confidential information and data contained in the products, or cause a denial of service (DoS) condition on the products, by accessing a folder with incorrect permissions, when GenBroker32 is installed on the same PC as GENESIS64, ICONICS Suite, MC Works64, or GENESIS32.

Oct 22, 2024
7.8
CVE-2024-47966HIGH

Delta Electronics CNCSoft-G2 lacks proper initialization of memory prior to accessing it. An attacker can manipulate users to visit a malicious page or file to leverage this vulnerability to execute code in the context of the current process.

Oct 10, 2024
7.8
CVE-2024-47965HIGH

Delta Electronics CNCSoft-G2 lacks proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can manipulate users to visit a malicious page or file to leverage this vulnerability to execute code in the context of the current process.

Oct 10, 2024
7.8
CVE-2024-47964HIGH

Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can manipulate users to visit a malicious page or file to leverage this vulnerability to execute code in the context of the current process.

Oct 10, 2024
7.8
CVE-2024-47963HIGH

Delta Electronics CNCSoft-G2 lacks proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can manipulate users to visit a malicious page or file to leverage this vulnerability to execute code in the context of the current process.

Oct 10, 2024
7.8
CVE-2024-47962HIGH

Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can manipulate an insider to visit a malicious page or file to leverage this vulnerability to execute code in the context of the current process.

Oct 10, 2024
7.8
CVE-2024-7987HIGH

A remote code execution vulnerability exists in the Rockwell Automation ThinManager® ThinServer™ that allows a threat actor to execute arbitrary code with System privileges. To exploit this vulnerability and a threat actor must abuse the ThinServer™ service by creating a junction and use it to upload arbitrary files.

Aug 26, 2024
7.8
CVE-2024-7502HIGH

A crafted DPA file could force Delta Electronics DIAScreen to overflow a stack-based buffer, which could allow an attacker to execute arbitrary code.

Aug 6, 2024
7.8
CVE-2024-5402HIGH

Unquoted Search Path or Element vulnerability in ABB Mint Workbench. A local attacker who successfully exploited this vulnerability could gain elevated privileges by inserting an executable file in the path of the affected service. This issue affects Mint Workbench I versions: from 5866 before 5868.

Jul 15, 2024
7.8
CVE-2024-39880HIGH

Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. If a target visits a malicious page or opens a malicious file an attacker can leverage this vulnerability to execute code in the context of the current process.

Jul 9, 2024
7.8
CVE-2021-47302HIGH

In the Linux kernel, the following vulnerability has been resolved: igc: Fix use-after-free error during reset Cleans the next descriptor to watch (next_to_watch) when cleaning the TX ring. Failure to do so can cause invalid memory accesses. If igc_poll() runs while the controller is being reset this can lead to the driver try to free a skb that was already freed. Log message: [ 101.525242] refcount_t: underflow; use-after-free. [ 101.525251] WARNING: CPU: 1 PID: 646 at lib/refcount.c:28 refcount_warn_saturate+0xab/0xf0 [ 101.525259] Modules linked in: sch_etf(E) sch_mqprio(E) rfkill(E) intel_rapl_msr(E) intel_rapl_common(E) x86_pkg_temp_thermal(E) intel_powerclamp(E) coretemp(E) binfmt_misc(E) kvm_intel(E) kvm(E) irqbypass(E) crc32_pclmul(E) ghash_clmulni_intel(E) aesni_intel(E) mei_wdt(E) libaes(E) crypto_simd(E) cryptd(E) glue_helper(E) snd_hda_codec_hdmi(E) rapl(E) intel_cstate(E) snd_hda_intel(E) snd_intel_dspcfg(E) sg(E) soundwire_intel(E) intel_uncore(E) at24(E) soundwire_generic_allocation(E) iTCO_wdt(E) soundwire_cadence(E) intel_pmc_bxt(E) serio_raw(E) snd_hda_codec(E) iTCO_vendor_support(E) watchdog(E) snd_hda_core(E) snd_hwdep(E) snd_soc_core(E) snd_compress(E) snd_pcsp(E) soundwire_bus(E) snd_pcm(E) evdev(E) snd_timer(E) mei_me(E) snd(E) soundcore(E) mei(E) configfs(E) ip_tables(E) x_tables(E) autofs4(E) ext4(E) crc32c_generic(E) crc16(E) mbcache(E) jbd2(E) sd_mod(E) t10_pi(E) crc_t10dif(E) crct10dif_generic(E) i915(E) ahci(E) libahci(E) ehci_pci(E) igb(E) xhci_pci(E) ehci_hcd(E) [ 101.525303] drm_kms_helper(E) dca(E) xhci_hcd(E) libata(E) crct10dif_pclmul(E) cec(E) crct10dif_common(E) tsn(E) igc(E) e1000e(E) ptp(E) i2c_i801(E) crc32c_intel(E) psmouse(E) i2c_algo_bit(E) i2c_smbus(E) scsi_mod(E) lpc_ich(E) pps_core(E) usbcore(E) drm(E) button(E) video(E) [ 101.525318] CPU: 1 PID: 646 Comm: irq/37-enp7s0-T Tainted: G E 5.10.30-rt37-tsn1-rt-ipipe #ipipe [ 101.525320] Hardware name: SIEMENS AG SIMATIC IPC427D/A5E31233588, BIOS V17.02.09 03/31/2017 [ 101.525322] RIP: 0010:refcount_warn_saturate+0xab/0xf0 [ 101.525325] Code: 05 31 48 44 01 01 e8 f0 c6 42 00 0f 0b c3 80 3d 1f 48 44 01 00 75 90 48 c7 c7 78 a8 f3 a6 c6 05 0f 48 44 01 01 e8 d1 c6 42 00 <0f> 0b c3 80 3d fe 47 44 01 00 0f 85 6d ff ff ff 48 c7 c7 d0 a8 f3 [ 101.525327] RSP: 0018:ffffbdedc0917cb8 EFLAGS: 00010286 [ 101.525329] RAX: 0000000000000000 RBX: ffff98fd6becbf40 RCX: 0000000000000001 [ 101.525330] RDX: 0000000000000001 RSI: ffffffffa6f2700c RDI: 00000000ffffffff [ 101.525332] RBP: ffff98fd6becc14c R08: ffffffffa7463d00 R09: ffffbdedc0917c50 [ 101.525333] R10: ffffffffa74c3578 R11: 0000000000000034 R12: 00000000ffffff00 [ 101.525335] R13: ffff98fd6b0b1000 R14: 0000000000000039 R15: ffff98fd6be35c40 [ 101.525337] FS: 0000000000000000(0000) GS:ffff98fd6e240000(0000) knlGS:0000000000000000 [ 101.525339] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 101.525341] CR2: 00007f34135a3a70 CR3: 0000000150210003 CR4: 00000000001706e0 [ 101.525343] Call Trace: [ 101.525346] sock_wfree+0x9c/0xa0 [ 101.525353] unix_destruct_scm+0x7b/0xa0 [ 101.525358] skb_release_head_state+0x40/0x90 [ 101.525362] skb_release_all+0xe/0x30 [ 101.525364] napi_consume_skb+0x57/0x160 [ 101.525367] igc_poll+0xb7/0xc80 [igc] [ 101.525376] ? sched_clock+0x5/0x10 [ 101.525381] ? sched_clock_cpu+0xe/0x100 [ 101.525385] net_rx_action+0x14c/0x410 [ 101.525388] __do_softirq+0xe9/0x2f4 [ 101.525391] __local_bh_enable_ip+0xe3/0x110 [ 101.525395] ? irq_finalize_oneshot.part.47+0xe0/0xe0 [ 101.525398] irq_forced_thread_fn+0x6a/0x80 [ 101.525401] irq_thread+0xe8/0x180 [ 101.525403] ? wake_threads_waitq+0x30/0x30 [ 101.525406] ? irq_thread_check_affinity+0xd0/0xd0 [ 101.525408] kthread+0x183/0x1a0 [ 101.525412] ? kthread_park+0x80/0x80 [ 101.525415] ret_from_fork+0x22/0x30

May 21, 2024
7.8
CVE-2024-4192HIGH

Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.

Apr 30, 2024
7.8
CVE-2024-2929HIGH

A memory corruption vulnerability in Rockwell Automation Arena Simulation software could potentially allow a malicious user to insert unauthorized code to the software by corrupting the memory triggering an access violation. Once inside, the threat actor can run harmful code on the system. This affects the confidentiality, integrity, and availability of the product. To trigger this, the user would unwittingly need to open a malicious file shared by the threat actor.

Mar 26, 2024
7.8
CVE-2024-21919HIGH

An uninitialized pointer in Rockwell Automation Arena Simulation software could potentially allow a malicious user to insert unauthorized code to the software by leveraging the pointer after it is properly. Once inside, the threat actor can run harmful code on the system. This affects the confidentiality, integrity, and availability of the product. To trigger this, the user would unwittingly need to open a malicious file shared by the threat actor.

Mar 26, 2024
7.8
CVE-2024-21918HIGH

A memory buffer vulnerability in Rockwell Automation Arena Simulation software could potentially allow a malicious user to insert unauthorized code to the software by corrupting the memory and triggering an access violation. Once inside, the threat actor can run harmful code on the system. This affects the confidentiality, integrity, and availability of the product. To trigger this, the user would unwittingly need to open a malicious file shared by the threat actor.

Mar 26, 2024
7.8
CVE-2024-21913HIGH

A heap-based memory buffer overflow vulnerability in Rockwell Automation Arena Simulation software could potentially allow a malicious user to insert unauthorized code into the software by overstepping the memory boundaries, which triggers an access violation. Once inside, the threat actor can run harmful code on the system. This affects the confidentiality, integrity, and availability of the product. To trigger this, the user would unwittingly need to open a malicious file shared by the threat actor.

Mar 26, 2024
7.8
CVE-2024-21912HIGH

An arbitrary code execution vulnerability in Rockwell Automation Arena Simulation could let a malicious user insert unauthorized code into the software. This is done by writing beyond the designated memory area, which causes an access violation. Once inside, the threat actor can run harmful code on the system. This affects the confidentiality, integrity, and availability of the product. To trigger this, the user would unwittingly need to open a malicious file shared by the threat actor.

Mar 26, 2024
7.8
CVE-2024-1941HIGH

Delta Electronics CNCSoft-B versions 1.0.0.4 and prior are vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code.

Mar 1, 2024
7.8
CVE-2024-1595HIGH

Delta Electronics CNCSoft-B DOPSoft prior to v4.0.0.82 insecurely loads libraries, which may allow an attacker to use DLL hijacking and take over the system where the software is installed.

Feb 29, 2024
7.8
CVE-2022-48626HIGH

In the Linux kernel, the following vulnerability has been resolved: moxart: fix potential use-after-free on remove path It was reported that the mmc host structure could be accessed after it was freed in moxart_remove(), so fix this by saving the base register of the device and using it instead of the pointer dereference.

Feb 26, 2024
7.8
CVE-2023-5944HIGH

Delta Electronics DOPSoft is vulnerable to a stack-based buffer overflow, which may allow for arbitrary code execution if an attacker can lead a legitimate user to execute a specially crafted file.

Dec 4, 2023
7.8
CVE-2023-5247HIGH

Malicious Code Execution Vulnerability due to External Control of File Name or Path in multiple Mitsubishi Electric FA Engineering Software Products allows a malicious attacker to execute a malicious code by having legitimate users open a specially crafted project file, which could result in information disclosure, tampering and deletion, or a denial-of-service (DoS) condition.

Nov 30, 2023
7.8
CVE-2023-6179HIGH

Honeywell ProWatch, 4.5, including all Service Pack versions, contain a Vulnerability in Application Server's executable folder(s). A(n) attacker could potentially exploit this vulnerability, leading to a standard user to have arbitrary system code execution. Honeywell recommends updating to the most recent version of this product, service or offering (Pro-watch 6.0.2, 6.0, 5.5.2,5.0.5).

Nov 17, 2023
7.8
CVE-2023-27858HIGH

Rockwell Automation Arena Simulation contains an arbitrary code execution vulnerability that could potentially allow a malicious user to commit unauthorized code to the software by using an uninitialized pointer in the application.  The threat-actor could then execute malicious code on the system affecting the confidentiality, integrity, and availability of the product.  The user would need to open a malicious file provided to them by the attacker for the code to execute.

Oct 27, 2023
7.8
CVE-2023-27854HIGH

An arbitrary code execution vulnerability was reported to Rockwell Automation in Arena Simulation that could potentially allow a malicious user to commit unauthorized arbitrary code to the software by using a memory buffer overflow.  The threat-actor could then execute malicious code on the system affecting the confidentiality, integrity, and availability of the product.  The user would need to open a malicious file provided to them by the attacker for the code to execute.

Oct 27, 2023
7.8
CVE-2023-5068HIGH

Delta Electronics DIAScreen may write past the end of an allocated buffer while parsing a specially crafted input file. This could allow an attacker to execute code in the context of the current process.

Sep 21, 2023
7.8
CVE-2023-4685HIGH

Delta Electronics' CNCSoft-B version 1.0.0.4 and DOPSoft versions 4.0.0.82 and prior are vulnerable to stack-based buffer overflow, which could allow an attacker to execute arbitrary code.

Sep 7, 2023
7.8
CVE-2021-41544HIGH

A vulnerability has been identified in Siemens Software Center (All versions < V3.0). A DLL Hijacking vulnerability could allow a local attacker to execute code with elevated privileges by placing a malicious DLL in one of the directories on the DLL search path.

Aug 8, 2023
7.8
CVE-2023-25177HIGH

Delta Electronics' CNCSoft-B DOPSoft versions 1.0.0.4 and prior are vulnerable to stack-based buffer overflow, which could allow an attacker to execute arbitrary code.

Jun 7, 2023
7.8
CVE-2023-24014HIGH

Delta Electronics' CNCSoft-B DOPSoft versions 1.0.0.4 and prior are vulnerable to heap-based buffer overflow, which could allow an attacker to execute arbitrary code.

Jun 7, 2023
7.8
CVE-2023-0635HIGH

Improper Privilege Management vulnerability in ABB Ltd. ASPECT®-Enterprise on ASPECT®-Enterprise, Linux (2CQG103201S3021, 2CQG103202S3021, 2CQG103203S3021, 2CQG103204S3021 modules), ABB Ltd. NEXUS Series on NEXUS Series, Linux (2CQG100102R2021, 2CQG100104R2021, 2CQG100105R2021, 2CQG100106R2021, 2CQG100110R2021, 2CQG100112R2021, 2CQG100103R2021, 2CQG100107R2021, 2CQG100108R2021, 2CQG100109R2021, 2CQG100111R2021, 2CQG100113R2021 modules), ABB Ltd. MATRIX Series on MATRIX Series, Linux (2CQG100102R1021, 2CQG100103R1021, 2CQG100104R1021, 2CQG100105R1021, 2CQG100106R1021 modules) allows Privilege Escalation.This issue affects ASPECT®-Enterprise: from 3.0;0 before 3.07.01; NEXUS Series: from 3.0;0 before 3.07.01; MATRIX Series: from 3.0;0 before 3.07.01.

Jun 5, 2023
7.8
CVE-2022-0010HIGH

Insertion of Sensitive Information into Log File vulnerability in ABB QCS 800xA, ABB QCS AC450, ABB Platform Engineering Tools. An attacker, who already has local access to the QCS nodes, could successfully obtain the password for a system user account. Using this information, the attacker could have the potential to exploit this vulnerability to gain control of system nodes. This issue affects QCS 800xA: from 1.0;0 through 6.1SP2; QCS AC450: from 1.0;0 through 5.1SP2; Platform Engineering Tools: from 1.0:0 through 2.3.0.

May 22, 2023
7.8
CVE-2023-29462HIGH

An arbitrary code execution vulnerability contained in Rockwell Automation's Arena Simulation software was reported that could potentially allow a malicious user to commit unauthorized arbitrary code to the software by using a memory buffer overflow in the heap. potentially resulting in a complete loss of confidentiality, integrity, and availability.

May 9, 2023
7.8
CVE-2023-29461HIGH

An arbitrary code execution vulnerability contained in Rockwell Automation's Arena Simulation software was reported that could potentially allow a malicious user to commit unauthorized arbitrary code to the software by using a memory buffer overflow in the heap. potentially resulting in a complete loss of confidentiality, integrity, and availability.

May 9, 2023
7.8
CVE-2023-29460HIGH

An arbitrary code execution vulnerability contained in Rockwell Automation's Arena Simulation software was reported that could potentially allow a malicious user to commit unauthorized arbitrary code to the software by using a memory buffer overflow potentially resulting in a complete loss of confidentiality, integrity, and availability.

May 9, 2023
7.8
CVE-2023-26593HIGH

CENTUM series provided by Yokogawa Electric Corporation are vulnerable to cleartext storage of sensitive information. If an attacker who can login or access the computer where the affected product is installed tampers the password file stored in the computer, the user privilege which CENTUM managed may be escalated. As a result, the control system may be operated with the escalated user privilege. To exploit this vulnerability, the following prerequisites must be met: (1)An attacker has obtained user credentials where the affected product is installed, (2)CENTUM Authentication Mode is used for user authentication when CENTUM VP is used. The affected products and versions are as follows: CENTUM CS 1000, CENTUM CS 3000 (Including CENTUM CS 3000 Entry Class) R2.01.00 to R3.09.50, CENTUM VP (Including CENTUM VP Entry Class) R4.01.00 to R4.03.00, R5.01.00 to R5.04.20, and R6.01.00 and later, B/M9000 CS R5.04.01 to R5.05.01, and B/M9000 VP R6.01.01 to R7.04.51 and R8.01.01 and later

Apr 11, 2023
7.8
CVE-2023-1145HIGH

Delta Electronics InfraSuite Device Master versions prior to 1.0.5 are affected by a deserialization vulnerability targeting the Device-DataCollect service, which could allow deserialization of requests prior to authentication, resulting in remote code execution.

Mar 27, 2023
7.8
CVE-2023-1135HIGH

In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could set incorrect directory permissions, which could result in local privilege escalation.

Mar 27, 2023
7.8
CVE-2023-0598HIGH

GE Digital Proficy iFIX 2022, GE Digital Proficy iFIX v6.1, and GE Digital Proficy iFIX v6.5 are vulnerable to code injection, which may allow an attacker to insert malicious configuration files in the expected web server execution path and gain full control of the HMI software.

Mar 16, 2023
7.8
CVE-2023-0251HIGH

Delta Electronics DIAScreen versions 1.2.1.23 and prior are vulnerable to a buffer overflow through improper restrictions of operations within memory, which could allow an attacker to remotely execute arbitrary code.

Feb 8, 2023
7.8
CVE-2023-0250HIGH

Delta Electronics DIAScreen versions 1.2.1.23 and prior are vulnerable to a stack-based buffer overflow, which could allow an attacker to remotely execute arbitrary code.

Feb 8, 2023
7.8
CVE-2023-0249HIGH

Delta Electronics DIAScreen versions 1.2.1.23 and prior are vulnerable to out-of-bounds write, which may allow an attacker to remotely execute arbitrary code.

Feb 8, 2023
7.8
CVE-2023-0124HIGH

Delta Electronics DOPSoft versions 4.00.16.22 and prior are vulnerable to an out-of-bounds write, which could allow an attacker to remotely execute arbitrary code when a malformed file is introduced to the software.

Feb 3, 2023
7.8
CVE-2023-0123HIGH

Delta Electronics DOPSoft versions 4.00.16.22 and prior are vulnerable to a stack-based buffer overflow, which could allow an attacker to remotely execute arbitrary code when a malformed file is introduced to the software.

Feb 3, 2023
7.8
CVE-2022-42973HIGH

A CWE-798: Use of Hard-coded Credentials vulnerability exists that could cause local privilege escalation when local attacker connects to the database. Affected Products: APC Easy UPS Online Monitoring Software (Windows 7, 10, 11 & Windows Server 2016, 2019, 2022 - Versions prior to V2.5-GA), APC Easy UPS Online Monitoring Software (Windows 11, Windows Server 2019, 2022 - Versions prior to V2.5-GA-01-22261), Schneider Electric Easy UPS Online Monitoring Software (Windows 7, 10, 11 & Windows Server 2016, 2019, 2022 - Versions prior to V2.5-GS), Schneider Electric Easy UPS Online Monitoring Software (Windows 11, Windows Server 2019, 2022 - Versions prior to V2.5-GS-01-22261)

Feb 1, 2023
7.8
CVE-2022-42972HIGH

A CWE-732: Incorrect Permission Assignment for Critical Resource vulnerability exists that could cause local privilege escalation when a local attacker modifies the webroot directory. Affected Products: APC Easy UPS Online Monitoring Software (Windows 7, 10, 11 & Windows Server 2016, 2019, 2022 - Versions prior to V2.5-GA), APC Easy UPS Online Monitoring Software (Windows 11, Windows Server 2019, 2022 - Versions prior to V2.5-GA-01-22261), Schneider Electric Easy UPS Online Monitoring Software (Windows 7, 10, 11 & Windows Server 2016, 2019, 2022 - Versions prior to V2.5-GS), Schneider Electric Easy UPS Online Monitoring Software (Windows 11, Windows Server 2019, 2022 - Versions prior to V2.5-GS-01-22261)

Feb 1, 2023
7.8
CVE-2022-3156HIGH

A remote code execution vulnerability exists in Rockwell Automation Studio 5000 Logix Emulate software.  Users are granted elevated permissions on certain product services when the software is installed. Due to this misconfiguration, a malicious user could potentially achieve remote code execution on the targeted software.

Dec 27, 2022
7.8
CVE-2020-12069HIGH

In CODESYS V3 products in all versions prior V3.5.16.0 containing the CmpUserMgr, the CODESYS Control runtime system stores the online communication passwords using a weak hashing algorithm. This can be used by a local attacker with low privileges to gain full control of the device.

Dec 26, 2022
7.8
CVE-2022-3088HIGH

UC-8100A-ME-T System Image: Versions v1.0 to v1.6, UC-2100 System Image: Versions v1.0 to v1.12, UC-2100-W System Image: Versions v1.0 to v 1.12,&nbsp;UC-3100 System Image: Versions v1.0 to v1.6,&nbsp;UC-5100 System Image: Versions v1.0 to v1.4, UC-8100 System Image: Versions v3.0 to v3.5, UC-8100-ME-T System Image: Versions v3.0 and v3.1, UC-8200 System Image: v1.0 to v1.5, AIG-300 System Image: v1.0 to v1.4, UC-8410A with Debian 9 System Image: Versions v4.0.2 and v4.1.2, UC-8580 with Debian 9 System Image: Versions v2.0 and v2.1, UC-8540 with Debian 9 System Image: Versions v2.0 and v2.1, and DA-662C-16-LX (GLB) System Image: Versions v1.0.2 to v1.1.2 of Moxa's ARM-based computers have an execution with unnecessary privileges vulnerability, which could allow an attacker with user-level privileges to gain root privileges.

Nov 28, 2022
7.8
CVE-2022-3737HIGH

In PHOENIX CONTACT Automationworx Software Suite up to version 1.89 memory can be read beyond the intended scope due to insufficient validation of input data. Availability, integrity, or confidentiality of an application programming workstation might be compromised by attacks using these vulnerabilities.

Nov 15, 2022
7.8
CVE-2022-3461HIGH

In PHOENIX CONTACT Automationworx Software Suite up to version 1.89 manipulated PC Worx or Config+ files could lead to a heap buffer overflow and a read access violation. Availability, integrity, or confidentiality of an application programming workstation might be compromised by attacks using these vulnerabilities.

Nov 15, 2022
7.8
CVE-2022-2069HIGH

The APDFL.dll in Siemens JT2Go prior to V13.3.0.5 and Siemens Teamcenter Visualization prior to V14.0.0.2 contains an out of bounds write past the fixed-length heap-based buffer while parsing specially crafted PDF files. This could allow an attacker to execute code in the context of the current process.

Oct 20, 2022
7.8
CVE-2022-3398HIGH

OMRON CX-Programmer 9.78 and prior is vulnerable to an Out-of-Bounds Write, which may allow an attacker to execute arbitrary code.

Oct 6, 2022
7.8
CVE-2022-3397HIGH

OMRON CX-Programmer 9.78 and prior is vulnerable to an Out-of-Bounds Write, which may allow an attacker to execute arbitrary code.

Oct 6, 2022
7.8
CVE-2022-3396HIGH

OMRON CX-Programmer 9.78 and prior is vulnerable to an Out-of-Bounds Write, which may allow an attacker to execute arbitrary code.

Oct 6, 2022
7.8
CVE-2022-33320HIGH

Deserialization of Untrusted Data vulnerability in Mitsubishi Electric GENESIS64 versions 10.97 to 10.97.1, Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97 to 10.97.1, Mitsubishi Electric ICONICS Suite versions 10.97 to 10.97.1, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite versions 10.97 to 10.97.1, and Mitsubishi Electric MC Works64 versions 4.04E and prior allows an unauthenticated attacker to execute an arbitrary malicious code by leading a user to load a project configuration file including malicious XML codes.

Jul 20, 2022
7.8
CVE-2022-33317HIGH

Inclusion of Functionality from Untrusted Control Sphere vulnerability in Mitsubishi Electric GENESIS64 versions 10.97 to 10.97.1, Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97 to 10.97.1, Mitsubishi Electric ICONICS Suite versions 10.97 to 10.97.1, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite versions 10.97 to 10.97.1, and Mitsubishi Electric MC Works64 versions 4.04E and prior allows an unauthenticated attacker to execute an arbitrary malicious code by leading a user to load a monitoring screen file including malicious script codes.

Jul 20, 2022
7.8
CVE-2022-33316HIGH

Deserialization of Untrusted Data vulnerability in Mitsubishi Electric GENESIS64 versions 10.97 to 10.97.1, Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97 to 10.97.1, Mitsubishi Electric ICONICS Suite versions 10.97 to 10.97.1, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite versions 10.97 to 10.97.1, and Mitsubishi Electric MC Works64 versions 4.04E and prior allows an unauthenticated attacker to execute an arbitrary malicious code by leading a user to load a monitoring screen file including malicious XAML codes.

Jul 20, 2022
7.8
CVE-2022-33315HIGH

Deserialization of Untrusted Data vulnerability in Mitsubishi Electric GENESIS64 versions 10.97 to 10.97.1, Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97 to 10.97.1, Mitsubishi Electric ICONICS Suite versions 10.97 to 10.97.1, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite versions 10.97 to 10.97.1, and Mitsubishi Electric MC Works64 versions 4.04E and prior allows an unauthenticated attacker to execute an arbitrary malicious code by leading a user to load a monitoring screen file including malicious XAML codes.

Jul 20, 2022
7.8
CVE-2022-29483HIGH

Incorrect Default Permissions vulnerability in ABB e-Design allows attacker to install malicious software executing with SYSTEM permissions violating confidentiality, integrity, and availability of the target machine.

Jun 2, 2022
7.8
CVE-2021-32969HIGH

Delta Electronics DIAScreen versions prior to 1.1.0 are vulnerable to an out-of-bounds write condition, which may result in a system crash or allow an attacker to remotely execute arbitrary code.

May 24, 2022
7.8
CVE-2021-32965HIGH

Delta Electronics DIAScreen versions prior to 1.1.0 are vulnerable to type confusion, which may allow an attacker to remotely execute arbitrary code.

May 24, 2022
7.8
CVE-2022-22516HIGH

The SysDrv3S driver in the CODESYS Control runtime system on Microsoft Windows allows any system user to read and write within restricted memory space.

Apr 7, 2022
7.8
CVE-2022-26419HIGH

Omron CX-Position (versions 2.5.3 and prior) is vulnerable to multiple stack-based buffer overflow conditions while parsing a specific project file, which may allow an attacker to locally execute arbitrary code.

Apr 1, 2022
7.8
CVE-2022-26417HIGH

Omron CX-Position (versions 2.5.3 and prior) is vulnerable to a use after free memory condition while processing a specific project file, which may allow an attacker to execute arbitrary code.

Apr 1, 2022
7.8
CVE-2022-26022HIGH

Omron CX-Position (versions 2.5.3 and prior) is vulnerable to an out-of-bounds write while processing a specific project file, which may allow an attacker to execute arbitrary code.

Apr 1, 2022
7.8
CVE-2022-25959HIGH

Omron CX-Position (versions 2.5.3 and prior) is vulnerable to memory corruption while processing a specific project file, which may allow an attacker to execute arbitrary code.

Apr 1, 2022
7.8
CVE-2022-1098HIGH

Delta Electronics DIAEnergie (all versions prior to 1.8.02.004) are vulnerable to a DLL hijacking condition. When combined with the Incorrect Default Permissions vulnerability of 4.2.2 above, this makes it possible for an attacker to escalate privileges

Apr 1, 2022
7.8
CVE-2022-26839HIGH

Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) is vulnerable to an incorrect default permission in the DIAEnergie application, which may allow an attacker to plant new files (such as DLLs) or replace existing executable files.

Mar 29, 2022
7.8
CVE-2020-25184HIGH

Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x stores the password in plaintext in a file that is in the same directory as the executable file. ISaGRAF Runtime reads the file and saves the data in a variable without any additional modification. A local, unauthenticated attacker could compromise the user passwords, resulting in information disclosure.

Mar 18, 2022
7.8
CVE-2022-23401HIGH

The following Yokogawa Electric products contain insecure DLL loading issues. CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00.

Mar 11, 2022
7.8
CVE-2022-22148HIGH

'Root Service' service implemented in the following Yokogawa Electric products creates some named pipe with improper ACL configuration. CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00.

Mar 11, 2022
7.8
CVE-2022-22141HIGH

'Long-term Data Archive Package' service implemented in the following Yokogawa Electric products creates some named pipe with imporper ACL configuration. CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00.

Mar 11, 2022
7.8
CVE-2021-40397HIGH

A privilege escalation vulnerability exists in the installation of Advantech WISE-PaaS/OTA Server 3.0.9. A specially-crafted file can be replaced in the system to escalate privileges to NT SYSTEM authority. An attacker can provide a malicious file to trigger this vulnerability.

Jan 28, 2022
7.8
CVE-2021-22808HIGH

A CWE-416: Use After Free vulnerability exists that could cause arbitrary code execution when a malicious *.gd1 configuration file is loaded into the GUIcon tool. Affected Product: Eurotherm by Schneider Electric GUIcon Version 2.0 (Build 683.003) and prior

Jan 28, 2022
7.8
CVE-2021-22807HIGH

A CWE-787: Out-of-bounds Write vulnerability exists that could cause arbitrary code execution when a malicious *.gd1 configuration file is loaded into the GUIcon tool. Affected Product: Eurotherm by Schneider Electric GUIcon Version 2.0 (Build 683.003) and prior

Jan 28, 2022
7.8
CVE-2022-21137HIGH

Omron CX-One Versions 4.60 and prior are vulnerable to a stack-based buffer overflow while processing specific project files, which may allow an attacker to execute arbitrary code.

Jan 14, 2022
7.8
CVE-2021-21912HIGH

A privilege escalation vulnerability exists in the Windows version of installation for Advantech R-SeeNet Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted file can be replaced in the system to escalate privileges to NT SYSTEM authority. An attacker can provide a malicious file to trigger this vulnerability.

Dec 22, 2021
7.8
CVE-2021-21911HIGH

A privilege escalation vulnerability exists in the Windows version of installation for Advantech R-SeeNet Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted file can be replaced in the system to escalate privileges to NT SYSTEM authority. An attacker can provide a malicious file to trigger this vulnerability.

Dec 22, 2021
7.8
CVE-2021-21910HIGH

A privilege escalation vulnerability exists in the Windows version of installation for Advantech R-SeeNet Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted file can be replaced in the system to escalate privileges to NT SYSTEM authority. An attacker can provide a malicious file to trigger this vulnerability.

Dec 22, 2021
7.8
CVE-2021-43982HIGH

Delta Electronics CNCSoft Versions 1.01.30 and prior are vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code.

Dec 9, 2021
7.8
CVE-2021-34597HIGH

Improper Input Validation vulnerability in PC Worx Automation Suite of Phoenix Contact up to version 1.88 could allow an attacker with a manipulated project file to unpack arbitrary files outside of the selected project directory.

Nov 4, 2021
7.8
CVE-2021-38422HIGH

Delta Electronics DIALink versions 1.2.4.0 and prior stores sensitive information in cleartext, which may allow an attacker to have extensive access to the application directory and escalate privileges.

Nov 3, 2021
7.8
CVE-2021-38420HIGH

Delta Electronics DIALink versions 1.2.4.0 and prior default permissions give extensive permissions to low-privileged user accounts, which may allow an attacker to modify the installation directory and upload malicious files.

Nov 3, 2021
7.8
CVE-2021-38416HIGH

Delta Electronics DIALink versions 1.2.4.0 and prior insecurely loads libraries, which may allow an attacker to use DLL hijacking and takeover the system where the software is installed.

Nov 3, 2021
7.8
CVE-2021-33019HIGH

A stack-based buffer overflow vulnerability in Delta Electronics DOPSoft Version 4.00.11 and prior may be exploited by processing a specially crafted project file, which may allow an attacker to execute arbitrary code.

Aug 30, 2021
7.8
CVE-2021-33007HIGH

A heap-based buffer overflow in Delta Electronics TPEditor: v1.98.06 and prior may be exploited by processing a specially crafted project file. Successful exploitation of this vulnerability may allow an attacker to execute arbitrary code.

Aug 30, 2021
7.8
CVE-2021-21869HIGH

An unsafe deserialization vulnerability exists in the Engine.plugin ProfileInformation ProfileData functionality of CODESYS GmbH CODESYS Development System 3.5.16 and 3.5.17. A specially crafted file can lead to arbitrary command execution. An attacker can provide a malicious file to trigger this vulnerability.

Aug 25, 2021
7.8
CVE-2021-21868HIGH

An unsafe deserialization vulnerability exists in the ObjectManager.plugin Project.get_MissingTypes() functionality of CODESYS GmbH CODESYS Development System 3.5.16 and 3.5.17. A specially crafted file can lead to arbitrary command execution. An attacker can provide a malicious file to trigger this vulnerability.

Aug 18, 2021
7.8
CVE-2021-21867HIGH

An unsafe deserialization vulnerability exists in the ObjectManager.plugin ObjectStream.ProfileByteArray functionality of CODESYS GmbH CODESYS Development System 3.5.16 and 3.5.17. A specially crafted file can lead to arbitrary command execution. An attacker can provide a malicious file to trigger this vulnerability.

Aug 18, 2021
7.8
CVE-2021-21863HIGH

A unsafe deserialization vulnerability exists in the ComponentModel Profile.FromFile() functionality of CODESYS GmbH CODESYS Development System 3.5.16 and 3.5.17. A specially crafted file can lead to arbitrary command execution. An attacker can provide a malicious file to trigger this vulnerability.

Aug 5, 2021
7.8
CVE-2021-21866HIGH

A unsafe deserialization vulnerability exists in the ObjectManager.plugin ProfileInformation.ProfileData functionality of CODESYS GmbH CODESYS Development System 3.5.16 and 3.5.17. A specially crafted file can lead to arbitrary command execution. An attacker can provide a malicious file to trigger this vulnerability.

Aug 2, 2021
7.8
CVE-2021-21865HIGH

A unsafe deserialization vulnerability exists in the PackageManagement.plugin ExtensionMethods.Clone() functionality of CODESYS GmbH CODESYS Development System 3.5.16. A specially crafted file can lead to arbitrary command execution. An attacker can provide a malicious file to trigger this vulnerability.

Aug 2, 2021
7.8
CVE-2021-21864HIGH

A unsafe deserialization vulnerability exists in the ComponentModel ComponentManager.StartupCultureSettings functionality of CODESYS GmbH CODESYS Development System 3.5.16 and 3.5.17. A specially crafted file can lead to arbitrary command execution. An attacker can provide a malicious file to trigger this vulnerability.

Aug 2, 2021
7.8
CVE-2021-27412HIGH

Delta Electronics DOPSoft Versions 4.0.10.17 and prior are vulnerable to an out-of-bounds read, which may allow an attacker to execute arbitrary code.

Jul 2, 2021
7.8
CVE-2021-33542HIGH

Phoenix Contact Classic Automation Worx Software Suite in Version 1.87 and below is affected by a remote code execution vulnerability. Manipulated PC Worx or Config+ projects could lead to a remote code execution when unallocated memory is freed because of incompletely initialized data. The attacker needs to get access to an original bus configuration file (*.bcp) to be able to manipulate data inside. After manipulation the attacker needs to exchange the original file by the manipulated one on the application programming workstation. Availability, integrity, or confidentiality of an application programming workstation might be compromised by attacks using these vulnerabilities. Automated systems in operation which were programmed with one of the above-mentioned products are not affected.

Jun 25, 2021
7.8
CVE-2021-27413HIGH

Omron CX-One Versions 4.60 and prior, including CX-Server Versions 5.0.29.0 and prior, are vulnerable to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code.

May 13, 2021
7.8
CVE-2021-22672HIGH

Delta Electronics' CNCSoft ScreenEditor in versions prior to v1.01.30 could allow the corruption of data, a denial-of-service condition, or code execution. The vulnerability may allow an attacker to remotely execute arbitrary code.

May 10, 2021
7.8
CVE-2021-29240HIGH

The Package Manager of CODESYS Development System 3 before 3.5.17.0 does not check the validity of packages before installation and may be used to install CODESYS packages with malicious content.

May 4, 2021
7.8
CVE-2021-29239HIGH

CODESYS Development System 3 before 3.5.17.0 displays or executes malicious documents or files embedded in libraries without first checking their validity.

May 3, 2021
7.8
CVE-2021-22665HIGH

Rockwell Automation DriveTools SP v5.13 and below and Drives AOP v4.12 and below both contain a vulnerability that a local attacker with limited privileges may be able to exploit resulting in privilege escalation and complete control of the system.

Mar 18, 2021
7.8
CVE-2020-13554HIGH

An exploitable local privilege elevation vulnerability exists in the file system permissions of Advantech WebAccess/SCADA 9.0.1 installation. In webvrpcs Run Key Privilege Escalation in installation folder of WebAccess, an attacker can either replace binary or loaded modules to execute code with NT SYSTEM privilege.

Mar 3, 2021
7.8
CVE-2020-27257HIGH

This vulnerability allows local attackers to execute arbitrary code due to the lack of proper validation of user-supplied data, which can result in a type-confusion condition in the Omron CX-One Version 4.60 and prior devices.

Feb 9, 2021
7.8
CVE-2020-27293HIGH

Delta Electronics CNCSoft-B Versions 1.0.0.2 and prior has a type confusion issue while processing project files, which may allow an attacker to execute arbitrary code.

Jan 11, 2021
7.8
CVE-2020-27291HIGH

Delta Electronics CNCSoft-B Versions 1.0.0.2 and prior is vulnerable to an out-of-bounds read while processing project files, which may allow an attacker to execute arbitrary code.

Jan 11, 2021
7.8
CVE-2020-27289HIGH

Delta Electronics CNCSoft-B Versions 1.0.0.2 and prior has a null pointer dereference issue while processing project files, which may allow an attacker to execute arbitrary code.

Jan 11, 2021
7.8
CVE-2020-27287HIGH

Delta Electronics CNCSoft-B Versions 1.0.0.2 and prior is vulnerable to an out-of-bounds write while processing project files, which may allow an attacker to execute arbitrary code.

Jan 11, 2021
7.8
CVE-2020-27281HIGH

A stack-based buffer overflow may exist in Delta Electronics CNCSoft ScreenEditor versions 1.01.26 and prior when processing specially crafted project files, which may allow an attacker to execute arbitrary code.

Jan 11, 2021
7.8
CVE-2020-27277HIGH

Delta Electronics DOPSoft Version 4.0.8.21 and prior has a null pointer dereference issue while processing project files, which may allow an attacker to execute arbitrary code.

Jan 11, 2021
7.8
CVE-2020-27275HIGH

Delta Electronics DOPSoft Version 4.0.8.21 and prior is vulnerable to an out-of-bounds write while processing project files, which may allow an attacker to execute arbitrary code.

Jan 11, 2021
7.8
CVE-2020-13537HIGH

An exploitable local privilege elevation vulnerability exists in the file system permissions of Moxa MXView series 3.1.8 installation. Depending on the vector chosen, an attacker can either add code to a script or replace a binary.By default MXViewService, which starts as a NT SYSTEM authority user executes a series of Node.Js scripts to start additional application functionality and among them the mosquitto executable is also run.

Nov 5, 2020
7.8
CVE-2020-13536HIGH

An exploitable local privilege elevation vulnerability exists in the file system permissions of Moxa MXView series 3.1.8 installation. Depending on the vector chosen, an attacker can either add code to a script or replace a binary. By default MXViewService, which starts as a NT SYSTEM authority user executes a series of Node.Js scripts to start additional application functionality.

Nov 5, 2020
7.8
CVE-2020-7523HIGH

Improper Privilege Management vulnerability exists in Schneider Electric Modbus Serial Driver (see security notification for versions) which could cause local privilege escalation when the Modbus Serial Driver service is invoked. The driver does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.

Aug 31, 2020
7.8
CVE-2019-20383HIGH

ABBYY network license server in ABBYY FineReader 15 before Release 4 (aka 15.0.112.2130) allows escalation of privileges by local users via manipulations involving files and using symbolic links.

Aug 13, 2020
7.8
CVE-2020-16227HIGH

Delta Electronics TPEditor Versions 1.97 and prior. An improper input validation may be exploited by processing a specially crafted project file not validated when the data is entered by a user. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.

Aug 7, 2020
7.8
CVE-2020-16225HIGH

Delta Electronics TPEditor Versions 1.97 and prior. A write-what-where condition may be exploited by processing a specially crafted project file. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.

Aug 7, 2020
7.8
CVE-2020-16223HIGH

Delta Electronics TPEditor Versions 1.97 and prior. A heap-based buffer overflow may be exploited by processing a specially crafted project file. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.

Aug 7, 2020
7.8
CVE-2020-16221HIGH

Delta Electronics TPEditor Versions 1.97 and prior. A stack-based buffer overflow may be exploited by processing a specially crafted project file. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.

Aug 7, 2020
7.8
CVE-2020-16219HIGH

Delta Electronics TPEditor Versions 1.97 and prior. An out-of-bounds read may be exploited by processing specially crafted project files. Successful exploitation of this vulnerability may allow an attacker to read/modify information, execute arbitrary code, and/or crash the application.

Aug 7, 2020
7.8
CVE-2020-16229HIGH

Advantech WebAccess HMI Designer, Versions 2.1.9.31 and prior. Processing specially crafted project files lacking proper validation of user supplied data may cause a type confusion condition, which may allow remote code execution, disclosure/modification of information, or cause the application to crash.

Aug 6, 2020
7.8
CVE-2020-16217HIGH

Advantech WebAccess HMI Designer, Versions 2.1.9.31 and prior. A double free vulnerability caused by processing specially crafted project files may allow remote code execution, disclosure/modification of information, or cause the application to crash.

Aug 6, 2020
7.8
CVE-2020-16215HIGH

Advantech WebAccess HMI Designer, Versions 2.1.9.31 and prior. Processing specially crafted project files lacking proper validation of user supplied data may cause a stack-based buffer overflow, which may allow remote code execution, disclosure/modification of information, or cause the application to crash.

Aug 6, 2020
7.8
CVE-2020-16213HIGH

Advantech WebAccess HMI Designer, Versions 2.1.9.31 and prior. Processing specially crafted project files lacking proper validation of user supplied data may cause the system to write outside the intended buffer area, which may allow remote code execution, disclosure/modification of information, or cause the application to crash.

Aug 6, 2020
7.8
CVE-2020-16207HIGH

Advantech WebAccess HMI Designer, Versions 2.1.9.31 and prior. Multiple heap-based buffer overflow vulnerabilities may be exploited by opening specially crafted project files that may overflow the heap, which may allow remote code execution, disclosure/modification of information, or cause the application to crash.

Aug 6, 2020
7.8
CVE-2020-12498HIGH

mwe file parsing in Phoenix Contact PC Worx and PC Worx Express version 1.87 and earlier is vulnerable to out-of-bounds read remote code execution. Manipulated PC Worx projects could lead to a remote code execution due to insufficient input data validation.

Jul 1, 2020
7.8
CVE-2020-12497HIGH

PLCopen XML file parsing in Phoenix Contact PC Worx and PC Worx Express version 1.87 and earlier can lead to a stack-based overflow. Manipulated PC Worx projects could lead to a remote code execution due to insufficient input data validation.

Jul 1, 2020
7.8
CVE-2020-8482HIGH

Insecure storage of sensitive information in ABB Device Library Wizard versions 6.0.X, 6.0.3.1 and 6.0.3.2 allows unauthenticated low privilege user to read file that contains confidential data

May 29, 2020
7.8
CVE-2019-5621HIGH

ABBS Software Audio Media Player version 3.1 suffers from an instance of CWE-121: Stack-based Buffer Overflow.

Apr 29, 2020
7.8
CVE-2020-8489HIGH

Insufficient protection of the inter-process communication functions in ABB System 800xA Information Management (all published versions) enables an attacker authenticated on the local system to inject data, affecting the runtime values to be stored in the archive, or making Information Management history services unavailable.

Apr 29, 2020
7.8
CVE-2020-8488HIGH

Insufficient protection of the inter-process communication functions in ABB System 800xA Batch Management (all published versions) enables an attacker authenticated on the local system to inject data, affecting User Interface update during batch execution and/or compare/printing functionalities.

Apr 29, 2020
7.8
CVE-2020-8485HIGH

Insufficient protection of the inter-process communication functions in ABB System 800xA for MOD 300 (all published versions) enables an attacker authenticated on the local system to inject data, allowing reads and writes to the controllers or cause windows processes to crash.

Apr 29, 2020
7.8
CVE-2020-8484HIGH

Insufficient protection of the inter-process communication functions in ABB System 800xA for DCI (all published versions) enables an attacker authenticated on the local system to inject data, allowing reads and writes to the controllers or cause windows processes to crash.

Apr 29, 2020
7.8
CVE-2020-8471HIGH

For the Central Licensing Server component used in ABB products ABB Ability™ System 800xA and related system extensions versions 5.1, 6.0 and 6.1, Compact HMI versions 5.1 and 6.0, Control Builder Safe 1.0, 1.1 and 2.0, Symphony Plus -S+ Operations 3.0 to 3.2 Symphony Plus -S+ Engineering 1.1 to 2.2, Composer Harmony 5.1, 6.0 and 6.1, Melody Composer 5.3, 6.1/6.2 and SPE for Melody 1.0SPx (Composer 6.3), Harmony OPC Server (HAOPC) Standalone 6.0, 6.1 and 7.0, ABB Ability™ System 800xA/ Advant® OCS Control Builder A 1.3 and 1.4, Advant® OCS AC100 OPC Server 5.1, 6.0 and 6.1, Composer CTK 6.1 and 6.2, AdvaBuild 3.7 SP1 and SP2, OPCServer for MOD 300 (non-800xA) 1.4, OPC Data Link 2.1 and 2.2, Knowledge Manager 8.0, 9.0 and 9.1, Manufacturing Operations Management 1812 and 1909, weak file permissions allow an authenticated attacker to block the license handling, escalate his/her privileges and execute arbitrary code.

Apr 29, 2020
7.8
CVE-2020-8474HIGH

Weak Registry permissions in ABB System 800xA Base allow low privileged users to read and modify registry settings related to control system functionality, allowing an authenticated attacker to cause system functions to stop or malfunction.

Apr 22, 2020
7.8
CVE-2020-10642HIGH

In Rockwell Automation RSLinx Classic versions 4.11.00 and prior, an authenticated local attacker could modify a registry key, which could lead to the execution of malicious code using system privileges when opening RSLinx Classic.

Apr 13, 2020
7.8
CVE-2020-10940HIGH

Local Privilege Escalation can occur in PHOENIX CONTACT PORTICO SERVER through 3.0.7 when installed to run as a service.

Mar 27, 2020
7.8
CVE-2020-10939HIGH

Insecure, default path permissions in PHOENIX CONTACT PC WORX SRT through 1.14 allow for local privilege escalation.

Mar 27, 2020
7.8
CVE-2019-5184HIGH

An exploitable double free vulnerability exists in the iocheckd service "I/O-Check" functionality of WAGO PFC 200. A specially crafted XML cache file written to a specific location on the device can cause a heap pointer to be freed twice, resulting in a denial of service and potentially code execution. An attacker can send a specially crafted packet to trigger the parsing of this cache file.

Mar 23, 2020
7.8
CVE-2019-5181HIGH

An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service ‘I/O-Check’ functionality of WAGO PFC 200 Firmware version 03.02.02(14). A specially crafted XML cache file written to a specific location on the device can cause a stack buffer overflow, resulting in code execution. An attacker can send a specially crafted packet to trigger the parsing of this cache file. The destination buffer sp+0x440 is overflowed with the call to sprintf() for any subnetmask values that are greater than 1024-len(‘/etc/config-tools/config_interfaces interface=X1 state=enabled subnet-mask=‘) in length. A subnetmask value of length 0x3d9 will cause the service to crash.

Mar 12, 2020
7.8
CVE-2019-5180HIGH

An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service ‘I/O-Check’ functionality of WAGO PFC 200 Firmware version 03.02.02(14). An attacker can send a specially crafted packet to trigger the parsing of this cache file. The destination buffer sp+0x440 is overflowed with the call to sprintf() for any ip values that are greater than 1024-len(‘/etc/config-tools/config_interfaces interface=X1 state=enabled ip-address=‘) in length. A ip value of length 0x3da will cause the service to crash.

Mar 12, 2020
7.8
CVE-2019-5179HIGH

An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service ‘I/O-Check’ functionality of WAGO PFC 200 Firmware version 03.02.02(14). An attacker can send a specially crafted packet to trigger the parsing of this cache file.

Mar 12, 2020
7.8
CVE-2019-5178HIGH

An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service ‘I/O-Check’ functionality of WAGO PFC 200 Firmware version 03.02.02(14). An attacker can send a specially crafted packet to trigger the parsing of this cache file. The destination buffer sp+0x440 is overflowed with the call to sprintf() for any hostname values that are greater than 1024-len(‘/etc/config-tools/change_hostname hostname=‘) in length. A hostname value of length 0x3fd will cause the service to crash.

Mar 12, 2020
7.8
CVE-2019-5171HIGH

An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function of the WAGO PFC 200 Firmware version 03.02.02(14). An attacker can send specially crafted packet at 0x1ea48 to the extracted hostname value from the xml file that is used as an argument to /etc/config-tools/config_interfaces interface=X1 state=enabled ip-address=<contents of ip node> using sprintf().

Mar 12, 2020
7.8
CVE-2019-5170HIGH

An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function of the WAGO PFC 200 Firmware version 03.02.02(14). A specially crafted XML cache file written to a specific location on the device can be used to inject OS commands. An attacker can send a specially crafted packet to trigger the parsing of this cache file.At 0x1e87c the extracted hostname value from the xml file is used as an argument to /etc/config-tools/change_hostname hostname=<contents of hostname node> using sprintf(). This command is later executed via a call to system().

Mar 12, 2020
7.8
CVE-2019-5169HIGH

An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function of the WAGO PFC 200 Firmware version 03.02.02(14). A specially crafted XML cache file written to a specific location on the device can be used to inject OS commands. An attacker can send a specially crafted packet to trigger the parsing of this cache file. At 0x1e900 the extracted gateway value from the xml file is used as an argument to /etc/config-tools/config_default_gateway number=0 state=enabled value=<contents of gateway node> using sprintf(). This command is later executed via a call to system().

Mar 12, 2020
7.8
CVE-2019-5175HIGH

An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function of the WAGO PFC 200 Firmware version 03.02.02(14). A specially crafted XML cache file written to a specific location on the device can be used to inject OS commands. An attacker can send a specially crafted packet to trigger the parsing of this cache file.At 0x1ea28 the extracted type value from the xml file is used as an argument to /etc/config-tools/config_interfaces interface=X1 state=enabled config-type=<contents of type node> using sprintf(). This command is later executed via a call to system().

Mar 11, 2020
7.8
CVE-2019-5174HIGH

An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function of the WAGO PFC 200 version 03.02.02(14). A specially crafted XML cache file written to a specific location on the device can be used to inject OS commands. An attacker can send a specially crafted packet to trigger the parsing of this cache file.At 0x1e9fc the extracted subnetmask value from the xml file is used as an argument to /etc/config-tools/config_interfaces interface=X1 state=enabled subnet-mask=<contents of subnetmask node> using sprintf(). This command is later executed via a call to system().

Mar 11, 2020
7.8
CVE-2019-5173HIGH

An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function of the WAGO PFC 200 Firmware version 03.02.02(14). A specially crafted XML cache file written to a specific location on the device can be used to inject OS commands. An attacker can send a specially crafted packet to trigger the parsing of this cache file. At 0x1e9fc the extracted state value from the xml file is used as an argument to /etc/config-tools/config_interfaces interface=X1 state=<contents of state node> using sprintf(). This command is later executed via a call to system().

Mar 11, 2020
7.8
CVE-2019-5172HIGH

An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function of the WAGO PFC 200 Firmware version 03.02.02(14). An attacker can send a specially crafted packet to trigger the parsing of this cache file. At 0x1e840 the extracted ntp value from the xml file is used as an argument to /etc/config-tools/config_sntp time-server-%d=<contents of ntp node> using sprintf(). This command is later executed via a call to system(). This is done in a loop and there is no limit to how many ntp entries will be parsed from the xml file.

Mar 11, 2020
7.8
CVE-2019-5168HIGH

An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function of the WAGO PFC 200 version 03.02.02(14). An attacker can send a specially crafted XML cache file At 0x1e8a8 the extracted domainname value from the xml file is used as an argument to /etc/config-tools/edit_dns_server domain-name=<contents of domainname node> using sprintf().This command is later executed via a call to system().

Mar 11, 2020
7.8
CVE-2019-5167HIGH

An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function of the WAGO PFC 200 version 03.02.02(14). At 0x1e3f0 the extracted dns value from the xml file is used as an argument to /etc/config-tools/edit_dns_server %s dns-server-nr=%d dns-server-name=<contents of dns node> using sprintf(). This command is later executed via a call to system(). This is done in a loop and there is no limit to how many dns entries will be parsed from the xml file.

Mar 11, 2020
7.8
CVE-2019-5166HIGH

An exploitable stack buffer overflow vulnerability exists in the iocheckd service ‘I/O-Check’ functionality of WAGO PFC 200 version 03.02.02(14). A specially crafted XML cache file written to a specific location on the device can cause a stack buffer overflow, resulting in code execution. An attacker can send a specially crafted packet to trigger the parsing of this cache file.

Mar 11, 2020
7.8
CVE-2019-5159HIGH

An exploitable improper input validation vulnerability exists in the firmware update functionality of WAGO e!COCKPIT automation software v1.6.0.7. A specially crafted firmware update file can allow an attacker to write arbitrary files to arbitrary locations on WAGO controllers as a part of executing a firmware update, potentially resulting in code execution. An attacker can create a malicious firmware update package file using any zip utility. The user must initiate a firmware update through e!COCKPIT and choose the malicious wup file using the file browser to trigger the vulnerability.

Mar 11, 2020
7.8
CVE-2019-5158HIGH

An exploitable firmware downgrade vulnerability exists in the firmware update package functionality of the WAGO e!COCKPIT automation software v1.6.1.5. A specially crafted firmware update file can allow an attacker to install an older firmware version while the user thinks a newer firmware version is being installed. An attacker can create a custom firmware update package with invalid metadata in order to trigger this vulnerability.

Mar 11, 2020
7.8
CVE-2020-6968HIGH

Honeywell INNCOM INNControl 3 allows workstation users to escalate application user privileges through the modification of local configuration files.

Feb 20, 2020
7.8
CVE-2019-13521HIGH

A maliciously crafted program file opened by an unsuspecting user of Rockwell Automation Arena Simulation Software version 16.00.00 and earlier may result in the limited exposure of information related to the targeted workstation. Rockwell Automation has released version 16.00.01 of Arena Simulation Software to address the reported vulnerabilities.

Jan 27, 2020
7.8
CVE-2019-13519HIGH

A maliciously crafted program file opened by an unsuspecting user of Rockwell Automation Arena Simulation Software version 16.00.00 and earlier may result in the limited exposure of information related to the targeted workstation. Rockwell Automation has released version 16.00.01 of Arena Simulation Software to address the reported vulnerabilities.

Jan 27, 2020
7.8
CVE-2019-6008HIGH

An unquoted search path vulnerability in Multiple Yokogawa products for Windows (Exaopc (R1.01.00 ? R3.77.00), Exaplog (R1.10.00 ? R3.40.00), Exaquantum (R1.10.00 ? R3.02.00 and R3.15.00), Exaquantum/Batch (R1.01.00 ? R2.50.40), Exasmoc (all revisions), Exarqe (all revisions), GA10 (R1.01.01 ? R3.05.01), and InsightSuiteAE (R1.01.00 ? R1.06.00)) allow local users to gain privileges via a Trojan horse executable file and execute arbitrary code with eleveted privileges.

Dec 26, 2019
7.8
CVE-2019-16675HIGH

An issue was discovered in PHOENIX CONTACT PC Worx through 1.86, PC Worx Express through 1.86, and Config+ through 1.86. A manipulated PC Worx or Config+ project file could lead to an Out-of-bounds Read and remote code execution. The attacker needs to get access to an original PC Worx or Config+ project to be able to manipulate data inside. After manipulation, the attacker needs to exchange the original files with the manipulated ones on the application programming workstation.

Oct 31, 2019
7.8
CVE-2019-13527HIGH

In Rockwell Automation Arena Simulation Software Cat. 9502-Ax, Versions 16.00.00 and earlier, a maliciously crafted Arena file opened by an unsuspecting user may result in the use of a pointer that has not been initialized.

Sep 24, 2019
7.8
CVE-2019-13544HIGH

Delta Electronics TPEditor, Versions 1.94 and prior. Multiple out-of-bounds write vulnerabilities may be exploited by processing specially crafted project files, which may allow remote code execution.

Sep 11, 2019
7.8
CVE-2019-13540HIGH

Delta Electronics TPEditor, Versions 1.94 and prior. Multiple stack-based buffer overflow vulnerabilities may be exploited by processing specially crafted project files, which may allow an attacker to remotely execute arbitrary code.

Sep 11, 2019
7.8
CVE-2019-13536HIGH

Delta Electronics TPEditor, Versions 1.94 and prior. Multiple heap-based buffer overflow vulnerabilities may be exploited by processing specially crafted project files, which may allow an attacker to remotely execute arbitrary code.

Sep 11, 2019
7.8
CVE-2019-13510HIGH

Rockwell Automation Arena Simulation Software versions 16.00.00 and earlier contain a USE AFTER FREE CWE-416. A maliciously crafted Arena file opened by an unsuspecting user may result in the application crashing or the execution of arbitrary code.

Aug 15, 2019
7.8
CVE-2019-10982HIGH

Delta Electronics CNCSoft ScreenEditor, Versions 1.00.89 and prior. Multiple heap-based buffer overflow vulnerabilities may be exploited by processing specially crafted project files, allowing an attacker to remotely execute arbitrary code. There is a lack of user input validation before copying data from project files onto the heap.

Jul 24, 2019
7.8
CVE-2018-19008HIGH

The TextEditor 2.0 in ABB CP400 Panel Builder versions 2.0.7.05 and earlier contain a vulnerability in the file parser of the Text Editor wherein the application doesn't properly prevent the insertion of specially crafted files which could allow arbitrary code execution.

Feb 13, 2019
7.8
CVE-2018-7815HIGH

A Type Confusion (CWE-843) vulnerability exists in Eurotherm by Schneider Electric GUIcon V2.0 (Gold Build 683.0) on c3core.dll which could cause remote code to be executed when parsing a GD1 file

Feb 6, 2019
7.8
CVE-2018-7814HIGH

A Stack-based Buffer Overflow (CWE-121) vulnerability exists in Eurotherm by Schneider Electric GUIcon V2.0 (Gold Build 683.0) which could cause remote code to be executed when parsing a GD1 file

Feb 6, 2019
7.8
CVE-2018-7813HIGH

A Type Confusion (CWE-843) vulnerability exists in Eurotherm by Schneider Electric GUIcon V2.0 (Gold Build 683.0) on pcwin.dll which could cause remote code to be executed when parsing a GD1 file

Feb 6, 2019
7.8
CVE-2018-17913HIGH

A type confusion vulnerability exists when processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior, which may allow an attacker to execute code in the context of the application.

Nov 5, 2018
7.8
CVE-2018-17909HIGH

When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior, the application fails to check if it is referencing freed memory, which may allow an attacker to execute code under the context of the application.

Nov 5, 2018
7.8
CVE-2018-17905HIGH

When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior and tampering with a specific byte, memory corruption may occur within a specific object.

Nov 5, 2018
7.8
CVE-2018-7799HIGH

A DLL hijacking vulnerability exists in Schneider Electric Software Update (SESU), all versions prior to V2.2.0, which could allow an attacker to execute arbitrary code on the targeted system when placing a specific DLL file.

Nov 2, 2018
7.8
CVE-2018-14828HIGH

Advantech WebAccess 8.3.1 and earlier has an improper privilege management vulnerability, which may allow an attacker to access those files and perform actions at a system administrator level.

Oct 23, 2018
7.8
CVE-2018-14800HIGH

Delta Electronics ISPSoft version 3.0.5 and prior allow an attacker, by opening a crafted file, to cause the application to read past the boundary allocated to a stack object, which could allow execution of code under the context of the application.

Oct 3, 2018
7.8
CVE-2018-13806HIGH

A vulnerability has been identified in SIEMENS TD Keypad Designer (All versions). A DLL hijacking vulnerability exists in all versions of SIEMENS TD Keypad Designer which could allow an attacker to execute code with the permission of the user running TD Designer. The attacker must have write access to the directory containing the TD project file in order to exploit the vulnerability. A legitimate user with higher privileges than the attacker must open the TD project in order for this vulnerability to be exploited. At the time of advisory publication no public exploitation of this security vulnerability was known.

Sep 12, 2018
7.8
CVE-2018-10616HIGH

ABB Panel Builder 800 all versions has an improper input validation vulnerability which may allow an attacker to insert and run arbitrary code on a computer where the affected product is used.

Jul 18, 2018
7.8
CVE-2018-4858HIGH

A vulnerability has been identified in IEC 61850 system configurator (All versions < V5.80), DIGSI 5 (affected as IEC 61850 system configurator is incorporated) (All versions < V7.80), DIGSI 4 (All versions < V4.93), SICAM PAS/PQS (All versions < V8.11), SICAM PQ Analyzer (All versions < V3.11), SICAM SCC (All versions < V9.02 HF3). A service of the affected products listening on all of the host's network interfaces on either port 4884/TCP, 5885/TCP, or port 5886/TCP could allow an attacker to either exfiltrate limited data from the system or to execute code with Microsoft Windows user permissions. Successful exploitation requires an attacker to be able to send a specially crafted network request to the vulnerable service and a user interacting with the service's client application on the host. In order to execute arbitrary code with Microsoft Windows user permissions, an attacker must be able to plant the code in advance on the host by other means. The vulnerability has limited impact to confidentiality and integrity of the affected system. At the time of advisory publication no public exploitation of this security vulnerability was known. Siemens confirms the security vulnerability and provides mitigations to resolve the security issue.

Jul 9, 2018
7.8
CVE-2018-8841HIGH

In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, an improper privilege management vulnerability may allow an authenticated user to modify files when read access should only be given to the user.

May 15, 2018
7.8
CVE-2017-6015HIGH

Without quotation marks, any whitespace in the file path for Rockwell Automation FactoryTalk Activation version 4.00.02 remains ambiguous, which may allow an attacker to link to or run a malicious executable. This may allow an authorized, but not privileged local user to execute arbitrary code with elevated privileges on the system. CVSS v3 base score: 8.8, CVSS vector string: (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H). Rockwell Automation has released a new version of FactoryTalk Activation, Version 4.01, which addresses the identified vulnerability. Rockwell Automation recommends upgrading to the latest version of FactoryTalk Activation, Version 4.01 or later.

May 11, 2018
7.8
CVE-2017-5175HIGH

Advantech WebAccess 8.1 and earlier contains a DLL hijacking vulnerability which may allow an attacker to run a malicious DLL file within the search path resulting in execution of arbitrary code.

May 9, 2018
7.8
CVE-2018-8839HIGH

Delta PMSoft versions 2.10 and prior have multiple stack-based buffer overflow vulnerabilities where a .ppm file can introduce a value larger than is readable by PMSoft's fixed-length stack buffer. This can cause the buffer to be overwritten, which may allow arbitrary code execution or cause the application to crash. CVSS v3 base score: 7.1; CVSS vector string: AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H. Delta Electronics recommends affected users update to at least PMSoft v2.11, which was made available as of March 22, 2018, or the latest available version.

Apr 30, 2018
7.8
CVE-2018-8837HIGH

Processing specially crafted .pm3 files in Advantech WebAccess HMI Designer 2.1.7.32 and prior may cause the system to write outside the intended buffer area and may allow remote code execution.

Apr 25, 2018
7.8
CVE-2018-8835HIGH

Double free vulnerabilities in Advantech WebAccess HMI Designer 2.1.7.32 and prior caused by processing specially crafted .pm3 files may allow remote code execution.

Apr 25, 2018
7.8
CVE-2018-8833HIGH

Heap-based buffer overflow vulnerabilities in Advantech WebAccess HMI Designer 2.1.7.32 and prior caused by processing specially crafted .pm3 files may allow remote code execution.

Apr 25, 2018
7.8
CVE-2018-8834HIGH

Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a heap-based buffer overflow.

Apr 17, 2018
7.8
CVE-2018-7530HIGH

Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition.

Apr 17, 2018
7.8
CVE-2018-7514HIGH

Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow.

Apr 17, 2018
7.8
CVE-2018-7502HIGH

Kernel drivers in Beckhoff TwinCAT 3.1 Build 4022.4, TwinCAT 2.11 R3 2259, and TwinCAT 3.1 lack proper validation of user-supplied pointer values. An attacker who is able to execute code on the target may be able to exploit this vulnerability to obtain SYSTEM privileges.

Mar 23, 2018
7.8
CVE-2018-5476HIGH

A Stack-based Buffer Overflow issue was discovered in Delta Electronics Delta Industrial Automation DOPSoft, Version 4.00.01 or prior. Stack-based buffer overflow vulnerabilities caused by processing specially crafted .dop or .dpb files may allow an attacker to remotely execute arbitrary code.

Mar 15, 2018
7.8
CVE-2017-16751HIGH

A Stack-based Buffer Overflow issue was discovered in Delta Electronics Delta Industrial Automation Screen Editor, Version 2.00.23.00 or prior. Stack-based buffer overflow vulnerabilities caused by processing specially crafted .dpb files may allow an attacker to remotely execute arbitrary code.

Mar 15, 2018
7.8
CVE-2017-16749HIGH

A Use-after-Free issue was discovered in Delta Electronics Delta Industrial Automation Screen Editor, Version 2.00.23.00 or prior. Specially crafted .dpb files could exploit a use-after-free vulnerability.

Mar 15, 2018
7.8
CVE-2017-16747HIGH

An Out-of-bounds Write issue was discovered in Delta Electronics Delta Industrial Automation Screen Editor, Version 2.00.23.00 or prior. Specially crafted .dpb files may cause the system to write outside the intended buffer area.

Mar 15, 2018
7.8
CVE-2017-16745HIGH

A Type Confusion issue was discovered in Delta Electronics Delta Industrial Automation Screen Editor, Version 2.00.23.00 or prior. An access of resource using incompatible type ('type confusion') vulnerability may allow an attacker to execute remote code when processing specially crafted .dpb files.

Mar 15, 2018
7.8
CVE-2018-7239HIGH

A DLL hijacking vulnerability exists in Schneider Electric's SoMove Software and associated DTM software components in all versions prior to 2.6.2 which could allow an attacker to execute arbitrary code.

Mar 9, 2018
7.8
CVE-2018-1168HIGH

This vulnerability allows local attackers to escalate privileges on vulnerable installations of ABB MicroSCADA 9.3 with FP 1-2-3. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the configuration of the access controls for the installed product files. The installation procedure leaves critical files open to manipulation by any authenticated user. An attacker can leverage this vulnerability to escalate privileges to SYSTEM. Was ZDI-CAN-5097.

Feb 21, 2018
7.8
CVE-2017-9967HIGH

A security misconfiguration vulnerability exists in Schneider Electric's IGSS SCADA Software versions 12 and prior. Security configuration settings such as Address Space Layout Randomization (ASLR) and Data Execution prevention (DEP) were not properly configured resulting in weak security.

Feb 12, 2018
7.8
CVE-2018-5441HIGH

An Improper Validation of Integrity Check Value issue was discovered in PHOENIX CONTACT mGuard firmware versions 7.2 to 8.6.0. mGuard devices rely on internal checksums for verification of the internal integrity of the update packages. Verification may not always be performed correctly, allowing an attacker to modify firmware update packages.

Jan 30, 2018
7.8
CVE-2017-14030HIGH

An issue was discovered in Moxa MXview v2.8 and prior. The unquoted service path escalation vulnerability could allow an authorized user with file access to escalate privileges by inserting arbitrary code into the unquoted service path.

Jan 12, 2018
7.8
CVE-2017-12705HIGH

A Heap-Based Buffer Overflow issue was discovered in Advantech WebOP. A maliciously crafted project file may be able to trigger a heap-based buffer overflow, which may crash the process and allow an attacker to execute arbitrary code.

Oct 25, 2017
7.8
CVE-2017-9961HIGH

A vulnerability exists in Schneider Electric's Pro-Face GP Pro EX version 4.07.000 that allows an attacker to execute arbitrary code. Malicious code installation requires an access to the computer. By placing a specific DLL/OCX file, an attacker is able to force the process to load arbitrary DLL and execute arbitrary code in the context of the process.

Sep 26, 2017
7.8
CVE-2017-9958HIGH

An improper access control vulnerability exists in Schneider Electric's U.motion Builder software versions 1.2.1 and prior in which an improper handling of the system configuration can allow an attacker to execute arbitrary code under the context of root.

Sep 26, 2017
7.8
CVE-2017-12717HIGH

An Uncontrolled Search Path Element issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. A maliciously crafted dll file placed earlier in the search path may allow an attacker to execute code within the context of the application.

Aug 30, 2017
7.8
CVE-2017-12713HIGH

An Incorrect Permission Assignment for Critical Resource issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. Multiple files and folders with ACLs that affect other users are allowed to be modified by non-administrator accounts.

Aug 30, 2017
7.8
CVE-2017-12711HIGH

An Incorrect Privilege Assignment issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. A built-in user account has been granted a sensitive privilege that may allow a user to elevate to administrative privileges.

Aug 30, 2017
7.8
CVE-2017-9942HIGH

A vulnerability was discovered in Siemens SiPass integrated (All versions before V2.70) that could allow an attacker with local access to the SiPass integrated server or SiPass integrated client to potentially obtain credentials from the systems.

Aug 8, 2017
7.8
CVE-2017-7968HIGH

An Incorrect Default Permissions issue was discovered in Schneider Electric Wonderware InduSoft Web Studio v8.0 Patch 3 and prior versions. Upon installation, Wonderware InduSoft Web Studio creates a new directory and two files, which are placed in the system's path and can be manipulated by non-administrators. This could allow an authenticated user to escalate his or her privileges.

May 19, 2017
7.8
CVE-2017-6033HIGH

A DLL Hijacking issue was discovered in Schneider Electric Interactive Graphical SCADA System (IGSS) Software, Version 12 and previous versions. The software will execute a malicious file if it is named the same as a legitimate file and placed in a location that is earlier in the search path.

Apr 7, 2017
7.8
CVE-2016-9356HIGH

An issue was discovered in Moxa DACenter Versions 1.4 and older. The application may suffer from an unquoted search path issue.

Feb 13, 2017
7.8
CVE-2016-9353HIGH

An issue was discovered in Advantech SUISAccess Server Version 3.0 and prior. The admin password is stored in the system and is encrypted with a static key hard-coded in the program. Attackers could reverse the admin account password for use.

Feb 13, 2017
7.8
CVE-2016-8566HIGH

An issue was discovered in Siemens SICAM PAS before 8.00. Because of Storing Passwords in a Recoverable Format, an authenticated local attacker with certain privileges could possibly reconstruct the passwords of users for accessing the database.

Feb 13, 2017
7.8
CVE-2016-5805HIGH

An issue was discovered in Delta Electronics WPLSoft, Versions prior to V2.42.11, ISPSoft, Versions prior to 3.02.11, and PMSoft, Versions prior to2.10.10. There are multiple instances of heap-based buffer overflows that may allow malicious files to cause the execution of arbitrary code or a denial of service.

Feb 13, 2017
7.8
CVE-2016-5802HIGH

An issue was discovered in Delta Electronics WPLSoft, Versions prior to V2.42.11, ISPSoft, Versions prior to 3.02.11, and PMSoft, Versions prior to 2.10.10. Multiple instances of out-of-bounds write conditions may allow malicious files to be read and executed by the affected software.

Feb 13, 2017
7.8
CVE-2016-6486HIGH

Siemens SINEMA Server uses weak permissions for the application folder, which allows local users to gain privileges via unspecified vectors.

Aug 8, 2016
7.8
CVE-2015-3938HIGH

The HTTP application on Mitsubishi Electric MELSEC FX3G PLC devices before April 2015 allows remote attackers to cause a denial of service (device outage) via a long parameter.

Oct 6, 2015
7.8
CVE-2015-2177HIGH

Siemens SIMATIC S7-300 CPU devices allow remote attackers to cause a denial of service (defect-mode transition) via crafted packets on (1) TCP port 102 or (2) Profibus.

Mar 7, 2015
7.8
CVE-2014-9369HIGH

Siemens SPC controllers SPC4000, SPC5000, and SPC6000 before 3.6.0 allow remote attackers to cause a denial of service (device restart) via crafted packets.

Mar 7, 2015
7.8
CVE-2014-8478HIGH

The web server on Siemens SCALANCE X-300 switches with firmware before 4.0 and SCALANCE X 408 switches with firmware before 4.0 allows remote attackers to cause a denial of service (reboot) via malformed HTTP requests.

Jan 21, 2015
7.8
CVE-2014-2380HIGH

Schneider Electric Wonderware Information Server (WIS) Portal 4.0 SP1 through 5.5 uses weak encryption, which allows remote attackers to obtain sensitive information by reading a credential file.

Aug 28, 2014
7.8
CVE-2014-2258HIGH

Siemens SIMATIC S7-1200 CPU PLC devices with firmware before 4.0 allow remote attackers to cause a denial of service (defect-mode transition) via crafted HTTPS packets, a different vulnerability than CVE-2014-2259.

Mar 24, 2014
7.8
CVE-2014-2254HIGH

Siemens SIMATIC S7-1200 CPU PLC devices with firmware before 4.0 allow remote attackers to cause a denial of service (defect-mode transition) via crafted HTTP packets, a different vulnerability than CVE-2014-2255.

Mar 24, 2014
7.8
CVE-2014-2256HIGH

Siemens SIMATIC S7-1200 CPU PLC devices with firmware before 4.0 allow remote attackers to cause a denial of service (defect-mode transition) via crafted ISO-TSAP packets, a different vulnerability than CVE-2014-2257.

Mar 24, 2014
7.8
CVE-2014-2259HIGH

Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allow remote attackers to cause a denial of service (defect-mode transition) via crafted HTTPS packets.

Mar 16, 2014
7.8
CVE-2014-2257HIGH

Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allow remote attackers to cause a denial of service (defect-mode transition) via crafted ISO-TSAP packets.

Mar 16, 2014
7.8
CVE-2014-2255HIGH

Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allow remote attackers to cause a denial of service (defect-mode transition) via crafted HTTP packets.

Mar 16, 2014
7.8
CVE-2013-2824HIGH

Schneider Electric StruxureWare SCADA Expert Vijeo Citect 7.40, Vijeo Citect 7.20 through 7.30SP1, CitectSCADA 7.20 through 7.30SP1, StruxureWare PowerSCADA Expert 7.30 through 7.30SR1, and PowerLogic SCADA 7.20 through 7.20SR1 do not properly handle exceptions, which allows remote attackers to cause a denial of service via a crafted packet.

Feb 26, 2014
7.8
CVE-2014-1966HIGH

The SNMP implementation in Siemens RuggedCom ROS before 3.11, ROS 3.11 for RS950G, ROS 3.12 before 3.12.4, and ROS 4.0 for RSG2488 allows remote attackers to cause a denial of service (device outage) via crafted packets.

Feb 24, 2014
7.8
CVE-2013-4780HIGH

core/getLog.php on the Siemens Enterprise OpenScape Branch appliance and OpenScape Session Border Controller (SBC) before 2 R0.32.0, and 7 before 7 R1.7.0, allows remote attackers to read arbitrary files via unspecified vectors.

Jul 18, 2013
7.8
CVE-2013-4778HIGH

core/getLog.php on the Siemens Enterprise OpenScape Branch appliance and OpenScape Session Border Controller (SBC) before 2 R0.32.0, and 7 before 7 R1.7.0, allows remote attackers to obtain sensitive server and statistics information via unspecified vectors.

Jul 18, 2013
7.8
CVE-2013-2780HIGH

Siemens SIMATIC S7-1200 PLCs 2.x and 3.x allow remote attackers to cause a denial of service (defect-mode transition and control outage) via crafted packets to UDP port 161 (aka the SNMP port).

Apr 22, 2013
7.8
CVE-2013-0700HIGH

Siemens SIMATIC S7-1200 PLCs 2.x and 3.x allow remote attackers to cause a denial of service (defect-mode transition and control outage) via crafted packets to TCP port 102 (aka the ISO-TSAP port).

Apr 22, 2013
7.8
CVE-2012-4714HIGH

Integer overflow in RNADiagnostics.dll in Rockwell Automation FactoryTalk Services Platform (FTSP) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 allows remote attackers to cause a denial of service (service outage or RNADiagReceiver.exe daemon crash) via UDP data that specifies a large integer value.

Apr 18, 2013
7.8
CVE-2012-4713HIGH

Integer signedness error in RNADiagnostics.dll in Rockwell Automation FactoryTalk Services Platform (FTSP) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 allows remote attackers to cause a denial of service (service outage or RNADiagReceiver.exe daemon crash) via UDP data that specifies a negative integer value.

Apr 18, 2013
7.8
CVE-2013-1627HIGH

Absolute path traversal vulnerability in NTWebServer.exe in Indusoft Studio 7.0 and earlier and Advantech Studio 7.0 and earlier allows remote attackers to read arbitrary files via a full pathname in an argument to the sub_401A90 CreateFileW function.

Mar 11, 2013
7.8
CVE-2012-4706HIGH

Integer signedness error in 3S CODESYS Gateway-Server before 2.3.9.27 allows remote attackers to cause a denial of service via a crafted packet that triggers a heap-based buffer overflow.

Feb 24, 2013
7.8
CVE-2012-6442HIGH

When an affected product receives a valid CIP message from an unauthorized or unintended source to Port 2222/TCP, Port 2222/UDP, Port 44818/TCP, or Port 44818/UDP that instructs the product to reset, a DoS can occur. This situation could cause loss of availability and a disruption of communication with other connected devices. Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400

Jan 24, 2013
7.8
CVE-2012-6438HIGH

The device does not properly validate the data being sent to the buffer. An attacker can send a malformed CIP packet to Port 2222/TCP, Port 2222/UDP, Port 44818/TCP, or Port 44818/UDP, which creates a buffer overflow and causes the NIC to crash. Successful exploitation of this vulnerability could cause loss of availability and a disruption in communications with other connected devices. Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400

Jan 24, 2013
7.8
CVE-2012-6436HIGH

The device does not properly validate the data being sent to the buffer. An attacker can send a malformed CIP packet to Port 2222/TCP, Port 2222/UDP, Port 44818/TCP, or Port 44818/UDP, which creates a buffer overflow and causes the CPU to crash. Successful exploitation of this vulnerability could cause loss of availability and a disruption in communications with other connected devices. Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400

Jan 24, 2013
7.8
CVE-2012-6435HIGH

When an affected product receives a valid CIP message from an unauthorized or unintended source to Port 2222/TCP, Port 2222/UDP, Port 44818/TCP, or Port 44818/UDP that instructs the CPU to stop logic execution and enter a fault state, a DoS can occur. This situation could cause loss of availability and a disruption of communication with other connected devices. Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400

Jan 24, 2013
7.8
CVE-2012-3017HIGH

Siemens SIMATIC S7-400 PN CPU devices with firmware 5.x allow remote attackers to cause a denial of service (defect-mode transition and service outage) via (1) malformed HTTP traffic or (2) malformed IP packets.

Jul 31, 2012
7.8
CVE-2012-3016HIGH

Siemens SIMATIC S7-400 PN CPU devices with firmware 6 before 6.0.3 allow remote attackers to cause a denial of service (defect-mode transition and service outage) via crafted ICMP packets.

Jul 31, 2012
7.8
CVE-2012-1802HIGH

Buffer overflow in the embedded web server on the Siemens Scalance X Industrial Ethernet switch X414-3E before 3.7.1, X308-2M before 3.7.2, X-300EEC before 3.7.2, XR-300 before 3.7.2, and X-300 before 3.7.2 allows remote attackers to cause a denial of service (device reboot) or possibly execute arbitrary code via a malformed URL.

Apr 18, 2012
7.8
CVE-2011-4878HIGH

Directory traversal vulnerability in miniweb.exe in the HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime allows remote attackers to read arbitrary files via a ..%5c (dot dot backslash) in a URI.

Feb 3, 2012
7.8
CVE-2010-2772HIGH

Siemens Simatic WinCC and PCS 7 SCADA system uses a hard-coded password, which allows local users to access a back-end database and gain privileges, as demonstrated in the wild in July 2010 by the Stuxnet worm, a different vulnerability than CVE-2010-2568.

Jul 22, 2010
7.8
CVE-2010-2568HIGH

Windows Shell in Microsoft Windows XP SP3, Server 2003 SP2, Vista SP1 and SP2, Server 2008 SP2 and R2, and Windows 7 allows local users or remote attackers to execute arbitrary code via a crafted (1) .LNK or (2) .PIF shortcut file, which is not properly handled during icon display in Windows Explorer, as demonstrated in the wild in July 2010, and originally reported for malware that leverages CVE-2010-2772 in Siemens WinCC SCADA systems.

Jul 22, 2010
7.8
CVE-2009-3322HIGH

The Siemens Gigaset SE361 WLAN router allows remote attackers to cause a denial of service (device reboot) via a flood of crafted TCP packets to port 1723.

Sep 23, 2009
7.8
CVE-2008-7065HIGH

Siemens C450 IP and C475 IP VoIP devices allow remote attackers to cause a denial of service (disconnected calls and device reboot) via a crafted SIP packet to UDP port 5060.

Aug 25, 2009
7.8
CVE-2008-1546HIGH

servlet/MIMEReceiveServlet in the web controller for Mitsubishi Electric GB-50 and GB-50A air-conditioning control systems allows remote attackers to cause a denial of service (air-conditioning outage) via an XML document containing a setRequest command.

Mar 28, 2008
7.8
CVE-2008-1267HIGH

The Siemens SpeedStream 6520 router allows remote attackers to cause a denial of service (web interface crash) via an HTTP request to basehelp_English.htm with a large integer in the Content-Length field.

Mar 10, 2008
7.8
CVE-2003-1464HIGH

Buffer overflow in Siemens 45 series mobile phones allows remote attackers to cause a denial of service (disconnect and unavailable inbox) via a Short Message Service (SMS) message with a long image name.

Dec 31, 2003
7.8
CVE-2025-10089HIGH

Uncontrolled Search Path Element Vulnerability in Setting and Operation Application for Lighting Control System MILCO.S Setting Application all versions, MILCO.S Setting Application (IR) all versions, MILCO.S Easy Setting Application (IR) all versions, and MILCO.S Easy Switch Application (IR) all versions allows a local attacker to execute malicious code by having installer to load a malicious DLL. However, if the signer name "Mitsubishi Electric Lighting" appears on the "Digital Signatures" tab of the properties for "MILCO.S Lighting Control.exe", the application is a fixed one. This vulnerability only affects when the installer is run, not after installation. If a user downloads directly from Mitsubishi Electric website and installs the affected product, there is no risk of malicious code being introduced.

Nov 18, 2025
7.7
CVE-2024-48844HIGH

Denial of Service vulnerabilities where found providing a potiential for device service disruptions.  Affected products: ABB ASPECT - Enterprise v3.08.02; NEXUS Series v3.08.02; MATRIX Series v3.08.02

Dec 5, 2024
7.7
CVE-2024-48843HIGH

Denial of Service vulnerabilities where found providing a potiential for device service disruptions.  Affected products: ABB ASPECT - Enterprise v3.08.02; NEXUS Series v3.08.02; MATRIX Series v3.08.02

Dec 5, 2024
7.7
CVE-2024-7847HIGH

VULNERABILITY DETAILS Rockwell Automation used the latest versions of the CVSS scoring system to assess the following vulnerabilities. The following vulnerabilities were reported to us by Sharon Brizinov of Claroty Research - Team82. A feature in the affected products enables users to prepare a project file with an embedded VBA script and can be configured to run once the project file has been opened without user intervention. This feature can be abused to trick a legitimate user into executing malicious code upon opening an infected RSP/RSS project file. If exploited, a threat actor may be able to perform a remote code execution. Connected devices may also be impacted by exploitation of this vulnerability.

Oct 14, 2024
7.7
CVE-2022-4048HIGH

Inadequate Encryption Strength in CODESYS Development System V3 versions prior to V3.5.18.40 allows an unauthenticated local attacker to access and manipulate code of the encrypted boot application.

May 15, 2023
7.7
CVE-2022-2464HIGH

Rockwell Automation ISaGRAF Workbench software versions 6.0 through 6.6.9 are affected by a Path Traversal vulnerability. Crafted malicious files can allow an attacker to traverse the file system when opened by ISaGRAF Workbench. If successfully exploited, an attacker could overwrite existing files and create additional files with the same permissions of the ISaGRAF Workbench software. User interaction is required for this exploit to be successful.

Aug 25, 2022
7.7
CVE-2022-1159HIGH

Rockwell Automation Studio 5000 Logix Designer (all versions) are vulnerable when an attacker who achieves administrator access on a workstation running Studio 5000 Logix Designer could inject controller code undetectable to a user.

Apr 1, 2022
7.7
CVE-2021-27471HIGH

The parsing mechanism that processes certain file types does not provide input sanitization for file paths. This may allow an attacker to craft malicious files that, when opened by Rockwell Automation Connected Components Workbench v12.00.00 and prior, can traverse the file system. If successfully exploited, an attacker could overwrite existing files and create additional files with the same permissions of the Connected Components Workbench software. User interaction is required for this exploit to be successful.

Mar 23, 2022
7.7
CVE-2021-35529HIGH

Insufficiently Protected Credentials vulnerability in client environment of Hitachi ABB Power Grids Retail Operations and Counterparty Settlement Billing (CSB) allows an attacker or unauthorized user to access database credentials, shut down the product and access or alter. This issue affects: Hitachi ABB Power Grids Retail Operations version 5.7.2 and prior versions. Hitachi ABB Power Grids Counterparty Settlement Billing (CSB) version 5.7.2 and prior versions.

Aug 20, 2021
7.7
CVE-2020-13550HIGH

A local file inclusion vulnerability exists in the installation functionality of Advantech WebAccess/SCADA 9.0.1. A specially crafted application can lead to information disclosure. An attacker can send an authenticated HTTP request to trigger this vulnerability.

Feb 17, 2021
7.7
CVE-2016-4514HIGH

Moxa PT-7728 devices with software 3.4 build 15081113 allow remote authenticated users to change the configuration via vectors involving a local proxy.

Jun 19, 2016
7.7
CVE-2015-3977HIGH

Buffer overflow in Schneider Electric IMT25 Magnetic Flow DTM before 1.500.004 for the HART Protocol allows remote authenticated users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted HART reply.

Nov 15, 2015
7.7
CVE-2012-1801HIGH

Multiple stack-based buffer overflows in (1) COM and (2) ActiveX controls in ABB WebWare Server, WebWare SDK, Interlink Module, S4 OPC Server, QuickTeach, RobotStudio S4, and RobotStudio Lite allow remote attackers to execute arbitrary code via crafted input data.

Apr 18, 2012
7.7
CVE-2025-48891HIGH

A vulnerability exists in Advantech iView that could allow for SQL injection through the CUtils.checkSQLInjection() function. This vulnerability can be exploited by an authenticated attacker with at least user-level privileges, potentially leading to information disclosure or a denial-of-service condition.

Jul 11, 2025
7.6
CVE-2023-1257HIGH

An attacker with physical access to the affected Moxa UC Series devices can initiate a restart of the device and gain access to its BIOS. Command line options can then be altered, allowing the attacker to access the terminal. From the terminal, the attacker can modify the device’s authentication files to create a new user and gain full access to the system.

Mar 7, 2023
7.6
CVE-2019-19094HIGH

Lack of input checks for SQL queries in ABB eSOMS versions 3.9 to 6.0.3 might allow an attacker SQL injection attacks against the backend database.

Apr 2, 2020
7.6
CVE-2014-2717HIGH

Honeywell FALCON XLWeb Linux controller devices 2.04.01 and earlier and FALCON XLWeb XLWebExe controller devices 2.02.11 and earlier allow remote attackers to bypass authentication and obtain administrative access by visiting the change-password page.

Jul 24, 2014
7.6
CVE-2012-4694HIGH

Moxa EDR-G903 series routers with firmware before 2.11 do not use a sufficient source of entropy for (1) SSH and (2) SSL keys, which makes it easier for man-in-the-middle attackers to spoof a device or modify a client-server data stream by leveraging knowledge of a key from a product installation elsewhere.

Feb 15, 2013
7.6
CVE-2026-3631HIGH

Delta Electronics COMMGR2 has Buffer Over-read DoS vulnerability.

Mar 9, 2026
7.5
CVE-2024-55027HIGH

Weintek cMT-3072XH2 easyweb v2.1.53, OS v20231011 was discovered to stroe credentials in plaintext in the component uac_temp.db.

Mar 3, 2026
7.5
CVE-2024-55021HIGH

Weintek cMT-3072XH2 easyweb v2.1.53, OS v20231011 was discovered to contain a hardcoded password in the FTP protocol.

Mar 3, 2026
7.5
CVE-2024-55019HIGH

Incorrect access control in the component download_wb.cgi of Weintek cMT-3072XH2 easyweb Web Version v2.1.53, OS v20231011 allows unauthenticated attack to download arbitrary files.

Mar 3, 2026
7.5
CVE-2025-66598HIGH

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product supports old SSL/TLS versions, potentially allowing an attacker to decrypt communications with the web server. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Feb 9, 2026
7.5
CVE-2025-66597HIGH

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product supports weak cryptographic algorithms, potentially allowing an attacker to decrypt communications with the web server. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Feb 9, 2026
7.5
CVE-2025-66608HIGH

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product does not properly validate URLs. An attacker could send specially crafted requests to steal files from the web server. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Feb 9, 2026
7.5
CVE-2025-13373HIGH

Advantech iView versions 5.7.05.7057 and prior do not properly sanitize SNMP v1 trap (Port 162) requests, which could allow an attacker to inject SQL commands.

Dec 4, 2025
7.5
CVE-2025-41738HIGH

An unauthenticated remote attacker may cause the visualisation server of the CODESYS Control runtime system to access a resource with a pointer of wrong type, potentially leading to a denial-of-service (DoS) condition.

Dec 1, 2025
7.5
CVE-2022-50594HIGH

Advantech iView versions prior to v5.7.04 build 6425 contain a vulnerability within the SNMP management tool that allows for remote attackers to bypass authentication checks and reach a SQL injection vulnerability within the ‘data’ parameter to the ‘NetworkServlet’ endpoint. Successful exploitation allows for the exfiltration of user data, included clear text passwords.

Nov 6, 2025
7.5
CVE-2025-7731HIGH

Cleartext Transmission of Sensitive Information vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series CPU module allows a remote unauthenticated attacker to obtain credential information by intercepting SLMP communication messages, and read or write the device values of the product and stop the operations of programs by using the obtained credential information.

Sep 1, 2025
7.5
CVE-2025-8754HIGH

Missing Authentication for Critical Function vulnerability in ABB ABB AbilityTM zenon.This issue affects ABB AbilityTM zenon: from 7.50 through 14.

Aug 13, 2025
7.5
CVE-2025-41691HIGH

An unauthenticated remote attacker may trigger a NULL pointer dereference in the affected CODESYS Control runtime systems by sending specially crafted communication requests, potentially leading to a denial-of-service (DoS) condition.

Aug 4, 2025
7.5
CVE-2025-2520HIGH

The Honeywell Experion PKS contains an Uninitialized Variable in the common Epic Platform Analyzer (EPA) communications. An attacker could potentially exploit this vulnerability, leading to a Communication Channel Manipulation, which results in a dereferencing of an uninitialized pointer leading to a denial of service. Honeywell recommends updating to the most recent version of Honeywell Experion PKS: 520.2 TCU9 HF1and 530.1 TCU3 HF1. The affected Experion PKS products are C300 PCNT02, EHB, EHPM, ELMM, Classic ENIM, ETN, FIM4, FIM8, PGM, and RFIM. The Experion PKS versions affected are from 520.1 through 520.2 TCU9 and from 530 through 530 TCU3.

Jul 10, 2025
7.5
CVE-2025-6073HIGH

Stack-based Buffer Overflow vulnerability in ABB RMC-100, ABB RMC-100 LITE. When the REST interface is enabled by the user, and an attacker gains access to the control network, and user/password broker authentication is enabled, and CVE-2025-6074 is exploited, the attacker can overflow the buffer for username or password. This issue affects RMC-100: from 2105457-043 through 2105457-045; RMC-100 LITE: from 2106229-015 through 2106229-016.

Jul 3, 2025
7.5
CVE-2025-6072HIGH

Stack-based Buffer Overflow vulnerability in ABB RMC-100, ABB RMC-100 LITE. When the REST interface is enabled by the user, and an attacker gains access to the control network, and CVE-2025-6074 is exploited, the attacker can use the JSON configuration to overflow the date of expiration field.This issue affects RMC-100: from 2105457-043 through 2105457-045; RMC-100 LITE: from 2106229-015 through 2106229-016.

Jul 3, 2025
7.5
CVE-2025-3511HIGH

Improper Validation of Specified Quantity in Input vulnerability in Mitsubishi Electric Corporation CC-Link IE TSN Remote I/O module, CC-Link IE TSN Analog-Digital Converter module, CC-Link IE TSN Digital-Analog Converter module, CC-Link IE TSN FPGA module, CC-Link IE TSN Remote Station Communication LSI CP620 with GbE-PHY, MELSEC iQ-R Series CC-Link IE TSN Master/Local Module, MELSEC iQ-R Series Ethernet Interface Module, CC-Link IE TSN Master/Local Station Communication LSI CP610, MELSEC iQ-F Series FX5 CC-Link IE TSN Master/Local Module, MELSEC iQ-F Series FX5 Ethernet Module, and MELSEC iQ-F Series FX5-ENET/IP Ethernet Module allows a remote unauthenticated attacker to cause a Denial of Service condition in the products by sending specially crafted UDP packets.

Apr 25, 2025
7.5
CVE-2025-1468HIGH

An unauthenticated remote attacker can gain access to sensitive information including authentication information when using CODESYS OPC UA Server with the non-default Basic128Rsa15 security policy.

Mar 18, 2025
7.5
CVE-2024-8603HIGH

A “Use of a Broken or Risky Cryptographic Algorithm” vulnerability in the SSL/TLS component used in B&R Automation Runtime versions before 6.1 and B&R mapp View versions before 6.1 may be abused by unauthenticated network-based attackers to masquerade as services on impacted devices.

Jan 15, 2025
7.5
CVE-2024-51546HIGH

Credentials Disclosure vulnerabilities allow access to on board project back-up bundles.  Affected products: ABB ASPECT - Enterprise v3.08.02; NEXUS Series v3.08.02; MATRIX Series v3.08.02

Dec 5, 2024
7.5
CVE-2024-11316HIGH

Fileszie Check vulnerabilities allow a malicious user to bypass size limits or overload to the product.  Affected products: ABB ASPECT - Enterprise v3.08.02; NEXUS Series v3.08.02; MATRIX Series v3.08.02

Dec 5, 2024
7.5
CVE-2024-9404HIGH

This vulnerability could lead to denial-of-service or service crashes. Exploitation of the moxa_cmd service, because of insufficient input validation, allows attackers to disrupt operations. If exposed to public networks, the vulnerability poses a significant remote threat, potentially allowing attackers to shut down affected systems.

Dec 4, 2024
7.5
CVE-2023-52335HIGH

Advantech iView ConfigurationServlet SQL Injection Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Advantech iView. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ConfigurationServlet servlet, which listens on TCP port 8080 by default. When parsing the column_value element, the process does not properly validate a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-17863.

Nov 22, 2024
7.5
CVE-2024-8403HIGH

Improper Validation of Specified Type of Input vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5-ENET versions 1.100 and later and FX5-ENET/IP versions 1.100 to 1.104 allows a remote attacker to cause a Denial of Service condition in Ethernet communication of the products by sending specially crafted SLMP packets.

Nov 19, 2024
7.5
CVE-2024-48989HIGH

A vulnerability in the PROFINET stack implementation of the IndraDrive (all versions) of Bosch Rexroth allows an attacker to cause a denial of service, rendering the device unresponsive by sending arbitrary UDP messages.

Nov 13, 2024
7.5
CVE-2024-9124HIGH

A denial-of-service vulnerability exists in the Rockwell Automation PowerFlex® 600T. If the device is overloaded with requests, it will become unavailable. The device may require a power cycle to recover it if it does not re-establish a connection after it stops receiving requests.

Oct 8, 2024
7.5
CVE-2024-8626HIGH

Due to a memory leak, a denial-of-service vulnerability exists in the Rockwell Automation affected products. A malicious actor could exploit this vulnerability by performing multiple actions on certain web pages of the product causing the affected products to become fully unavailable and require a power cycle to recover.

Oct 8, 2024
7.5
CVE-2024-8175HIGH

An unauthenticated remote attacker can causes the CODESYS web server to access invalid memory which results in a DoS.

Sep 25, 2024
7.5
CVE-2024-6077HIGH

A denial-of-service vulnerability exists in the Rockwell Automation affected products when specially crafted packets are sent to the CIP Security Object. If exploited the device will become unavailable and require a factory reset to recover.

Sep 12, 2024
7.5
CVE-2024-7986HIGH

A vulnerability exists in the Rockwell Automation ThinManager® ThinServer that allows a threat actor to disclose sensitive information. A threat actor can exploit this vulnerability by abusing the ThinServer™ service to read arbitrary files by creating a junction that points to the target directory.

Aug 23, 2024
7.5
CVE-2024-5800HIGH

Diffie-Hellman groups with insufficient strength are used in the SSL/TLS stack of B&R Automation Runtime versions before 6.0.2, allowing a network attacker to decrypt the SSL/TLS communication.

Aug 12, 2024
7.5
CVE-2024-6089HIGH

An input validation vulnerability exists in the Rockwell Automation 5015 - AENFTXT when a manipulated PTP packet is sent, causing the secondary adapter to result in a major nonrecoverable fault. If exploited, a power cycle is required to recover the product.

Jul 16, 2024
7.5
CVE-2024-5990HIGH

Due to an improper input validation, an unauthenticated threat actor can send a malicious message to a monitor thread within Rockwell Automation ThinServer™ and cause a denial-of-service condition on the affected device.

Jun 25, 2024
7.5
CVE-2024-37368HIGH

A user authentication vulnerability exists in the Rockwell Automation FactoryTalk® View SE. The vulnerability allows a user from a remote system with FTView to send a packet to the customer’s server to view an HMI project. Due to the lack of proper authentication, this action is allowed without proper authentication verification.

Jun 14, 2024
7.5
CVE-2024-37367HIGH

A user authentication vulnerability exists in the Rockwell Automation FactoryTalk® View SE v12. The vulnerability allows a user from a remote system with FTView to send a packet to the customer’s server to view an HMI project. This action is allowed without proper authentication verification.

Jun 14, 2024
7.5
CVE-2024-5000HIGH

An unauthenticated remote attacker can use a malicious OPC UA client to send a crafted request to affected CODESYS products which can cause a DoS due to incorrect calculation of buffer size.

Jun 4, 2024
7.5
CVE-2024-4549HIGH

A denial of service vulnerability exists in Delta Electronics DIAEnergie v1.10.1.8610 and prior. When processing an 'ICS Restart!' message, CEBC.exe restarts the system.

May 6, 2024
7.5
CVE-2023-27336HIGH

Softing edgeConnector Siemens OPC UA Server Null Pointer Dereference Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Softing edgeConnector Siemens. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of OPC client certificates. The issue results from dereferencing a NULL pointer. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-20508.

May 3, 2024
7.5
CVE-2023-27334HIGH

Softing edgeConnector Siemens ConditionRefresh Resource Exhaustion Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Softing edgeConnector Siemens. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of OPC UA ConditionRefresh requests. By sending a large number of requests, an attacker can consume all available resources on the server. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-20498.

May 3, 2024
7.5
CVE-2024-2424HIGH

An input validation vulnerability exists in the Rockwell Automation 5015-AENFTXT that causes the secondary adapter to result in a major nonrecoverable fault (MNRF) when malicious input is entered. If exploited, the availability of the device will be impacted, and a manual restart is required. Additionally, a malformed PTP packet is needed to exploit this vulnerability.

Apr 15, 2024
7.5
CVE-2023-5392HIGH

C300 information leak due to an analysis feature which allows extracting more memory over the network than required by the function. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning.

Apr 11, 2024
7.5
CVE-2024-0335HIGH

ABB has internally identified a vulnerability in the ABB VPNI feature of the S+ Control API component which may be used by several Symphony Plus products (e.g., S+ Operations, S+ Engineering and S+ Analyst) This issue affects Symphony Plus S+ Operations: from 3..0;0 through 3.3 SP1 RU4, from 2.1;0 through 2.1 SP2 RU3, from 2.0;0 through 2.0 SP6 TC6; Symphony Plus S+ Engineering: from 2.1 through 2.3 RU3; Symphony Plus S+ Analyst: from 7.0.0.0 through 7.2.0.2.

Apr 3, 2024
7.5
CVE-2024-2427HIGH

A denial-of-service vulnerability exists in the Rockwell Automation PowerFlex® 527 due to improper traffic throttling in the device. If multiple data packets are sent to the device repeatedly the device will crash and require a manual restart to recover.

Mar 25, 2024
7.5
CVE-2024-2426HIGH

A denial-of-service vulnerability exists in the Rockwell Automation PowerFlex® 527 due to improper input validation in the device. If exploited, a disruption in the CIP communication will occur and a manual restart will be required by the user to recover it.

Mar 25, 2024
7.5
CVE-2024-2425HIGH

A denial-of-service vulnerability exists in the Rockwell Automation PowerFlex® 527 due to improper input validation in the device. If exploited, the web server will crash and need a manual restart to recover it.

Mar 25, 2024
7.5
CVE-2023-6942HIGH

Missing Authentication for Critical Function vulnerability in Mitsubishi Electric Corporation EZSocket versions 3.0 to 5.92, GT Designer3 Version1(GOT1000) versions 1.325P and prior, GT Designer3 Version1(GOT2000) versions 1.320J and prior, GX Works2 versions 1.11M to 1.626C, GX Works3 versions 1.106L and prior, MELSOFT Navigator versions 1.04E to 2.102G, MT Works2 versions 1.190Y and prior, MX Component versions 4.00A to 5.007H and MX OPC Server DA/UA all versions allows a remote unauthenticated attacker to bypass authentication by sending specially crafted packets and connect to the products illegally.

Jan 30, 2024
7.5
CVE-2023-43817HIGH

A buffer overflow exists in Delta Electronics Delta Industrial Automation DOPSoft version 2 when parsing the wMailContentLen field of a DPS file. An anonymous attacker can exploit this vulnerability by enticing a user to open a specially crafted DPS file to achieve code execution.

Jan 18, 2024
7.5
CVE-2023-5592HIGH

Download of Code Without Integrity Check vulnerability in PHOENIX CONTACT MULTIPROG, PHOENIX CONTACT ProConOS eCLR (SDK) allows an unauthenticated remote attacker to download and execute applications without integrity checks on the device which may result in a complete loss of integrity.

Dec 14, 2023
7.5
CVE-2023-46143HIGH

Download of Code Without Integrity Check vulnerability in PHOENIX CONTACT classic line PLCs allows an unauthenticated remote attacker to modify some or all applications on a PLC.

Dec 14, 2023
7.5
CVE-2023-5188HIGH

The MMS Interpreter of WagoAppRTU in versions below 1.4.6.0 which is used by the WAGO Telecontrol Configurator is vulnerable to malformed packets. An remote unauthenticated attacker could send specifically crafted packets that lead to a denial-of-service condition until restart of the affected device.

Dec 5, 2023
7.5
CVE-2023-47279HIGH

In Delta Electronics InfraSuite Device Master v.1.0.7, A vulnerability exists that allows an unauthenticated attacker to disclose user information through a single UDP packet, obtain plaintext credentials, or perform NTLM relaying.

Nov 30, 2023
7.5
CVE-2023-46590HIGH

A vulnerability has been identified in Siemens OPC UA Modelling Editor (SiOME) (All versions < V2.8). Affected products suffer from a XML external entity (XXE) injection vulnerability. This vulnerability could allow an attacker to interfere with an application's processing of XML data and read arbitrary files in the system.

Nov 14, 2023
7.5
CVE-2023-46289HIGH

Rockwell Automation FactoryTalk View Site Edition insufficiently validates user input, which could potentially allow threat actors to send malicious data bringing the product offline. If exploited, the product would become unavailable and require a restart to recover resulting in a denial-of-service condition.

Oct 27, 2023
7.5
CVE-2023-2915HIGH

The Rockwell Automation Thinmanager Thinserver is impacted by an improper input validation vulnerability, Due to improper input validation, a path traversal vulnerability exists when the ThinManager software processes a certain function. If exploited, an unauthenticated remote threat actor can delete arbitrary files with system privileges. A malicious user could exploit this vulnerability by sending a specifically crafted synchronization protocol message resulting in a denial-of-service condition.

Aug 17, 2023
7.5
CVE-2023-2914HIGH

The Rockwell Automation Thinmanager Thinserver is impacted by an improper input validation vulnerability, an integer overflow condition exists in the affected products. When the ThinManager processes incoming messages, a read access violation occurs and terminates the process. A malicious user could exploit this vulnerability by sending a crafted synchronization protocol message and causing a denial of service condition in the software.

Aug 17, 2023
7.5
CVE-2023-37860HIGH

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote unauthenticated attacker can obtain the r/w community string of the SNMPv2 daemon.

Aug 9, 2023
7.5
CVE-2023-0525HIGH

Weak Encoding for Password vulnerability in Mitsubishi Electric Corporation GOT2000 Series GT27 model versions 01.49.000 and prior, GT25 model versions 01.49.000 and prior, GT23 model versions 01.49.000 and prior, GT21 model versions 01.49.000 and prior, GOT SIMPLE Series GS25 model versions 01.49.000 and prior, GS21 model versions 01.49.000 and prior, GT Designer3 Version1 (GOT2000) versions 1.295H and prior and GT SoftGOT2000 versions 1.295H and prior allows a remote unauthenticated attacker to obtain plaintext passwords by sniffing packets containing encrypted passwords and decrypting the encrypted passwords, in the case of transferring data with GT Designer3 Version1(GOT2000) and GOT2000 Series or GOT SIMPLE Series with the Data Transfer Security function enabled, or in the case of transferring data by the SoftGOT-GOT link function with GT SoftGOT2000 and GOT2000 series with the Data Transfer Security function enabled.

Aug 4, 2023
7.5
CVE-2023-34429HIGH

Weintek Weincloud v0.13.6 could allow an attacker to cause a denial-of-service condition for Weincloud by sending a forged JWT token.

Jul 19, 2023
7.5
CVE-2023-2913HIGH

An executable used in Rockwell Automation ThinManager ThinServer can be configured to enable an API feature in the HTTPS Server Settings. This feature is disabled by default. When the API is enabled and handling requests, a path traversal vulnerability exists that allows a remote actor to leverage the privileges of the server’s file system and read arbitrary files stored in it. A malicious user could exploit this vulnerability by executing a path that contains manipulating variables.

Jul 18, 2023
7.5
CVE-2023-2263HIGH

The Rockwell Automation Kinetix 5700 DC Bus Power Supply Series A is vulnerable to CIP fuzzing.  The new ENIP connections cannot be established if impacted by this vulnerability,  which prohibits operational capabilities of the device resulting in a denial-of-service attack.

Jul 18, 2023
7.5
CVE-2023-26597HIGH

Controller DoS due to buffer overflow in the handling of a specially crafted message received by the controller. See Honeywell Security Notification for recommendations on upgrading and versioning. See Honeywell Security Notification for recommendations on upgrading and versioning.

Jul 13, 2023
7.5
CVE-2023-25948HIGH

Server information leak of configuration data when an error is generated in response to a specially crafted message. See Honeywell Security Notification for recommendations on upgrading and versioning.

Jul 13, 2023
7.5
CVE-2023-3596HIGH

Where this vulnerability exists in the Rockwell Automation 1756-EN4* Ethernet/IP communication products, it could allow a malicious user to cause a denial of service by asserting the target system through maliciously crafted CIP messages.

Jul 12, 2023
7.5
CVE-2023-2846HIGH

Authentication Bypass by Capture-replay vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series main modules allows a remote unauthenticated attacker to cancel the password/keyword setting and login to the affected products by sending specially crafted packets.

Jun 30, 2023
7.5
CVE-2023-1150HIGH

Uncontrolled resource consumption in Series WAGO 750-3x/-8x products may allow an unauthenticated remote attacker to DoS the MODBUS server with specially crafted packets.

Jun 26, 2023
7.5
CVE-2023-2778HIGH

A denial-of-service vulnerability exists in Rockwell Automation FactoryTalk Transaction Manager. This vulnerability can be exploited by sending a modified packet to port 400. If exploited, the application could potentially crash or experience a high CPU or memory usage condition, causing intermittent application functionality issues. The application would need to be restarted to recover from the DoS.

Jun 13, 2023
7.5
CVE-2023-2060HIGH

Weak Password Requirements vulnerability in FTP function on Mitsubishi Electric Corporation MELSEC iQ-R Series EtherNet/IP module RJ71EIP91 and MELSEC iQ-F Series EtherNet/IP module FX5-ENET/IP allows a remote unauthenticated attacker to access to the module via FTP by dictionary attack or password sniffing.

Jun 2, 2023
7.5
CVE-2023-1618HIGH

Active Debug Code vulnerability in Mitsubishi Electric Corporation MELSEC WS Series WS0-GETH00200 Serial number 2310 **** and prior allows a remote unauthenticated attacker to bypass authentication and illegally log into the affected module by connecting to it via telnet which is hidden function and is enabled by default when shipped from the factory. As a result, a remote attacker with unauthorized login can reset the module, and if certain conditions are met, he/she can disclose or tamper with the module's configuration or rewrite the firmware.

May 19, 2023
7.5
CVE-2022-47391HIGH

In multiple CODESYS products in multiple versions an unauthorized, remote attacker may use a improper input validation vulnerability to read from invalid addresses leading to a denial of service.

May 15, 2023
7.5
CVE-2023-2443HIGH

Rockwell Automation ThinManager product allows the use of medium strength ciphers.  If the client requests an insecure cipher, a malicious actor could potentially decrypt traffic sent between the client and server API.

May 11, 2023
7.5
CVE-2023-1285HIGH

Signal Handler Race Condition vulnerability in Mitsubishi Electric India GC-ENET-COM whose first 2 digits of 11-digit serial number of unit are "16" allows a remote unauthenticated attacker to cause a denial-of-service (DoS) condition in Ethernet communication by sending a large number of specially crafted packets to any UDP port when GC-ENET-COM is configured as a Modbus TCP Server. The communication resumes only when the power of the main unit is turned off and on or when the GC-ENET-COM is hot-swapped from the main unit.

Apr 14, 2023
7.5
CVE-2023-1142HIGH

In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use URL decoding to retrieve system files, credentials, and bypass authentication resulting in privilege escalation.

Mar 27, 2023
7.5
CVE-2023-1138HIGH

Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contain an improper access control vulnerability, which could allow an attacker to retrieve Gateway configuration files to obtain plaintext credentials.

Mar 27, 2023
7.5
CVE-2023-27857HIGH

In affected versions, a heap-based buffer over-read condition occurs when the message field indicates more data than is present in the message field in Rockwell Automation's ThinManager ThinServer.  An unauthenticated remote attacker can exploit this vulnerability to crash ThinServer.exe due to a read access violation.

Mar 22, 2023
7.5
CVE-2023-27856HIGH

In affected versions, path traversal exists when processing a message of type 8 in Rockwell Automation's ThinManager ThinServer. An unauthenticated remote attacker can exploit this vulnerability to download arbitrary files on the disk drive where ThinServer.exe is installed.

Mar 22, 2023
7.5
CVE-2023-0457HIGH

Plaintext Storage of a Password vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series, MELSEC iQ-R Series, MELSEC-Q Series and MELSEC-L Series allows a remote unauthenticated attacker to disclose plaintext credentials stored in project files and login into FTP server or Web server.

Mar 3, 2023
7.5
CVE-2022-40693HIGH

A cleartext transmission vulnerability exists in the web application functionality of Moxa SDS-3008 Series Industrial Ethernet Switch 2.1. A specially-crafted network sniffing can lead to a disclosure of sensitive information. An attacker can sniff network traffic to trigger this vulnerability.

Feb 7, 2023
7.5
CVE-2022-40224HIGH

A denial of service vulnerability exists in the web server functionality of Moxa SDS-3008 Series Industrial Ethernet Switch 2.1. A specially-crafted HTTP message header can lead to denial of service. An attacker can send an HTTP request to trigger this vulnerability.

Feb 7, 2023
7.5
CVE-2022-33323HIGH

Active Debug Code vulnerability in robot controller of Mitsubishi Electric Corporation industrial robot MELFA SD/SQ Series and MELFA F-Series allows a remote unauthenticated attacker to gain unauthorized access by authentication bypass through an unauthorized telnet login. As for the affected model names, controller types and firmware versions, see the Mitsubishi Electric's advisory which is listed in [References] section.

Feb 2, 2023
7.5
CVE-2020-12067HIGH

In Pilz PMC programming tool 3.x before 3.5.17 (based on CODESYS Development System), a user's password may be changed by an attacker without knowledge of the current password.

Dec 26, 2022
7.5
CVE-2022-33324HIGH

Improper Resource Shutdown or Release vulnerability in Mitsubishi Electric Corporation MELSEC iQ-R Series R00/01/02CPU Firmware versions "32" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R04/08/16/32/120(EN)CPU Firmware versions "65" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R08/16/32/120SFCPU Firmware versions "29" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R08/16/32/120PSFCPU Firmware versions "08" and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R12CCPU-V Firmware versions "17" and prior, Mitsubishi Electric Corporation MELSEC iQ-L Series L04/08/16/32HCPU Firmware versions "05" and prior and Mitsubishi Electric Corporation MELIPC Series MI5122-VW Firmware versions "07" and prior allows a remote unauthenticated attacker to cause a Denial of Service condition in Ethernet communication on the module by sending specially crafted packets. A system reset of the module is required for recovery.

Dec 23, 2022
7.5
CVE-2022-3166HIGH

Rockwell Automation was made aware that the webservers of the Micrologix 1100 and 1400 controllers contain a vulnerability that may lead to a denial-of-service condition. The security vulnerability could be exploited by an attacker with network access to the affected systems by sending TCP packets to webserver and closing it abruptly which would cause a denial-of-service condition for the web server application on the device

Dec 16, 2022
7.5
CVE-2022-29831HIGH

Use of Hard-coded Password vulnerability in Mitsubishi Electric Corporation GX Works3 versions from 1.015R to 1.095Z allows a remote unauthenticated attacker to obtain information about the project file for MELSEC safety CPU modules.

Nov 25, 2022
7.5
CVE-2022-3480HIGH

A remote, unauthenticated attacker could cause a denial-of-service of PHOENIX CONTACT FL MGUARD and TC MGUARD devices below version 8.9.0 by sending a larger number of unauthenticated HTTPS connections originating from different source IP’s. Configuring firewall limits for incoming connections cannot prevent the issue.

Nov 15, 2022
7.5
CVE-2021-34579HIGH

In Phoenix Contact: FL MGUARD DM version 1.12.0 and 1.13.0 access to the Apache web server being installed as part of the FL MGUARD DM on Microsoft Windows does not require login credentials even if configured during installation.Attackers with network access to the Apache web server can download and therefore read mGuard configuration profiles (“ATV profiles”). Such configuration profiles may contain sensitive information, e.g. private keys associated with IPsec VPN connections.

Nov 9, 2022
7.5
CVE-2021-34568HIGH

In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to provoke a denial of service.

Nov 9, 2022
7.5
CVE-2022-41776HIGH

Delta Electronics InfraSuite Device Master versions 00.00.01a and prior allow unauthenticated users to trigger the WriteConfiguration method, which could allow an attacker to provide new values for user configuration files such as UserListInfo.xml. This could lead to the changing of administrative passwords.

Oct 31, 2022
7.5
CVE-2022-41629HIGH

Delta Electronics InfraSuite Device Master versions 00.00.01a and prior allow unauthenticated users to access the aprunning endpoint, which could allow an attacker to retrieve any file from the “RunningConfigs” directory. The attacker could then view and modify configuration files such as UserListInfo.xml, which would allow them to see existing administrative passwords.

Oct 31, 2022
7.5
CVE-2021-38399HIGH

Honeywell Experion PKS C200, C200E, C300, and ACE controllers are vulnerable to relative path traversal, which may allow an attacker access to unauthorized files and directories.

Oct 28, 2022
7.5
CVE-2022-38744HIGH

An unauthenticated attacker with network access to a victim's Rockwell Automation FactoryTalk Alarm and Events service could open a connection, causing the service to fault and become unavailable. The affected port could be used as a server ping port and uses messages structured with XML.

Oct 27, 2022
7.5
CVE-2022-3281HIGH

WAGO Series PFC100/PFC200, Series Touch Panel 600, Compact Controller CC100 and Edge Controller in multiple versions are prone to a loss of MAC-Address-Filtering after reboot. This may allow an remote attacker to circumvent the reach the network that should be protected by the MAC address filter.

Oct 17, 2022
7.5
CVE-2022-3323HIGH

An SQL injection vulnerability in Advantech iView 5.7.04.6469. The specific flaw exists within the ConfigurationServlet endpoint, which listens on TCP port 8080 by default. An unauthenticated remote attacker can craft a special column_value parameter in the setConfiguration action to bypass checks in com.imc.iview.utils.CUtils.checkSQLInjection() to perform SQL injection. For example, the attacker can exploit the vulnerability to retrieve the iView admin password.

Sep 27, 2022
7.5
CVE-2022-2043HIGH

MOXA NPort 5110: Firmware Versions 2.10 is vulnerable to an out-of-bounds write that can cause the device to become unresponsive.

Aug 31, 2022
7.5
CVE-2022-30313HIGH

Honeywell Experion PKS Safety Manager through 2022-05-06 has Missing Authentication for a Critical Function. According to FSCT-2022-0051, there is a Honeywell Experion PKS Safety Manager multiple proprietary protocols with unauthenticated functionality issue. The affected components are characterized as: Honeywell Experion TCP (51000/TCP), Safety Builder (51010/TCP). The potential impact is: Manipulate controller state, Manipulate controller configuration, Manipulate controller logic, Manipulate controller files, Manipulate IO. The Honeywell Experion PKS Distributed Control System (DCS) Safety Manager utilizes several proprietary protocols for a wide variety of functionality, including process data acquisition, controller steering and configuration management. These protocols include: Experion TCP (51000/TCP) and Safety Builder (51010/TCP). None of these protocols have any authentication features, allowing any attacker capable of communicating with the ports in question to invoke (a subset of) desired functionality. There is no authentication functionality on the protocols in question. An attacker capable of invoking the protocols' functionalities could achieve a wide range of adverse impacts, including (but not limited to), the following: for Experion TCP (51000/TCP): Issue IO manipulation commands, Issue file read/write commands; and for Safety Builder (51010/TCP): Issue controller start/stop commands, Issue logic download/upload commands, Issue file read commands, Issue system time change commands. A mitigating factor with regards to some, but not all, of the above functionality is that these require the Safety Manager physical keyswitch to be in the right position.

Jul 28, 2022
7.5
CVE-2022-31205HIGH

In Omron CS series, CJ series, and CP series PLCs through 2022-05-18, the password for access to the Web UI is stored in memory area D1449...D1452 and can be read out using the Omron FINS protocol without any further authentication.

Jul 26, 2022
7.5
CVE-2022-31204HIGH

Omron CS series, CJ series, and CP series PLCs through 2022-05-18 use cleartext passwords. They feature a UM Protection setting that allows users or system integrators to configure a password in order to restrict sensitive engineering operations (such as project/logic uploads and downloads). This password is set using the OMRON FINS command Program Area Protect and unset using the command Program Area Protect Clear, both of which are transmitted in cleartext.

Jul 26, 2022
7.5
CVE-2022-29834HIGH

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Mitsubishi Electric GENESIS64 versions 10.97 to 10.97.1, Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97 to 10.97.1, Mitsubishi Electric ICONICS Suite versions 10.97 to 10.97.1, and Mitsubishi Electric Iconics Digital Solutions ICONICS Suite versions 10.97 to 10.97.1 allows a remote unauthenticated attacker to access to arbitrary files in the GENESIS64 server or ICONICS suite server and disclose information stored in the files by embedding a malicious URL parameter in the URL of the monitoring screen delivered to the GENESIS64 or ICONICS Suite mobile monitoring application and accessing the monitoring screen.

Jul 20, 2022
7.5
CVE-2022-30792HIGH

In CmpChannelServer of CODESYS V3 in multiple versions an uncontrolled ressource consumption allows an unauthorized attacker to block new communication channel connections. Existing connections are not affected.

Jul 11, 2022
7.5
CVE-2022-30791HIGH

In CmpBlkDrvTcp of CODESYS V3 in multiple versions an uncontrolled ressource consumption allows an unauthorized attacker to block new TCP connections. Existing connections are not affected.

Jul 11, 2022
7.5
CVE-2022-33971HIGH

Authentication bypass by capture-replay vulnerability exists in Machine automation controller NX7 series all models V1.28 and earlier, Machine automation controller NX1 series all models V1.48 and earlier, and Machine automation controller NJ series all models V 1.48 and earlier, which may allow an adjacent attacker who can analyze the communication between the controller and the specific software used by OMRON internally to cause a denial-of-service (DoS) condition or execute a malicious program.

Jul 4, 2022
7.5
CVE-2022-32284HIGH

Use of insufficiently random values vulnerability exists in Vnet/IP communication module VI461 of YOKOGAWA Wide Area Communication Router (WAC Router) AW810D, which may allow a remote attacker to cause denial-of-service (DoS) condition by sending a specially crafted packet.

Jul 4, 2022
7.5
CVE-2022-31805HIGH

In the CODESYS Development System multiple components in multiple versions transmit the passwords for the communication between clients and servers unprotected.

Jun 24, 2022
7.5
CVE-2022-31804HIGH

The CODESYS Gateway Server V2 does not verifiy that the size of a request is within expected limits. An unauthenticated attacker may allocate an arbitrary amount of memory, which may lead to a crash of the Gateway due to an out-of-memory condition.

Jun 24, 2022
7.5
CVE-2022-24946HIGH

Improper Resource Locking vulnerability in Mitsubishi Electric MELSEC iQ-R Series R12CCPU-V firmware versions "16" and prior, Mitsubishi Electric MELSEC-Q Series Q03UDECPU the first 5 digits of serial No. "24061" and prior, Mitsubishi Electric MELSEC-Q Series Q04/06/10/13/20/26/50/100UDEHCPU the first 5 digits of serial No. "24061" and prior, Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU the first 5 digits of serial number "24051" and prior, Mitsubishi Electric MELSEC-Q Series Q04/06/13/26UDPVCPU the first 5 digits of serial number "24051" and prior, Mitsubishi Electric MELSEC-Q Series Q12DCCPU-V all versions, Mitsubishi Electric MELSEC-Q Series Q24DHCCPU-V(G) all versions, Mitsubishi Electric MELSEC-Q Series Q24/26DHCCPU-LS all versions, Mitsubishi Electric MELSEC-L series L02/06/26CPU(-P) the first 5 digits of serial number "24051" and prior, Mitsubishi Electric MELSEC-L series L26CPU-(P)BT the first 5 digits of serial number "24051" and prior and Mitsubishi Electric MELIPC Series MI5122-VW firmware versions "05" and prior allows a remote unauthenticated attacker to cause a denial of service (DoS) condition in Ethernet communications by sending specially crafted packets. A system reset of the products is required for recovery.

Jun 15, 2022
7.5
CVE-2021-40392HIGH

An information disclosure vulnerability exists in the Web Application functionality of Moxa MXView Series 3.2.4. Network sniffing can lead to a disclosure of sensitive information. An attacker can sniff network traffic to exploit this vulnerability.

Apr 14, 2022
7.5
CVE-2022-22519HIGH

A remote, unauthenticated attacker can send a specific crafted HTTP or HTTPS requests causing a buffer over-read resulting in a crash of the webserver of the CODESYS Control runtime system.

Apr 7, 2022
7.5
CVE-2022-22517HIGH

An unauthenticated, remote attacker can disrupt existing communication channels between CODESYS products by guessing a valid channel ID and injecting packets. This results in the communication channel to be closed.

Apr 7, 2022
7.5
CVE-2021-30065HIGH

On Schneider Electric ConneXium Tofino Firewall TCSEFEA23F3F22 before 03.23, TCSEFEA23F3F20/21, and Belden Tofino Xenon Security Appliance, crafted ModBus packets can bypass the ModBus enforcer. NOTE: this issue exists because of an incomplete fix of CVE-2017-11401.

Apr 3, 2022
7.5
CVE-2021-30063HIGH

On Schneider Electric ConneXium Tofino OPCLSM TCSEFM0000 before 03.23 and Belden Tofino Xenon Security Appliance, crafted OPC packets can cause an OPC enforcer denial of service.

Apr 3, 2022
7.5
CVE-2021-30062HIGH

On Schneider Electric ConneXium Tofino OPCLSM TCSEFM0000 before 03.23 and Belden Tofino Xenon Security Appliance, crafted OPC packets can bypass the OPC enforcer.

Apr 3, 2022
7.5
CVE-2021-32970HIGH

Data can be copied without validation in the built-in web server in Moxa NPort IAW5000A-I/O series firmware version 2.2 or earlier, which may allow a remote attacker to cause denial-of-service conditions.

Apr 1, 2022
7.5
CVE-2021-32968HIGH

Two buffer overflows in the built-in web server in Moxa NPort IAW5000A-I/O Series firmware version 2.2 or earlier may allow a remote attacker to cause a denial-of-service condition.

Apr 1, 2022
7.5
CVE-2021-22277HIGH

Improper Input Validation vulnerability in ABB 800xA, Control Software for AC 800M, Control Builder Safe, Compact Product Suite - Control and I/O, ABB Base Software for SoftControl allows an attacker to cause the denial of service.

Apr 1, 2022
7.5
CVE-2020-25178HIGH

ISaGRAF Workbench communicates with Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x using TCP/IP. This communication protocol provides various file system operations, as well as the uploading of applications. Data is transferred over this protocol unencrypted, which could allow a remote unauthenticated attacker to upload, read, and delete files.

Mar 18, 2022
7.5
CVE-2021-39364HIGH

Honeywell HDZP252DI 1.00.HW02.4 and HBW2PER1 1.000.HW01.3 devices allow command spoofing (for camera control) after ARP cache poisoning has been achieved.

Feb 24, 2022
7.5
CVE-2021-46082HIGH

Moxa TN-5900 v3.1 series routers, MGate 5109 v2.2 series protocol gateways, and MGate 5101-PBM-MN v2.1 series protocol gateways were discovered to contain a memory leak which allows attackers to cause a Denial of Service (DoS) via crafted packets.

Feb 18, 2022
7.5
CVE-2021-22288HIGH

Improper Input Validation vulnerability in the ABB SPIET800 and PNI800 module allows an attacker to cause the denial of service or make the module unresponsive.

Feb 4, 2022
7.5
CVE-2021-22286HIGH

Improper Input Validation vulnerability in the ABB SPIET800 and PNI800 module allows an attacker to cause the denial of service or make the module unresponsive.

Feb 4, 2022
7.5
CVE-2021-22285HIGH

Improper Handling of Exceptional Conditions, Improper Check for Unusual or Exceptional Conditions vulnerability in the ABB SPIET800 and PNI800 module that allows an attacker to cause the denial of service or make the module unresponsive.

Feb 4, 2022
7.5
CVE-2022-22510HIGH

Codesys Profinet in version V4.2.0.0 is prone to null pointer dereference that allows a denial of service (DoS) attack of an unauthenticated user via SNMP.

Feb 2, 2022
7.5
CVE-2021-46559HIGH

The firmware on Moxa TN-5900 devices through 3.1 has a weak algorithm that allows an attacker to defeat an inspection mechanism for integrity protection.

Jan 26, 2022
7.5
CVE-2021-20608HIGH

Improper Handling of Length Parameter Inconsistency vulnerability in Mitsubishi Electric GX Works2 versions 1.606G and prior allows a remote unauthenticated attacker to cause a DoS condition in GX Works2 by getting GX Works2 to read a tampered program file from a Mitsubishi Electric PLC by sending malicious crafted packets to tamper with the program file.

Dec 17, 2021
7.5
CVE-2021-20611HIGH

Improper Input Validation vulnerability in Mitsubishi Electric MELSEC iQ-R Series R00/01/02CPU, MELSEC iQ-R Series R04/08/16/32/120(EN)CPU, MELSEC iQ-R Series R08/16/32/120SFCPU, MELSEC iQ-R Series R08/16/32/120PCPU, MELSEC iQ-R Series R08/16/32/120PSFCPU, MELSEC iQ-R Series R16/32/64MTCPU, MELSEC iQ-R Series R12CCPU-V, MELSEC Q Series Q03UDECPU, MELSEC Q Series Q04/06/10/13/20/26/50/100UDEHCPU, MELSEC Q Series Q03/04/06/13/26UDVCPU, MELSEC Q Series Q04/06/13/26UDPVCPU, MELSEC Q Series Q12DCCPU-V, MELSEC Q Series Q24DHCCPU-V(G), MELSEC Q Series Q24/26DHCCPU-LS, MELSEC Q Series MR-MQ100, MELSEC Q Series Q172/173DCPU-S1, MELSEC Q Series Q172/173DSCPU, MELSEC Q Series Q170MCPU, MELSEC Q Series Q170MSCPU(-S1), MELSEC L Series L02/06/26CPU(-P), MELSEC L Series L26CPU-(P)BT and MELIPC Series MI5122-VW allows a remote unauthenticated attacker to cause a denial-of-service (DoS) condition by sending specially crafted packets. System reset is required for recovery.

Dec 1, 2021
7.5
CVE-2021-20610HIGH

Improper Handling of Length Parameter Inconsistency vulnerability in Mitsubishi Electric MELSEC iQ-R Series R00/01/02CPU, MELSEC iQ-R Series R04/08/16/32/120(EN)CPU, MELSEC iQ-R Series R08/16/32/120SFCPU, MELSEC iQ-R Series R08/16/32/120PCPU, MELSEC iQ-R Series R08/16/32/120PSFCPU, MELSEC iQ-R Series R16/32/64MTCPU, MELSEC iQ-R Series R12CCPU-V, MELSEC Q Series Q03UDECPU, MELSEC Q Series Q04/06/10/13/20/26/50/100UDEHCPU, MELSEC Q Series Q03/04/06/13/26UDVCPU, MELSEC Q Series Q04/06/13/26UDPVCPU, MELSEC Q Series Q12DCCPU-V, MELSEC Q Series Q24DHCCPU-V(G), MELSEC Q Series Q24/26DHCCPU-LS, MELSEC Q Series MR-MQ100, MELSEC Q Series Q172/173DCPU-S1, MELSEC Q Series Q172/173DSCPU, MELSEC Q Series Q170MCPU, MELSEC Q Series Q170MSCPU(-S1), MELSEC L Series L02/06/26CPU(-P), MELSEC L Series L26CPU-(P)BT and MELIPC Series MI5122-VW allows a remote unauthenticated attacker to cause a denial-of-service (DoS) condition by sending specially crafted packets. System reset is required for recovery.

Dec 1, 2021
7.5
CVE-2021-20609HIGH

Uncontrolled Resource Consumption vulnerability in Mitsubishi Electric MELSEC iQ-R Series R00/01/02CPU, MELSEC iQ-R Series R04/08/16/32/120(EN)CPU, MELSEC iQ-R Series R08/16/32/120SFCPU, MELSEC iQ-R Series R08/16/32/120PCPU, MELSEC iQ-R Series R08/16/32/120PSFCPU, MELSEC iQ-R Series R16/32/64MTCPU, MELSEC iQ-R Series R12CCPU-V, MELSEC Q Series Q03UDECPU, MELSEC Q Series Q04/06/10/13/20/26/50/100UDEHCPU, MELSEC Q Series Q03/04/06/13/26UDVCPU, MELSEC Q Series Q04/06/13/26UDPVCPU, MELSEC Q Series Q12DCCPU-V, MELSEC Q Series Q24DHCCPU-V(G), MELSEC Q Series Q24/26DHCCPU-LS, MELSEC Q Series MR-MQ100, MELSEC Q Series Q172/173DCPU-S1, MELSEC Q Series Q172/173DSCPU, MELSEC Q Series Q170MCPU, MELSEC Q Series Q170MSCPU(-S1), MELSEC L Series L02/06/26CPU(-P), MELSEC L Series L26CPU-(P)BT and MELIPC Series MI5122-VW allows a remote unauthenticated attacker to cause a denial-of-service (DoS) condition by sending specially crafted packets. System reset is required for recovery.

Dec 1, 2021
7.5
CVE-2021-34598HIGH

In Phoenix Contact FL MGUARD 1102 and 1105 in Versions 1.4.0, 1.4.1 and 1.5.0 the remote logging functionality is impaired by the lack of memory release for data structures from syslog-ng when remote logging is active

Nov 10, 2021
7.5
CVE-2021-34593HIGH

In CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56 unauthenticated crafted invalid requests may result in several denial-of-service conditions. Running PLC programs may be stopped, memory may be leaked, or further communication clients may be blocked from accessing the PLC.

Oct 26, 2021
7.5
CVE-2021-34586HIGH

In the CODESYS V2 web server prior to V1.1.9.22 crafted web server requests may cause a Null pointer dereference in the CODESYS web server and may result in a denial-of-service condition.

Oct 26, 2021
7.5
CVE-2021-34585HIGH

In the CODESYS V2 web server prior to V1.1.9.22 crafted web server requests can trigger a parser error. Since the parser result is not checked under all conditions, a pointer dereference with an invalid address can occur. This leads to a denial of service situation.

Oct 26, 2021
7.5
CVE-2021-34583HIGH

Crafted web server requests may cause a heap-based buffer overflow and could therefore trigger a denial-of- service condition due to a crash in the CODESYS V2 web server prior to V1.1.9.22.

Oct 26, 2021
7.5
CVE-2018-16060HIGH

Mitsubishi Electric Europe B.V. SmartRTU devices allow remote attackers to obtain sensitive information (directory listing and source code) via a direct request to the /web URI.

Oct 15, 2021
7.5
CVE-2021-38460HIGH

A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries.

Oct 12, 2021
7.5
CVE-2021-38452HIGH

A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 may allow an attacker to create or overwrite critical files used to execute code, such as programs or libraries.

Oct 12, 2021
7.5
CVE-2021-34570HIGH

Multiple Phoenix Contact PLCnext control devices in versions prior to 2021.0.5 LTS are prone to a DoS attack through special crafted JSON requests.

Sep 27, 2021
7.5
CVE-2021-34581HIGH

Missing Release of Resource after Effective Lifetime vulnerability in OpenSSL implementation of WAGO 750-831/xxx-xxx, 750-880/xxx-xxx, 750-881, 750-889 in versions FW4 up to FW15 allows an unauthenticated attacker to cause DoS on the device.

Aug 31, 2021
7.5
CVE-2021-20594HIGH

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Mitsubishi Electric MELSEC iQ-R series Safety CPU modules R08/16/32/120SFCPU firmware versions "26" and prior and Mitsubishi Electric MELSEC iQ-R series SIL2 Process CPU modules R08/16/32/120PSFCPU firmware versions "11" and prior allows a remote unauthenticated attacker to acquire legitimate user names registered in the module via brute-force attack on user names.

Aug 6, 2021
7.5
CVE-2021-36765HIGH

In CODESYS EtherNetIP before 4.1.0.0, specific EtherNet/IP requests may cause a null pointer dereference in the downloaded vulnerable EtherNet/IP stack that is executed by the CODESYS Control runtime system.

Aug 4, 2021
7.5
CVE-2021-36764HIGH

In CODESYS Gateway V3 before 3.5.17.10, there is a NULL Pointer Dereference. Crafted communication requests may cause a Null pointer dereference in the affected CODESYS products and may result in a denial-of-service condition.

Aug 4, 2021
7.5
CVE-2021-36763HIGH

In CODESYS V3 web server before 3.5.17.10, files or directories are accessible to External Parties.

Aug 3, 2021
7.5
CVE-2021-33486HIGH

All versions of the CODESYS V3 Runtime Toolkit for VxWorks from version V3.5.8.0 and before version V3.5.17.10 have Improper Handling of Exceptional Conditions.

Aug 3, 2021
7.5
CVE-2021-35527HIGH

Password autocomplete vulnerability in the web application password field of Hitachi ABB Power Grids eSOMS allows attacker to gain access to user credentials that are stored by the browser. This issue affects: Hitachi ABB Power Grids eSOMS version 6.3 and prior versions.

Jul 14, 2021
7.5
CVE-2021-33541HIGH

Phoenix Contact Classic Line Controllers ILC1x0 and ILC1x1 in all versions/variants are affected by a Denial-of-Service vulnerability. The communication protocols and device access do not feature authentication measures. Remote attackers can use specially crafted IP packets to cause a denial of service on the PLC's network communication module. A successful attack stops all network communication. To restore the network connectivity the device needs to be restarted. The automation task is not affected.

Jun 25, 2021
7.5
CVE-2021-21005HIGH

In Phoenix Contact FL SWITCH SMCS series products in multiple versions if an attacker sends a hand-crafted TCP-Packet with the Urgent-Flag set and the Urgent-Pointer set to 0, the network stack will crash. The device needs to be rebooted afterwards.

Jun 25, 2021
7.5
CVE-2021-21002HIGH

In Phoenix Contact FL COMSERVER UNI in versions < 2.40 a invalid Modbus exception response can lead to a temporary denial of service.

Jun 25, 2021
7.5
CVE-2021-33824HIGH

An issue was discovered on MOXA Mgate MB3180 Version 2.1 Build 18113012. Attackers can use slowhttptest tool to send incomplete HTTP request, which could make server keep waiting for the packet to finish the connection, until its resource exhausted. Then the web server is denial-of-service.

Jun 18, 2021
7.5
CVE-2021-33823HIGH

An issue was discovered on MOXA Mgate MB3180 Version 2.1 Build 18113012. Attacker could send a huge amount of TCP SYN packet to make web service's resource exhausted. Then the web server is denial-of-service.

Jun 18, 2021
7.5
CVE-2021-27196HIGH

Improper Input Validation vulnerability in Hitachi ABB Power Grids Relion 670 Series, Relion 670/650 Series, Relion 670/650/SAM600-IO, Relion 650, REB500, RTU500 Series, FOX615 (TEGO1), MSM, GMS600, PWC600 allows an attacker with access to the IEC 61850 network with knowledge of how to reproduce the attack, as well as the IP addresses of the different IEC 61850 access points (of IEDs/products), to force the device to reboot, which renders the device inoperable for approximately 60 seconds. This vulnerability affects only products with IEC 61850 interfaces. This issue affects: Hitachi ABB Power Grids Relion 670 Series 1.1; 1.2.3 versions prior to 1.2.3.20; 2.0 versions prior to 2.0.0.13; 2.1; 2.2.2 versions prior to 2.2.2.3; 2.2.3 versions prior to 2.2.3.2. Hitachi ABB Power Grids Relion 670/650 Series 2.2.0 versions prior to 2.2.0.13. Hitachi ABB Power Grids Relion 670/650/SAM600-IO 2.2.1 versions prior to 2.2.1.6. Hitachi ABB Power Grids Relion 650 1.1; 1.2; 1.3 versions prior to 1.3.0.7. Hitachi ABB Power Grids REB500 7.3; 7.4; 7.5; 7.6; 8.2; 8.3. Hitachi ABB Power Grids RTU500 Series 7.x version 7.x and prior versions; 8.x version 8.x and prior versions; 9.x version 9.x and prior versions; 10.x version 10.x and prior versions; 11.x version 11.x and prior versions; 12.x version 12.x and prior versions. Hitachi ABB Power Grids FOX615 (TEGO1) R1D02 version R1D02 and prior versions. Hitachi ABB Power Grids MSM 2.1.0 versions prior to 2.1.0. Hitachi ABB Power Grids GMS600 1.3.0 version 1.3.0 and prior versions. Hitachi ABB Power Grids PWC600 1.0 versions prior to 1.0.1.4; 1.1 versions prior to 1.1.0.1.

Jun 14, 2021
7.5
CVE-2021-26845HIGH

Information Exposure vulnerability in Hitachi ABB Power Grids eSOMS allows unauthorized user to gain access to report data if the URL used to access the report is discovered. This issue affects: Hitachi ABB Power Grids eSOMS 6.0 versions prior to 6.0.4.2.2; 6.1 versions prior to 6.1.4; 6.3 versions prior to 6.3.

Jun 14, 2021
7.5
CVE-2021-20591HIGH

Uncontrolled Resource Consumption vulnerability in Mitsubishi Electric MELSEC iQ-R series CPU modules (R00/01/02CPU all versions, R04/08/16/32/120(EN)CPU all versions, R08/16/32/120SFCPU all versions, R08/16/32/120PCPU all versions, R08/16/32/120PSFCPU all versions) allows a remote unauthenticated attacker to prevent legitimate clients from connecting to the MELSOFT transmission port (TCP/IP) by not closing a connection properly, which may lead to a denial of service (DoS) condition.

Jun 11, 2021
7.5
CVE-2021-30195HIGH

CODESYS V2 runtime system before 2.4.7.55 has Improper Input Validation.

May 25, 2021
7.5
CVE-2021-30191HIGH

CODESYS V2 Web-Server before 1.1.9.20 has a a Buffer Copy without Checking the Size of the Input.

May 25, 2021
7.5
CVE-2021-30186HIGH

CODESYS V2 runtime system SP before 2.4.7.55 has a Heap-based Buffer Overflow.

May 25, 2021
7.5
CVE-2020-27185HIGH

Cleartext transmission of sensitive information via Moxa Service in NPort IA5000A series serial devices. Successfully exploiting the vulnerability could enable attackers to read authentication data, device configuration, and other sensitive data transmitted over Moxa Service.

May 14, 2021
7.5
CVE-2021-20997HIGH

In multiple managed switches by WAGO in different versions it is possible to read out the password hashes of all Web-based Management users.

May 13, 2021
7.5
CVE-2021-25849HIGH

An integer underflow was discovered in userdisk/vport_lldpd in Moxa Camera VPort 06EC-2V Series, version 1.1, improper validation of the PortID TLV leads to Denial of Service via a crafted lldp packet.

May 10, 2021
7.5
CVE-2021-25846HIGH

Improper validation of the ChassisID TLV in userdisk/vport_lldpd in Moxa Camera VPort 06EC-2V Series, version 1.1, allows attackers to cause a denial of service due to a negative number passed to the memcpy function via a crafted lldp packet.

May 10, 2021
7.5
CVE-2021-25845HIGH

Improper validation of the ChassisID TLV in userdisk/vport_lldpd in Moxa Camera VPort 06EC-2V Series, version 1.1, allows attackers to cause a denial of service due to a NULL pointer dereference via a crafted lldp packet.

May 10, 2021
7.5
CVE-2021-29241HIGH

CODESYS Gateway 3 before 3.5.16.70 has a NULL pointer dereference that may result in a denial of service (DoS).

May 3, 2021
7.5
CVE-2019-18231HIGH

Advantech Spectre RT ERT351 Versions 5.1.3 and prior logins and passwords are transmitted in clear text form, which may allow an attacker to intercept the request.

Mar 17, 2021
7.5
CVE-2020-24686HIGH

The vulnerabilities can be exploited to cause the web visualization component of the PLC to stop and not respond, leading to genuine users losing remote visibility of the PLC state. If a user attempts to login to the PLC while this vulnerability is exploited, the PLC will show an error state and refuse connections to Automation Builder. The execution of the PLC application is not affected by this vulnerability. This issue affects ABB AC500 V2 products with onboard Ethernet.

Feb 26, 2021
7.5
CVE-2021-20588HIGH

Improper Handling of Length Parameter Inconsistency vulnerability in Mitsubishi Electric FA Engineering Software (CPU Module Logging Configuration Tool versions 1.112R and prior, CW Configurator versions 1.011M and prior, Data Transfer versions 3.44W and prior, EZSocket versions 5.4 and prior, FR Configurator all versions, FR Configurator SW3 all versions, FR Configurator2 versions 1.24A and prior, GT Designer3 Version1(GOT1000) versions 1.250L and prior, GT Designer3 Version1(GOT2000) versions 1.250L and prior, GT SoftGOT1000 Version3 versions 3.245F and prior, GT SoftGOT2000 Version1 versions 1.250L and prior, GX Configurator-DP versions 7.14Q and prior, GX Configurator-QP all versions, GX Developer versions 8.506C and prior, GX Explorer all versions, GX IEC Developer all versions, GX LogViewer versions 1.115U and prior, GX RemoteService-I all versions, GX Works2 versions 1.597X and prior, GX Works3 versions 1.070Y and prior, iQ Monozukuri ANDON (Data Transfer) versions 1.003D and prior, iQ Monozukuri Process Remote Monitoring (Data Transfer) versions 1.002C and prior, M_CommDTM-HART all versions, M_CommDTM-IO-Link versions 1.03D and prior, MELFA-Works versions 4.4 and prior, MELSEC WinCPU Setting Utility all versions, MELSOFT EM Software Development Kit (EM Configurator) versions 1.015R and prior, MELSOFT Navigator versions 2.74C and prior, MH11 SettingTool Version2 versions 2.004E and prior, MI Configurator versions 1.004E and prior, MT Works2 versions 1.167Z and prior, MX Component versions 5.001B and prior, Network Interface Board CC IE Control utility versions 1.29F and prior, Network Interface Board CC IE Field Utility versions 1.16S and prior, Network Interface Board CC-Link Ver.2 Utility versions 1.23Z and prior, Network Interface Board MNETH utility versions 34L and prior, PX Developer versions 1.53F and prior, RT ToolBox2 versions 3.73B and prior, RT ToolBox3 versions 1.82L and prior, Setting/monitoring tools for the C Controller module (SW4PVC-CCPU) versions 4.12N and prior, and SLMP Data Collector versions 1.04E and prior) allows a remote unauthenticated attacker to cause a DoS condition on the software products, and possibly to execute a malicious code on the personal computer running the software products although it has not been reproduced, by spoofing MELSEC, GOT or FREQROL and returning crafted reply packets.

Feb 19, 2021
7.5
CVE-2021-20587HIGH

Heap-based buffer overflow vulnerability in Mitsubishi Electric FA Engineering Software (CPU Module Logging Configuration Tool versions 1.112R and prior, CW Configurator versions 1.011M and prior, Data Transfer versions 3.44W and prior, EZSocket versions 5.4 and prior, FR Configurator all versions, FR Configurator SW3 all versions, FR Configurator2 versions 1.24A and prior, GT Designer3 Version1(GOT1000) versions 1.250L and prior, GT Designer3 Version1(GOT2000) versions 1.250L and prior, GT SoftGOT1000 Version3 versions 3.245F and prior, GT SoftGOT2000 Version1 versions 1.250L and prior, GX Configurator-DP versions 7.14Q and prior, GX Configurator-QP all versions, GX Developer versions 8.506C and prior, GX Explorer all versions, GX IEC Developer all versions, GX LogViewer versions 1.115U and prior, GX RemoteService-I all versions, GX Works2 versions 1.597X and prior, GX Works3 versions 1.070Y and prior, iQ Monozukuri ANDON (Data Transfer) versions 1.003D and prior, iQ Monozukuri Process Remote Monitoring (Data Transfer) versions 1.002C and prior, M_CommDTM-HART all versions, M_CommDTM-IO-Link versions 1.03D and prior, MELFA-Works versions 4.4 and prior, MELSEC WinCPU Setting Utility all versions, MELSOFT EM Software Development Kit (EM Configurator) versions 1.015R and prior, MELSOFT Navigator versions 2.74C and prior, MH11 SettingTool Version2 versions 2.004E and prior, MI Configurator versions 1.004E and prior, MT Works2 versions 1.167Z and prior, MX Component versions 5.001B and prior, Network Interface Board CC IE Control utility versions 1.29F and prior, Network Interface Board CC IE Field Utility versions 1.16S and prior, Network Interface Board CC-Link Ver.2 Utility versions 1.23Z and prior, Network Interface Board MNETH utility versions 34L and prior, PX Developer versions 1.53F and prior, RT ToolBox2 versions 3.73B and prior, RT ToolBox3 versions 1.82L and prior, Setting/monitoring tools for the C Controller module (SW4PVC-CCPU) versions 4.12N and prior, and SLMP Data Collector versions 1.04E and prior) allows a remote unauthenticated attacker to cause a DoS condition on the software products, and possibly to execute a malicious code on the personal computer running the software products although it has not been reproduced, by spoofing MELSEC, GOT or FREQROL and returning crafted reply packets.

Feb 19, 2021
7.5
CVE-2021-22656HIGH

Advantech iView versions prior to v5.7.03.6112 are vulnerable to directory traversal, which may allow an attacker to read sensitive files.

Feb 11, 2021
7.5
CVE-2021-22654HIGH

Advantech iView versions prior to v5.7.03.6112 are vulnerable to a SQL injection, which may allow an unauthorized attacker to disclose information.

Feb 11, 2021
7.5
CVE-2020-13573HIGH

A denial-of-service vulnerability exists in the Ethernet/IP server functionality of Rockwell Automation RSLinx Classic 2.57.00.14 CPR 9 SR 3. A specially crafted network request can lead to a denial of service. An attacker can send a sequence of malicious packets to trigger this vulnerability.

Jan 7, 2021
7.5
CVE-2020-25190HIGH

The built-in WEB server for MOXA NPort IAW5000A-I/O firmware version 2.1 or lower stores and transmits the credentials of third-party services in cleartext.

Dec 23, 2020
7.5
CVE-2020-12516HIGH

Older firmware versions (FW1 up to FW10) of the WAGO PLC family 750-88x and 750-352 are vulnerable for a special denial of service attack.

Dec 10, 2020
7.5
CVE-2020-12524HIGH

Uncontrolled Resource Consumption can be exploited to cause the Phoenix Contact HMIs BTP 2043W, BTP 2070W and BTP 2102W in all versions to become unresponsive and not accurately update the display content (Denial of Service).

Dec 2, 2020
7.5
CVE-2020-7524HIGH

Out-of-bounds Write vulnerability exists in Modicon M218 Logic Controller (V5.0.0.7 and prior) which could cause Denial of Service when sending specific crafted IPV4 packet to the controller: Sending a specific IPv4 protocol package to Schneider Electric Modicon M218 Logic Controller can cause IPv4 devices to go down. The device does not work properly and must be powered back on to return to normal.

Aug 31, 2020
7.5
CVE-2020-15806HIGH

CODESYS Control runtime system before 3.5.16.10 allows Uncontrolled Memory Allocation.

Jul 22, 2020
7.5
CVE-2020-12031HIGH

In all versions of FactoryTalk View SE, after bypassing memory corruption mechanisms found in the operating system, a local, authenticated attacker may corrupt the associated memory space allowing for arbitrary code execution. Rockwell Automation recommends applying patch 1126290. Before installing this patch, the patch rollup dated 06 Apr 2020 or later MUST be applied. 1066644 – Patch Roll-up for CPR9 SRx.

Jul 20, 2020
7.5
CVE-2020-12015HIGH

A specially crafted communication packet sent to the affected systems could cause a denial-of-service condition due to improper deserialization. This issue affects: Mitsubishi Electric MC Works64 version 4.02C (10.95.208.31) and earlier, all versions; Mitsubishi Electric MC Works32 version 3.00A (9.50.255.02); ICONICS GenBroker64, Platform Services, Workbench, FrameWorX Server version 10.96 and prior; ICONICS GenBroker32 version 9.5 and prior.

Jul 16, 2020
7.5
CVE-2020-12009HIGH

A specially crafted communication packet sent to the affected device could cause a denial-of-service condition due to a deserialization vulnerability. This affects: Mitsubishi Electric MC Works64 Version 4.02C (10.95.208.31) and earlier, all versions; Mitsubishi Electric MC Works32 Version 3.00A (9.50.255.02); ICONICS GenBroker64, Platform Services, Workbench, FrameWorX Server v10.96 and prior; ICONICS GenBroker32 v9.5 and prior.

Jul 16, 2020
7.5
CVE-2020-14499HIGH

Advantech iView, versions 5.6 and prior, has an improper access control vulnerability. Successful exploitation of this vulnerability may allow an attacker to obtain all user accounts credentials.

Jul 15, 2020
7.5
CVE-2020-5600HIGH

TCP/IP function included in the firmware of Mitsubishi Electric GOT2000 series (CoreOS with version -Y and earlier installed in GT27 Model, GT25 Model, and GT23 Model) contains a resource management error vulnerability, which may allow a remote attacker to stop the network functions of the products or execute a malicious program via a specially crafted packet.

Jul 7, 2020
7.5
CVE-2020-5598HIGH

TCP/IP function included in the firmware of Mitsubishi Electric GOT2000 series (CoreOS with version -Y and earlier installed in GT27 Model, GT25 Model, and GT23 Model) contains an improper access control vulnerability, which may which may allow a remote attacker tobypass access restriction and stop the network functions of the products or execute a malicious program via a specially crafted packet.

Jul 7, 2020
7.5
CVE-2020-5597HIGH

TCP/IP function included in the firmware of Mitsubishi Electric GOT2000 series (CoreOS with version -Y and earlier installed in GT27 Model, GT25 Model, and GT23 Model) contains a null pointer dereference vulnerability, which may allow a remote attacker to stop the network functions of the products or execute a malicious program via a specially crafted packet.

Jul 7, 2020
7.5
CVE-2020-5596HIGH

TCP/IP function included in the firmware of Mitsubishi Electric GOT2000 series (CoreOS with version -Y and earlier installed in GT27 Model, GT25 Model, and GT23 Model) does not properly manage sessions, which may allow a remote attacker to stop the network functions of the products or execute a malicious program via a specially crafted packet.

Jul 7, 2020
7.5
CVE-2020-12018HIGH

Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. An out-of-bounds vulnerability exists that may allow access to unauthorized data.

May 8, 2020
7.5
CVE-2020-12014HIGH

Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Input is not properly sanitized and may allow an attacker to inject SQL commands.

May 8, 2020
7.5
CVE-2019-19100HIGH

A privilege escalation vulnerability in the upgrade service in B&R Automation Studio versions 4.0.x, 4.1.x, 4.2.x, < 4.3.11SP, < 4.4.9SP, < 4.5.4SP, <. 4.6.3SP, < 4.7.2 and < 4.8.1 allow authenticated users to delete arbitrary files via an exposed interface.

Apr 29, 2020
7.5
CVE-2019-3942HIGH

Advantech WebAccess 8.3.4 does not properly restrict an RPC call that allows unauthenticated, remote users to read files. An attacker can use this vulnerability to recover the administrator password.

Apr 1, 2020
7.5
CVE-2020-5527HIGH

When MELSOFT transmission port (UDP/IP) of Mitsubishi Electric MELSEC iQ-R series (all versions), MELSEC iQ-F series (all versions), MELSEC Q series (all versions), MELSEC L series (all versions), and MELSEC F series (all versions) receives massive amount of data via unspecified vectors, resource consumption occurs and the port does not process the data properly. As a result, it may fall into a denial-of-service (DoS) condition. The vendor states this vulnerability only affects Ethernet communication functions.

Mar 30, 2020
7.5
CVE-2019-5105HIGH

An exploitable memory corruption vulnerability exists in the Name Service Client functionality of 3S-Smart Software Solutions CODESYS GatewayService. A specially crafted packet can cause a large memcpy, resulting in an access violation and termination of the process. An attacker can send a packet to a device running the GatewayService.exe to trigger this vulnerability. All variants of the CODESYS V3 products in all versions prior V3.5.16.10 containing the CmpRouter or CmpRouterEmbedded component are affected, regardless of the CPU type or operating system: CODESYS Control for BeagleBone, CODESYS Control for emPC-A/iMX6, CODESYS Control for IOT2000, CODESYS Control for Linux, CODESYS Control for PLCnext, CODESYS Control for PFC100, CODESYS Control for PFC200, CODESYS Control for Raspberry Pi, CODESYS Control RTE V3, CODESYS Control RTE V3 (for Beckhoff CX), CODESYS Control Win V3 (also part of the CODESYS Development System setup), CODESYS Control V3 Runtime System Toolkit, CODESYS V3 Embedded Target Visu Toolkit, CODESYS V3 Remote Target Visu Toolkit, CODESYS V3 Safety SIL2, CODESYS Edge Gateway V3, CODESYS Gateway V3, CODESYS HMI V3, CODESYS OPC Server V3, CODESYS PLCHandler SDK, CODESYS V3 Simulation Runtime (part of the CODESYS Development System).

Mar 26, 2020
7.5
CVE-2020-7001HIGH

In Moxa EDS-G516E Series firmware, Version 5.2 or lower, the affected products use a weak cryptographic algorithm, which may allow confidential information to be disclosed.

Mar 24, 2020
7.5
CVE-2020-6997HIGH

In Moxa EDS-G516E Series firmware, Version 5.2 or lower, sensitive information is transmitted over some web applications in cleartext.

Mar 24, 2020
7.5
CVE-2020-6979HIGH

In Moxa EDS-G516E Series firmware, Version 5.2 or lower, the affected products use a hard-coded cryptographic key, increasing the possibility that confidential data can be recovered.

Mar 24, 2020
7.5
CVE-2020-6993HIGH

In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, an attacker can gain access to sensitive information from the web service without authorization.

Mar 24, 2020
7.5
CVE-2020-6987HIGH

In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, the affected products use a weak cryptographic algorithm, which may allow confidential information to be disclosed.

Mar 24, 2020
7.5
CVE-2020-6983HIGH

In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or lower, the affected products use a hard-coded cryptographic key, which increases the possibility that confidential data can be recovered.

Mar 24, 2020
7.5
CVE-2020-7003HIGH

In Moxa ioLogik 2500 series firmware, Version 3.0 or lower, and IOxpress configuration utility, Version 2.3.0 or lower, sensitive information is transmitted over some web applications in clear text.

Mar 24, 2020
7.5
CVE-2019-18242HIGH

In Moxa ioLogik 2500 series firmware, Version 3.0 or lower, and IOxpress configuration utility, Version 2.3.0 or lower, frequent and multiple requests for short-term use may cause the web server to fail.

Mar 24, 2020
7.5
CVE-2020-6988HIGH

Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior, A remote, unauthenticated attacker can send a request from the RSLogix 500 software to the victim’s MicroLogix controller. The controller will then respond to the client with used password values to authenticate the user on the client-side. This method of authentication may allow an attacker to bypass authentication altogether, disclose sensitive information, or leak credentials.

Mar 16, 2020
7.5
CVE-2020-6984HIGH

Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior, The cryptographic function utilized to protect the password in MicroLogix is discoverable.

Mar 16, 2020
7.5
CVE-2020-9464HIGH

A Denial-of-Service vulnerability exists in BECKHOFF Ethernet TCP/IP Bus Coupler BK9000. After an attack has occurred, the device's functionality can be restored by rebooting.

Mar 12, 2020
7.5
CVE-2020-9435HIGH

PHOENIX CONTACT TC ROUTER 3002T-4G through 2.05.3, TC ROUTER 2002T-3G through 2.05.3, TC ROUTER 3002T-4G VZW through 2.05.3, TC ROUTER 3002T-4G ATT through 2.05.3, TC CLOUD CLIENT 1002-4G through 2.03.17, and TC CLOUD CLIENT 1002-TXTX through 1.03.17 devices contain a hardcoded certificate (and key) that is used by default for web-based services on the device. Impersonation, man-in-the-middle, or passive decryption attacks are possible if the generic certificate is not replaced by a device-specific certificate during installation.

Mar 12, 2020
7.5
CVE-2019-5149HIGH

The WBM web application on firmwares prior to 03.02.02 and 03.01.07 on the WAGO PFC100 and PFC2000, respectively, runs on a lighttpd web server and makes use of the FastCGI module, which is intended to provide high performance for all Internet applications without the penalties of Web server APIs. However, the default configuration of this module appears to limit the number of concurrent php-cgi processes to two, which can be abused to cause a denial of service of the entire web server. This affects WAGO PFC200 Firmware version 03.00.39(12) and version 03.01.07(13), and WAGO PFC100 Firmware version 03.00.39(12) and version 03.02.02(14).

Mar 11, 2020
7.5
CVE-2019-5134HIGH

An exploitable regular expression without anchors vulnerability exists in the Web-Based Management (WBM) authentication functionality of WAGO PFC200 versions 03.00.39(12) and 03.01.07(13), and WAGO PFC100 version 03.00.39(12). A specially crafted authentication request can bypass regular expression filters, resulting in sensitive information disclosure.

Mar 11, 2020
7.5
CVE-2019-5107HIGH

A cleartext transmission vulnerability exists in the network communication functionality of WAGO e!Cockpit version 1.5.1.1. An attacker with access to network traffic can easily intercept, interpret, and manipulate data coming from, or destined for e!Cockpit. This includes passwords, configurations, and binaries being transferred to endpoints.

Mar 11, 2020
7.5
CVE-2019-9104HIGH

An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. The application's configuration file contains parameters that represent passwords in cleartext.

Mar 11, 2020
7.5
CVE-2019-9101HIGH

An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. Sensitive information is sent to the web server in cleartext, which may allow an attacker to discover the credentials if they are able to observe traffic between the web browser and the server.

Mar 11, 2020
7.5
CVE-2019-9098HIGH

An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. An Integer overflow in the built-in web server allows remote attackers to initiate DoS.

Mar 11, 2020
7.5
CVE-2019-19279HIGH

A vulnerability has been identified in SIPROTEC 4 and SIPROTEC Compact relays equipped with EN100 Ethernet communication modules (All versions). Specially crafted packets sent to port 50000/UDP of the EN100 Ethernet communication modules could cause a Denial-of-Service of the affected device. A manual reboot is required to recover the service of the device. At the time of advisory publication no public exploitation of this security vulnerability was known to Siemens.

Mar 10, 2020
7.5
CVE-2020-6986HIGH

In all versions of Omron PLC CJ Series, an attacker can send a series of specific data packets within a short period, causing a service error on the PLC Ethernet module, which in turn causes a PLC service denied result.

Mar 5, 2020
7.5
CVE-2019-18238HIGH

In Moxa ioLogik 2500 series firmware, Version 3.0 or lower, and IOxpress configuration utility, Version 2.3.0 or lower, sensitive information is stored in configuration files without encryption, which may allow an attacker to access an administrative account.

Feb 26, 2020
7.5
CVE-2019-5148HIGH

An exploitable denial-of-service vulnerability exists in ServiceAgent functionality of the Moxa AWK-3131A, firmware version 1.13. A specially crafted packet can cause an integer underflow, triggering a large memcpy that will access unmapped or out-of-bounds memory. An attacker can send this packet while unauthenticated to trigger this vulnerability.

Feb 25, 2020
7.5
CVE-2019-5137HIGH

The usage of hard-coded cryptographic keys within the ServiceAgent binary allows for the decryption of captured traffic across the network from or to the Moxa AWK-3131A firmware version 1.13.

Feb 25, 2020
7.5
CVE-2018-16994HIGH

An issue was discovered on PHOENIX CONTACT AXL F BK PN <=1.0.4, AXL F BK ETH <= 1.12, and AXL F BK ETH XC <= 1.11 devices and Bosch Rexroth S20-ETH-BK and Rexroth S20-PN-BK+ (the S20-PN-BK+/S20-ETH-BK fieldbus couplers sold by Bosch Rexroth contain technology from Phoenix Contact). Incorrect handling of a request with non-standard symbols allows remote attackers to initiate a complete lock up of the bus coupler. Authentication of the request is not required.

Feb 18, 2020
7.5
CVE-2019-13537HIGH

The IEC870IP driver for AVEVA’s Vijeo Citect and Citect SCADA and Schneider Electric’s Power SCADA Operation has a buffer overflow vulnerability that could result in a server-side crash.

Jan 14, 2020
7.5
CVE-2019-19707HIGH

On Moxa EDS-G508E, EDS-G512E, and EDS-G516E devices (with firmware through 6.0), denial of service can occur via PROFINET DCE-RPC endpoint discovery packets.

Dec 11, 2019
7.5
CVE-2019-5637HIGH

When Beckhoff TwinCAT is configured to use the Profinet driver, a denial of service of the controller could be reached by sending a malformed UDP packet to the device. This issue affects TwinCAT 2 version 2304 (and prior) and TwinCAT 3.1 version 4204.0 (and prior).

Nov 21, 2019
7.5
CVE-2019-18230HIGH

Honeywell equIP and Performance series IP cameras, multiple versions, A vulnerability exists where the affected product allows unauthenticated access to audio streaming over HTTP.

Oct 31, 2019
7.5
CVE-2019-18228HIGH

Honeywell equIP series IP cameras Multiple equIP Series Cameras, A vulnerability exists in the affected products where a specially crafted HTTP packet request could result in a denial of service.

Oct 31, 2019
7.5
CVE-2019-18227HIGH

Advantech WISE-PaaS/RMM, Versions 3.3.29 and prior. XXE vulnerabilities exist that may allow disclosure of sensitive data.

Oct 31, 2019
7.5
CVE-2019-14927HIGH

An issue was discovered on Mitsubishi Electric Europe B.V. ME-RTU devices through 2.02 and INEA ME-RTU devices through 3.0. An unauthenticated remote configuration download vulnerability allows an attacker to download the smartRTU's configuration file (which contains data such as usernames, passwords, and other sensitive RTU data).

Oct 28, 2019
7.5
CVE-2019-16901HIGH

Advantech WebAccess/HMI Designer 2.1.9.31 has Exception Handler Chain corruption starting at Unknown Symbol @ 0x0000000000000000 called from ntdll!RtlRaiseStatus+0x00000000000000b4.

Sep 26, 2019
7.5
CVE-2019-16900HIGH

Advantech WebAccess/HMI Designer 2.1.9.31 has a User Mode Write AV starting at MSVCR90!memcpy+0x000000000000015c.

Sep 26, 2019
7.5
CVE-2019-16899HIGH

In Advantech WebAccess/HMI Designer 2.1.9.31, Data from a Faulting Address controls Code Flow starting at PM_V3!CTagInfoThreadBase::GetNICInfo+0x0000000000512918.

Sep 26, 2019
7.5
CVE-2019-9009HIGH

An issue was discovered in 3S-Smart CODESYS before 3.5.15.0 . Crafted network packets cause the Control Runtime to crash.

Sep 17, 2019
7.5
CVE-2019-13532HIGH

CODESYS V3 web server, all versions prior to 3.5.14.10, allows an attacker to send specially crafted http or https requests which may allow access to files outside the restricted working directory of the controller.

Sep 13, 2019
7.5
CVE-2019-9012HIGH

An issue was discovered in 3S-Smart CODESYS V3 products. A crafted communication request may cause uncontrolled memory allocations in the affected CODESYS products and may result in a denial-of-service condition. All variants of the following CODESYS V3 products in all versions prior to v3.5.14.20 that contain the CmpGateway component are affected, regardless of the CPU type or operating system: CODESYS Control for BeagleBone, CODESYS Control for emPC-A/iMX6, CODESYS Control for IOT2000, CODESYS Control for Linux, CODESYS Control for PFC100, CODESYS Control for PFC200, CODESYS Control for Raspberry Pi, CODESYS Control V3 Runtime System Toolkit, CODESYS Gateway V3, CODESYS V3 Development System.

Aug 15, 2019
7.5
CVE-2018-11424HIGH

There is Memory corruption in the web interface of Moxa OnCell G3470A-LTE Series version 1.6 Build 18021314 and prior, a different vulnerability than CVE-2018-11425.

Jul 3, 2019
7.5
CVE-2018-11423HIGH

There is Memory corruption in the web interface Moxa OnCell G3100-HSPA Series version 1.6 Build 17100315 and prior, different vulnerability than CVE-2018-11420.

Jul 3, 2019
7.5
CVE-2019-6571HIGH

A vulnerability has been identified in SIEMENS LOGO!8 (6ED1052-xyyxx-0BA8 FS:01 to FS:06 / Firmware version V1.80.xx and V1.81.xx), SIEMENS LOGO!8 (6ED1052-xyy08-0BA0 FS:01 / Firmware version < V1.82.02). An attacker with network access to port 10005/tcp of the LOGO! device could cause a Denial-of-Service condition by sending specially crafted packets. The security vulnerability could be exploited by an unauthenticated attacker with network access to the affected service. No user interaction is required to exploit this security vulnerability. Successful exploitation of the security vulnerability compromises availability of the targeted system. At the time of advisory publication no public exploitation of this security vulnerability was known.

Jun 12, 2019
7.5
CVE-2018-10691HIGH

An issue was discovered on Moxa AWK-3121 1.14 devices. It is intended that an administrator can download /systemlog.log (the system log). However, the same functionality allows an attacker to download the file without any authentication or authorization.

Jun 7, 2019
7.5
CVE-2019-10977HIGH

In Mitsubishi Electric MELSEC-Q series Ethernet module QJ71E71-100 serial number 20121 and prior, an attacker could send crafted TCP packets against the FTP service, forcing the target devices to enter an error mode and cause a denial-of-service condition.

May 23, 2019
7.5
CVE-2018-13994HIGH

The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions 1.0 to 1.34 is vulnerable to a denial-of-service attack by making more than 120 connections.

May 7, 2019
7.5
CVE-2019-10953HIGH

ABB, Phoenix Contact, Schneider Electric, Siemens, WAGO - Programmable Logic Controllers, multiple versions. Researchers have found some controllers are susceptible to a denial-of-service attack due to a flood of network packets.

Apr 17, 2019
7.5
CVE-2018-16561HIGH

A vulnerability has been identified in SIMATIC S7-300 CPUs (All versions < V3.X.16). The affected CPUs improperly validate S7 communication packets which could cause a Denial-of-Service condition of the CPU. The CPU will remain in DEFECT mode until manual restart. Successful exploitation requires an attacker to be able to send a specially crafted S7 communication packet to a communication interface of the CPU. This includes Ethernet, PROFIBUS, and Multi Point Interfaces (MPI). No user interaction or privileges are required to exploit the security vulnerability. The vulnerability could allow causing a Denial-of-Service condition of the core functionality of the CPU, compromising the availability of the system. At the time of advisory publication no public exploitation of this security vulnerability was known. Siemens confirms the security vulnerability and provides mitigations to resolve the security issue.

Apr 17, 2019
7.5
CVE-2019-3941HIGH

Advantech WebAccess 8.3.4 allows unauthenticated, remote attackers to delete arbitrary files via IOCTL 10005 RPC.

Apr 9, 2019
7.5
CVE-2014-5436HIGH

A directory traversal vulnerability exists in the confd.exe module in Honeywell Experion PKS R40x before R400.6, R41x before R410.6, and R43x before R430.2, which could lead to possible information disclosure. Honeywell strongly encourages and recommends all customers running unsupported versions of EKPS prior to R400 to upgrade to a supported version.

Apr 8, 2019
7.5
CVE-2019-6554HIGH

Advantech WebAccess/SCADA, Versions 8.3.5 and prior. An improper access control vulnerability may allow an attacker to cause a denial-of-service condition.

Apr 5, 2019
7.5
CVE-2018-19016HIGH

Rockwell Automation EtherNet/IP Web Server Modules 1756-EWEB (includes 1756-EWEBK) Version 5.001 and earlier, and CompactLogix 1768-EWEB Version 2.005 and earlier. A remote attacker could send a crafted UDP packet to the SNMP service causing a denial-of-service condition to occur until the affected product is restarted.

Mar 27, 2019
7.5
CVE-2013-2805HIGH

Rockwell Automation RSLinx Enterprise Software (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 does not handle input correctly and results in a logic error if it receives a datagram with an incorrect value in the “Record Data Size” field. By sending a datagram to the service over Port 4444/UDP with the “Record Data Size” field modified to an oversized value, an attacker could cause an out-of-bounds read access violation that leads to a service crash. The service can be recovered with a manual reboot. The patches and details pertaining to this vulnerability can be found at the following Rockwell Automation Security Advisory link (login is required): https://rockwellautomation.custhelp.com/app/answers/detail/a_id/537599

Mar 26, 2019
7.5
CVE-2013-2807HIGH

Rockwell Automation RSLinx Enterprise Software (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 does not handle input correctly and results in a logic error if it calculates an incorrect value for the “Total Record Size” field. By sending a datagram to the service over Port 4444/UDP with the “Record Data Size” field modified to a specifically oversized value, the service will calculate an undersized value for the “Total Record Size” that will cause an out-of-bounds read access violation that leads to a service crash. The service can be recovered with a manual reboot. The patches and details pertaining to these vulnerabilities can be found at the following Rockwell Automation Security Advisory link (login is required): https://rockwellautomation.custhelp.com/app/answers/detail/a_id/537599

Mar 26, 2019
7.5
CVE-2013-2806HIGH

Rockwell Automation RSLinx Enterprise Software (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 does not handle input correctly and results in a logic error if it calculates an incorrect value for the “End of Current Record” field. By sending a datagram to the service over Port 4444/UDP with the “Record Data Size” field modified to a specifically oversized value, the service will calculate an undersized value for the “Total Record Size.” Then the service will calculate an incorrect value for the “End of Current Record” field causing access violations that lead to a service crash. The service can be recovered with a manual reboot. The patches and details pertaining to these vulnerabilities can be found at the following Rockwell Automation security advisory link (login is required): https://rockwellautomation.custhelp.com/app/answers/detail/a_id/537599

Mar 26, 2019
7.5
CVE-2019-6520HIGH

Moxa IKS and EDS does not properly check authority on server side, which results in a read-only user being able to perform arbitrary configuration changes.

Mar 5, 2019
7.5
CVE-2019-6518HIGH

Moxa IKS and EDS store plaintext passwords, which may allow sensitive information to be read by someone with access to the device.

Mar 5, 2019
7.5
CVE-2018-20026HIGH

Improper Communication Address Filtering exists in CODESYS V3 products versions prior V3.5.14.0.

Feb 19, 2019
7.5
CVE-2018-20025HIGH

Use of Insufficiently Random Values exists in CODESYS V3 products versions prior V3.5.14.0.

Feb 19, 2019
7.5
CVE-2019-6535HIGH

Mitsubishi Electric Q03/04/06/13/26UDVCPU: serial number 20081 and prior, Q04/06/13/26UDPVCPU: serial number 20081 and prior, and Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: serial number 20101 and prior. A remote attacker can send specific bytes over Port 5007 that will result in an Ethernet stack crash and disruption to USB communication.

Feb 5, 2019
7.5
CVE-2018-18981HIGH

In Rockwell Automation FactoryTalk Services Platform 2.90 and earlier, a remote unauthenticated attacker could send numerous crafted packets to service ports resulting in memory consumption that could lead to a partial or complete denial-of-service condition to the affected services.

Jan 24, 2019
7.5
CVE-2018-20720HIGH

ABB Relion 630 devices 1.1 before 1.1.0.C0, 1.2 before 1.2.0.B3, and 1.3 before 1.3.0.A6 allow remote attackers to cause a denial of service (reboot) via a reboot command in an SPA message.

Jan 16, 2019
7.5
CVE-2018-16196HIGH

Multiple Yokogawa products that contain Vnet/IP Open Communication Driver (CENTUM CS 3000(R3.05.00 - R3.09.50), CENTUM CS 3000 Entry Class(R3.05.00 - R3.09.50), CENTUM VP(R4.01.00 - R6.03.10), CENTUM VP Entry Class(R4.01.00 - R6.03.10), Exaopc(R3.10.00 - R3.75.00), PRM(R2.06.00 - R3.31.00), ProSafe-RS(R1.02.00 - R4.02.00), FAST/TOOLS(R9.02.00 - R10.02.00), B/M9000 VP(R6.03.01 - R8.01.90)) allows remote attackers to cause a denial of service attack that may result in stopping Vnet/IP Open Communication Driver's communication via unspecified vectors.

Jan 9, 2019
7.5
CVE-2018-14820HIGH

Advantech WebAccess 8.3.1 and earlier has a .dll component that is susceptible to external control of file name or path vulnerability, which may allow an arbitrary file deletion when processing.

Oct 23, 2018
7.5
CVE-2018-18390HIGH

User Enumeration in Moxa ThingsPro IIoT Gateway and Device Management Software Solutions version 2.1.

Oct 19, 2018
7.5
CVE-2018-17898HIGH

Yokogawa STARDOM Controllers FCJ,FCN-100, FCN-RTU, FCN-500, All versions R4.10 and prior, The controller application fails to prevent memory exhaustion by unauthorized requests. This could allow an attacker to cause the controller to become unstable.

Oct 12, 2018
7.5
CVE-2018-14827HIGH

Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. A remote, unauthenticated threat actor may intentionally send specially crafted Ethernet/IP packets to Port 44818, causing the software application to stop responding and crash. The user must restart the software to regain functionality.

Sep 20, 2018
7.5
CVE-2018-14821HIGH

Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. This vulnerability may allow a remote, unauthenticated threat actor to intentionally send a malformed CIP packet to Port 44818, causing the RSLinx Classic application to terminate. The user will need to manually restart the software to regain functionality.

Sep 20, 2018
7.5
CVE-2018-7792HIGH

A Permissions, Privileges, and Access Control vulnerability exists in Schneider Electric's Modicon M221 product (all references, all versions prior to firmware V1.6.2.0). The vulnerability allows unauthorized users to decode the password using rainbow table.

Aug 29, 2018
7.5
CVE-2018-7789HIGH

An Improper Check for Unusual or Exceptional Conditions vulnerability exists in Schneider Electric's Modicon M221 product (all references, all versions prior to firmware V1.6.2.0). The vulnerability allows unauthorized users to remotely reboot Modicon M221 using crafted programing protocol frames.

Aug 29, 2018
7.5
CVE-2018-10632HIGH

In Moxa NPort 5210, 5230, and 5232 versions 2.9 build 17030709 and prior, the amount of resources requested by a malicious actor are not restricted, allowing for a denial-of-service condition.

Jul 24, 2018
7.5
CVE-2018-7783HIGH

Schneider Electric SoMachine Basic prior to v1.6 SP1 suffers from an XML External Entity (XXE) vulnerability using the DTD parameter entities technique resulting in disclosure and retrieval of arbitrary data on the affected node via out-of-band (OOB) attack. The vulnerability is triggered when input passed to the xml parser is not sanitized while parsing the xml project/template file.

Jul 3, 2018
7.5
CVE-2018-7779HIGH

In Schneider Electric Wiser for KNX V2.1.0 and prior, homeLYnk V2.0.1 and prior; and spaceLYnk V2.1.0 and prior, weak and unprotected FTP access could allow an attacker unauthorized access.

Jul 3, 2018
7.5
CVE-2018-1000531HIGH

inversoft prime-jwt version prior to commit abb0d479389a2509f939452a6767dc424bb5e6ba contains a CWE-20 vulnerability in JWTDecoder.decode that can result in an incorrect signature validation of a JWT token. This attack can be exploitable when an attacker crafts a JWT token with a valid header using 'none' as algorithm and a body to requests it be validated. This vulnerability was fixed after commit abb0d479389a2509f939452a6767dc424bb5e6ba.

Jun 26, 2018
7.5
CVE-2018-7503HIGH

In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, a path transversal vulnerability has been identified, which may allow an attacker to disclose sensitive information on the target.

May 15, 2018
7.5
CVE-2018-7501HIGH

In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, several SQL injection vulnerabilities have been identified, which may allow an attacker to disclose sensitive information from the host.

May 15, 2018
7.5
CVE-2018-7495HIGH

In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, an external control of file name or path vulnerability has been identified, which may allow an attacker to delete files.

May 15, 2018
7.5
CVE-2018-10590HIGH

In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, an information exposure vulnerability through directory listing has been identified, which may allow an attacker to find important files that are not normally visible.

May 15, 2018
7.5
CVE-2017-14439HIGH

Exploitable denial of service vulnerabilities exists in the Service Agent functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted packet can cause a denial of service. An attacker can send a large packet to 4001/tcp to trigger this vulnerability.

May 14, 2018
7.5
CVE-2017-14438HIGH

Exploitable denial of service vulnerabilities exists in the Service Agent functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted packet can cause a denial of service. An attacker can send a large packet to 4000/tcp to trigger this vulnerability.

May 14, 2018
7.5
CVE-2017-14437HIGH

An exploitable denial of service vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted HTTP URI can cause a null pointer dereference resulting in denial of service. An attacker can send a GET request to "/MOXA\_LOG.ini" without a cookie header to trigger this vulnerability.

May 14, 2018
7.5
CVE-2017-14436HIGH

An exploitable denial of service vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted HTTP URI can cause a null pointer dereference resulting in denial of service. An attacker can send a GET request to "/MOXA\_CFG2.ini" without a cookie header to trigger this vulnerability.

May 14, 2018
7.5
CVE-2017-14435HIGH

An exploitable denial of service vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted HTTP URI can cause a null pointer dereference resulting in denial of service. An attacker can send a GET request to "/MOXA\_CFG.ini" without a cookie header to trigger this vulnerability.

May 14, 2018
7.5
CVE-2017-12128HIGH

An exploitable information disclosure vulnerability exists in the Server Agent functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted TCP packet can cause information disclosure. An attacker can send a crafted TCP packet to trigger this vulnerability.

May 14, 2018
7.5
CVE-2017-6021HIGH

In Schneider Electric ClearSCADA 2014 R1 (build 75.5210) and prior, 2014 R1.1 (build 75.5387) and prior, 2015 R1 (build 76.5648) and prior, and 2015 R2 (build 77.5882) and prior, an attacker with network access to the ClearSCADA server can send specially crafted sequences of commands and data packets to the ClearSCADA server that can cause the ClearSCADA server process and ClearSCADA communications driver processes to terminate. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).

May 14, 2018
7.5
CVE-2018-7762HIGH

A vulnerability exists in the web services to process SOAP requests in Schneider Electric's Modicon M340, Modicon Premium, Modicon Quantum PLC, BMXNOR0200 which could allow result in a buffer overflow.

Apr 18, 2018
7.5
CVE-2018-7759HIGH

A buffer overflow vulnerability exists in Schneider Electric's Modicon M340, Modicon Premium, Modicon Quantum PLC, BMXNOR0200. The buffer overflow vulnerability is caused by the length of the source string specified (instead of the buffer size) as the number of bytes to be copied.

Apr 18, 2018
7.5
CVE-2014-8421HIGH

Unify (former Siemens) OpenStage SIP and OpenScape Desk Phone IP V3 devices before R3.32.0 allow remote attackers to gain super-user privileges by leveraging SSH access and incorrect ownership of (1) ConfigureCoreFile.sh, (2) Traceroute.sh, (3) apps.sh, (4) conversion_java2native.sh, (5) coreCompression.sh, (6) deletePasswd.sh, (7) findHealthSvcFDs.sh, (8) fw_printenv.sh, (9) fw_setenv.sh, (10) hw_wd_kicker.sh, (11) new_rootfs.sh, (12) opera_killSnmpd.sh, (13) opera_startSnmpd.sh, (14) rebootOperaSoftware.sh, (15) removeLogFiles.sh, (16) runOperaServices.sh, (17) setPasswd.sh, (18) startAccTestSvcs.sh, (19) usbNotification.sh, or (20) appWeb in /Opera_Deploy.

Apr 12, 2018
7.5
CVE-2018-7506HIGH

The private key of the web server in Moxa MXview versions 2.8 and prior is able to be read and accessed via an HTTP GET request, which may allow a remote attacker to decrypt encrypted information.

Apr 6, 2018
7.5
CVE-2018-7235HIGH

A vulnerability exists in Schneider Electric's Pelco Sarix Professional in all firmware versions prior to 3.29.67 which could allow arbitrary system file download due to lack of validation of the shell meta characters with the value of 'system.download.sd_file'

Mar 9, 2018
7.5
CVE-2018-7234HIGH

A vulnerability exists in Schneider Electric's Pelco Sarix Professional in all firmware versions prior to 3.29.67 which could allow arbitrary system file download due to lack of validation of SSL certificate.

Mar 9, 2018
7.5
CVE-2018-5453HIGH

An Improper Handling of Length Parameter Inconsistency issue was discovered in Moxa OnCell G3100-HSPA Series version 1.4 Build 16062919 and prior. An attacker may be able to edit the element of an HTTP request, causing the device to become unavailable.

Mar 5, 2018
7.5
CVE-2017-16736HIGH

An Unrestricted Upload Of File With Dangerous Type issue was discovered in Advantech WebAccess versions prior to 8.3. WebAccess allows a remote attacker to upload arbitrary files.

Jan 12, 2018
7.5
CVE-2017-16753HIGH

An Improper Input Validation issue was discovered in Advantech WebAccess versions prior to 8.3. WebAccess allows some inputs that may cause the program to crash.

Jan 5, 2018
7.5
CVE-2017-16728HIGH

An Untrusted Pointer Dereference issue was discovered in Advantech WebAccess versions prior to 8.3. There are multiple vulnerabilities that may allow an attacker to cause the program to use an invalid memory address, resulting in a program crash.

Jan 5, 2018
7.5
CVE-2017-14022HIGH

An Improper Input Validation issue was discovered in Rockwell Automation FactoryTalk Alarms and Events, Version 2.90 and earlier. An unauthenticated attacker with remote access to a network with FactoryTalk Alarms and Events can send a specially crafted set of packets packet to Port 403/TCP (the history archiver service), causing the service to either stall or terminate.

Dec 23, 2017
7.5
CVE-2017-13699HIGH

An issue was discovered on MOXA EDS-G512E 5.1 build 16072215 devices. The password encryption method can be retrieved from the firmware. This encryption method is based on a chall value that is sent in cleartext as a POST parameter. An attacker could reverse the password encryption algorithm to retrieve it.

Nov 23, 2017
7.5
CVE-2017-13698HIGH

An issue was discovered on MOXA EDS-G512E 5.1 build 16072215 devices. An attacker could extract public and private keys from the firmware image available on the MOXA website and could use them against a production switch that has the default keys embedded.

Nov 23, 2017
7.5
CVE-2017-13703HIGH

An issue was discovered on MOXA EDS-G512E 5.1 build 16072215 devices. A denial of service may occur.

Nov 17, 2017
7.5
CVE-2017-16719HIGH

An Injection issue was discovered in Moxa NPort 5110 Version 2.2, NPort 5110 Version 2.4, NPort 5110 Version 2.6, NPort 5110 Version 2.7, NPort 5130 Version 3.7 and prior, and NPort 5150 Version 3.7 and prior. An attacker may be able to inject packets that could potentially disrupt the availability of the device.

Nov 16, 2017
7.5
CVE-2017-16715HIGH

An Information Exposure issue was discovered in Moxa NPort 5110 Version 2.2, NPort 5110 Version 2.4, NPort 5110 Version 2.6, NPort 5110 Version 2.7, NPort 5130 Version 3.7 and prior, and NPort 5150 Version 3.7 and prior. An attacker may be able to exploit a flaw in the handling of Ethernet frame padding that may allow for information exposure.

Nov 16, 2017
7.5
CVE-2017-14028HIGH

A Resource Exhaustion issue was discovered in Moxa NPort 5110 Version 2.2, NPort 5110 Version 2.4, NPort 5110 Version 2.6, NPort 5110 Version 2.7, NPort 5130 Version 3.7 and prior, and NPort 5150 Version 3.7 and prior. An attacker may be able to exhaust memory resources by sending a large amount of TCP SYN packets.

Nov 16, 2017
7.5
CVE-2017-12719HIGH

An Untrusted Pointer Dereference issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. A remote attacker is able to execute code to dereference a pointer within the program causing the application to become unavailable.

Nov 6, 2017
7.5
CVE-2017-9946HIGH

A vulnerability has been identified in Siemens APOGEE PXC and TALON TC BACnet Automation Controllers in all versions <V3.5. An attacker with network access to the integrated web server (80/tcp and 443/tcp) could bypass the authentication and download sensitive information from the device.

Oct 23, 2017
7.5
CVE-2017-9962HIGH

Schneider Electric's ClearSCADA versions released prior to August 2017 are susceptible to a memory allocation vulnerability, whereby malformed requests can be sent to ClearSCADA client applications to cause unexpected behavior. Client applications affected include ViewX and the Server Icon.

Sep 26, 2017
7.5
CVE-2017-7924HIGH

An Improper Input Validation issue was discovered in Rockwell Automation MicroLogix 1100 controllers 1763-L16BWA, 1763-L16AWA, 1763-L16BBB, and 1763-L16DWD. A remote, unauthenticated attacker could send a single, specially crafted Programmable Controller Communication Commands (PCCC) packet to the controller that could potentially cause the controller to enter a DoS condition.

Sep 20, 2017
7.5
CVE-2017-12734HIGH

A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V1.81.2). An attacker with network access to the integrated web server on port 80/tcp could obtain the session ID of an active user session. A user must be logged in to the web interface. Siemens recommends to use the integrated webserver on port 80/tcp only in trusted networks.

Aug 30, 2017
7.5
CVE-2017-12710HIGH

A SQL Injection issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. By submitting a specially crafted parameter, it is possible to inject arbitrary SQL statements that could allow an attacker to obtain sensitive information.

Aug 30, 2017
7.5
CVE-2017-9938HIGH

A vulnerability was discovered in Siemens SIMATIC Logon (All versions before V1.6) that could allow specially crafted packets sent to the SIMATIC Logon Remote Access service on port 16389/tcp to cause a Denial-of-Service condition. The service restarts automatically.

Aug 8, 2017
7.5
CVE-2017-7920HIGH

An Improper Authentication issue was discovered in ABB VSN300 WiFi Logger Card versions 1.8.15 and prior, and VSN300 WiFi Logger Card for React versions 2.1.3 and prior. By accessing a specific uniform resource locator (URL) on the web server, a malicious user is able to access internal information about status and connected devices without authenticating.

Aug 7, 2017
7.5
CVE-2017-9631HIGH

A Null Pointer Dereference issue was discovered in Schneider Electric Wonderware ArchestrA Logger, versions 2017.426.2307.1 and prior. The null pointer dereference vulnerability could allow an attacker to crash the logger process, causing a denial of service for logging and log-viewing (applications that use the Wonderware ArchestrA Logger continue to run when the Wonderware ArchestrA Logger service is unavailable).

Jul 7, 2017
7.5
CVE-2017-6017HIGH

A Resource Exhaustion issue was discovered in Schneider Electric Modicon M340 PLC BMXNOC0401, BMXNOE0100, BMXNOE0110, BMXNOE0110H, BMXNOR0200H, BMXP341000, BMXP342000, BMXP3420102, BMXP3420102CL, BMXP342020, BMXP342020H, BMXP342030, BMXP3420302, BMXP3420302H, and BMXP342030H. A remote attacker could send a specially crafted set of packets to the PLC causing it to freeze, requiring the operator to physically press the reset button on the PLC in order to recover.

Jun 30, 2017
7.5
CVE-2017-7935HIGH

A Resource Exhaustion issue was discovered in Phoenix Contact GmbH mGuard firmware versions 8.3.0 to 8.4.2. An attacker may compromise the device's availability by performing multiple initial VPN requests.

May 19, 2017
7.5
CVE-2017-7456HIGH

Moxa MXView 2.8 allows remote attackers to cause a Denial of Service by sending overly long junk payload for the MXView client login credentials.

Apr 14, 2017
7.5
CVE-2017-7455HIGH

Moxa MXView 2.8 allows remote attackers to read web server's private key file, no access control.

Apr 14, 2017
7.5
CVE-2016-8727HIGH

An exploitable information disclosure vulnerability exists in the Web Application functionality of Moxa AWK-3131A Wireless Access Point. Retrieving a series of URLs without authentication can reveal sensitive configuration and system information to an attacker.

Apr 13, 2017
7.5
CVE-2016-8726HIGH

An exploitable null pointer dereference vulnerability exists in the Web Application /forms/web_runScript iw_filename functionality of Moxa AWK-3131A Wireless Access Point running firmware 1.1. An HTTP POST request with a blank line in the header will cause a segmentation fault in the web server.

Apr 13, 2017
7.5
CVE-2016-8723HIGH

An exploitable null pointer dereference exists in the Web Application functionality of Moxa AWK-3131A Wireless Access Point running firmware 1.1. Any HTTP GET request not preceded by an '/' will cause a segmentation fault in the web server. An attacker can send any of a multitude of potentially unexpected HTTP get requests to trigger this vulnerability.

Apr 13, 2017
7.5
CVE-2016-8716HIGH

An exploitable Cleartext Transmission of Password vulnerability exists in the Web Application functionality of Moxa AWK-3131A Wireless Access Point running firmware 1.1. The Change Password functionality of the Web Application transmits the password in cleartext. An attacker capable of intercepting this traffic is able to obtain valid credentials.

Apr 12, 2017
7.5
CVE-2017-6019HIGH

An issue was discovered in Schneider Electric Conext ComBox, model 865-1058, all firmware versions prior to V3.03 BN 830. A series of rapid requests to the device may cause it to reboot.

Apr 7, 2017
7.5
CVE-2016-9367HIGH

An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. The amount of resources requested by a malicious actor is not restricted, leading to a denial-of-service caused by resource exhaustion.

Feb 13, 2017
7.5
CVE-2016-9349HIGH

An issue was discovered in Advantech SUISAccess Server Version 3.0 and prior. An attacker could traverse the file system and extract files that can result in information disclosure.

Feb 13, 2017
7.5
CVE-2016-9344HIGH

An issue was discovered in Moxa MiiNePort E1 versions prior to 1.8, E2 versions prior to 1.4, and E3 versions prior to 1.1. An attacker may be able to brute force an active session cookie to be able to download configuration files.

Feb 13, 2017
7.5
CVE-2016-9332HIGH

An issue was discovered in Moxa SoftCMS versions prior to Version 1.6. Moxa SoftCMS Webserver does not properly validate input. An attacker could provide unexpected values and cause the program to crash or excessive consumption of resources could result in a denial-of-service condition.

Feb 13, 2017
7.5
CVE-2016-8374HIGH

An issue was discovered in Schneider Electric Magelis HMI Magelis GTO Advanced Optimum Panels, all versions, Magelis GTU Universal Panel, all versions, Magelis STO5xx and STU Small panels, all versions, Magelis XBT GH Advanced Hand-held Panels, all versions, Magelis XBT GK Advanced Touchscreen Panels with Keyboard, all versions, Magelis XBT GT Advanced Touchscreen Panels, all versions, and Magelis XBT GTW Advanced Open Touchscreen Panels (Windows XPe). An attacker may be able to disrupt a targeted web server, resulting in a denial of service because of UNCONTROLLED RESOURCE CONSUMPTION.

Feb 13, 2017
7.5
CVE-2016-8370HIGH

An issue was discovered in Mitsubishi Electric Automation MELSEC-Q series Ethernet interface modules QJ71E71-100, all versions, QJ71E71-B5, all versions, and QJ71E71-B2, all versions. Weakly encrypted passwords are transmitted to a MELSEC-Q PLC.

Feb 13, 2017
7.5
CVE-2016-8346HIGH

An issue was discovered in Moxa EDR-810 Industrial Secure Router. By accessing a specific uniform resource locator (URL) on the web server, a malicious user is able to access configuration and log files (PRIVILEGE ESCALATION).

Feb 13, 2017
7.5
CVE-2016-7987HIGH

An issue was discovered in Siemens ETA4 firmware (all versions prior to Revision 08) of the SM-2558 extension module for: SICAM AK, SICAM TM 1703, SICAM BC 1703, and SICAM AK 3. Specially crafted packets sent to Port 2404/TCP could cause the affected device to go into defect mode. A cold start might be required to recover the system, a Denial-of-Service Vulnerability.

Feb 13, 2017
7.5
CVE-2016-9154HIGH

Siemens Desigo PX Web modules PXA40-W0, PXA40-W1, PXA40-W2 for Desigo PX automation controllers PXC00-E.D, PXC50-E.D, PXC100-E.D, PXC200-E.D (All firmware versions < V6.00.046) and Desigo PX Web modules PXA30-W0, PXA30-W1, PXA30-W2 for Desigo PX automation controllers PXC00-U, PXC64-U, PXC128-U (All firmware versions < V6.00.046) use a pseudo random number generator with insufficient entropy to generate certificates for HTTPS, potentially allowing remote attackers to reconstruct the corresponding private key.

Dec 23, 2016
7.5
CVE-2016-8563HIGH

Siemens Automation License Manager (ALM) before 5.3 SP3 Update 1 allows remote attackers to cause a denial of service (ALM service outage) via crafted packets to TCP port 4410.

Oct 13, 2016
7.5
CVE-2016-4526HIGH

ABB DataManagerPro 1.x before 1.7.1 allows local users to gain privileges by replacing a DLL file in the package directory.

Sep 19, 2016
7.5
CVE-2016-5874HIGH

Siemens SIMATIC NET PC-Software before 13 SP2 allows remote attackers to cause a denial of service (OPC UA service outage) via crafted TCP packets.

Jul 22, 2016
7.5
CVE-2016-5744HIGH

Siemens SIMATIC WinCC 7.0 through SP3 and 7.2 allows remote attackers to read arbitrary WinCC station files via crafted packets.

Jul 22, 2016
7.5
CVE-2016-3949HIGH

Siemens SIMATIC S7-300 Profinet-enabled CPU devices with firmware before 3.2.12 and SIMATIC S7-300 Profinet-disabled CPU devices with firmware before 3.3.12 allow remote attackers to cause a denial of service (defect-mode transition) via crafted (1) ISO-TSAP or (2) Profibus packets.

Jun 27, 2016
7.5
CVE-2016-2295HIGH

Moxa MiiNePort_E1_4641 devices with firmware 1.1.10 Build 09120714, MiiNePort_E1_7080 devices with firmware 1.1.10 Build 09120714, MiiNePort_E2_1242 devices with firmware 1.1 Build 10080614, MiiNePort_E2_4561 devices with firmware 1.1 Build 10080614, and MiiNePort E3 devices with firmware 1.0 Build 11071409 allow remote attackers to obtain sensitive cleartext information by reading a configuration file.

May 31, 2016
7.5
CVE-2016-2286HIGH

Moxa MiiNePort_E1_4641 devices with firmware 1.1.10 Build 09120714, MiiNePort_E1_7080 devices with firmware 1.1.10 Build 09120714, MiiNePort_E2_1242 devices with firmware 1.1 Build 10080614, MiiNePort_E2_4561 devices with firmware 1.1 Build 10080614, and MiiNePort E3 devices with firmware 1.0 Build 11071409 have a blank default password, which allows remote attackers to obtain access via unspecified vectors.

May 31, 2016
7.5
CVE-2016-0879HIGH

Moxa Secure Router EDR-G903 devices before 3.4.12 do not delete copies of configuration and log files after completing the import function, which allows remote attackers to obtain sensitive information by requesting these files at an unspecified URL.

May 31, 2016
7.5
CVE-2016-0878HIGH

Moxa Secure Router EDR-G903 devices before 3.4.12 allow remote attackers to cause a denial of service (cold start) by sending two crafted ping requests.

May 31, 2016
7.5
CVE-2016-0877HIGH

Memory leak on Moxa Secure Router EDR-G903 devices before 3.4.12 allows remote attackers to cause a denial of service (memory consumption) by executing the ping function.

May 31, 2016
7.5
CVE-2016-0876HIGH

Moxa Secure Router EDR-G903 devices before 3.4.12 allow remote attackers to discover cleartext passwords by reading a configuration file.

May 31, 2016
7.5
CVE-2016-0875HIGH

Moxa Secure Router EDR-G903 devices before 3.4.12 allow remote attackers to read configuration and log files via a crafted URL.

May 31, 2016
7.5
CVE-2016-2280HIGH

Buffer overflow in RDISERVER in Honeywell Uniformance Process History Database (PHD) R310, R320, and R321 allows remote attackers to cause a denial of service (service outage) via unspecified vectors.

Apr 21, 2016
7.5
CVE-2016-2200HIGH

Siemens SIMATIC S7-1500 CPU devices before 1.8.3 allow remote attackers to cause a denial of service (STOP mode transition) via crafted packets on TCP port 102.

Feb 8, 2016
7.5
CVE-2016-0860HIGH

Buffer overflow in the BwpAlarm subsystem in Advantech WebAccess before 8.1 allows remote attackers to cause a denial of service via a crafted RPC request.

Jan 15, 2016
7.5
CVE-2016-0855HIGH

Directory traversal vulnerability in Advantech WebAccess before 8.1 allows remote attackers to list arbitrary virtual-directory files via unspecified vectors.

Jan 15, 2016
7.5
CVE-2016-0853HIGH

Advantech WebAccess before 8.1 allows remote attackers to obtain sensitive information via crafted input.

Jan 15, 2016
7.5
CVE-2016-0852HIGH

Advantech WebAccess before 8.1 allows remote attackers to bypass an intended administrative requirement and obtain file or folder access via unspecified vectors.

Jan 15, 2016
7.5
CVE-2016-0851HIGH

Advantech WebAccess before 8.1 allows remote attackers to cause a denial of service (out-of-bounds memory access) via unspecified vectors.

Jan 15, 2016
7.5
CVE-2015-7375HIGH

Schneider Electric InduSoft Web Studio before 8.0 allows remote attackers to execute arbitrary code or cause a denial of service (unhandled runtime exception and application crash) via a crafted Indusoft Project file.

Sep 25, 2015
7.5
CVE-2015-7374HIGH

The Remote Agent component in Schneider Electric InduSoft Web Studio before 8.0 allows remote attackers to execute arbitrary code via unspecified vectors, aka ZDI-CAN-2649.

Sep 25, 2015
7.5
CVE-2015-6460HIGH

Multiple heap-based buffer overflows in 3S-Smart CODESYS Gateway Server before 2.3.9.34 allow remote attackers to execute arbitrary code via opcode (1) 0x3ef or (2) 0x3f0.

Sep 18, 2015
7.5
CVE-2015-5698HIGH

Cross-site request forgery (CSRF) vulnerability in the web server on Siemens SIMATIC S7-1200 CPU devices with firmware before 4.1.3 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.

Aug 30, 2015
7.5
CVE-2015-0986HIGH

Multiple stack-based buffer overflows in Moxa VPort ActiveX SDK Plus before 2.8 allow remote attackers to insert assembly-code lines via vectors involving a regkey (1) set or (2) get command.

May 26, 2015
7.5
CVE-2015-0982HIGH

Buffer overflow in an unspecified DLL in Schneider Electric Pelco DS-NVs before 7.8.90 allows remote attackers to execute arbitrary code via unspecified vectors.

Mar 14, 2015
7.5
CVE-2014-9200HIGH

Stack-based buffer overflow in an unspecified DLL file in a DTM development kit in Schneider Electric Unity Pro, SoMachine, SoMove, SoMove Lite, Modbus Communication Library 2.2.6 and earlier, CANopen Communication Library 1.0.2 and earlier, EtherNet/IP Communication Library 1.0.0 and earlier, EM X80 Gateway DTM (MB TCP/SL), Advantys DTM for OTB, Advantys DTM for STB, KINOS DTM, SOLO DTM, and Xantrex DTMs allows remote attackers to execute arbitrary code via unspecified vectors.

Feb 1, 2015
7.5
CVE-2014-8386HIGH

Multiple stack-based buffer overflows in Advantech AdamView 4.3 and earlier allow remote attackers to execute arbitrary code via a crafted (1) display properties or (2) conditional bitmap parameter in a GNI file.

Jan 20, 2015
7.5
CVE-2014-8514HIGH

Buffer overflow in an ActiveX control in MDraw30.ocx in Schneider Electric ProClima before 6.1.7 allows remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-8513 and CVE-2014-9188. NOTE: this may be clarified later based on details provided by researchers.

Dec 27, 2014
7.5
CVE-2014-8513HIGH

Buffer overflow in an ActiveX control in MDraw30.ocx in Schneider Electric ProClima before 6.1.7 allows remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-8514 and CVE-2014-9188. NOTE: this may be clarified later based on details provided by researchers.

Dec 27, 2014
7.5
CVE-2014-8512HIGH

Buffer overflow in an ActiveX control in Atx45.ocx in Schneider Electric ProClima before 6.1.7 allows remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-8511. NOTE: this may be clarified later based on details provided by researchers.

Dec 27, 2014
7.5
CVE-2014-5208HIGH

BKBCopyD.exe in the Batch Management Packages in Yokogawa CENTUM CS 3000 through R3.09.50 and CENTUM VP through R4.03.00 and R5.x through R5.04.00, and Exaopc through R3.72.10, does not require authentication, which allows remote attackers to read arbitrary files via a RETR operation, write to arbitrary files via a STOR operation, or obtain sensitive database-location information via a PMODE operation, a different vulnerability than CVE-2014-0784.

Dec 22, 2014
7.5
CVE-2014-8269HIGH

Multiple stack-based buffer overflows in (1) HWOPOSScale.ocx and (2) HWOPOSSCANNER.ocx in Honeywell OPOS Suite before 1.13.4.15 allow remote attackers to execute arbitrary code via a crafted file that is improperly handled by the Open method.

Dec 13, 2014
7.5
CVE-2014-5424HIGH

Rockwell Automation Connected Components Workbench (CCW) before 7.00.00 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an invalid property value to an ActiveX control that was built with an outdated compiler.

Nov 14, 2014
7.5
CVE-2014-5399HIGH

SQL injection vulnerability in Schneider Electric Wonderware Information Server (WIS) Portal 4.0 SP1 through 5.5 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.

Aug 28, 2014
7.5
CVE-2014-5397HIGH

Cross-site scripting (XSS) vulnerability in Schneider Electric Wonderware Information Server (WIS) Portal 4.0 SP1 through 5.5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Aug 28, 2014
7.5
CVE-2014-2368HIGH

The BrowseFolder method in the bwocxrun ActiveX control in Advantech WebAccess before 7.2 allows remote attackers to read arbitrary files via a crafted call.

Jul 19, 2014
7.5
CVE-2014-2367HIGH

The ChkCookie subroutine in an ActiveX control in broadweb/include/gChkCook.asp in Advantech WebAccess before 7.2 allows remote attackers to read arbitrary files via a crafted call.

Jul 19, 2014
7.5
CVE-2014-2364HIGH

Multiple stack-based buffer overflows in Advantech WebAccess before 7.2 allow remote attackers to execute arbitrary code via a long string in the (1) ProjectName, (2) SetParameter, (3) NodeName, (4) CCDParameter, (5) SetColor, (6) AlarmImage, (7) GetParameter, (8) GetColor, (9) ServerResponse, (10) SetBaud, or (11) IPAddress parameter to an ActiveX control in (a) webvact.ocx, (b) dvs.ocx, or (c) webdact.ocx.

Jul 19, 2014
7.5
CVE-2014-1697HIGH

The integrated web server in Siemens SIMATIC WinCC OA before 3.12 P002 January allows remote attackers to execute arbitrary code via crafted packets to TCP port 4999.

Feb 7, 2014
7.5
CVE-2013-3958HIGH

The login implementation in the Web Navigator in Siemens WinCC before 7.2 Update 1, as used in SIMATIC PCS7 8.0 SP1 and earlier and other products, has a hardcoded account, which makes it easier for remote attackers to obtain access via an unspecified request.

Jun 14, 2013
7.5
CVE-2013-3957HIGH

SQL injection vulnerability in the login screen in the Web Navigator in Siemens WinCC before 7.2 Update 1, as used in SIMATIC PCS7 8.0 SP1 and earlier and other products, allows remote attackers to execute arbitrary SQL commands via unspecified vectors.

Jun 14, 2013
7.5
CVE-2012-3032HIGH

SQL injection vulnerability in WebNavigator in Siemens WinCC 7.0 SP3 and earlier, as used in SIMATIC PCS7 and other products, allows remote attackers to execute arbitrary SQL commands via a crafted SOAP message.

Sep 18, 2012
7.5
CVE-2012-0254HIGH

Stack-based buffer overflow in the HMIWeb Browser HSCDSPRenderDLL ActiveX control in Honeywell Process Solutions (HPS) Experion R2xx, R30x, R31x, and R400.x; Honeywell Building Solutions (HBS) Enterprise Building Manager R400 and R410.1; and Honeywell Environmental Combustion and Controls (ECC) SymmetrE R410.1 allows remote attackers to execute arbitrary code via unspecified vectors.

Sep 8, 2012
7.5
CVE-2012-3020HIGH

The Siemens Synco OZW Web Server devices OZW672.*, OZW772.*, and OZW775 with firmware before 4 have an unspecified default password, which makes it easier for remote attackers to obtain administrative access via a network session.

Aug 6, 2012
7.5
CVE-2012-0244HIGH

Multiple SQL injection vulnerabilities in Advantech/BroadWin WebAccess before 7.0 allow remote attackers to execute arbitrary SQL commands via crafted string input.

Feb 21, 2012
7.5
CVE-2012-0234HIGH

SQL injection vulnerability in Advantech/BroadWin WebAccess before 7.0 allows remote attackers to execute arbitrary SQL commands via a malformed URL.

Feb 21, 2012
7.5
CVE-2011-4521HIGH

SQL injection vulnerability in Advantech/BroadWin WebAccess before 7.0 allows remote attackers to execute arbitrary SQL commands via crafted string input.

Feb 21, 2012
7.5
CVE-2012-0929HIGH

Multiple buffer overflows in Schneider Electric Modicon Quantum PLC allow remote attackers to cause a denial of service via malformed requests to the (1) FTP server or (2) HTTP server.

Jan 28, 2012
7.5
CVE-2011-4529HIGH

Multiple buffer overflows in Siemens Automation License Manager (ALM) 4.0 through 5.1+SP1+Upd1 allow remote attackers to execute arbitrary code via a long serialid field in an _licensekey command, as demonstrated by the (1) check_licensekey or (2) read_licensekey command.

Jan 8, 2012
7.5
CVE-2011-5008HIGH

Integer overflow in the GatewayService component in 3S CoDeSys 3.4 SP4 Patch 2 allows remote attackers to execute arbitrary code via a large size value in the packet header, which triggers a heap-based buffer overflow.

Dec 25, 2011
7.5
CVE-2010-0985HIGH

Directory traversal vulnerability in the Abbreviations Manager (com_abbrev) component 1.1 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information.

Mar 16, 2010
7.5
CVE-2006-3344HIGH

Siemens Speedstream Wireless Router 2624 allows local users to bypass authentication and access protected files by using the Universal Plug and Play UPnP/1.0 component.

Jul 3, 2006
7.5
CVE-2005-2424HIGH

The management interface for Siemens SANTIS 50 running firmware 4.2.8.0, and possibly other products including Ericsson HN294dp and Dynalink RTA300W, allows remote attackers to access the Telnet port without authentication via certain packets to the web interface that cause the interface to freeze.

Aug 3, 2005
7.5
CVE-2025-9970HIGH

Cleartext Storage of Sensitive Information in Memory vulnerability in ABB MConfig.This issue affects MConfig: through 1.4.9.21.

Oct 8, 2025
7.4
CVE-2023-5396HIGH

Server receiving a malformed message creates connection for a hostname that may cause a stack overflow resulting in possible remote code execution. See Honeywell Security Notification for recommendations on upgrading and versioning.

Apr 17, 2024
7.4
CVE-2023-5394HIGH

Server receiving a malformed message that where the GCL message hostname may be too large which may cause a stack overflow; resulting in possible remote code execution. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning.

Apr 11, 2024
7.4
CVE-2023-5393HIGH

Server receiving a malformed message that causes a disconnect to a hostname may causing a stack overflow resulting in possible remote code execution. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning.

Apr 11, 2024
7.4
CVE-2023-35134HIGH

Weintek Weincloud v0.13.6 could allow an attacker to reset a password with the corresponding account’s JWT token only.

Jul 19, 2023
7.4
CVE-2022-27048HIGH

A vulnerability has been discovered in Moxa MGate which allows an attacker to perform a man-in-the-middle (MITM) attack on the device. This affects MGate MB3170 Series Firmware Version 4.2 or lower. and MGate MB3270 Series Firmware Version 4.2 or lower. and MGate MB3280 Series Firmware Version 4.1 or lower. and MGate MB3480 Series Firmware Version 3.2 or lower.

Apr 15, 2022
7.4
CVE-2021-34599HIGH

Affected versions of CODESYS Git in Versions prior to V1.1.0.0 lack certificate validation in HTTPS handshakes. CODESYS Git does not implement certificate validation by default, so it does not verify that the server provides a valid and trusted HTTPS certificate. Since the certificate of the server to which the connection is made is not properly verified, the server connection is vulnerable to a man-in-the-middle attack.

Dec 1, 2021
7.4
CVE-2021-21004HIGH

In Phoenix Contact FL SWITCH SMCS series products in multiple versions an attacker may insert malicious code via LLDP frames into the web-based management which could then be executed by the client.

Jun 25, 2021
7.4
CVE-2018-4849HIGH

A vulnerability has been identified in Siveillance VMS Video for Android (All versions < V12.1a (2018 R1)), Siveillance VMS Video for iOS (All versions < V12.1a (2018 R1)). Improper certificate validation could allow an attacker in a privileged network position to read data from and write data to the encrypted communication channel between the app and a server. The security vulnerability could be exploited by an attacker in a privileged network position which allows intercepting the communication channel between the affected app and a server (such as Man-in-the-Middle). Furthermore, an attacker must be able to generate a certificate that results for the validation algorithm in a checksum identical to a trusted certificate. Successful exploitation requires no user interaction. The vulnerability could allow reading data from and writing data to the encrypted communication channel between the app and a server, impacting the communication's confidentiality and integrity. At the time of advisory publication no public exploitation of this security vulnerability was known. Siemens confirms the security vulnerability and provides mitigations to resolve the security issue.

May 3, 2018
7.4
CVE-2017-9941HIGH

A vulnerability was discovered in Siemens SiPass integrated (All versions before V2.70) that could allow an attacker in a Man-in-the-Middle position between the SiPass integrated server and SiPass integrated clients to read or modify the network communication.

Aug 8, 2017
7.4
CVE-2017-6873HIGH

A vulnerability was discovered in Siemens OZW672 (all versions) and OZW772 (all versions) that could allow an attacker to read and manipulate data in TLS sessions while performing a man-in-the-middle (MITM) attack on the integrated web server on port 443/tcp.

Aug 8, 2017
7.4
CVE-2017-6870HIGH

A vulnerability was discovered in Siemens SIMATIC WinCC Sm@rtClient for Android (All versions before V1.0.2.2). The existing TLS protocol implementation could allow an attacker to read and modify data within a TLS session while performing a Man-in-the-Middle (MitM) attack.

Aug 8, 2017
7.4
CVE-2017-2685HIGH

Siemens SINUMERIK Integrate Operate Clients between 2.0.3.00.016 (including) and 2.0.6 (excluding) and between 3.0.4.00.032 (including) and 3.0.6 (excluding) contain a vulnerability that could allow an attacker to read and manipulate data in TLS sessions while performing a man-in-the-middle (MITM) attack.

Mar 1, 2017
7.4
CVE-2026-2364HIGH

If a legitimate user confirms a self-update prompt or initiate an installation of a CODESYS Development System, a low privileged local attacker can gain elevated rights due to a TOCTOU vulnerability in the CODESYS installer.

Mar 10, 2026
7.3
CVE-2025-11918HIGH

Rockwell Automation Arena® suffers from a stack-based buffer overflow vulnerability. The specific flaw exists within the parsing of DOE files. Local attackers are able to exploit this issue to potentially execute arbitrary code on affected installations of Arena®. Exploiting the vulnerability requires opening a malicious DOE file.

Nov 14, 2025
7.3
CVE-2025-58320HIGH

Delta Electronics DIALink has an Directory Traversal Authentication Bypass Vulnerability.

Sep 11, 2025
7.3
CVE-2025-7405HIGH

Missing Authentication for Critical Function vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series CPU module allows a remote unauthenticated attacker to read or write the device values of the product and stop the operation of the programs, since MODBUS/TCP in the products does not have authentication features.

Sep 1, 2025
7.3
CVE-2025-47728HIGH

Delta Electronics CNCSoft-G2 lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.

Jun 4, 2025
7.3
CVE-2025-47727HIGH

Delta Electronics CNCSoft lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.

Jun 4, 2025
7.3
CVE-2025-47726HIGH

Delta Electronics CNCSoft lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.

Jun 4, 2025
7.3
CVE-2025-47725HIGH

Delta Electronics CNCSoft lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.

Jun 4, 2025
7.3
CVE-2025-47724HIGH

Delta Electronics CNCSoft lacks proper validation of the user-supplied file. If a user opens a malicious file, an attacker can leverage this vulnerability to execute code in the context of the current process.

Jun 4, 2025
7.3
CVE-2024-9876HIGH

: Modification of Assumed-Immutable Data (MAID) vulnerability in ABB ANC, ABB ANC-L, ABB ANC-mini.This issue affects ANC: through 1.1.4; ANC-L: through 1.1.4; ANC-mini: through 1.1.4.

Apr 30, 2025
7.3
CVE-2024-12672HIGH

A third-party vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to write beyond the boundaries of allocated memory in a DOE file. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.

Dec 19, 2024
7.3
CVE-2024-11364HIGH

Another “uninitialized variable” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to access a variable prior to it being initialized. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.

Dec 19, 2024
7.3
CVE-2024-11157HIGH

A third-party vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to write beyond the boundaries of allocated memory in a DOE file. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.

Dec 19, 2024
7.3
CVE-2024-50376HIGH

A CWE-79 "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The vulnerability can be exploited remotely leveraging a rogue Wi-Fi access point with a malicious SSID.

Nov 26, 2024
7.3
CVE-2023-3662HIGH

In CODESYS Development System versions from 3.5.17.0 and prior to 3.5.19.20 a vulnerability allows for execution of binaries from the current working directory in the users context .

Aug 3, 2023
7.3
CVE-2023-3670HIGH

In CODESYS Development System 3.5.9.0 to 3.5.17.0 and CODESYS Scripting 4.0.0.0 to 4.1.0.0 unsafe directory permissions would allow an attacker with local access to the workstation to place potentially harmful and disguised scripts that could be executed by legitimate users.

Jul 28, 2023
7.3
CVE-2023-2637HIGH

Rockwell Automation's FactoryTalk System Services uses a hard-coded cryptographic key to generate administrator cookies.  Hard-coded cryptographic key may lead to privilege escalation.  This vulnerability may allow a local, authenticated non-admin user to generate an invalid administrator cookie giving them administrative privileges to the FactoryTalk Policy Manger database. This may allow the threat actor to make malicious changes to the database that will be deployed when a legitimate FactoryTalk Policy Manager user deploys a security policy model. User interaction is required for this vulnerability to be successfully exploited.

Jun 13, 2023
7.3
CVE-2023-2866HIGH

If an attacker can trick an authenticated user into loading a maliciously crafted .zip file onto Advantech WebAccess version 8.4.5, a web shell could be used to give the attacker full control of the SCADA server.

Jun 7, 2023
7.3
CVE-2019-6834HIGH

A CWE-502: Deserialization of Untrusted Data vulnerability exists which could allow an attacker to execute arbitrary code on the targeted system with SYSTEM privileges when placing a malicious user to be authenticated for this vulnerability to be successfully exploited. Affected Product: Schneider Electric Software Update (SESU) SUT Service component (V2.1.1 to V2.3.0)

Apr 13, 2022
7.3
CVE-2021-33540HIGH

In certain devices of the Phoenix Contact AXL F BK and IL BK product families an undocumented password protected FTP access to the root directory exists.

Jun 25, 2021
7.3
CVE-2021-29242HIGH

CODESYS Control Runtime system before 3.5.17.0 has improper input validation. Attackers can send crafted communication packets to change the router's addressing scheme and may re-route, add, remove or change low level communication packages.

May 3, 2021
7.3
CVE-2020-12510HIGH

The default installation path of the TwinCAT XAR 3.1 software in all versions is underneath C:\TwinCAT. If the directory does not exist it and further subdirectories are created with permissions which allow every local user to modify the content. The default installation registers TcSysUI.exe for automatic execution upon log in of a user. If a less privileged user has a local account he or she can replace TcSysUI.exe. It will be executed automatically by another user during login. This is also true for users with administrative access. Consequently, a less privileged user can trick a higher privileged user into executing code he or she modified this way. By default Beckhoff’s IPCs are shipped with TwinCAT software installed this way and with just a single local user configured. Thus the vulnerability exists if further less privileged users have been added.

Nov 19, 2020
7.3
CVE-2020-12028HIGH

In all versions of FactoryTalk View SEA remote, an authenticated attacker may be able to utilize certain handlers to interact with the data on the remote endpoint since those handlers do not enforce appropriate permissions. Rockwell Automation recommends enabling built in security features found within FactoryTalk View SE. Users should follow guidance found in knowledge base articles 109056 and 1126943 to set up IPSec and/or HTTPs.

Jul 20, 2020
7.3
CVE-2020-8473HIGH

Insufficient folder permissions used by system functions in ABB System 800xA Base (version 6.1 and earlier) allow low privileged users to read, modify, add and delete system and application files. An authenticated attacker who successfully exploit the vulnerabilities could escalate his/her privileges, cause system functions to stop and to corrupt user applications.

Apr 29, 2020
7.3
CVE-2019-7227HIGH

In the ABB IDAL FTP server, an authenticated attacker can traverse to arbitrary directories on the hard disk with "CWD ../" and then use the FTP server functionality to download and upload files. An unauthenticated attacker can take advantage of the hardcoded or default credential pair exor/exor to become an authenticated attacker.

Jun 27, 2019
7.3
CVE-2015-1014HIGH

A successful exploit of these vulnerabilities requires the local user to load a crafted DLL file in the system directory on servers running Schneider Electric OFS v3.5 with version v7.40 of SCADA Expert Vijeo Citect/CitectSCADA, OFS v3.5 with version v7.30 of Vijeo Citect/CitectSCADA, and OFS v3.5 with version v7.20 of Vijeo Citect/CitectSCADA.. If the application attempts to open that file, the application could crash or allow the attacker to execute arbitrary code. Schneider Electric recommends vulnerable users upgrade the OFS to V3.5 and install the latest service pack (SP 6 or newer) for their associated version.

Mar 25, 2019
7.3
CVE-2016-8380HIGH

The web server in Phoenix Contact ILC PLCs allows access to read and write PLC variables without authentication.

Apr 5, 2018
7.3
CVE-2016-8371HIGH

The web server in Phoenix Contact ILC PLCs can be accessed without authenticating even if the authentication mechanism is enabled.

Apr 5, 2018
7.3
CVE-2016-8366HIGH

Webvisit in Phoenix Contact ILC PLCs offers a password macro to protect HMI pages on the PLC against casual or coincidental opening of HMI pages by the user. The password macro can be configured in a way that the password is stored and transferred in clear text.

Apr 5, 2018
7.3
CVE-2017-9956HIGH

An authentication bypass vulnerability exists in Schneider Electric's U.motion Builder software versions 1.2.1 and prior in which the system contains a hard-coded valid session. An attacker can use that session ID as part of the HTTP cookie of a web request, resulting in authentication bypass

Sep 26, 2017
7.3
CVE-2017-7965HIGH

A buffer overflow vulnerability exists in Programming Software executable AlTracePrint.exe, in Schneider Electric's SoMachine HVAC v2.1.0 for Modicon M171/M172 Controller.

Jun 7, 2017
7.3
CVE-2017-5155HIGH

An issue was discovered in Schneider Electric Wonderware Historian 2014 R2 SP1 P01 and earlier. Wonderware Historian creates logins with default passwords, which can allow a malicious entity to compromise Historian databases. In some installation scenarios, resources beyond those created by Wonderware Historian may be compromised as well.

Feb 13, 2017
7.3
CVE-2016-9363HIGH

An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. Buffer overflow vulnerability may allow an unauthenticated attacker to remotely execute arbitrary code.

Feb 13, 2017
7.3
CVE-2016-9334HIGH

An issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 controller 1763-L16AWA, Series A and B, Version 14.000 and prior versions; 1763-L16BBB, Series A and B, Version 14.000 and prior versions; 1763-L16BWA, Series A and B, Version 14.000 and prior versions; and 1763-L16DWD, Series A and B, Version 14.000 and prior versions. User credentials are sent to the web server in clear text, which may allow an attacker to discover the credentials if they are able to observe traffic between the web browser and the server.

Feb 13, 2017
7.3
CVE-2016-9156HIGH

A vulnerability in Siemens SICAM PAS (all versions before V8.09) could allow a remote attacker to upload, download, or delete files in certain parts of the file system by sending specially crafted packets to port 19235/TCP.

Dec 5, 2016
7.3
CVE-2016-4860HIGH

Yokogawa STARDOM FCN/FCJ controller R1.01 through R4.01 does not require authentication for Logic Designer connections, which allows remote attackers to reconfigure the device or cause a denial of service via a (1) stop application program, (2) change value, or (3) modify application command.

Sep 19, 2016
7.3
CVE-2016-5645HIGH

Rockwell Automation MicroLogix 1400 PLC 1766-L32BWA, 1766-L32AWA, 1766-L32BXB, 1766-L32BWAA, 1766-L32AWAA, and 1766-L32BXBA devices have a hardcoded SNMP community, which makes it easier for remote attackers to load arbitrary firmware updates by leveraging knowledge of this community.

Aug 24, 2016
7.3
CVE-2016-4531HIGH

Rockwell Automation FactoryTalk EnergyMetrix before 2.20.00 does not invalidate credentials upon a logout action, which makes it easier for remote attackers to obtain access by leveraging an unattended workstation.

Jul 28, 2016
7.3
CVE-2016-4529HIGH

An unspecified ActiveX control in Schneider Electric SoMachine HVAC Programming Software for M171/M172 Controllers before 2.1.0 allows remote attackers to execute arbitrary code via unknown vectors, related to the INTERFACESAFE_FOR_UNTRUSTED_CALLER (aka safe for scripting) flag.

Jul 15, 2016
7.3
CVE-2009-1152HIGH

Siemens Gigaset SE461 WiMAX router 1.5-BL024.9.6401, and possibly other versions, allows remote attackers to cause a denial of service (device restart and loss of configuration) by connecting to TCP port 53, then closing the connection.

Mar 26, 2009
7.3
CVE-2026-2670HIGH

A vulnerability was identified in Advantech WISE-6610 1.2.1_20251110. Affected is an unknown function of the file /cgi-bin/luci/admin/openvpn_apply of the component Background Management. Such manipulation of the argument delete_file leads to os command injection. The attack can be executed remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

Feb 18, 2026
7.2
CVE-2025-34239HIGH

Advantech WebAccess/VPN versions prior to 1.1.5 contain a command injection vulnerability in AppManagementController.appUpgradeAction() that allows an authenticated system administrator to execute arbitrary commands as the web server user (www-data) by supplying a crafted uploaded filename.

Nov 6, 2025
7.2
CVE-2022-50595HIGH

Advantech iView versions prior to v5.7.04 build 6425 contain a vulnerability within the SNMP management tool that allows for remote attackers to bypass authentication checks and reach a SQL injection vulnerability within the ‘ztp_search_value’ parameter to the ‘NetworkServlet’ endpoint. Successful exploitation allows for remote code execution with administrator privileges.

Nov 6, 2025
7.2
CVE-2022-50592HIGH

Advantech iView versions prior to v5.7.04 build 6425 contain a vulnerability within the SNMP management tool that allows for remote attackers to bypass authentication checks and reach a SQL injection vulnerability within the ‘getInventoryReportData’ parameter to the ‘NetworkServlet’ endpoint. Successful exploitation allows for remote code execution with administrator privileges.

Nov 6, 2025
7.2
CVE-2025-10207HIGH

Improper Validation of Specified Type of Input vulnerability in ABB FLXEON.This issue affects FLXEON: through 9.3.5.

Sep 18, 2025
7.2
CVE-2024-48851HIGH

Improper Validation of Specified Type of Input vulnerability in ABB FLXEON.A remote code execution is possible due to an improper input validation. This issue affects FLXEON: through 9.3.5.

Sep 18, 2025
7.2
CVE-2024-9138HIGH

Moxa’s cellular routers, secure routers, and network security appliances are affected by a high-severity vulnerability, CVE-2024-9138. This vulnerability involves hard-coded credentials, enabling an authenticated user to escalate privileges and gain root-level access to the system, posing a significant security risk.

Jan 3, 2025
7.2
CVE-2024-50369HIGH

A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The source of the vulnerability relies on multiple parameters belonging to the "multiple_ssid_htm" API which are not properly sanitized before being concatenated to OS level commands.

Nov 26, 2024
7.2
CVE-2024-50368HIGH

A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The source of the vulnerability relies on multiple parameters belonging to the "basic_htm" API which are not properly sanitized before being concatenated to OS level commands.

Nov 26, 2024
7.2
CVE-2024-50367HIGH

A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The source of the vulnerability relies on multiple parameters belonging to the "sta_log_htm" API which are not properly sanitized before being concatenated to OS level commands.

Nov 26, 2024
7.2
CVE-2024-50366HIGH

A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The source of the vulnerability relies on multiple parameters belonging to the "applications_apply" API which are not properly sanitized before being concatenated to OS level commands.

Nov 26, 2024
7.2
CVE-2024-50365HIGH

A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The source of the vulnerability relies on multiple parameters belonging to the "lan_apply" API which are not properly sanitized before being concatenated to OS level commands.

Nov 26, 2024
7.2
CVE-2024-50364HIGH

A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The source of the vulnerability relies on multiple parameters belonging to the "export_log" API which are not properly sanitized before being concatenated to OS level commands.

Nov 26, 2024
7.2
CVE-2024-50363HIGH

A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The source of the vulnerability relies on multiple parameters belonging to the "mp_apply" API which are not properly sanitized before being concatenated to OS level commands.

Nov 26, 2024
7.2
CVE-2024-50362HIGH

A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The source of the vulnerability relies on multiple parameters belonging to the "connection_profile_apply" API which are not properly sanitized before being concatenated to OS level commands.

Nov 26, 2024
7.2
CVE-2024-50361HIGH

A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The source of the vulnerability relies on multiple parameters belonging to the "certificate_file_remove" API which are not properly sanitized before being concatenated to OS level commands.

Nov 26, 2024
7.2
CVE-2024-50360HIGH

A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The source of the vulnerability relies on multiple parameters belonging to the "snmp_apply" API which are not properly sanitized before being concatenated to OS level commands.

Nov 26, 2024
7.2
CVE-2024-50359HIGH

A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The source of the vulnerability relies on multiple parameters belonging to the "scan_ap" API which are not properly sanitized before being concatenated to OS level commands.

Nov 26, 2024
7.2
CVE-2024-50358HIGH

A CWE-15 "External Control of System or Configuration Setting" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The vulnerability can be exploited by authenticated users by restoring a tampered configuration backup.

Nov 26, 2024
7.2
CVE-2021-22280HIGH

Improper DLL loading algorithms in B&R Automation Studio versions >=4.0 and <4.12 may allow an authenticated local attacker to execute code in the context of the product.

May 14, 2024
7.2
CVE-2023-37864HIGH

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with SNMPv2 write privileges may use an a special SNMP request to gain full access to the device.

Aug 9, 2023
7.2
CVE-2023-37863HIGH

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with SNMPv2 write privileges may use an a special SNMP request to gain full access to the device.

Aug 9, 2023
7.2
CVE-2023-37859HIGH

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 the SNMP daemon is running with root privileges allowing a remote attacker with knowledge of the SNMPv2 r/w community string to execute system commands as root.

Aug 9, 2023
7.2
CVE-2023-37362HIGH

Weintek Weincloud v0.13.6 could allow an attacker to abuse the registration functionality to login with testing credentials to the official website.

Jul 19, 2023
7.2
CVE-2023-32628HIGH

In Advantech WebAccss/SCADA v9.1.3 and prior, there is an arbitrary file upload vulnerability that could allow an attacker to modify the file extension of a certificate file to ASP when uploading it, which can lead to remote code execution.

Jun 6, 2023
7.2
CVE-2023-32540HIGH

In Advantech WebAccss/SCADA v9.1.3 and prior, there is an arbitrary file overwrite vulnerability, which could allow an attacker to overwrite any file in the operating system (including system files), inject code into an XLS file, and modify the file extension, which could lead to arbitrary code execution.

Jun 6, 2023
7.2
CVE-2023-22450HIGH

In Advantech WebAccss/SCADA v9.1.3 and prior, there is an arbitrary file upload vulnerability that could allow an attacker to upload an ASP script file to a webserver when logged in as manager user, which can lead to arbitrary code execution.

Jun 6, 2023
7.2
CVE-2023-0636HIGH

Improper Input Validation vulnerability in ABB Ltd. ASPECT®-Enterprise on ASPECT®-Enterprise, Linux (2CQG103201S3021, 2CQG103202S3021, 2CQG103203S3021, 2CQG103204S3021 modules), ABB Ltd. NEXUS Series on NEXUS Series, Linux (2CQG100102R2021, 2CQG100104R2021, 2CQG100105R2021, 2CQG100106R2021, 2CQG100110R2021, 2CQG100112R2021, 2CQG100103R2021, 2CQG100107R2021, 2CQG100108R2021, 2CQG100109R2021, 2CQG100111R2021, 2CQG100113R2021 modules), ABB Ltd. MATRIX Series on MATRIX Series, Linux (2CQG100102R1021, 2CQG100103R1021, 2CQG100104R1021, 2CQG100105R1021, 2CQG100106R1021 modules) allows Command Injection.This issue affects ASPECT®-Enterprise: from 3.0;0 before 3.07.0; NEXUS Series: from 3.0;0 before 3.07.0; MATRIX Series: from 3.0;0 before 3.07.1.

Jun 5, 2023
7.2
CVE-2022-42140HIGH

Delta Electronics DX-2100-L1-CN 2.42 is vulnerable to Command Injection via lform/net_diagnose.

Dec 14, 2022
7.2
CVE-2020-16244HIGH

GE Digital APM Classic, Versions 4.4 and prior. Salt is not used for hash calculation of passwords, making it possible to decrypt passwords. This design flaw, along with the IDOR vulnerability, puts the entire platform at high risk because an authenticated user can retrieve all user account data and then retrieve the actual passwords.

Sep 23, 2020
7.2
CVE-2020-6090HIGH

An exploitable code execution vulnerability exists in the Web-Based Management (WBM) functionality of WAGO PFC 200 03.03.10(15). A specially crafted series of HTTP requests can cause code execution resulting in remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.

Jun 11, 2020
7.2
CVE-2020-6978HIGH

In Honeywell WIN-PAK 4.7.2, Web and prior versions, the affected product is vulnerable due to the usage of old jQuery libraries.

Mar 24, 2020
7.2
CVE-2019-5157HIGH

An exploitable command injection vulnerability exists in the Cloud Connectivity functionality of WAGO PFC200 Firmware versions 03.02.02(14), 03.01.07(13), and 03.00.39(12). An attacker can inject OS commands into the TimeoutUnconfirmed parameter value contained in the Firmware Update command.

Mar 11, 2020
7.2
CVE-2019-5156HIGH

An exploitable command injection vulnerability exists in the cloud connectivity functionality of WAGO PFC200 versions 03.02.02(14), 03.01.07(13), and 03.00.39(12). An attacker can inject operating system commands into the TimeoutPrepared parameter value contained in the firmware update command.

Mar 11, 2020
7.2
CVE-2019-5155HIGH

An exploitable command injection vulnerability exists in the cloud connectivity feature of WAGO PFC200. An attacker can inject operating system commands into any of the parameter values contained in the firmware update command. This affects WAGO PFC200 Firmware version 03.02.02(14), version 03.01.07(13), and version 03.00.39(12)

Mar 11, 2020
7.2
CVE-2019-5165HIGH

An exploitable authentication bypass vulnerability exists in the hostname processing of the Moxa AWK-3131A firmware version 1.13. A specially configured device hostname can cause the device to interpret select remote traffic as local traffic, resulting in a bypass of web authentication. An attacker can send authenticated SNMP requests to trigger this vulnerability.

Feb 25, 2020
7.2
CVE-2019-5142HIGH

An exploitable command injection vulnerability exists in the hostname functionality of the Moxa AWK-3131A firmware version 1.13. A specially crafted entry to network configuration information can cause execution of arbitrary system commands, resulting in full control of the device. An attacker can send various authenticated requests to trigger this vulnerability.

Feb 25, 2020
7.2
CVE-2019-10969HIGH

Moxa EDR 810, all versions 5.1 and prior, allows an authenticated attacker to abuse the ping feature to execute unauthorized commands on the router, which may allow an attacker to perform remote code execution.

Oct 8, 2019
7.2
CVE-2017-9970HIGH

A remote code execution vulnerability exists in Schneider Electric's StruxureOn Gateway versions 1.1.3 and prior. Uploading a zip which contains carefully crafted metadata allows for the file to be uploaded to any directory on the host machine information which could lead to remote code execution.

Feb 12, 2018
7.2
CVE-2017-5170HIGH

An Uncontrolled Search Path Element issue was discovered in Moxa SoftNVR-IA Live Viewer, Version 3.30.3122 and prior versions. An uncontrolled search path element (DLL Hijacking) vulnerability has been identified. To exploit this vulnerability, an attacker could rename a malicious DLL to meet the criteria of the application, and the application would not verify that the DLL is correct. The attacker needs to have administrative access to the default install location in order to plant the insecure DLL. Once loaded by the application, the DLL could run malicious code at the privilege level of the application.

Jan 18, 2018
7.2
CVE-2016-2281HIGH

Untrusted search path vulnerability in ABB Panel Builder 800 5.1 allows local users to gain privileges via a Trojan horse DLL in the current working directory.

Mar 18, 2016
7.2
CVE-2016-2278HIGH

Schneider Electric Struxureware Building Operations Automation Server AS 1.7 and earlier and AS-P 1.7 and earlier allows remote authenticated administrators to execute arbitrary OS commands by defeating an msh (aka Minimal Shell) protection mechanism.

Mar 2, 2016
7.2
CVE-2014-8388HIGH

Stack-based buffer overflow in Advantech WebAccess, formerly BroadWin WebAccess, before 8.0 allows remote attackers to execute arbitrary code via a crafted ip_address parameter in an HTML document.

Nov 21, 2014
7.2
CVE-2013-4943HIGH

The client application in Siemens COMOS before 9.1 Update 458, 9.2 before 9.2.0.6.37, and 10.0 before 10.0.3.0.19 allows local users to gain privileges and bypass intended database-operation restrictions by leveraging COMOS project access.

Aug 9, 2013
7.2
CVE-2011-3330HIGH

Buffer overflow in the UnitelWay Windows Device Driver, as used in Schneider Electric Unity Pro 6 and earlier, OPC Factory Server 3.34, Vijeo Citect 7.20 and earlier, Telemecanique Driver Pack 2.6 and earlier, Monitor Pro 7.6 and earlier, and PL7 Pro 4.5 and earlier, allows local users, and possibly remote attackers, to execute arbitrary code via an unspecified system parameter.

Nov 4, 2011
7.2
CVE-2003-1528HIGH

nsr_shutdown in Fujitsu Siemens NetWorker 6.0 allows local users to overwrite arbitrary files via a symlink attack on the nsrsh[PID] temporary file.

Dec 31, 2003
7.2
CVE-2025-3465HIGH

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in ABB CoreSense™ HM, ABB CoreSense™ M10.This issue affects CoreSense™ HM: through 2.3.1; CoreSense™ M10: through 1.4.1.12.

Oct 20, 2025
7.1
CVE-2025-5023HIGH

Use of Hard-coded Credentials vulnerability in Mitsubishi Electric Corporation photovoltaic system monitor “EcoGuideTAB” PV-DR004J all versions and PV-DR004JA all versions allows an attacker within the Wi-Fi communication range between the units of the product (measurement unit and display unit) to disclose information such as generated power and electricity sold back to the grid stored in the product, tamper with or destroy stored or configured information in the product, or cause a Denial-of-Service (DoS) condition on the product, by using hardcoded user ID and password common to the product series obtained by exploiting CVE-2025-5022. The affected products discontinued in 2015, support ended in 2020.

Jul 10, 2025
7.1
CVE-2025-3395HIGH

Incorrect Permission Assignment for Critical Resource, Cleartext Storage of Sensitive Information vulnerability in ABB Automation Builder.This issue affects Automation Builder: through 2.8.0.

Apr 30, 2025
7.1
CVE-2024-48846HIGH

Cross Site Request Forgery vulnerabilities where found providing a potiential for exposing sensitive information or changing system settings.  Affected products: ABB ASPECT - Enterprise v3.08.02; NEXUS Series v3.08.02; MATRIX Series v3.08.02

Dec 5, 2024
7.1
CVE-2023-43815HIGH

A buffer overflow vulnerability exists in Delta Electronics Delta Industrial Automation DOPSoft version 2 when parsing the wScreenDESCTextLen field of a DPS file. An anonymous attacker can exploit this vulnerability by enticing a user to open a specially crafted DPS file to achieve code execution.

Jan 18, 2024
7.1
CVE-2023-0864HIGH

Cleartext Transmission of Sensitive Information vulnerability in ABB Terra AC wallbox (UL40/80A), ABB Terra AC wallbox (UL32A), ABB Terra AC wallbox (CE) (Terra AC MID), ABB Terra AC wallbox (CE) Terra AC Juno CE, ABB Terra AC wallbox (CE) Terra AC PTB, ABB Terra AC wallbox (CE) Symbiosis, ABB Terra AC wallbox (JP).This issue affects Terra AC wallbox (UL40/80A): from 1.0;0 through 1.5.5; Terra AC wallbox (UL32A) : from 1.0;0 through 1.6.5; Terra AC wallbox (CE) (Terra AC MID): from 1.0;0 through 1.6.5; Terra AC wallbox (CE) Terra AC Juno CE: from 1.0;0 through 1.6.5; Terra AC wallbox (CE) Terra AC PTB : from 1.0;0 through 1.5.25; Terra AC wallbox (CE) Symbiosis: from 1.0;0 through 1.2.7; Terra AC wallbox (JP): from 1.0;0 through 1.6.5.

May 17, 2023
7.1
CVE-2023-2444HIGH

A cross site request forgery vulnerability exists in Rockwell Automation's FactoryTalk Vantagepoint. This vulnerability can be exploited in two ways. If an attacker sends a malicious link to a computer that is on the same domain as the FactoryTalk Vantagepoint server and a user clicks the link, the attacker could impersonate the legitimate user and send requests to the affected product.  Additionally, if an attacker sends an untrusted link to a computer that is not on the same domain as the server and a user opens the FactoryTalk Vantagepoint website, enters credentials for the FactoryTalk Vantagepoint server, and clicks on the malicious link a cross site request forgery attack would be successful as well.

May 11, 2023
7.1
CVE-2023-1134HIGH

Delta Electronics InfraSuite Device Master versions prior to 1.0.5 are affected by a path traversal vulnerability, which could allow an attacker to read local files, disclose plaintext credentials, and escalate privileges.

Mar 27, 2023
7.1
CVE-2022-46670HIGH

Rockwell Automation was made aware of a vulnerability by a security researcher from Georgia Institute of Technology that the MicroLogix 1100 and 1400 controllers contain a vulnerability that may give an attacker the ability to accomplish remote code execution.  The vulnerability is an unauthenticated stored cross-site scripting vulnerability in the embedded webserver. The payload is transferred to the controller over SNMP and is rendered on the homepage of the embedded website.

Dec 16, 2022
7.1
CVE-2022-0988HIGH

Delta Electronics DIAEnergie (Version 1.7.5 and prior) is vulnerable to cleartext transmission as the web application runs by default on HTTP. This could allow an attacker to remotely read transmitted information between the client and product.

Mar 25, 2022
7.1
CVE-2021-20593HIGH

Incorrect Implementation of Authentication Algorithm in Mitsubishi Electric Air Conditioning System/Centralized Controllers (G-50A Ver.2.50 to Ver. 3.35, GB-50A Ver.2.50 to Ver. 3.35, AG-150A-A Ver.3.20 and prior, AG-150A-J Ver.3.20 and prior, GB-50ADA-A Ver.3.20 and prior, GB-50ADA-J Ver.3.20 and prior, EB-50GU-A Ver 7.09 and prior, EB-50GU-J Ver 7.09 and prior, AE-200A Ver 7.93 and prior, AE-200E Ver 7.93 and prior, AE-50A Ver 7.93 and prior, AE-50E Ver 7.93 and prior, EW-50A Ver 7.93 and prior, EW-50E Ver 7.93 and prior, TE-200A Ver 7.93 and prior, TE-50A Ver 7.93 and prior, TW-50A Ver 7.93 and prior, CMS-RMD-J Ver.1.30 and prior) and Air Conditioning System/Expansion Controllers (PAC-YG50ECA Ver.2.20 and prior) allows a remote authenticated attacker to impersonate administrators to disclose configuration information of the air conditioning system and tamper information (e.g. operation information and configuration of air conditioning system) by exploiting this vulnerability.

Jul 13, 2021
7.1
CVE-2020-12010HIGH

Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple relative path traversal vulnerabilities exist that may allow an authenticated user to use a specially crafted file to delete files outside the application’s control.

May 8, 2020
7.1
CVE-2019-5139HIGH

An exploitable use of hard-coded credentials vulnerability exists in multiple iw_* utilities of the Moxa AWK-3131A firmware version 1.13. The device operating system contains an undocumented encryption password, allowing for the creation of custom diagnostic scripts.

Feb 25, 2020
7.1
CVE-2019-18998HIGH

Insufficient access control in the web interface of ABB Asset Suite versions 9.0 to 9.3, 9.4 prior to 9.4.2.6, 9.5 prior to 9.5.3.2 and 9.6.0 enables full access to directly referenced objects. An attacker with knowledge of a resource's URL can access the resource directly.

Feb 17, 2020
7.1
CVE-2019-18996HIGH

Path settings in HMIStudio component of ABB PB610 Panel Builder 600 versions 2.8.0.424 and earlier accept DLLs outside of the program directory, potentially allowing an attacker with access to the local file system the execution of code in the application’s context.

Dec 18, 2019
7.1
CVE-2017-9966HIGH

A privilege escalation vulnerability exists in Schneider Electric's Pelco VideoXpert Enterprise versions 2.0 and prior. By replacing certain files, an unauthorized user can obtain system privileges and the inserted code would execute at an elevated privilege level.

Jan 2, 2018
7.1
CVE-2017-7929HIGH

An Absolute Path Traversal issue was discovered in Advantech WebAccess Version 8.1 and prior. The absolute path traversal vulnerability has been identified, which may allow an attacker to traverse the file system to access restricted files or directories.

May 6, 2017
7.1
CVE-2014-5410HIGH

The DNP3 feature on Rockwell Automation Allen-Bradley MicroLogix 1400 1766-Lxxxxx A FRN controllers 7 and earlier and 1400 1766-Lxxxxx B FRN controllers before 15.001 allows remote attackers to cause a denial of service (process disruption) via malformed packets over (1) an Ethernet network or (2) a serial line.

Oct 3, 2014
7.1
CVE-2014-5074HIGH

Siemens SIMATIC S7-1500 CPU devices with firmware before 1.6 allow remote attackers to cause a denial of service (device restart and STOP transition) via crafted TCP packets.

Aug 17, 2014
7.1
CVE-2014-0757HIGH

Smart Software Solutions (3S) CoDeSys Runtime Toolkit before 2.4.7.44 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via unspecified vectors.

Jan 31, 2014
7.1
CVE-2012-3039HIGH

Moxa OnCell Gateway G3111, G3151, G3211, and G3251 devices with firmware before 1.4 do not use a sufficient source of entropy for SSH and SSL keys, which makes it easier for remote attackers to obtain access by leveraging knowledge of a key from a product installation elsewhere.

Aug 9, 2013
7.1
CVE-2012-4695HIGH

LogReceiver.exe in Rockwell Automation RSLinx Enterprise CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 allows remote attackers to cause a denial of service (service outage) via a zero-byte UDP packet that is not properly handled by Logger.dll.

Apr 18, 2013
7.1
CVE-2012-4690HIGH

Rockwell Automation Allen-Bradley MicroLogix controller 1100, 1200, 1400, and 1500; SLC 500 controller platform; and PLC-5 controller platform, when Static status is not enabled, allow remote attackers to cause a denial of service via messages that trigger modification of status bits.

Dec 8, 2012
7.1
CVE-2011-4877HIGH

HmiLoad in the runtime loader in Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime, when Transfer Mode is enabled, allows remote attackers to cause a denial of service (application crash) by sending crafted data over TCP.

Feb 3, 2012
7.1
CVE-2024-48842HIGH

Use of Hard-coded Credentials vulnerability in ABB FLXEON.This issue affects FLXEON: through 9.3.5 and newer versions

Sep 17, 2025
7.0
CVE-2024-8300HIGH

Dead Code vulnerability in Mitsubishi Electric GENESIS64 Version 10.97.2, 10.97.2 CFR1, 10.97.2 CRF2 and 10.97.3, Mitsubishi Electric Iconics Digital Solutions GENESIS64 Version 10.97.2, 10.97.2 CFR1, 10.97.2 CRF2 and 10.97.3, Mitsubishi Electric ICONICS Suite Version 10.97.2, 10.97.2 CFR1, 10.97.2 CRF2 and 10.97.3, and Mitsubishi Electric Iconics Digital Solutions ICONICS Suite Version 10.97.2, 10.97.2 CFR1, 10.97.2 CRF2 and 10.97.3 allows a local authenticated attacker to execute a malicious code by tampering with a specially crafted DLL. This could lead to disclose, tamper with, destroy, or delete information in the affected products, or cause a denial of service (DoS) condition on the products.

Nov 28, 2024
7.0
CVE-2024-1182HIGH

Uncontrolled Search Path Element vulnerability in Mitsubishi Electric Iconics Digital Solutions GENESIS64 all versions, Mitsubishi Electric GENESIS64 all versions, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite all versions, Mitsubishi Electric ICONICS Suite all versions, Mitsubishi Electric Iconics Digital Solutions GENESIS32 all versions, Mitsubishi Electric GENESIS32 all versions, and Mitsubishi Electric MC Works64 all versions allows a local attacker to execute a malicious code by storing a specially crafted DLL in a specific folder when GENESIS64, ICONICS Suite, GENESIS32, and MC Works64 are installed with the Pager agent in the alarm multi-agent notification feature.

Jul 4, 2024
7.0
CVE-2023-3322HIGH

A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An attacker could exploit the vulnerability by using specially crafted programs to exploit the vulnerabilities by allowing them to run on the zenon installed hosts. This issue affects ABB Ability™ zenon: from 11 build through 11 build 106404.

Jul 24, 2023
7.0
CVE-2023-3321HIGH

A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An attacker could exploit the vulnerability by using specially crafted programs to exploit the vulnerabilities by allowing them to run on the zenon installed hosts. This issue affects ABB Ability™ zenon: from 11 build through 11 build 106404.

Jul 24, 2023
7.0
CVE-2023-29031HIGH

A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product that could potentially allow a malicious user to view and modify sensitive data or make the web page unavailable. User interaction, such as a phishing attack, is required for successful exploitation of this vulnerability.

May 11, 2023
7.0
CVE-2023-29030HIGH

A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product that could potentially allow a malicious user to view and modify sensitive data or make the web page unavailable. User interaction, such as a phishing attack, is required for successful exploitation of this vulnerability.

May 11, 2023
7.0
CVE-2023-29023HIGH

A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product that could potentially allow a malicious user to view and modify sensitive data or make the web page unavailable. User interaction, such as a phishing attack, is required for successful exploitation of this vulnerability.

May 11, 2023
7.0
CVE-2019-5186HIGH

An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service "I/O-Check" functionality of WAGO PFC 200. An attacker can send a specially crafted packet to trigger the parsing of this cache file.At 0x1eb9c the extracted interface element name from the xml file is used as an argument to /etc/config-tools/config_interfaces interface=<contents of interface element> using sprintf(). The destination buffer sp+0x40 is overflowed with the call to sprintf() for any interface values that are greater than 512-len("/etc/config-tools/config_interfaces interface=") in length. Later, at 0x1ea08 strcpy() is used to copy the contents of the stack buffer that was overflowed sp+0x40 into sp+0x440. The buffer sp+0x440 is immediately adjacent to sp+0x40 on the stack. Therefore, there is no NULL termination on the buffer sp+0x40 since it overflowed into sp+0x440. The strcpy() will result in invalid memory access. An interface value of length 0x3c4 will cause the service to crash.

Mar 23, 2020
7.0
CVE-2019-5185HIGH

An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service "I/O-Check" functionality of WAGO PFC 200. An attacker can send a specially crafted packet to trigger the parsing of this cache file. At 0x1ea28 the extracted state value from the xml file is used as an argument to /etc/config-tools/config_interfaces interface=X1 state=<contents of state node> using sprintf(). The destination buffer sp+0x40 is overflowed with the call to sprintf() for any state values that are greater than 512-len("/etc/config-tools/config_interfaces interface=X1 state=") in length. Later, at 0x1ea08 strcpy() is used to copy the contents of the stack buffer that was overflowed sp+0x40 into sp+0x440. The buffer sp+0x440 is immediately adjacent to sp+0x40 on the stack. Therefore, there is no NULL termination on the buffer sp+0x40 since it overflowed into sp+0x440. The strcpy() will result in invalid memory access. An state value of length 0x3c9 will cause the service to crash.

Mar 23, 2020
7.0
CVE-2019-11486HIGH

The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel before 5.0.8 has multiple race conditions.

Apr 23, 2019
7.0
CVE-2017-5176HIGH

A DLL Hijack issue was discovered in Rockwell Automation Connected Components Workbench (CCW). The following versions are affected: Connected Components Workbench - Developer Edition, v9.01.00 and earlier: 9328-CCWDEVENE, 9328-CCWDEVZHE, 9328-CCWDEVFRE, 9328-CCWDEVITE, 9328-CCWDEVDEE, 9328-CCWDEVESE, and 9328-CCWDEVPTE; and Connected Components Workbench - Free Standard Edition (All Supported Languages), v9.01.00 and earlier. Certain DLLs included with versions of CCW software can be potentially hijacked to allow an attacker to gain rights to a victim's affected personal computer. Such access rights can be at the same or potentially higher level of privileges as the compromised user account, including and up to computer administrator privileges.

May 19, 2017
7.0
CVE-2016-9351HIGH

An issue was discovered in Advantech SUISAccess Server Version 3.0 and prior. The directory traversal/file upload error allows an attacker to upload and unpack a zip file.

Feb 13, 2017
7.0
CVE-2016-8354HIGH

An issue was discovered in Schneider Electric Unity PRO prior to V11.1. Unity projects can be compiled as x86 instructions and loaded onto the PLC Simulator delivered with Unity PRO. These x86 instructions are subsequently executed directly by the simulator. A specially crafted patched Unity project file can make the simulator execute malicious code by redirecting the control flow of these instructions.

Feb 13, 2017
7.0
CVE-2017-9964MEDIUM

A Path Traversal issue was discovered in Schneider Electric Pelco VideoXpert Enterprise all versions prior to 2.1. By sniffing communications, an unauthorized person can execute a directory traversal attack resulting in authentication bypass or session hijack.

Jan 2, 2018
6.9
CVE-2014-9202MEDIUM

Multiple stack-based buffer overflows in an unspecified DLL file in Advantech WebAccess before 8.0_20150816 allow remote attackers to execute arbitrary code via a crafted file that triggers long string arguments to functions.

Sep 28, 2015
6.9
CVE-2015-3940MEDIUM

Untrusted search path vulnerability in Schneider Electric Wonderware System Platform before 2014 R2 Patch 01 allows local users to gain privileges via a Trojan horse DLL in an unspecified directory.

Aug 4, 2015
6.9
CVE-2014-9204MEDIUM

Stack-based buffer overflow in OPCTest.exe in Rockwell Automation RSLinx Classic before 3.73.00 allows remote attackers to execute arbitrary code via a crafted CSV file.

May 17, 2015
6.9
CVE-2014-9209MEDIUM

Untrusted search path vulnerability in the Clean Utility application in Rockwell Automation FactoryTalk Services Platform before 2.71.00 and FactoryTalk View Studio 8.00.00 and earlier allows local users to gain privileges via a Trojan horse DLL in an unspecified directory.

Mar 31, 2015
6.9
CVE-2014-9206MEDIUM

Stack-based buffer overflow in Device Type Manager (DTM) 3.1.6 and earlier for Schneider Electric Invensys SRD Control Valve Positioner devices 960 and 991 allows local users to gain privileges via a malformed DLL file.

Mar 14, 2015
6.9
CVE-2015-1594MEDIUM

Untrusted search path vulnerability in Siemens SIMATIC ProSave before 13 SP1; SIMATIC CFC before 8.0 SP4 Upd9 and 8.1 before Upd1; SIMATIC STEP 7 before 5.5 SP1 HF2, 5.5 SP2 before HF7, 5.5 SP3, and 5.5 SP4 before HF4; SIMOTION Scout before 4.4; and STARTER before 4.4 HF3 allows local users to gain privileges via a Trojan horse application file.

Mar 7, 2015
6.9
CVE-2014-5430MEDIUM

Untrusted search path vulnerability in ABB RobotStudio 5.6x before 5.61.02 and Test Signal Viewer 1.5 allows local users to gain privileges via a Trojan horse DLL that is accessed as a result of incorrect DLL configuration by an optional installation program.

Nov 7, 2014
6.9
CVE-2014-0759MEDIUM

Unquoted Windows search path vulnerability in Schneider Electric Floating License Manager 1.0.0 through 1.4.0 allows local users to gain privileges via a Trojan horse application with a name composed of an initial substring of a path that contains a space character.

Feb 28, 2014
6.9
CVE-2013-6840MEDIUM

Siemens COMOS before 9.2.0.8.1, 10.0 before 10.0.3.1.40, and 10.1 before 10.1.0.0.2 allows local users to gain database privileges via unspecified vectors.

Dec 10, 2013
6.9
CVE-2013-2796MEDIUM

Schneider Electric Vijeo Citect 7.20 and earlier, CitectSCADA 7.20 and earlier, and PowerLogic SCADA 7.20 and earlier allow remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

Aug 9, 2013
6.9
CVE-2012-3015MEDIUM

Untrusted search path vulnerability in Siemens SIMATIC STEP7 before 5.5 SP1, as used in SIMATIC PCS7 7.1 SP3 and earlier and other products, allows local users to gain privileges via a Trojan horse DLL in a STEP7 project folder.

Jul 26, 2012
6.9
CVE-2011-2957MEDIUM

Unspecified vulnerability in Rockwell Automation FactoryTalk Diagnostics Viewer before V2.30.00 (CPR9 SR3) allows local users to execute arbitrary code via a crafted FactoryTalk Diagnostics Viewer (.ftd) configuration file, which triggers memory corruption.

Jul 28, 2011
6.9
CVE-2026-0715MEDIUM

Moxa Arm-based industrial computers running Moxa Industrial Linux Secure use a device-unique bootloader password provided on the device. An attacker with physical access to the device could use this information to access the bootloader menu via a serial interface.  Access to the bootloader menu does not allow full system takeover or privilege escalation. The bootloader enforces digital signature verification and only permits flashing of Moxa-signed images. As a result, an attacker cannot install malicious firmware or execute arbitrary code. The primary impact is limited to a potential temporary denial-of-service condition if a valid image is reflashed. Remote exploitation is not possible.

Feb 5, 2026
6.8
CVE-2026-0714MEDIUM

A physical attack vulnerability exists in certain Moxa industrial computers using TPM-backed LUKS full-disk encryption on Moxa Industrial Linux 3, where the discrete TPM is connected to the CPU via an SPI bus. Exploitation requires invasive physical access, including opening the device and attaching external equipment to the SPI bus to capture TPM communications. If successful, the captured data may allow offline decryption of eMMC contents. This attack cannot be performed through brief or opportunistic physical access and requires extended physical access, possession of the device, appropriate equipment, and sufficient time for signal capture and analysis. Remote exploitation is not possible.

Feb 5, 2026
6.8
CVE-2025-11044MEDIUM

An Allocation of Resources Without Limits or Throttling vulnerability in the ANSL-Server component of B&R Automation Runtime versions prior to 6.5 and prior to R4.93 could be exploited by an unauthenti-cated attacker on the network to win a race condition, resulting in permanent denial-of-service (DoS) conditions on affected devices.

Jan 19, 2026
6.8
CVE-2025-63701MEDIUM

A heap corruption vulnerability exists in the Advantech TP-3250 printer driver's DrvUI_x64_ADVANTECH.dll (v0.3.9200.20789) when DocumentPropertiesW() is called with a valid dmDriverExtra value but an undersized output buffer. The driver incorrectly assumes the output buffer size matches the input buffer size, leading to invalid memory operations and heap corruption. This vulnerability can cause denial of service through application crashes and potentially lead to code execution in user space. Local access is required to exploit this vulnerability.

Nov 14, 2025
6.8
CVE-2025-12351MEDIUM

Honeywell S35 Series Cameras contains an authorization bypass Vulnerability through User controller key. An attacker could potentially exploit this vulnerability, leading to Privilege Escalation to admin privileged functionalities . Honeywell also recommends updating to the most recent version of this product, service or offering (S35 Pinhole/Kit Camera to version 2025.08.28, S35 AI Fisheye & Dual Sensor/Micro Dome/Full Color Eyeball & Bullet Camera to version 2025.08.22, S35 Thermal Camera to version 2025.08.26).

Oct 27, 2025
6.8
CVE-2025-5517MEDIUM

Heap-based Buffer Overflow vulnerability in ABB Terra AC wallbox (UL40/80A), ABB Terra AC wallbox (UL32A), ABB Terra AC wallbox (MID/ CE) -Terra AC MID, ABB Terra AC wallbox (MID/ CE) -Terra AC Juno CE, ABB Terra AC wallbox (MID/ CE) -Terra AC PTB, ABB Terra AC wallbox (JP).This issue affects Terra AC wallbox (UL40/80A): through 1.8.32; Terra AC wallbox (UL32A): through 1.8.2; Terra AC wallbox (MID/ CE) -Terra AC MID: through 1.8.32; Terra AC wallbox (MID/ CE) -Terra AC Juno CE: through 1.8.32; Terra AC wallbox (MID/ CE) -Terra AC PTB: through 1.8.21; Terra AC wallbox (JP): through 1.8.2.

Oct 20, 2025
6.8
CVE-2025-8531MEDIUM

Improper Handling of Length Parameter Inconsistency vulnerability in Mitsubishi Electric Corporation MELSEC-Q Series Q03UDVCPU, Q04UDVCPU, Q06UDVCPU, Q13UDVCPU, Q26UDVCPU, Q04UDPVCPU, Q06UDPVCPU, Q13UDPVCPU, and Q26UDPVCPU with the first 5 digits of serial No. "24082" to "27081" allows a remote attacker to cause an integer underflow by sending specially crafted packets to the affected product to stop Ethernet communication and the execution of control programs on the product, when the user authentication function is enabled. The user authentication function is enabled by default only when settings are configured by GX Works2, which complies with the Cybersecurity Law of the People's Republic of China, and is normally disabled.

Sep 19, 2025
6.8
CVE-2025-7705MEDIUM

: Active Debug Code vulnerability in ABB Switch Actuator 4 DU-83330, ABB Switch actuator, door/light 4 DU -83330-500.This issue affects Switch Actuator 4 DU-83330: All Versions; Switch actuator, door/light 4 DU -83330-500: All Versions.

Jul 22, 2025
6.8
CVE-2022-40269MEDIUM

Authentication Bypass by Spoofing vulnerability in Mitsubishi Electric Corporation GOT2000 Series GT27 model versions 01.14.000 to 01.47.000, Mitsubishi Electric Corporation GOT2000 Series GT25 model versions 01.14.000 to 01.47.000 and Mitsubishi Electric Corporation GT SoftGOT2000 versions 1.265B to 1.285X allows a remote unauthenticated attacker to disclose sensitive information from users' browsers or spoof legitimate users by abusing inappropriate HTML attributes.

Feb 2, 2023
6.8
CVE-2022-29833MEDIUM

Insufficiently Protected Credentials vulnerability in Mitsubishi Electric Corporation GX Works3 versions 1.015R and later allows a remote unauthenticated attacker to disclose sensitive information. As a result, unauthenticated users could access to MELSEC safety CPU modules illgally.

Nov 25, 2022
6.8
CVE-2022-29829MEDIUM

Use of Hard-coded Cryptographic Key vulnerability in Mitsubishi Electric GX Works3 versions from 1.000A to 1.090U, GT Designer3 Version1 (GOT2000) versions from 1.122C to 1.290C, Motion Control Setting(GX Works3 related software) versions from 1.035M to 1.042U, and MT Works2 versions from 1.100E to 1.200J allows a remote unauthenticated attacker to disclose sensitive information. As a result, unauthenticated users may view programs and project files or execute programs illegally.

Nov 25, 2022
6.8
CVE-2022-29828MEDIUM

Use of Hard-coded Cryptographic Key vulnerability in Mitsubishi Electric GX Works3 versions from 1.000A and later allows a remote unauthenticated attacker to disclose sensitive information. As a result, unauthenticated attackers may view programs and project file or execute programs illegally.

Nov 25, 2022
6.8
CVE-2022-29827MEDIUM

Use of Hard-coded Cryptographic Key vulnerability in Mitsubishi Electric GX Works3 versions from 1.000A and later allows a remote unauthenticated attacker to disclose sensitive information. As a result, unauthenticated attackers may view programs and project files or execute programs illegally.

Nov 25, 2022
6.8
CVE-2022-29826MEDIUM

Cleartext Storage of Sensitive Information vulnerability in Mitsubishi Electric GX Works3 versions from 1.000A to 1.087R and Motion Control Setting(GX Works3 related software) versions from 1.000A to 1.042U allows a remote unauthenticated attacker to disclose sensitive information. As a result, unauthenticated users may view programs and project files or execute programs illegally.

Nov 25, 2022
6.8
CVE-2022-30316MEDIUM

Honeywell Experion PKS Safety Manager 5.02 has Insufficient Verification of Data Authenticity. According to FSCT-2022-0054, there is a Honeywell Experion PKS Safety Manager unauthenticated firmware update issue. The affected components are characterized as: Firmware update functionality. The potential impact is: Firmware manipulation. The Honeywell Experion PKS Safety Manager utilizes the DCOM-232/485 communication FTA serial interface and Enea POLO bootloader for firmware management purposes. An engineering workstation running the Safety Builder software communicates via serial or serial-over-ethernet link with the DCOM-232/485 interface. Firmware images were found to have no authentication (in the form of firmware signing) and only relied on insecure checksums for regular integrity checks. Firmware images are unsigned. An attacker with access to the serial interface (either through physical access, a compromised EWS or an exposed serial-to-ethernet gateway) can utilize hardcoded credentials (see FSCT-2022-0052) for the POLO bootloader to control the boot process and push malicious firmware images to the controller allowing for firmware manipulation, remote code execution and denial of service impacts. A mitigating factor is that in order for a firmware update to be initiated, the Safety Manager has to be rebooted which is typically done by means of physical controls on the Safety Manager itself. As such, an attacker would have to either lay dormant until a legitimate reboot occurs or possibly attempt to force a reboot through a secondary vulnerability.

Jul 28, 2022
6.8
CVE-2022-30242MEDIUM

Honeywell Alerton Ascent Control Module (ACM) through 2022-05-04 allows unauthenticated configuration changes from remote users. This enables configuration data to be stored on the controller and then implemented. A user with malicious intent can send a crafted packet to change the controller configuration without the knowledge of other users, altering the controller's function capabilities. The changed configuration is not updated in the User Interface, which creates an inconsistency between the configuration display and the actual configuration on the controller. After the configuration change, remediation requires reverting to the correct configuration, requiring either physical or remote access depending on the configuration that was altered.

Jul 15, 2022
6.8
CVE-2022-1797MEDIUM

A malformed Class 3 common industrial protocol message with a cached connection can cause a denial-of-service condition in Rockwell Automation Logix Controllers, resulting in a major nonrecoverable fault. If the target device becomes unavailable, a user would have to clear the fault and redownload the user project file to bring the device back online.

Jun 2, 2022
6.8
CVE-2021-30066MEDIUM

On Schneider Electric ConneXium Tofino Firewall TCSEFEA23F3F22 before 03.23, TCSEFEA23F3F20/21, and Belden Tofino Xenon Security Appliance, an arbitrary firmware image can be loaded because firmware signature verification (for a USB stick) can be bypassed. NOTE: this issue exists because of an incomplete fix of CVE-2017-11400.

Apr 3, 2022
6.8
CVE-2021-30061MEDIUM

On Schneider Electric ConneXium Tofino Firewall TCSEFEA23F3F22 before 03.23, TCSEFEA23F3F20/21, and Belden Tofino Xenon Security Appliance, physically proximate attackers can execute code via a crafted file on a USB stick.

Apr 3, 2022
6.8
CVE-2019-10998MEDIUM

An issue was discovered on Phoenix Contact AXC F 2152 (No.2404267) before 2019.0 LTS and AXC F 2152 STARTERKIT (No.1046568) before 2019.0 LTS devices. Unlimited physical access to the PLC may lead to a manipulation of SD cards data. SD card manipulation may lead to an authentication bypass opportunity.

Jun 18, 2019
6.8
CVE-2017-8371MEDIUM

Schneider Electric StruxureWare Data Center Expert before 7.4.0 uses cleartext RAM storage for passwords, which might allow remote attackers to obtain sensitive information via unspecified vectors.

Apr 30, 2017
6.8
CVE-2015-8561MEDIUM

The F1BookView ActiveX control in F1 Bookview in Schneider Electric ProClima before 6.2 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted integer value to the (1) AttachToSS, (2) CopyAll, (3) CopyRange, (4) CopyRangeEx, or (5) SwapTable method, a different vulnerability than CVE-2015-7918.

Dec 15, 2015
6.8
CVE-2015-7918MEDIUM

Multiple buffer overflows in the F1BookView ActiveX control in F1 Bookview in Schneider Electric ProClima before 6.2 allow remote attackers to execute arbitrary code via the (1) Attach, (2) DefinedName, (3) DefinedNameLocal, (4) ODBCPrepareEx, (5) ObjCreatePolygon, (6) SetTabbedTextEx, or (7) SetValidationRule method, a different vulnerability than CVE-2015-8561.

Dec 15, 2015
6.8
CVE-2015-6465MEDIUM

The GoAhead web server on Moxa EDS-405A and EDS-408A switches with firmware before 3.6 allows remote authenticated users to cause a denial of service (reboot) via a crafted URL.

Sep 11, 2015
6.8
CVE-2015-2848MEDIUM

Cross-site request forgery (CSRF) vulnerability in Honeywell Tuxedo Touch before 5.2.19.0_VA allows remote attackers to hijack the authentication of arbitrary users for requests associated with home-automation commands, as demonstrated by a door-unlock command.

Jul 26, 2015
6.8
CVE-2015-1000MEDIUM

Stack-based buffer overflow in the OpenForIPCamTest method in the RTSPVIDEO.rtspvideoCtrl.1 (aka SStreamVideo) ActiveX control in Moxa SoftCMS before 1.3 allows remote attackers to execute arbitrary code via the StrRtspPath parameter.

Jun 5, 2015
6.8
CVE-2015-2823MEDIUM

Siemens SIMATIC HMI Basic Panels 2nd Generation before WinCC (TIA Portal) 13 SP1 Upd2, SIMATIC HMI Comfort Panels before WinCC (TIA Portal) 13 SP1 Upd2, SIMATIC WinCC Runtime Advanced before WinCC (TIA Portal) 13 SP1 Upd2, SIMATIC WinCC Runtime Professional before WinCC (TIA Portal) 13 SP1 Upd2, SIMATIC HMI Basic Panels 1st Generation (WinCC TIA Portal), SIMATIC HMI Mobile Panel 277 (WinCC TIA Portal), SIMATIC HMI Multi Panels (WinCC TIA Portal), and SIMATIC WinCC 7.x before 7.3 Upd4 allow remote attackers to complete authentication by leveraging knowledge of a password hash without knowledge of the associated password.

Apr 8, 2015
6.8
CVE-2015-1601MEDIUM

Siemens SIMATIC STEP 7 (TIA Portal) 12 and 13 before 13 SP1 Upd1 allows man-in-the-middle attackers to obtain sensitive information or modify transmitted data via unspecified vectors.

Apr 6, 2015
6.8
CVE-2015-1597MEDIUM

The Siemens SPCanywhere application for Android does not use encryption during the loading of code, which allows man-in-the-middle attackers to execute arbitrary code by modifying the client-server data stream.

Mar 7, 2015
6.8
CVE-2015-1049MEDIUM

The web server on Siemens SCALANCE X-200IRT switches with firmware before 5.2.0 allows remote attackers to hijack sessions via unspecified vectors.

Feb 2, 2015
6.8
CVE-2014-8479MEDIUM

The FTP server on Siemens SCALANCE X-300 switches with firmware before 4.0 and SCALANCE X 408 switches with firmware before 4.0 allows remote authenticated users to cause a denial of service (reboot) via crafted FTP packets.

Jan 21, 2015
6.8
CVE-2014-0992MEDIUM

Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the password parameter.

Sep 20, 2014
6.8
CVE-2014-0991MEDIUM

Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the projectname parameter.

Sep 20, 2014
6.8
CVE-2014-0990MEDIUM

Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the UserName parameter.

Sep 20, 2014
6.8
CVE-2014-0989MEDIUM

Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the AccessCode2 parameter.

Sep 20, 2014
6.8
CVE-2014-0988MEDIUM

Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the AccessCode parameter.

Sep 20, 2014
6.8
CVE-2014-0987MEDIUM

Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the NodeName2 parameter.

Sep 20, 2014
6.8
CVE-2014-0986MEDIUM

Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the GotoCmd parameter.

Sep 20, 2014
6.8
CVE-2014-0985MEDIUM

Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote attackers to execute arbitrary code via the NodeName parameter.

Sep 20, 2014
6.8
CVE-2014-4686MEDIUM

The Project administration application in Siemens SIMATIC WinCC before 7.3, as used in PCS7 and other products, has a hardcoded encryption key, which allows remote attackers to obtain sensitive information by extracting this key from another product installation and then employing this key during the sniffing of network traffic on TCP port 1030.

Jul 24, 2014
6.8
CVE-2014-0779MEDIUM

The PLC driver in ServerMain.exe in the Kepware KepServerEX 4 component in Schneider Electric StruxureWare SCADA Expert ClearSCADA 2010 R2 build 71.4165, 2010 R2.1 build 71.4325, 2010 R3 build 72.4560, 2010 R3.1 build 72.4644, 2013 R1 build 73.4729, 2013 R1.1 build 73.4832, 2013 R1.1a build 73.4903, 2013 R1.2 build 73.4955, and 2013 R2 build 74.5094 allows remote attackers to cause a denial of service (application crash) via a crafted OPF file (aka project file).

Mar 14, 2014
6.8
CVE-2014-0774MEDIUM

Stack-based buffer overflow in the C++ sample client in Schneider Electric OPC Factory Server (OFS) TLXCDSUOFS33 - 3.35, TLXCDSTOFS33 - 3.35, TLXCDLUOFS33 - 3.35, TLXCDLTOFS33 - 3.35, and TLXCDLFOFS33 - 3.35 allows local users to gain privileges via vectors involving a malformed configuration file.

Feb 28, 2014
6.8
CVE-2013-4911MEDIUM

Cross-site request forgery (CSRF) vulnerability in Siemens WinCC (TIA Portal) 11 and 12 before 12 SP1 allows remote attackers to hijack the authentication of unspecified victims by leveraging improper configuration of SIMATIC HMI panels by the WinCC product.

Aug 1, 2013
6.8
CVE-2013-0663MEDIUM

Cross-site request forgery (CSRF) vulnerability on the Schneider Electric Quantum 140NOE77111, 140NOE77101, and 140NWM10000; M340 BMXNOC0401, BMXNOE0100x, and BMXNOE011xx; and Premium TSXETY4103, TSXETY5103, and TSXWMY100 PLC modules allows remote attackers to hijack the authentication of arbitrary users for requests that execute commands, as demonstrated by modifying HTTP credentials.

Apr 4, 2013
6.8
CVE-2013-0674MEDIUM

Buffer overflow in the RegReader ActiveX control in Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, allows remote attackers to execute arbitrary code via a long parameter.

Mar 21, 2013
6.8
CVE-2013-0108MEDIUM

An ActiveX control in HscRemoteDeploy.dll in Honeywell Enterprise Buildings Integrator (EBI) R310, R400.2, R410.1, and R410.2; SymmetrE R310, R410.1, and R410.2; ComfortPoint Open Manager (aka CPO-M) Station R100; and HMIWeb Browser client packages allows remote attackers to execute arbitrary code via a crafted HTML document.

Feb 24, 2013
6.8
CVE-2013-0656MEDIUM

Buffer overflow in a third-party ActiveX component in Siemens SIMATIC RF-MANAGER 2008, and RF-MANAGER Basic 3.0 and earlier, allows remote attackers to execute arbitrary code via a crafted web site.

Jan 21, 2013
6.8
CVE-2012-3028MEDIUM

Cross-site request forgery (CSRF) vulnerability in WebNavigator in Siemens WinCC 7.0 SP3 and earlier, as used in SIMATIC PCS7 and other products, allows remote attackers to hijack the authentication of arbitrary users for requests that modify data or cause a denial of service.

Sep 18, 2012
6.8
CVE-2011-4535MEDIUM

Buffer overflow in TurboPower Abbrevia before 4.0, as used in ScadaTEC ScadaPhone 5.3.11.1230 and earlier, ScadaTEC ModbusTagServer 4.1.1.81 and earlier, and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted ZIP file.

Apr 3, 2012
6.8
CVE-2009-0473MEDIUM

Open redirect vulnerability in the web interface in the Rockwell Automation ControlLogix 1756-ENBT/A EtherNet/IP Bridge Module allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.

Feb 6, 2009
6.8
CVE-2006-2405MEDIUM

Directory traversal vulnerability in unb_lib/abbc.conf.php in Unclassified NewsBoard (UNB) 1.6.1 patch 1 and earlier, when register_globals is enabled, allows remote attackers to include arbitrary files via .. (dot dot) sequences and a trailing null byte (%00) in the ABBC[Config][smileset] parameter to unb_lib/abbc.css.php.

May 16, 2006
6.8
CVE-2025-9818MEDIUM

A vulnerability (CWE-428) has been identified in the Uninterruptible Power Supply (UPS) management application provided by OMRON SOCIAL SOLUTIONS Co., Ltd., where the executable file paths of Windows services are not enclosed in quotation marks. If the installation folder path of this product contains spaces, there is a possibility that unauthorized files may be executed under the service privileges by using paths containing spaces.

Sep 17, 2025
6.7
CVE-2025-4407MEDIUM

Insufficient Session Expiration vulnerability in ABB Lite Panel Pro.This issue affects Lite Panel Pro: through 1.0.1.

Jun 30, 2025
6.7
CVE-2025-30000MEDIUM

A vulnerability has been identified in Siemens License Server (SLS) (All versions < V4.3). The affected application does not properly restrict permissions of the users. This could allow a lowly-privileged attacker to escalate their privileges.

Apr 8, 2025
6.7
CVE-2025-29999MEDIUM

A vulnerability has been identified in Siemens License Server (SLS) (All versions < V4.3). The affected application searches for executable files in the application folder without proper validation. This could allow an attacker to execute arbitrary code with administrative privileges by placing a malicious executable in the same directory.

Apr 8, 2025
6.7
CVE-2024-11158MEDIUM

An “uninitialized variable” code execution vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor to craft a DOE file and force the software to access a variable before it being initialized. If exploited, a threat actor could leverage this vulnerability to execute arbitrary code. To exploit this vulnerability, a legitimate user must execute the malicious code crafted by the threat actor.

Dec 5, 2024
6.7
CVE-2024-1574MEDIUM

Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') vulnerability in the licensing feature of Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97 to 10.97.2, Mitsubishi Electric GENESIS64 versions 10.97 to 10.97.2, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite versions 10.97 to 10.97.2, Mitsubishi Electric ICONICS Suite versions 10.97 to 10.97.2, Mitsubishi Electric Iconics Digital Solutions GENESIS32 versions 9.7 and prior, Mitsubishi Electric GENESIS32 versions 9.7 and prior, Mitsubishi Electric Iconics Digital Solutions BizViz versions 9.7 and prior, Mitsubishi Electric BizViz versions 9.7 and prior, and Mitsubishi Electric MC Works64 all versions allows a local attacker to execute a malicious code with administrative privileges by tampering with a specific file that is not protected by the system.

Jul 4, 2024
6.7
CVE-2020-25182MEDIUM

Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x searches for and loads DLLs as dynamic libraries. Uncontrolled loading of dynamic libraries could allow a local, unauthenticated attacker to execute arbitrary code. This vulnerability only affects ISaGRAF Runtime when running on Microsoft Windows systems.

Mar 18, 2022
6.7
CVE-2020-6992MEDIUM

A local privilege escalation vulnerability has been identified in the GE Digital CIMPLICITY HMI/SCADA product v10.0 and prior. If exploited, this vulnerability could allow an adversary to modify the system, leading to the arbitrary execution of code. This vulnerability is only exploitable if an attacker has access to an authenticated session. GE Digital CIMPLICITY v11.0, released January 2020, contains mitigation for this local privilege escalation vulnerability. GE Digital recommends all users upgrade to GE CIMPLICITY v11.0 or newer.

Apr 15, 2020
6.7
CVE-2018-7522MEDIUM

In Schneider Electric Triconex Tricon MP model 3008 firmware versions 10.0-10.4, when a system call is made, registers are stored to a fixed memory location. Modifying the data in this location could allow attackers to gain supervisor-level access and control system states.

May 4, 2018
6.7
CVE-2018-4844MEDIUM

A vulnerability has been identified in SIMATIC WinCC OA UI for Android (All versions < V3.15.10), SIMATIC WinCC OA UI for iOS (All versions < V3.15.10). Insufficient limitation of CONTROL script capabilities could allow read and write access from one HMI project cache folder to other HMI project cache folders within the app's sandbox on the same mobile device. This includes HMI project cache folders of other configured WinCC OA servers. The security vulnerability could be exploited by an attacker who tricks an app user to connect to an attacker-controlled WinCC OA server. Successful exploitation requires user interaction and read/write access to the app's folder on a mobile device. The vulnerability could allow reading data from and writing data to the app's folder. At the time of advisory publication no public exploitation of this security vulnerability was known. Siemens confirms the security vulnerability and provides mitigations to resolve the security issue.

Mar 20, 2018
6.7
CVE-2017-9969MEDIUM

An information disclosure vulnerability exists in Schneider Electric's IGSS Mobile application version 3.01 and prior. Passwords are stored in clear text in the configuration which can result in exposure of sensitive information.

Feb 12, 2018
6.7
CVE-2016-5848MEDIUM

Siemens SICAM PAS before 8.07 does not properly restrict password data in the database, which makes it easier for local users to calculate passwords by leveraging unspecified database privileges.

Jul 4, 2016
6.7
CVE-2025-0694MEDIUM

Insufficient path validation in CODESYS Control allows low privileged attackers with physical access to gain full filesystem access.

Mar 18, 2025
6.6
CVE-2023-3712MEDIUM

Files or Directories Accessible to External Parties vulnerability in Honeywell PM43 on 32 bit, ARM (Printer web page modules) allows Privilege Escalation.This issue affects PM43 versions prior to P10.19.050004.  Update to the latest available firmware version of the respective printers to version MR19.5 (e.g. P10.19.050006).

Sep 12, 2023
6.6
CVE-2023-3463MEDIUM

All versions of GE Digital CIMPLICITY that are not adhering to SDG guidance and accepting documents from untrusted sources are vulnerable to memory corruption issues due to insufficient input validation, including issues such as out-of-bounds reads and writes, use-after-free, stack-based buffer overflows, uninitialized pointers, and a heap-based buffer overflow. Successful exploitation could allow an attacker to execute arbitrary code.

Jul 19, 2023
6.6
CVE-2022-2792MEDIUM

Emerson Electric's Proficy Machine Edition Version 9.00 and prior is vulenrable to CWE-284 Improper Access Control, and stores project data in a directory with improper access control lists.

Aug 19, 2022
6.6
CVE-2020-8487MEDIUM

Insufficient protection of the inter-process communication functions in ABB System 800xA Base (all published versions) enables an attacker authenticated on the local system to inject data, affect node redundancy handling.

Apr 29, 2020
6.6
CVE-2020-8486MEDIUM

Insufficient protection of the inter-process communication functions in ABB System 800xA RNRP (all published versions) enables an attacker authenticated on the local system to inject data, affect node redundancy handling.

Apr 29, 2020
6.6
CVE-2017-7907MEDIUM

An Improper XML Parser Configuration issue was discovered in Schneider Electric Wonderware Historian Client 2014 R2 SP1 and prior. An improperly restricted XML parser (with improper restriction of XML external entity reference, or XXE) may allow an attacker to enter malicious input through the application which could cause a denial of service or disclose file contents from a server or connected network.

May 19, 2017
6.6
CVE-2016-4525MEDIUM

Unspecified ActiveX controls in Advantech WebAccess before 8.1_20160519 allow remote authenticated users to obtain sensitive information or modify data via unknown vectors, related to the INTERFACESAFE_FOR_UNTRUSTED_CALLER (aka safe for scripting) flag.

Jun 25, 2016
6.6
CVE-2013-4651MEDIUM

Siemens Scalance W7xx devices with firmware before 4.5.4 use the same hardcoded X.509 certificate across different customers' installations, which makes it easier for remote attackers to conduct man-in-the-middle attacks against SSL sessions by leveraging the certificate's trust relationship.

Aug 1, 2013
6.6
CVE-2013-0687MEDIUM

The installer routine in Schneider Electric MiCOM S1 Studio uses world-writable permissions for executable files, which allows local users to modify the service or the configuration files, and consequently gain privileges or trigger incorrect protective-relay operation, via a Trojan horse executable file.

Apr 18, 2013
6.6
CVE-2025-13778MEDIUM

Missing authentication for critical function vulnerability in ABB AWIN GW100 rev.2, ABB AWIN GW120.This issue affects AWIN GW100 rev.2: 2.0-0, 2.0-1; AWIN GW120: 1.2-0, 1.2-1.

Mar 13, 2026
6.5
CVE-2024-55025MEDIUM

Incorrect access control in the VNC component of Weintek cMT-3072XH2 easyweb v2.1.53, OS v20231011 allows unauthorized attackers to access the HMI system.

Mar 3, 2026
6.5
CVE-2025-48023MEDIUM

A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation. If affected product receives maliciously crafted packets, Vnet/IP software stack process may be terminated. The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier

Feb 13, 2026
6.5
CVE-2025-48022MEDIUM

A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation. If affected product receives maliciously crafted packets, Vnet/IP software stack process may be terminated. The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier

Feb 13, 2026
6.5
CVE-2025-48021MEDIUM

A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation. If affected product receives maliciously crafted packets, Vnet/IP software stack process may be terminated. The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier

Feb 13, 2026
6.5
CVE-2025-48020MEDIUM

A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation. If affected product receives maliciously crafted packets, Vnet/IP software stack process may be terminated. The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier

Feb 13, 2026
6.5
CVE-2025-48019MEDIUM

A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporation. If affected product receives maliciously crafted packets, Vnet/IP software stack process may be terminated. The affected products and versions are as follows: Vnet/IP Interface Package (for CENTUM VP R6 VP6C3300, CENTUM VP R7 VP7C3300) R1.07.00 or earlier

Feb 13, 2026
6.5
CVE-2025-4677MEDIUM

Insufficient Session Expiration vulnerability in ABB WebPro SNMP Card PowerValue, ABB WebPro SNMP Card PowerValue UL.This issue affects WebPro SNMP Card PowerValue: through 1.1.8.K; WebPro SNMP Card PowerValue UL: through 1.1.8.K.

Jan 7, 2026
6.5
CVE-2025-4675MEDIUM

Improper Check for Unusual or Exceptional Conditions vulnerability in ABB WebPro SNMP Card PowerValue, ABB WebPro SNMP Card PowerValue UL.This issue affects WebPro SNMP Card PowerValue: through 1.1.8.K; WebPro SNMP Card PowerValue UL: through 1.1.8.K.

Jan 7, 2026
6.5
CVE-2025-34247MEDIUM

Advantech WebAccess/VPN versions prior to 1.1.5 contain a SQL injection vulnerability in NetworksController.addNetworkAction() that allows an authenticated low-privileged observer user to inject SQL via datatable search parameters, leading to disclosure of database information.

Nov 6, 2025
6.5
CVE-2025-34246MEDIUM

Advantech WebAccess/VPN versions prior to 1.1.5 contain a SQL injection vulnerability in AjaxPrevalidationController.ajaxAction() that allows an authenticated low-privileged observer user to inject SQL via datatable search parameters, leading to disclosure of database information.

Nov 6, 2025
6.5
CVE-2025-34245MEDIUM

Advantech WebAccess/VPN versions prior to 1.1.5 contain a SQL injection vulnerability in AjaxStandaloneVpnClientsController.ajaxAction() that allows an authenticated low-privileged observer user to inject SQL via datatable search parameters, leading to disclosure of database information.

Nov 6, 2025
6.5
CVE-2025-34244MEDIUM

Advantech WebAccess/VPN versions prior to 1.1.5 contain a SQL injection vulnerability in AjaxFwRulesController.ajaxDeviceFwRulesAction() that allows an authenticated low-privileged observer user to inject SQL via datatable search parameters, leading to disclosure of database information.

Nov 6, 2025
6.5
CVE-2025-34243MEDIUM

Advantech WebAccess/VPN versions prior to 1.1.5 contain a SQL injection vulnerability in AjaxFwRulesController.ajaxNetworkFwRulesAction() that allows an authenticated low-privileged observer user to inject SQL via datatable search parameters, leading to disclosure of database information.

Nov 6, 2025
6.5
CVE-2025-34242MEDIUM

Advantech WebAccess/VPN versions prior to 1.1.5 contain a SQL injection vulnerability in AjaxNetworkController.ajaxAction() that allows an authenticated low-privileged observer user to inject SQL via datatable search parameters, leading to disclosure of database information.

Nov 6, 2025
6.5
CVE-2025-34241MEDIUM

Advantech WebAccess/VPN versions prior to 1.1.5 contain a SQL injection vulnerability in AjaxDeviceController.ajaxDeviceAction() that allows an authenticated low-privileged observer user to inject SQL via datatable search parameters, leading to disclosure of database information.

Nov 6, 2025
6.5
CVE-2025-34240MEDIUM

Advantech WebAccess/VPN versions prior to 1.1.5 contain a SQL injection vulnerability in AppManagementController.appUpgradeAction() that allows an authenticated low-privileged observer user to inject SQL via datatable search parameters, leading to disclosure of database information.

Nov 6, 2025
6.5
CVE-2025-34238MEDIUM

Advantech WebAccess/VPN versions prior to 1.1.5 contain an absolute path traversal via AjaxStandaloneVpnClientsController.ajaxDownloadRoadWarriorConfigFileAction() that allows an authenticated network administrator to cause the application to read and return the contents of arbitrary files the web user (www-data) can access.

Nov 6, 2025
6.5
CVE-2025-53509MEDIUM

A vulnerability exists in Advantech iView that allows for argument injection in the NetworkServlet.restoreDatabase(). This issue requires an authenticated attacker with at least user-level privileges. An input parameter can be used directly in a command without proper sanitization, allowing arbitrary arguments to be injected. This can result in information disclosure, including sensitive database credentials.

Jul 11, 2025
6.5
CVE-2025-52459MEDIUM

A vulnerability exists in Advantech iView that allows for argument injection in NetworkServlet.backupDatabase(). This issue requires an authenticated attacker with at least user-level privileges. Certain parameters can be used directly in a command without proper sanitization, allowing arbitrary arguments to be injected. This can result in information disclosure, including sensitive database credentials.

Jul 11, 2025
6.5
CVE-2025-2522MEDIUM

The Honeywell Experion PKS and OneWireless WDM contains Sensitive Information in Resource vulnerability in the component Control Data Access (CDA). An attacker could potentially exploit this vulnerability, leading to a Communication Channel Manipulation, which could result in buffer reuse which may cause incorrect system behavior. Honeywell also recommends updating to the most recent version of Honeywell Experion PKS:520.2 TCU9 HF1 and 530.1 TCU3 HF1 and OneWireless: 322.5 and 331.1.  The affected Experion PKS products are C300, FIM4, FIM8, UOC, CN100, HCA, C300PM, and C200E. The Experion PKS versions affected are 520.1 before 520.2 TCU9 HF1 and 530 before 530 TCU3. The OneWireless WDM affected versions are 322.1 through 322.4 and 330.1 through 330.3.

Jul 10, 2025
6.5
CVE-2025-5022MEDIUM

Weak Password Requirements vulnerability in Mitsubishi Electric Corporation photovoltaic system monitor “EcoGuideTAB” PV-DR004J all versions and PV-DR004JA all versions allows an attacker within the Wi-Fi communication range between the units of the product (measurement unit and display unit) to derive the password from the SSID. In addition, if the product is configured to enable the individual air conditioner control function, an attacker who has access to the Wi-Fi communication between the units by exploiting this vulnerability may be able to execute ECHONET Lite commands to perform operations such as turning the air conditioner on or off and changing the set temperature. The individual air conditioner control function is available only in display unit version 02.00.01 or later and measurement unit version 02.03.01 or later. The affected products discontinued in 2015, support ended in 2020.

Jul 10, 2025
6.5
CVE-2025-6074MEDIUM

Use of Hard-coded Cryptographic Key vulnerability in ABB RMC-100, ABB RMC-100 LITE. When the REST interface is enabled by the user, and an attacker gains access to source code and control network, the attacker can bypass the REST interface authentication and gain access to MQTT configuration data. This issue affects RMC-100: from 2105457-043 through 2105457-045; RMC-100 LITE: from 2106229-015 through 2106229-016.

Jul 3, 2025
6.5
CVE-2025-49427MEDIUM

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ryan Burnette Abbie Expander allows Stored XSS. This issue affects Abbie Expander: from n/a through 1.0.1.

Jun 6, 2025
6.5
CVE-2025-0921MEDIUM

Execution with Unnecessary Privileges vulnerability in multiple services of Mitsubishi Electric GENESIS64 all versions, Mitsubishi Electric Iconics Digital Solutions GENESIS64 all versions, Mitsubishi Electric ICONICS Suite all versions, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite all versions, Mitsubishi Electric MC Works64 all versions, Mitsubishi Electric GENESIS version 11.00, Mitsubishi Electric Iconics Digital Solutions GENESIS version 11.00, Mitsubishi Electric GENESIS32 all versions, Mitsubishi Electric Iconics Digital Solutions GENESIS32 all versions, Mitsubishi Electric BizViz all versions, and Mitsubishi Electric Iconics Digital Solutions BizViz all versions allows a local authenticated attacker to make an unauthorized write to arbitrary files, by creating a symbolic link from a file used as a write destination by the services of the affected products to a target file. This could allow the attacker to destroy the file on a PC with the affected products installed, resulting in a denial-of-service (DoS) condition on the PC if the destroyed file is necessary for the operation of the PC.

May 15, 2025
6.5
CVE-2024-50377MEDIUM

A CWE-798 "Use of Hard-coded Credentials" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The vulnerability is associated to the backup configuration functionality that by default encrypts the archives using a static password.

Nov 26, 2024
6.5
CVE-2024-6436MEDIUM

An input validation vulnerability exists in the Rockwell Automation Sequence Manager™ which could allow a malicious user to send malformed packets to the server and cause a denial-of-service condition. If exploited, the device would become unresponsive, and a manual restart will be required for recovery. Additionally, if exploited, there could be a loss of view for the downstream equipment sequences in the controller. Users would not be able to view the status or command the equipment sequences, however the equipment sequence would continue to execute uninterrupted.

Sep 27, 2024
6.5
CVE-2024-6325MEDIUM

The v6.40 release of Rockwell Automation FactoryTalk® Policy Manager CVE-2021-22681 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1550.html  and CVE-2022-1161 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1585.html  by implementing CIP security and did not update to the versions of the software CVE-2022-1161 https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1585.html  and CVE-2022-1161. https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.PN1585.html

Jul 16, 2024
6.5
CVE-2024-5659MEDIUM

Rockwell Automation was made aware of a vulnerability that causes all affected controllers on the same network to result in a major nonrecoverable fault(MNRF/Assert). This vulnerability could be exploited by sending abnormal packets to the mDNS port. If exploited, the availability of the device would be compromised.

Jun 14, 2024
6.5
CVE-2023-51605MEDIUM

Honeywell Saia PG5 Controls Suite XML External Entity Processing Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Honeywell Saia PG5 Controls Suite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XML files. Due to the improper restriction of XML External Entity (XXE) references, a crafted document specifying a URI causes the XML parser to access the URI and embed the contents back into the XML document for further processing. An attacker can leverage this vulnerability to disclose information in the context of the current process. . Was ZDI-CAN-18644.

May 3, 2024
6.5
CVE-2023-51604MEDIUM

Honeywell Saia PG5 Controls Suite XML External Entity Processing Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Honeywell Saia PG5 Controls Suite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XML files. Due to the improper restriction of XML External Entity (XXE) references, a crafted document specifying a URI causes the XML parser to access the URI and embed the contents back into the XML document for further processing. An attacker can leverage this vulnerability to disclose information in the context of the current process. . Was ZDI-CAN-18593.

May 3, 2024
6.5
CVE-2023-51602MEDIUM

Honeywell Saia PG5 Controls Suite XML External Entity Processing Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Honeywell Saia PG5 Controls Suite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XML files. Due to the improper restriction of XML External Entity (XXE) references, a crafted document specifying a URI causes the XML parser to access the URI and embed the contents back into the XML document for further processing. An attacker can leverage this vulnerability to disclose information in the context of the current process. . Was ZDI-CAN-18591.

May 3, 2024
6.5
CVE-2023-51601MEDIUM

Honeywell Saia PG5 Controls Suite XML External Entity Processing Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Honeywell Saia PG5 Controls Suite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of xml files. Due to the improper restriction of XML External Entity (XXE) references, a crafted document specifying a URI causes the XML parser to access the URI and embed the contents back into the XML document for further processing. An attacker can leverage this vulnerability to disclose information in the context of the current process. . Was ZDI-CAN-18563.

May 3, 2024
6.5
CVE-2023-51600MEDIUM

Honeywell Saia PG5 Controls Suite XML External Entity Processing Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Honeywell Saia PG5 Controls Suite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XML files. Due to the improper restriction of XML External Entity (XXE) references, a crafted document specifying a URI causes the XML parser to access the URI and embed the contents back into the XML document for further processing. An attacker can leverage this vulnerability to disclose information in the context of the current process. . Was ZDI-CAN-18456.

May 3, 2024
6.5
CVE-2024-1309MEDIUM

Uncontrolled Resource Consumption vulnerability in Honeywell Niagara Framework on Windows, Linux, QNX allows Content Spoofing.This issue affects Niagara Framework: before Niagara AX 3.8.1, before Niagara 4.1.

Feb 13, 2024
6.5
CVE-2023-6815MEDIUM

Incorrect Privilege Assignment vulnerability in Mitsubishi Electric Corporation MELSEC iQ-R Series Safety CPU R08/16/32/120SFCPU all versions and MELSEC iQ-R Series SIL2 Process CPU R08/16/32/120PSFCPU all versions allows a remote authenticated attacker who has logged into the product as a non-administrator user to disclose the credentials (user ID and password) of a user with a lower access level than the attacker by sending a specially crafted packet.

Feb 13, 2024
6.5
CVE-2023-4215MEDIUM

Advantech WebAccess version 9.1.3 contains an exposure of sensitive information to an unauthorized actor vulnerability that could leak user credentials.

Oct 17, 2023
6.5
CVE-2023-5459MEDIUM

A vulnerability has been found in Delta Electronics DVP32ES2 PLC 1.48 and classified as critical. This vulnerability affects unknown code of the component Password Transmission Handler. The manipulation leads to denial of service. The exploit has been disclosed to the public and may be used. VDB-241582 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Oct 9, 2023
6.5
CVE-2023-37559MEDIUM

After successful authentication as a user in multiple Codesys products in multiple versions, specific crafted network communication requests with inconsistent content can cause the CmpAppForce component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37558

Aug 3, 2023
6.5
CVE-2023-37558MEDIUM

After successful authentication as a user in multiple Codesys products in multiple versions, specific crafted network communication requests with inconsistent content can cause the CmpAppForce component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37559

Aug 3, 2023
6.5
CVE-2023-37557MEDIUM

After successful authentication as a user in multiple Codesys products in multiple versions, specific crafted remote communication requests can cause the CmpAppBP component to overwrite a heap-based buffer, which can lead to a denial-of-service condition.

Aug 3, 2023
6.5
CVE-2023-37556MEDIUM

In multiple versions of multiple Codesys products, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpAppBP component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37552, CVE-2023-37553, CVE-2023-37554 and CVE-2023-37555.

Aug 3, 2023
6.5
CVE-2023-37555MEDIUM

In multiple versions of multiple Codesys products, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpAppBP component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37552, CVE-2023-37553, CVE-2023-37554 and CVE-2023-37556.

Aug 3, 2023
6.5
CVE-2023-37554MEDIUM

In multiple versions of multiple Codesys products, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpAppBP component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37552, CVE-2023-37553, CVE-2023-37555 and CVE-2023-37556.

Aug 3, 2023
6.5
CVE-2023-37553MEDIUM

In multiple versions of multiple Codesys products, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpAppBP component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37552, CVE-2023-37554, CVE-2023-37555 and CVE-2023-37556.

Aug 3, 2023
6.5
CVE-2023-37552MEDIUM

In multiple versions of multiple Codesys products, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpAppBP component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37553, CVE-2023-37554, CVE-2023-37555 and CVE-2023-37556.

Aug 3, 2023
6.5
CVE-2023-37551MEDIUM

In multiple Codesys products in multiple versions, after successful authentication as a user, specially crafted network communication requests can utilize the CmpApp component to download files with any file extensions to the controller. In contrast to the regular file download via CmpFileTransfer, no filtering of certain file types is performed here. As a result, the integrity of the CODESYS control runtime system may be compromised by the files loaded onto the controller.

Aug 3, 2023
6.5
CVE-2023-37550MEDIUM

In multiple Codesys products in multiple versions, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpApp component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37545, CVE-2023-37546, CVE-2023-37547, CVE-2023-37548 and CVE-2023-37549.

Aug 3, 2023
6.5
CVE-2023-37549MEDIUM

In multiple Codesys products in multiple versions, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpApp component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37545, CVE-2023-37546, CVE-2023-37547, CVE-2023-37548 and CVE-2023-37550

Aug 3, 2023
6.5
CVE-2023-37548MEDIUM

In multiple Codesys products in multiple versions, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpApp component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37545, CVE-2023-37546, CVE-2023-37547, CVE-2023-37549 and CVE-2023-37550

Aug 3, 2023
6.5
CVE-2023-37547MEDIUM

In multiple Codesys products in multiple versions, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpApp component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37545, CVE-2023-37546, CVE-2023-37548, CVE-2023-37549 and CVE-2023-37550

Aug 3, 2023
6.5
CVE-2023-37546MEDIUM

In multiple Codesys products in multiple versions, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpApp component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37545, CVE-2023-37547, CVE-2023-37548, CVE-2023-37549 and CVE-2023-37550

Aug 3, 2023
6.5
CVE-2023-37545MEDIUM

In multiple Codesys products in multiple versions, after successful authentication as a user, specific crafted network communication requests with inconsistent content can cause the CmpApp component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37546, CVE-2023-37547, CVE-2023-37548, CVE-2023-37549, CVE-2023-37550

Aug 3, 2023
6.5
CVE-2023-34316MEDIUM

​An attacker could bypass the latest Delta Electronics InfraSuite Device Master (versions prior to 1.0.7) patch, which could allow an attacker to retrieve file contents.

Jul 10, 2023
6.5
CVE-2022-4240MEDIUM

Missing Authentication for Critical Function vulnerability in Honeywell OneWireless allows Authentication Bypass. This issue affects OneWireless version 322.1

May 30, 2023
6.5
CVE-2022-47393MEDIUM

An authenticated, remote attacker may use a Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple versions of multiple CODESYS products to force a denial-of-service situation.

May 15, 2023
6.5
CVE-2022-47392MEDIUM

An authenticated, remote attacker may use a improper input validation vulnerability in the CmpApp/CmpAppBP/CmpAppForce Components of multiple CODESYS products in multiple versions to read from an invalid address which can lead to a denial-of-service condition.

May 15, 2023
6.5
CVE-2022-47378MEDIUM

Multiple CODESYS products in multiple versions are prone to a improper input validation vulnerability. An authenticated remote attacker may craft specific requests that use the vulnerability leading to a denial-of-service condition.

May 15, 2023
6.5
CVE-2023-1137MEDIUM

Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contain a vulnerability in which a low-level user could extract files and plaintext credentials of administrator users, resulting in privilege escalation.

Mar 27, 2023
6.5
CVE-2022-3387MEDIUM

Advantech R-SeeNet Versions 2.4.19 and prior are vulnerable to path traversal attacks. An unauthorized attacker could remotely exploit vulnerable PHP code to delete .PDF files.

Oct 27, 2022
6.5
CVE-2022-2179MEDIUM

The X-Frame-Options header in Rockwell Automation MicroLogix 1100/1400 Versions 21.007 and prior is not configured in the HTTP response, which could allow clickjacking attacks.

Jul 20, 2022
6.5
CVE-2022-30245MEDIUM

Honeywell Alerton Compass Software 1.6.5 allows unauthenticated configuration changes from remote users. This enables configuration data to be stored on the controller and then implemented. A user with malicious intent can send a crafted packet to change the controller configuration without the knowledge of other users, altering the controller's function capabilities. The changed configuration is not updated in the User Interface, which creates an inconsistency between the configuration display and the actual configuration on the controller. After the configuration change, remediation requires reverting to the correct configuration, requiring either physical or remote access depending on the configuration that was altered.

Jul 15, 2022
6.5
CVE-2022-32141MEDIUM

Multiple CODESYS Products are prone to a buffer over read. A low privileged remote attacker may craft a request with an invalid offset, which can cause an internal buffer over-read, resulting in a denial-of-service condition. User interaction is not required.

Jun 24, 2022
6.5
CVE-2022-32140MEDIUM

Multiple CODESYS products are affected to a buffer overflow.A low privileged remote attacker may craft a request, which can cause a buffer copy without checking the size of the service, resulting in a denial-of-service condition. User Interaction is not required.

Jun 24, 2022
6.5
CVE-2022-32139MEDIUM

In multiple CODESYS products, a low privileged remote attacker may craft a request, which cause an out-of-bounds read, resulting in a denial-of-service condition. User Interaction is not required.

Jun 24, 2022
6.5
CVE-2022-32136MEDIUM

In multiple CODESYS products, a low privileged remote attacker may craft a request that cause a read access to an uninitialized pointer, resulting in a denial-of-service. User interaction is not required.

Jun 24, 2022
6.5
CVE-2022-1596MEDIUM

Incorrect Permission Assignment for Critical Resource vulnerability in ABB REX640 PCL1, REX640 PCL2, REX640 PCL3 allows an authenticated attacker to launch an attack against the user database file and try to take control of an affected system node.

Jun 21, 2022
6.5
CVE-2022-22513MEDIUM

An authenticated remote attacker can cause a null pointer dereference in the CmpSettings component of the affected CODESYS products which leads to a crash.

Apr 7, 2022
6.5
CVE-2021-34596MEDIUM

A crafted request may cause a read access to an uninitialized pointer in CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56, resulting in a denial-of-service condition.

Oct 26, 2021
6.5
CVE-2021-22272MEDIUM

The vulnerability origins in the commissioning process where an attacker of the ControlTouch can enter a serial number in a specific way to transfer the device virtually into her/his my.busch-jaeger.de or mybuildings.abb.com profile. A successful attacker can observe and control a ControlTouch remotely under very specific circumstances. The issue is fixed in the cloud side of the system. No firmware update is needed for customer products. If a user wants to understand if (s)he is affected, please read the advisory. This issue affects: ABB and Busch-Jaeger, ControlTouch

Sep 27, 2021
6.5
CVE-2021-32954MEDIUM

Advantech WebAccess/SCADA Versions 9.0.1 and prior is vulnerable to a directory traversal, which may allow an attacker to remotely read arbitrary files on the file system.

Jun 18, 2021
6.5
CVE-2020-12521MEDIUM

On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS a specially crafted LLDP packet may lead to a high system load in the PROFINET stack. An attacker can cause failure of system services or a complete reboot.

Dec 17, 2020
6.5
CVE-2020-12068MEDIUM

An issue was discovered in CODESYS Development System before 3.5.16.0. CODESYS WebVisu and CODESYS Remote TargetVisu are susceptible to privilege escalation.

May 14, 2020
6.5
CVE-2019-19101MEDIUM

A missing secure communication definition and an incomplete TLS validation in the upgrade service in B&R Automation Studio versions 4.0.x, 4.1.x, 4.2.x, < 4.3.11SP, < 4.4.9SP, < 4.5.5SP, < 4.6.4 and < 4.7.2 enable unauthenticated users to perform MITM attacks via the B&R upgrade server.

Apr 29, 2020
6.5
CVE-2019-19001MEDIUM

For ABB eSOMS versions 4.0 to 6.0.2, the X-Frame-Options header is not configured in HTTP response. This can potentially allow 'ClickJacking' attacks where an attacker can frame parts of the application on a malicious web site, revealing sensitive user information such as authentication credentials.

Apr 2, 2020
6.5
CVE-2019-19000MEDIUM

For ABB eSOMS 4.0 to 6.0.3, the Cache-Control and Pragma HTTP header(s) have not been properly configured within the application response. This can potentially allow browsers and proxies to cache sensitive information.

Apr 2, 2020
6.5
CVE-2020-6999MEDIUM

In Moxa EDS-G516E Series firmware, Version 5.2 or lower, some of the parameters in the setting pages do not ensure text is the correct size for its buffer.

Mar 26, 2020
6.5
CVE-2020-7052MEDIUM

CODESYS Control V3, Gateway V3, and HMI V3 before 3.5.15.30 allow uncontrolled memory allocation which can result in a remote denial of service condition.

Jan 24, 2020
6.5
CVE-2019-19789MEDIUM

3S-Smart CODESYS SP Realtime NT before V2.3.7.28, CODESYS Runtime Toolkit 32 bit full before V2.4.7.54, and CODESYS PLCWinNT before V2.4.7.54 allow a NULL pointer dereference.

Dec 20, 2019
6.5
CVE-2019-18229MEDIUM

Advantech WISE-PaaS/RMM, Versions 3.3.29 and prior. Lack of sanitization of user-supplied input cause SQL injection vulnerabilities. An attacker can leverage these vulnerabilities to disclose information.

Oct 31, 2019
6.5
CVE-2019-14925MEDIUM

An issue was discovered on Mitsubishi Electric Europe B.V. ME-RTU devices through 2.02 and INEA ME-RTU devices through 3.0. A world-readable /usr/smartrtu/init/settings.xml configuration file on the file system allows an attacker to read sensitive configuration settings such as usernames, passwords, and other sensitive RTU data due to insecure permission assignment.

Oct 28, 2019
6.5
CVE-2019-13542MEDIUM

3S-Smart Software Solutions GmbH CODESYS V3 OPC UA Server, all versions 3.5.11.0 to 3.5.15.0, allows an attacker to send crafted requests from a trusted OPC UA client that cause a NULL pointer dereference, which may trigger a denial-of-service condition.

Sep 17, 2019
6.5
CVE-2019-6559MEDIUM

Moxa IKS and EDS allow remote authenticated users to cause a denial of service via a specially crafted packet, which may cause the switch to crash.

Mar 5, 2019
6.5
CVE-2018-15706MEDIUM

WADashboard API in Advantech WebAccess 8.3.1 and 8.3.2 allows remote authenticated attackers to read any file on the filesystem due to a directory traversal vulnerability in the readFile API.

Oct 31, 2018
6.5
CVE-2018-15705MEDIUM

WADashboard API in Advantech WebAccess 8.3.1 and 8.3.2 allows remote authenticated attackers to write or overwrite any file on the filesystem due to a directory traversal vulnerability in the writeFile API. An attacker can use this vulnerability to remotely execute arbitrary code.

Oct 31, 2018
6.5
CVE-2018-14824MEDIUM

Delta Electronics Delta Industrial Automation PMSoft v2.11 or prior has an out-of-bounds read vulnerability that can be executed when processing project files, which may allow an attacker to read confidential information.

Sep 27, 2018
6.5
CVE-2018-12979MEDIUM

An issue was discovered on WAGO e!DISPLAY 762-3000 through 762-3003 devices with firmware before FW 02. Weak permissions allow an authenticated user to overwrite critical files by abusing the unrestricted file upload in the WBM.

Jul 12, 2018
6.5
CVE-2018-7770MEDIUM

The vulnerability exists within processing of sendmail.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. The applet allows callers to select arbitrary files to send to an arbitrary email address.

Jul 3, 2018
6.5
CVE-2017-12124MEDIUM

An exploitable denial of service vulnerability exists in the web server functionality of Moxa EDR-810 V4.1 build 17030317. A specially crafted HTTP URI can cause a null pointer dereference resulting in the web server crashing. An attacker can send a crafted URI to trigger this vulnerability.

May 14, 2018
6.5
CVE-2017-12716MEDIUM

Abbott Laboratories Accent and Anthem pacemakers manufactured prior to Aug 28, 2017 transmit unencrypted patient information via RF communications to programmers and home monitoring units. Additionally, the Accent and Anthem pacemakers store the optional patient information without encryption. CVSS v3 base score: 3.1, CVSS vector string: AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N. Abbott has developed a firmware update to help mitigate the identified vulnerabilities.

Apr 25, 2018
6.5
CVE-2017-12714MEDIUM

Abbott Laboratories pacemakers manufactured prior to Aug 28, 2017 do not restrict or limit the number of correctly formatted "RF wake-up" commands that can be received, which may allow a nearby attacker to repeatedly send commands to reduce pacemaker battery life. CVSS v3 base score: 5.3, CVSS vector string: AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H. Abbott has developed a firmware update to help mitigate the identified vulnerabilities.

Apr 25, 2018
6.5
CVE-2018-7758MEDIUM

A denial of service vulnerability exists in Schneider Electric's MiCOM Px4x (P540 range excluded) with legacy Ethernet board, MiCOM P540D Range with Legacy Ethernet Board, and MiCOM Px4x Rejuvenated could lose network communication in case of TCP/IP open requests on port 20000 (DNP3oE) if an older TCI/IP session is still open with identical IP address and port number.

Apr 18, 2018
6.5
CVE-2018-5449MEDIUM

A NULL Pointer Dereference issue was discovered in Moxa OnCell G3100-HSPA Series version 1.4 Build 16062919 and prior. The application does not check for a NULL value, allowing for an attacker to perform a denial of service attack.

Mar 5, 2018
6.5
CVE-2017-16732MEDIUM

A use-after-free issue was discovered in Advantech WebAccess versions prior to 8.3. WebAccess allows an unauthenticated attacker to specify an arbitrary address.

Jan 12, 2018
6.5
CVE-2017-15583MEDIUM

The embedded web server on ABB Fox515T 1.0 devices is vulnerable to Local File Inclusion. It accepts a parameter that specifies a file for display or for use as a template. The filename is not validated; an attacker could retrieve any file.

Oct 18, 2017
6.5
CVE-2017-7971MEDIUM

A vulnerability exists in Schneider Electric's PowerSCADA Anywhere v1.0 redistributed with PowerSCADA Expert v8.1 and PowerSCADA Expert v8.2 and Citect Anywhere version 1.0 that allows the use of outdated cipher suites and improper verification of peer SSL Certificate.

Sep 26, 2017
6.5
CVE-2017-7970MEDIUM

A vulnerability exists in Schneider Electric's PowerSCADA Anywhere v1.0 redistributed with PowerSCADA Expert v8.1 and PowerSCADA Expert v8.2 and Citect Anywhere version 1.0 that allows the ability to specify Arbitrary Server Target Nodes in connection requests to the Secure Gateway and Server components.

Sep 26, 2017
6.5
CVE-2017-9945MEDIUM

In the Siemens 7KM PAC Switched Ethernet PROFINET expansion module (All versions < V2.1.3), a Denial-of-Service condition could be induced by a specially crafted PROFINET DCP packet sent as a local Ethernet (Layer 2) broadcast. The affected component requires a manual restart via the main device to recover.

Aug 30, 2017
6.5
CVE-2017-6872MEDIUM

A vulnerability was discovered in Siemens OZW672 (all versions) and OZW772 (all versions) that could allow an attacker with access to port 21/tcp to access or alter historical measurement data stored on the device.

Aug 8, 2017
6.5
CVE-2017-6866MEDIUM

A vulnerability was discovered in Siemens XHQ server 4 and 5 (4 before V4.7.1.3 and 5 before V5.0.0.2) that could allow an authenticated low-privileged remote user to gain read access to data in the XHQ solution exceeding his configured permission level.

Aug 7, 2017
6.5
CVE-2017-7916MEDIUM

A Permissions, Privileges, and Access Controls issue was discovered in ABB VSN300 WiFi Logger Card versions 1.8.15 and prior, and VSN300 WiFi Logger Card for React versions 2.1.3 and prior. The web application does not properly restrict privileges of the Guest account. A malicious user may be able to gain access to configuration information that should be restricted.

Aug 7, 2017
6.5
CVE-2017-6030MEDIUM

A Predictable Value Range from Previous Values issue was discovered in Schneider Electric Modicon PLCs Modicon M221, firmware versions prior to Version 1.5.0.0, Modicon M241, firmware versions prior to Version 4.0.5.11, and Modicon M251, firmware versions prior to Version 4.0.5.11. The affected products generate insufficiently random TCP initial sequence numbers that may allow an attacker to predict the numbers from previous values. This may allow an attacker to spoof or disrupt TCP connections.

Jun 30, 2017
6.5
CVE-2017-2686MEDIUM

Siemens RUGGEDCOM ROX I (all versions) contain a vulnerability that could allow an authenticated user to read arbitrary files through the web interface at port 10000/TCP and access sensitive information.

Mar 29, 2017
6.5
CVE-2016-8362MEDIUM

An issue was discovered in Moxa OnCell OnCellG3470A-LTE, AWK-1131A/3131A/4131A Series, AWK-3191 Series, AWK-5232/6232 Series, AWK-1121/1127 Series, WAC-1001 V2 Series, WAC-2004 Series, AWK-3121-M12-RTG Series, AWK-3131-M12-RCC Series, AWK-5232-M12-RCC Series, TAP-6226 Series, AWK-3121/4121 Series, AWK-3131/4131 Series, and AWK-5222/6222 Series. Any user is able to download log files by accessing a specific URL.

Feb 13, 2017
6.5
CVE-2016-8564MEDIUM

SQL injection vulnerability in Siemens Automation License Manager (ALM) before 5.3 SP3 Update 1 allows remote attackers to execute arbitrary SQL commands via crafted traffic to TCP port 4410.

Oct 13, 2016
6.5
CVE-2016-4524MEDIUM

ABB PCM600 before 2.7 improperly stores OPC Server IEC61850 passwords in unspecified temporary circumstances, which allows local users to obtain sensitive information via unknown vectors.

Jun 10, 2016
6.5
CVE-2016-2846MEDIUM

Siemens SIMATIC S7-1200 CPU devices before 4.0 allow remote attackers to bypass a "user program block" protection mechanism via unspecified vectors.

Mar 16, 2016
6.5
CVE-2014-2365MEDIUM

Unspecified vulnerability in Advantech WebAccess before 7.2 allows remote authenticated users to create or delete arbitrary files via unknown vectors.

Jul 19, 2014
6.5
CVE-2012-1234MEDIUM

SQL injection vulnerability in Advantech/BroadWin WebAccess 7.0 allows remote authenticated users to execute arbitrary SQL commands via a malformed URL. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0234.

Feb 21, 2012
6.5
CVE-2008-3126MEDIUM

Multiple stack-based buffer overflows in the ServerView web interface (SnmpGetMibValues.exe) in Fujitsu Siemens Computers ServerView 04.60.07 and earlier allow remote authenticated users to execute arbitrary code via a crafted URL.

Jul 10, 2008
6.5
CVE-2024-2453MEDIUM

There is an SQL injection vulnerability in Advantech WebAccess/SCADA software that allows an authenticated attacker to remotely inject SQL code in the database. Successful exploitation of this vulnerability could allow an attacker to read or modify data on the remote database.

Mar 21, 2024
6.4
CVE-2023-3711MEDIUM

Session Fixation vulnerability in Honeywell PM43 on 32 bit, ARM (Printer web page modules) allows Session Credential Falsification through Prediction.This issue affects PM43 versions prior to P10.19.050004. Update to the latest available firmware version of the respective printers to version MR19.5 (e.g. P10.19.050006).

Sep 12, 2023
6.4
CVE-2014-5409MEDIUM

The 17046 Ethernet card before 94450214LFMT100SEM-L.R3-CL for the GE Digital Energy Hydran M2 does not properly generate random values for TCP Initial Sequence Numbers (ISNs), which makes it easier for remote attackers to spoof packets by predicting these values.

Mar 14, 2015
6.4
CVE-2014-5413MEDIUM

Schneider Electric StruxureWare SCADA Expert ClearSCADA 2010 R3 through 2014 R1 uses the MD5 algorithm for an X.509 certificate, which makes it easier for remote attackers to spoof servers via a cryptographic attack against this algorithm.

Sep 18, 2014
6.4
CVE-2014-5412MEDIUM

Schneider Electric StruxureWare SCADA Expert ClearSCADA 2010 R3 through 2014 R1 allows remote attackers to read database records by leveraging access to the guest account.

Sep 18, 2014
6.4
CVE-2012-0237MEDIUM

Advantech/BroadWin WebAccess before 7.0 allows remote attackers to (1) enable date and time syncing or (2) disable date and time syncing via a crafted URL.

Feb 21, 2012
6.4
CVE-2011-5058MEDIUM

The CmbWebserver.dll module of the Control service in 3S CoDeSys 3.4 SP4 Patch 2 allows remote attackers to create arbitrary directories under the web root by specifying a non-existent directory using \ (backslash) characters in an HTTP GET request.

Jan 10, 2012
6.4
CVE-2025-46268MEDIUM

Advantech WebAccess/SCADA  is vulnerable to SQL injection, which may allow an attacker to execute arbitrary SQL commands.

Dec 18, 2025
6.3
CVE-2024-39364MEDIUM

Advantech ADAM-5630 has built-in commands that can be executed without authenticating the user. These commands allow for restarting the operating system, rebooting the hardware, and stopping the execution. The commands can be sent to a simple HTTP request and are executed by the device automatically, without discrimination of origin or level of privileges of the user sending the commands.

Sep 27, 2024
6.3
CVE-2023-43816MEDIUM

A buffer overflow vulnerability exists in Delta Electronics Delta Industrial Automation DOPSoft version 2 when parsing the wKPFStringLen field of a DPS file. An anonymous attacker can exploit this vulnerability by enticing a user to open a specially crafted DPS file to achieve code execution.

Jan 18, 2024
6.3
CVE-2023-3324MEDIUM

A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An attacker could exploit the vulnerability by using specially crafted programs to exploit the vulnerabilities by allowing them to run on the zenon installed hosts. This issue affects ABB Ability™ zenon: from 11 build through 11 build 106404.

Jul 24, 2023
6.3
CVE-2023-2063MEDIUM

Unrestricted Upload of File with Dangerous Type vulnerability in FTP function on Mitsubishi Electric Corporation MELSEC iQ-R Series EtherNet/IP module RJ71EIP91 and MELSEC iQ-F Series EtherNet/IP module FX5-ENET/IP allows a remote unauthenticated attacker to cause information disclosure, tampering, deletion or destruction via file upload/download. As a result, the attacker may be able to exploit this for further attacks.

Jun 2, 2023
6.3
CVE-2022-26080MEDIUM

Use of Insufficiently Random Values vulnerability in ABB Pulsar Plus System Controller NE843_S, ABB Infinity DC Power Plant.This issue affects Pulsar Plus System Controller NE843_S : comcode 150042936; Infinity DC Power Plant: H5692448 G104 G842 G224L G630-4 G451C(2) G461(2) – comcode 150047415.

Mar 16, 2023
6.3
CVE-2021-35526MEDIUM

Backup file without encryption vulnerability is found in Hitachi ABB Power Grids System Data Manager – SDM600 allows attacker to gain access to sensitive information. This issue affects: Hitachi ABB Power Grids System Data Manager – SDM600 1.2 versions prior to FP2 HF6 (Build Nr. 1.2.14002.257).

Sep 8, 2021
6.3
CVE-2021-27887MEDIUM

Cross-site Scripting (XSS) vulnerability in the main dashboard of Ellipse APM versions allows an authenticated user or integrated application to inject malicious data into the application that can then be executed in a victim’s browser. This issue affects: Hitachi ABB Power Grids Ellipse APM 5.3 version 5.3.0.1 and prior versions; 5.2 version 5.2.0.3 and prior versions; 5.1 version 5.1.0.6 and prior versions.

Jun 14, 2021
6.3
CVE-2019-19002MEDIUM

For ABB eSOMS versions 4.0 to 6.0.2, the X-XSS-Protection HTTP response header is not set in responses from the web server. For older web browser not supporting Content Security Policy, this might increase the risk of Cross Site Scripting.

Apr 2, 2020
6.3
CVE-2017-14016MEDIUM

A Stack-based Buffer Overflow issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. The application lacks proper validation of the length of user-supplied data prior to copying it to a stack-based buffer, which could allow an attacker to execute arbitrary code under the context of the process.

Nov 6, 2017
6.3
CVE-2016-8350MEDIUM

An issue was discovered in Moxa ioLogik E1210, firmware Version V2.4 and prior, ioLogik E1211, firmware Version V2.3 and prior, ioLogik E1212, firmware Version V2.4 and prior, ioLogik E1213, firmware Version V2.5 and prior, ioLogik E1214, firmware Version V2.4 and prior, ioLogik E1240, firmware Version V2.3 and prior, ioLogik E1241, firmware Version V2.4 and prior, ioLogik E1242, firmware Version V2.4 and prior, ioLogik E1260, firmware Version V2.4 and prior, ioLogik E1262, firmware Version V2.4 and prior, ioLogik E2210, firmware versions prior to V3.13, ioLogik E2212, firmware versions prior to V3.14, ioLogik E2214, firmware versions prior to V3.12, ioLogik E2240, firmware versions prior to V3.12, ioLogik E2242, firmware versions prior to V3.12, ioLogik E2260, firmware versions prior to V3.13, and ioLogik E2262, firmware versions prior to V3.12. The web application may not sufficiently verify whether a request was provided by a valid user (CROSS-SITE REQUEST FORGERY).

Feb 13, 2017
6.3
CVE-2016-2277MEDIUM

IAB.exe in Rockwell Automation Integrated Architecture Builder (IAB) before 9.6.0.8 and 9.7.x before 9.7.0.2 allows remote attackers to execute arbitrary code via a crafted project file.

Apr 6, 2016
6.3
CVE-2014-0755MEDIUM

Rockwell Automation RSLogix 5000 7 through 20.01, and 21.0, does not properly implement password protection for .ACD files (aka project files), which allows local users to obtain sensitive information or modify data via unspecified vectors.

Feb 5, 2014
6.3
CVE-2025-69652MEDIUM

GNU Binutils thru 2.46 readelf contains a vulnerability that leads to an abort (SIGABRT) when processing a crafted ELF binary with malformed DWARF abbrev or debug information. Due to incomplete state cleanup in process_debug_info(), an invalid debug_info_p state may propagate into DWARF attribute parsing routines. When certain malformed attributes result in an unexpected data length of zero, byte_get_little_endian() triggers a fatal abort. No evidence of memory corruption or code execution was observed; the impact is limited to denial of service.

Mar 6, 2026
6.2
CVE-2023-2062MEDIUM

Missing Password Field Masking vulnerability in Mitsubishi Electric Corporation EtherNet/IP configuration tools SW1DNN-EIPCT-BD and SW1DNN-EIPCTFX5-BD allows a remote unauthenticated attacker to know the password for MELSEC iQ-R Series EtherNet/IP module RJ71EIP91 and MELSEC iQ-F Series EtherNet/IP module FX5-ENET/IP. This vulnerability results in authentication bypass vulnerability, which allows the attacker to access MELSEC iQ-R Series EtherNet/IP module RJ71EIP91 and MELSEC iQ-F Series EtherNet/IP module FX5-ENET/IP via FTP.

Jun 2, 2023
6.2
CVE-2023-2061MEDIUM

Use of Hard-coded Password vulnerability in FTP function on Mitsubishi Electric Corporation MELSEC iQ-R Series EtherNet/IP module RJ71EIP91 and MELSEC iQ-F Series EtherNet/IP module FX5-ENET/IP allows a remote unauthenticated attacker to obtain a hard-coded password and access to the module via FTP.

Jun 2, 2023
6.2
CVE-2022-43485MEDIUM

Use of Insufficiently Random Values in Honeywell OneWireless. This vulnerability may allow attacker to manipulate claims in client's JWT token. This issue affects OneWireless version 322.1

May 30, 2023
6.2
CVE-2021-22283MEDIUM

Improper Initialization vulnerability in ABB Relion protection relays - 611 series, ABB Relion protection relays - 615 series IEC 4.0 FP1, ABB Relion protection relays - 615 series CN 4.0 FP1, ABB Relion protection relays - 615 series IEC 5.0, ABB Relion protection relays - 615 series IEC 5.0 FP1, ABB Relion protection relays - 620 series IEC/CN 2.0, ABB Relion protection relays - 620 series IEC/CN 2.0 FP1, ABB Relion protection relays - REX640 PCL1, ABB Relion protection relays - REX640 PCL2, ABB Relion protection relays - REX640 PCL3, ABB Relion protection relays - RER615, ABB Remote Monitoring and Control - REC615, ABB Merging Unit- SMU615 allows Communication Channel Manipulation.This issue affects Relion protection relays - 611 series: from 1.0.0 before 2.0.3; Relion protection relays - 615 series IEC 4.0 FP1: from 4.1.0 before 4.1.9; Relion protection relays - 615 series CN 4.0 FP1: from 4.1.0 before 4.1.8; Relion protection relays - 615 series IEC 5.0: from 5.0.0 before 5.0.12; Relion protection relays - 615 series IEC 5.0 FP1: from 5.1.0 before 5.1.20; Relion protection relays - 620 series IEC/CN 2.0: from 2.0.0 before 2.0.11; Relion protection relays - 620 series IEC/CN 2.0 FP1: from 2.1.0 before 2.1.15; Relion protection relays - REX640 PCL1: from 1.0.0 before 1.0.8; Relion protection relays - REX640 PCL2: from 1.1.0 before 1.1.4; Relion protection relays - REX640 PCL3: from 1.2.0 before 1.2.1; Relion protection relays - RER615: from 2.0.0 before 2.0.3; Remote Monitoring and Control - REC615: from 1.0.0 before 2.0.3; Merging Unit- SMU615: from 1.0.0 before 1.0.2.

Feb 28, 2023
6.2
CVE-2022-2332MEDIUM

A local unprivileged attacker may escalate to administrator privileges in Honeywell SoftMaster version 4.51, due to insecure permission assignment.

Sep 16, 2022
6.2
CVE-2022-34837MEDIUM

Storing Passwords in a Recoverable Format vulnerability in ABB Zenon 8.20 allows an attacker who successfully exploit the vulnerability may add more network clients that may monitor various activities of the Zenon.

Aug 24, 2022
6.2
CVE-2019-19107MEDIUM

The Configuration pages in ABB Telephone Gateway TG/S 3.2 and Busch-Jaeger 6186/11 Telefon-Gateway for user profiles and services transfer the password in plaintext (although hidden when displayed).

Apr 22, 2020
6.2
CVE-2019-19105MEDIUM

The backup function in ABB Telephone Gateway TG/S 3.2 and Busch-Jaeger 6186/11 Telefon-Gateway saves the current settings and configuration of the application, including credentials of existing user accounts and other configuration's credentials in plaintext.

Apr 22, 2020
6.2
CVE-2025-66596MEDIUM

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product does not properly validate request headers. When an attacker inserts an invalid host header, users could be redirected to malicious sites. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Feb 9, 2026
6.1
CVE-2025-66601MEDIUM

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product does not specify MIME types. When an attacker performs a content sniffing attack, malicious scripts could be executed. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Feb 9, 2026
6.1
CVE-2025-12143MEDIUM

Stack-based Buffer Overflow vulnerability in ABB Terra AC wallbox.This issue affects Terra AC wallbox: through 1.8.33.

Nov 28, 2025
6.1
CVE-2025-12142MEDIUM

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in ABB Terra AC wallbox.This issue affects Terra AC wallbox: through 1.8.33.

Oct 29, 2025
6.1
CVE-2025-11498MEDIUM

An Improper Neutralization of Formula Elements in a CSV File vulnerability exists in System Diagnostics Manager (SDM) of B&R Automation Runtime versions before 6.4 enabling a remote attacker to inject formula data into a generated CSV file. The exploitation of this vulnerability requires the attacker to create a malicious link. The user would need to click on this link, after which the resulting CSV file addi-tionally needs to be manually opened.

Oct 14, 2025
6.1
CVE-2025-3448MEDIUM

Reflected cross-site scripting (XSS) vulnerabilities exist in System Diagnostics Manager (SDM) of B&R Automation Runtime versions before 6.4 that enables a remote attacker to execute arbitrary JavaScript code in the context of the attacked user’s browser session

Oct 7, 2025
6.1
CVE-2025-10504MEDIUM

Heap-based Buffer Overflow vulnerability in ABB Terra AC wallbox.This issue affects Terra AC wallbox: through 1.8.33.

Sep 29, 2025
6.1
CVE-2023-6028MEDIUM

A reflected cross-site scripting (XSS) vulnerability exists in the SVG version of System Diagnostics Manager of B&R Automation Runtime versions <= G4.93 that enables a remote attacker to execute arbitrary JavaScript code in the context of the attacked user’s browser session.

Feb 5, 2024
6.1
CVE-2024-21732MEDIUM

FlyCms through abbaa5a allows XSS via the permission management feature.

Jan 1, 2024
6.1
CVE-2022-4286MEDIUM

A reflected cross-site scripting (XSS) vulnerability exists in System Diagnostics Manager of B&R Automation Runtime versions >=3.00 and <=C4.93 that enables a remote attacker to execute arbitrary JavaScript in the context of the users browser session.

Feb 14, 2023
6.1
CVE-2022-40268MEDIUM

Improper Restriction of Rendered UI Layers or Frames vulnerability in Mitsubishi Electric Corporation GOT2000 Series GT27 model versions 01.14.000 to 01.47.000, Mitsubishi Electric Corporation GOT2000 Series GT25 model versions 01.14.000 to 01.47.000 and Mitsubishi Electric Corporation GT SoftGOT2000 versions 1.265B to 1.285X allows a remote unauthenticated attacker to lead legitimate users to perform unintended operations through clickjacking.

Feb 2, 2023
6.1
CVE-2022-33322MEDIUM

Cross-site scripting vulnerability in Mitsubishi Electric consumer electronics products (Air Conditioning, Wi-Fi Interface, Refrigerator, HEMS adapter, Remote control with Wi-Fi Interface, BATHROOM THERMO VENTILATOR, Rice cooker, Mitsubishi Electric HEMS control adapter, Energy Recovery Ventilator, Smart Switch and Air Purifier) allows a remote unauthenticated attacker to execute an malicious script on a user's browser to disclose information, etc. The wide range of models/versions of Mitsubishi Electric consumer electronics products are affected by this vulnerability. As for the affected product models/versions, see the Mitsubishi Electric's advisory which is listed in [References] section.

Nov 8, 2022
6.1
CVE-2022-2463MEDIUM

Rockwell Automation ISaGRAF Workbench software versions 6.0 through 6.6.9 are affected by a Path Traversal vulnerability. A crafted malicious .7z exchange file may allow an attacker to gain the privileges of the ISaGRAF Workbench software when opened. If the software is running at the SYSTEM level, then the attacker will gain admin level privileges. User interaction is required for this exploit to be successful.

Aug 25, 2022
6.1
CVE-2022-33005MEDIUM

A cross-site scripting (XSS) vulnerability in the System Settings/IOT Settings module of Delta Electronics DIAEnergie v1.08.00 allows attackers to execute arbitrary web scripts via a crafted payload injected into the Name text field.

Jun 27, 2022
6.1
CVE-2022-28702MEDIUM

Incorrect Default Permissions vulnerability in ABB e-Design allows attacker to install malicious software executing with SYSTEM permissions violating confidentiality, integrity, and availability of the target machine.

Jun 2, 2022
6.1
CVE-2021-44768MEDIUM

Delta Electronics CNCSoft (Version 1.01.30) and prior) is vulnerable to an out-of-bounds read while processing a specific project file, which may allow an attacker to disclose information.

Mar 25, 2022
6.1
CVE-2021-27473MEDIUM

Rockwell Automation Connected Components Workbench v12.00.00 and prior does not sanitize paths specified within the .ccwarc archive file during extraction. This type of vulnerability is also commonly referred to as a Zip Slip. A local, authenticated attacker can create a malicious .ccwarc archive file that, when opened by Connected Components Workbench, will allow the attacker to gain the privileges of the software. If the software is running at SYSTEM level, the attacker will gain admin level privileges. User interaction is required for this exploit to be successful.

Mar 23, 2022
6.1
CVE-2022-23127MEDIUM

Cross-site Scripting vulnerability in Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior and ICONICS MobileHMI versions 10.96.2 and prior allows a remote unauthenticated attacker to gain authentication information of an MC Works64 or MobileHMI and perform any operation using the acquired authentication information, by injecting a malicious script in the URL of a monitoring screen delivered from the MC Works64 server or MobileHMI server to an application for mobile devices and leading a legitimate user to access this URL.

Jan 21, 2022
6.1
CVE-2018-16061MEDIUM

Mitsubishi Electric Europe B.V. SmartRTU devices allow XSS via the username parameter or PATH_INFO to login.php.

Oct 15, 2021
6.1
CVE-2021-39278MEDIUM

Certain MOXA devices allow reflected XSS via the Config Import menu. This affects WAC-2004 1.7, WAC-1001 2.1, WAC-1001-T 2.1, OnCell G3470A-LTE-EU 1.7, OnCell G3470A-LTE-EU-T 1.7, TAP-323-EU-CT-T 1.3, TAP-323-US-CT-T 1.3, TAP-323-JP-CT-T 1.3, WDR-3124A-EU 2.3, WDR-3124A-EU-T 2.3, WDR-3124A-US 2.3, and WDR-3124A-US-T 2.3.

Sep 7, 2021
6.1
CVE-2021-21803MEDIUM

This vulnerability is present in device_graph_page.php script, which is a part of the Advantech R-SeeNet web applications. A specially crafted URL by an attacker and visited by a victim can lead to arbitrary JavaScript code execution.

Jul 16, 2021
6.1
CVE-2021-21802MEDIUM

This vulnerability is present in device_graph_page.php script, which is a part of the Advantech R-SeeNet web applications. A specially crafted URL by an attacker and visited by a victim can lead to arbitrary JavaScript code execution.

Jul 16, 2021
6.1
CVE-2021-21801MEDIUM

This vulnerability is present in device_graph_page.php script, which is a part of the Advantech R-SeeNet web applications. A specially crafted URL by an attacker and visited by a victim can lead to arbitrary JavaScript code execution.

Jul 16, 2021
6.1
CVE-2021-21800MEDIUM

Cross-site scripting vulnerabilities exist in the ssh_form.php script functionality of Advantech R-SeeNet v 2.4.12 (20.10.2020). If a user visits a specially crafted URL, it can lead to arbitrary JavaScript code execution in the context of the targeted user’s browser. An attacker can provide a crafted URL to trigger this vulnerability.

Jul 16, 2021
6.1
CVE-2021-21799MEDIUM

Cross-site scripting vulnerabilities exist in the telnet_form.php script functionality of Advantech R-SeeNet v 2.4.12 (20.10.2020). If a user visits a specially crafted URL, it can lead to arbitrary JavaScript code execution in the context of the targeted user’s browser. An attacker can provide a crafted URL to trigger this vulnerability.

Jul 16, 2021
6.1
CVE-2021-32956MEDIUM

Advantech WebAccess/SCADA Versions 9.0.1 and prior is vulnerable to redirection, which may allow an attacker to send a maliciously crafted URL that could result in redirecting a user to a malicious webpage.

Jun 18, 2021
6.1
CVE-2021-34540MEDIUM

Advantech WebAccess 8.4.2 and 8.4.4 allows XSS via the username column of the bwRoot.asp page of WADashboard.

Jun 11, 2021
6.1
CVE-2019-18233MEDIUM

In Advantech Spectre RT Industrial Routers ERT351 5.1.3 and prior, the affected product does not neutralize special characters in the error response, allowing attackers to use a reflected XSS attack.

Mar 17, 2021
6.1
CVE-2019-19096MEDIUM

The Redis data structure component used in ABB eSOMS versions 6.0 to 6.0.2 stores credentials in clear text. If an attacker has file system access, this can potentially compromise the credentials' confidentiality.

Apr 2, 2020
6.1
CVE-2019-19089MEDIUM

For ABB eSOMS versions 4.0 to 6.0.3, the X-Content-Type-Options Header is missing in the HTTP response, potentially causing the response body to be interpreted and displayed as different content type other than declared. A possible attack scenario would be unauthorized code execution via text interpreted as JavaScript.

Apr 2, 2020
6.1
CVE-2020-7579MEDIUM

A vulnerability has been identified in Spectrum Power™ 5 (All versions < v5.50 HF02). The web server could allow Cross-Site Scripting (XSS) attacks if unsuspecting users are tricked into accessing a malicious link. User interaction is required for a successful exploitation. If deployed according to recommended system configuration, Siemens consideres the environmental vector as CR:L/IR:M/AR:H/MAV:A (4.1).

Mar 10, 2020
6.1
CVE-2019-14653MEDIUM

pandao Editor.md 1.5.0 allows XSS via an attribute of an ABBR or SUP element.

Aug 3, 2019
6.1
CVE-2018-10700MEDIUM

An issue was discovered on Moxa AWK-3121 1.19 devices. It provides functionality so that an administrator can change the name of the device. However, the same functionality allows an attacker to execute XSS by injecting an XSS payload. The POST parameter "iw_board_deviceName" is susceptible to this injection.

Jun 7, 2019
6.1
CVE-2018-10692MEDIUM

An issue was discovered on Moxa AWK-3121 1.14 devices. The session cookie "Password508" does not have an HttpOnly flag. This allows an attacker who is able to execute a cross-site scripting attack to steal the cookie very easily.

Jun 7, 2019
6.1
CVE-2019-10955MEDIUM

In Rockwell Automation MicroLogix 1400 Controllers Series A, All Versions Series B, v15.002 and earlier, MicroLogix 1100 Controllers v14.00 and earlier, CompactLogix 5370 L1 controllers v30.014 and earlier, CompactLogix 5370 L2 controllers v30.014 and earlier, CompactLogix 5370 L3 controllers (includes CompactLogix GuardLogix controllers) v30.014 and earlier, an open redirect vulnerability could allow a remote unauthenticated attacker to input a malicious link to redirect users to a malicious site that could run or download arbitrary malware on the user’s machine.

Apr 25, 2019
6.1
CVE-2016-5819MEDIUM

Moxa G3100V2 Series, editions prior to Version 2.8, and OnCell G3111/G3151/G3211/G3251 Series, editions prior to Version 1.7 allows a reflected cross-site scripting attack which may allow an attacker to execute arbitrary script code in the user’s browser within the trust relationship between their browser and the server.

Mar 21, 2019
6.1
CVE-2019-6565MEDIUM

Moxa IKS and EDS fails to properly validate user input, giving unauthenticated and authenticated attackers the ability to perform XSS attacks, which may be used to send a malicious script.

Mar 5, 2019
6.1
CVE-2018-18997MEDIUM

Pluto Safety PLC Gateway Ethernet devices in ABB GATE-E1 and GATE-E2 all versions allows an unauthenticated attacker using the administrative web interface to insert an HTML/Javascript payload into any of the device properties, which may allow an attacker to display/execute the payload in a visitor browser.

Jan 3, 2019
6.1
CVE-2018-19615MEDIUM

Rockwell Automation Allen-Bradley PowerMonitor 1000 all versions. A remote attacker could inject arbitrary code into a targeted user’s web browser to gain access to the affected device.

Dec 26, 2018
6.1
CVE-2018-15703MEDIUM

Advantech WebAccess 8.3.2 and below is vulnerable to multiple reflected cross site scripting vulnerabilities. A remote unauthenticated attacker could potentially exploit this vulnerability by tricking a victim to supply malicious HTML or JavaScript code to WebAccess, which is then reflected back to the victim and executed by the web browser.

Oct 22, 2018
6.1
CVE-2018-16210MEDIUM

WAGO 750-88X and WAGO 750-89X Ethernet Controller devices, versions 01.09.18(13) and before, have XSS in the SNMP configuration via the webserv/cplcfg/snmp.ssi SNMP_DESC or SNMP_LOC_SNMP_CONT field.

Oct 12, 2018
6.1
CVE-2018-7795MEDIUM

A Cross Protocol Injection vulnerability exists in Schneider Electric's PowerLogic (PM5560 prior to FW version 2.5.4) product. The vulnerability makes the product susceptible to cross site scripting attack on its web browser. User inputs can be manipulated to cause execution of java script code.

Aug 29, 2018
6.1
CVE-2018-11450MEDIUM

A reflected Cross-Site-Scripting (XSS) vulnerability has been identified in Siemens PLM Software TEAMCENTER (V9.1.2.5). If a user visits the login portal through the URL crafted by the attacker, the attacker can insert html/javascript and thus alter/rewrite the login portal page. Siemens PLM Software TEAMCENTER V9.1.3 and newer are not affected.

Jul 9, 2018
6.1
CVE-2018-7786MEDIUM

In Schneider Electric U.motion Builder software versions prior to v1.3.4, a cross site scripting (XSS) vulnerability exists which could allow injection of malicious scripts.

Jul 3, 2018
6.1
CVE-2018-8714MEDIUM

Honeywell MatrikonOPC OPC Controller before 5.1.0.0 allows local users to transfer arbitrary files from a host computer and consequently obtain sensitive information via vectors related to MSXML libraries.

May 17, 2018
6.1
CVE-2018-10591MEDIUM

In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAccess Dashboard versions V.2.0.15 and prior, WebAccess Scada Node versions prior to 8.3.1, and WebAccess/NMS 2.0.3 and prior, an origin validation error vulnerability has been identified, which may allow an attacker can create a malicious web site, steal session cookies, and access data of authenticated users.

May 15, 2018
6.1
CVE-2017-16723MEDIUM

A Cross-site Scripting issue was discovered in PHOENIX CONTACT FL COMSERVER BASIC 232/422/485, FL COMSERVER UNI 232/422/485, FL COMSERVER BAS 232/422/485-T, FL COMSERVER UNI 232/422/485-T, FL COM SERVER RS232, FL COM SERVER RS485, and PSI-MODEM/ETH (running firmware versions prior to 1.99, 2.20, or 2.40). The cross-site scripting vulnerability has been identified, which may allow remote code execution.

Dec 11, 2017
6.1
CVE-2017-12738MEDIUM

An issue was discovered on Siemens SICAM RTUs SM-2556 COM Modules with the firmware variants ENOS00, ERAC00, ETA2, ETLS00, MODi00, and DNPi00. The integrated web server (port 80/tcp) of the affected devices could allow Cross-Site Scripting (XSS) attacks if unsuspecting users are tricked into clicking on a malicious link.

Nov 15, 2017
6.1
CVE-2016-8719MEDIUM

An exploitable reflected Cross-Site Scripting vulnerability exists in the Web Application functionality of Moxa AWK-3131A Wireless Access Point running firmware 1.1. Specially crafted input, in multiple parameters, can cause a malicious scripts to be executed by a victim.

Apr 12, 2017
6.1
CVE-2017-2687MEDIUM

Siemens RUGGEDCOM ROX I (all versions) contain a vulnerability in the integrated web server at port 10000/TCP which is prone to reflected Cross-Site Scripting attacks if an unsuspecting user is induced to click on a malicious link.

Mar 29, 2017
6.1
CVE-2017-5157MEDIUM

An issue was discovered in Schneider Electric homeLYnk Controller, LSS100100, all versions prior to V1.5.0. The homeLYnk controller is susceptible to a cross-site scripting attack. User inputs can be manipulated to cause execution of JavaScript code.

Feb 13, 2017
6.1
CVE-2016-9371MEDIUM

An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. User-controlled input is not neutralized before being output to web page (CROSS-SITE SCRIPTING).

Feb 13, 2017
6.1
CVE-2016-8359MEDIUM

An issue was discovered in Moxa ioLogik E1210, firmware Version V2.4 and prior, ioLogik E1211, firmware Version V2.3 and prior, ioLogik E1212, firmware Version V2.4 and prior, ioLogik E1213, firmware Version V2.5 and prior, ioLogik E1214, firmware Version V2.4 and prior, ioLogik E1240, firmware Version V2.3 and prior, ioLogik E1241, firmware Version V2.4 and prior, ioLogik E1242, firmware Version V2.4 and prior, ioLogik E1260, firmware Version V2.4 and prior, ioLogik E1262, firmware Version V2.4 and prior, ioLogik E2210, firmware versions prior to V3.13, ioLogik E2212, firmware versions prior to V3.14, ioLogik E2214, firmware versions prior to V3.12, ioLogik E2240, firmware versions prior to V3.12, ioLogik E2242, firmware versions prior to V3.12, ioLogik E2260, firmware versions prior to V3.13, and ioLogik E2262, firmware versions prior to V3.12. The web application fails to sanitize user input, which may allow an attacker to inject script or execute arbitrary code (CROSS-SITE SCRIPTING).

Feb 13, 2017
6.1
CVE-2016-6204MEDIUM

Cross-site scripting (XSS) vulnerability in the integrated web server in Siemens SINEMA Remote Connect Server before 1.2 allows remote attackers to inject arbitrary web script or HTML via a crafted URL.

Jul 22, 2016
6.1
CVE-2016-4513MEDIUM

Cross-site scripting (XSS) vulnerability in the Schneider Electric PowerLogic PM8ECC module before 2.651 for PowerMeter 800 devices allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Jun 26, 2016
6.1
CVE-2016-2279MEDIUM

Cross-site scripting (XSS) vulnerability in the web server in Rockwell Automation Allen-Bradley CompactLogix 1769-L* before 28.011+ allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Mar 2, 2016
6.1
CVE-2016-1488MEDIUM

Cross-site scripting (XSS) vulnerability in the login form in the integrated web server on Siemens OZW OZW672 devices before 6.00 and OZW772 devices before 6.00 allows remote attackers to inject arbitrary web script or HTML via a crafted URL.

Jan 30, 2016
6.1
CVE-2014-2252MEDIUM

Siemens SIMATIC S7-1200 CPU PLC devices with firmware before 4.0 allow remote attackers to cause a denial of service (defect-mode transition) via crafted PROFINET packets, a different vulnerability than CVE-2014-2253.

Mar 24, 2014
6.1
CVE-2014-2253MEDIUM

Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allow remote attackers to cause a denial of service (defect-mode transition) via crafted Profinet packets.

Mar 16, 2014
6.1
CVE-2013-0675MEDIUM

Buffer overflow in CCEServer (aka the central communications component) in Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, allows remote attackers to cause a denial of service via a crafted packet.

Mar 21, 2013
6.1
CVE-2012-1800MEDIUM

Stack-based buffer overflow in the Profinet DCP protocol implementation on the Siemens Scalance S Security Module firewall S602 V2, S612 V2, and S613 V2 with firmware before 2.3.0.3 allows remote attackers to cause a denial of service (device outage) or possibly execute arbitrary code via a crafted DCP frame.

Apr 18, 2012
6.1
CVE-2012-0930MEDIUM

Cross-site scripting (XSS) vulnerability in Schneider Electric Modicon Quantum PLC allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Jan 28, 2012
6.1
CVE-2017-5141MEDIUM

An issue was discovered in Honeywell XL Web II controller XL1000C500 XLWebExe-2-01-00 and prior, and XLWeb 500 XLWebExe-1-02-08 and prior. An attacker can establish a new user session, without invalidating any existing session identifier, which gives the opportunity to steal authenticated sessions (SESSION FIXATION).

Feb 13, 2017
6.0
CVE-2014-4684MEDIUM

The database server in Siemens SIMATIC WinCC before 7.3, as used in PCS7 and other products, allows remote authenticated users to gain privileges via a request to TCP port 1433.

Jul 24, 2014
6.0
CVE-2012-1235MEDIUM

Cross-site request forgery (CSRF) vulnerability in Advantech/BroadWin WebAccess 7.0 allows remote authenticated users to hijack the authentication of unspecified victims via unknown vectors. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0235.

Feb 21, 2012
6.0
CVE-2012-0235MEDIUM

Cross-site request forgery (CSRF) vulnerability in Advantech/BroadWin WebAccess before 7.0 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.

Feb 21, 2012
6.0
CVE-2025-2399MEDIUM

Improper Validation of Specified Index, Position, or Offset in Input vulnerability in Mitsubishi Electric CNC M800V Series M800VW and M800VS, M80V Series M80V and M80VW, M800 Series M800W and M800S, M80 Series M80 and M80W, E80 Series E80, C80 Series C80, M700V Series M750VW, M720VW, 730VW, M720VS, M730VS, and M750VS, M70V Series M70V, E70 Series E70, and Software Tools NC Trainer2 and NC Trainer2 plus allows a remote attacker to cause an out-of-bounds read, resulting in a denial-of-service condition by sending specially crafted packets to TCP port 683.

Mar 10, 2026
5.9
CVE-2025-41739MEDIUM

An unauthenticated remote attacker, who beats a race condition, can exploit a flaw in the communication servers of the CODESYS Control runtime system on Linux and QNX to trigger an out-of-bounds read via crafted socket communication, potentially causing a denial of service.

Dec 1, 2025
5.9
CVE-2025-7376MEDIUM

Windows Shortcut Following (.LNK) vulnerability in multiple processes of Mitsubishi Electric Iconics Digital Solutions GENESIS64 all versions, Mitsubishi Electric Iconics Digital Solutions GENESIS version 11.00, Mitsubishi Electric GENESIS64 all versions, Mitsubishi Electric MC Works64 all versions, and Mitsubishi Electric GENESIS version 11.00 allows a local authenticated attacker to make an unauthorized write to arbitrary files, by creating a symbolic link from a file used as a write destination by the processes of the affected products to a target file. This could allow the attacker to destroy the file on a PC with the affected products installed, resulting in a denial-of-service (DoS) condition on the PC if the destroyed file is necessary for the operation of the PC.

Aug 6, 2025
5.9
CVE-2024-8036MEDIUM

ABB is aware of privately reported vulnerabilities in the product versions referenced in this CVE. An attacker could exploit these vulnerabilities by sending a specially crafted firmware or configuration to the system node, causing the node to stop, become inaccessible, or allowing the attacker to take control of the node.

Oct 25, 2024
5.9
CVE-2024-7316MEDIUM

Improper Validation of Specified Quantity in Input vulnerability in Mitsubishi Electric CNC Series allows a remote unauthenticated attacker to cause Denial of Service (DoS) condition on the product by sending specially crafted packets to TCP port 683, causing an emergency stop.

Oct 17, 2024
5.9
CVE-2024-1573MEDIUM

Missing Authentication for Critical Function vulnerability in the mobile monitoring feature of Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97 to 10.97.2, Mitsubishi Electric GENESIS64 versions 10.97 to 10.97.2, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite versions 10.97 to 10.97.2, Mitsubishi Electric ICONICS Suite versions 10.97 to 10.97.2, and Mitsubishi Electric MC Works64 all versions allows a remote unauthenticated attacker to bypass proper authentication and log in to the system when all of the following conditions are met: * Active Directory is used in the security setting. * “Automatic log in” option is enabled in the security setting. * The IcoAnyGlass IIS Application Pool is running under an Active Directory Domain Account. * The IcoAnyGlass IIS Application Pool account is included in GENESIS64 and MC Works64 Security and has permission to log in.

Jul 4, 2024
5.9
CVE-2023-5407MEDIUM

Controller denial of service due to improper handling of a specially crafted message received by the controller. See Honeywell Security Notification for recommendations on upgrading and versioning.

Apr 17, 2024
5.9
CVE-2023-5406MEDIUM

Server communication with a controller can lead to remote code execution using a specially crafted message from the controller. See Honeywell Security Notification for recommendations on upgrading and versioning.

Apr 17, 2024
5.9
CVE-2023-5405MEDIUM

Server information leak for the CDA Server process memory can occur when an error is generated in response to a specially crafted message. See Honeywell Security Notification for recommendations on upgrading and versioning.

Apr 17, 2024
5.9
CVE-2023-5398MEDIUM

Server receiving a malformed message based on a list of IPs resulting in heap corruption causing a denial of service. See Honeywell Security Notification for recommendations on upgrading and versioning.

Apr 17, 2024
5.9
CVE-2023-6374MEDIUM

Authentication Bypass by Capture-replay vulnerability in Mitsubishi Electric Corporation MELSEC WS Series WS0-GETH00200 all serial numbers allows a remote unauthenticated attacker to bypass authentication by capture-replay attack and illegally login to the affected module. As a result, the remote attacker who has logged in illegally may be able to disclose or tamper with the programs and parameters in the modules.

Jan 30, 2024
5.9
CVE-2023-3373MEDIUM

Predictable Exact Value from Previous Values vulnerability in Mitsubishi Electric Corporation GOT2000 Series GT21 model versions 01.49.000 and prior and GOT SIMPLE Series GS21 model versions 01.49.000 and prior allows a remote unauthenticated attacker to hijack data connections (session hijacking) or prevent legitimate users from establishing data connections (to cause DoS condition) by guessing the listening port of the data connection on FTP server and connecting to it.

Aug 4, 2023
5.9
CVE-2023-3323MEDIUM

A vulnerability exists by allowing low-privileged users to read and update the data in various directories used by the Zenon system. An attacker could exploit the vulnerability by using specially crafted programs to exploit the vulnerabilities by allowing them to run on the zenon installed hosts. This issue affects ABB Ability™ zenon: from 11 build through 11 build 106404.

Jul 24, 2023
5.9
CVE-2023-2638MEDIUM

Rockwell Automation's FactoryTalk System Services does not verify that a backup configuration archive is password protected.   Improper authorization in FTSSBackupRestore.exe may lead to the loading of malicious configuration archives.  This vulnerability may allow a local, authenticated non-admin user to craft a malicious backup archive, without password protection, that will be loaded by FactoryTalk System Services as a valid backup when a restore procedure takes places. User interaction is required for this vulnerability to be successfully exploited.

Jun 13, 2023
5.9
CVE-2022-40267MEDIUM

Predictable Seed in Pseudo-Random Number Generator (PRNG) vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-xMy/z (x=32,64,80, y=T,R, z=ES,DS,ESS,DSS) with serial number 17X**** or later, and versions 1.280 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-xMy/z (x=32,64,80, y=T,R, z=ES,DS,ESS,DSS) with serial number 179**** and prior, and versions 1.074 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UC-xMy/z (x=32,64,96, y=T, z=D,DSS)) with serial number 17X**** or later, and versions 1.280 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UC-xMy/z (x=32,64,96, y=T, z=D,DSS)) with serial number 179**** and prior, and versions 1.074 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UC-32MT/DS-TS versions 1.280 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UC-32MT/DSS-TS versions 1.280 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UJ-xMy/z (x=24,40,60, y=T,R, z=ES,ESS) versions 1.042 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UJ-xMy/ES-A (x=24,40,60, y=T,R) versions 1.043 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5S-xMy/z (x=30,40,60,80, y=T,R, z=ES,ESS) versions 1.003 and prior, Mitsubishi Electric Corporation MELSEC iQ-F Series FX5UC-32MR/DS-TS versions 1.280 and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R00/01/02CPU versions 33 and prior, Mitsubishi Electric Corporation MELSEC iQ-R Series R04/08/16/32/120(EN)CPU versions 66 and prior allows a remote unauthenticated attacker to access the Web server function by guessing the random numbers used for authentication from several used random numbers.

Jan 20, 2023
5.9
CVE-2022-2791MEDIUM

Emerson Electric's Proficy Machine Edition Version 9.00 and prior is vulnerable to CWE-434 Unrestricted Upload of File with Dangerous Type, and will upload any file written into the PLC logic folder to the connected PLC.

Nov 22, 2022
5.9
CVE-2022-34836MEDIUM

Relative Path Traversal vulnerability in ABB Zenon 8.20 allows the user to access files on the Zenon system and user also can add own log messages and e.g., flood the log entries. An attacker who successfully exploit the vulnerability could access the Zenon runtime activities such as the start and stop of various activity and the last error code etc.

Aug 24, 2022
5.9
CVE-2022-2793MEDIUM

Emerson Electric's Proficy Machine Edition Version 9.00 and prior is vulenrable to CWE-353 Missing Support for Integrity Check, and has no authentication or authorization of data packets after establishing a connection for the SRTP protocol.

Aug 19, 2022
5.9
CVE-2022-2790MEDIUM

Emerson Electric's Proficy Machine Edition Version 9.00 and prior is vulenrable to CWE-347 Improper Verification of Cryptographic Signature, and does not properly verify compiled logic (PDT files) and data blocks data (BLD/BLK files).

Aug 19, 2022
5.9
CVE-2022-25160MEDIUM

Cleartext Storage of Sensitive Information vulnerability in Mitsubishi Electric MELSEC iQ-F series FX5U(C) CPU all versions, Mitsubishi Electric MELSEC iQ-F series FX5UJ CPU all versions, Mitsubishi Electric MELSEC iQ-R series R00/01/02CPU all versions, Mitsubishi Electric MELSEC iQ-R series R04/08/16/32/120(EN)CPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120SFCPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PCPU all versions, Mitsubishi Electric MELSEC iQ-R series R08/16/32/120PSFCPU all versions, Mitsubishi Electric MELSEC iQ-R series R16/32/64MTCPU all versions, Mitsubishi Electric MELSEC iQ-R series RJ71C24(-R2/R4) all versions, Mitsubishi Electric MELSEC iQ-R series RJ71EN71 all versions, Mitsubishi Electric MELSEC iQ-R series RJ72GF15-T2 all versions, Mitsubishi Electric MELSEC Q series Q03/04/06/13/26UDVCPU all versions, Mitsubishi Electric MELSEC Q series Q04/06/13/26UDPVCPU all versions, Mitsubishi Electric MELSEC Q series QJ71C24N(-R2/R4) all versions and Mitsubishi Electric MELSEC Q series QJ71E71-100 all versions allows a remote unauthenticated attacker to disclose a file in a legitimate user's product by using previously eavesdropped cleartext information and to counterfeit a legitimate user’s system.

Apr 1, 2022
5.9
CVE-2022-23130MEDIUM

Buffer Over-read vulnerability in Mitsubishi Electric MC Works64 versions 4.00A to 4.04E, Mitsubishi Electric GENESIS64 versions 10.97 and prior, Mitsubishi Electric Iconics Digital Solutions GENESIS64 versions 10.97 and prior, Mitsubishi Electric ICONICS Suite versions 10.97 and prior, Mitsubishi Electric Iconics Digital Solutions ICONICS Suite versions 10.97 and prior, Mitsubishi Electric GENESIS32 versions 9.7 and prior, and Mitsubishi Electric Iconics Digital Solutions GENESIS32 versions 9.7 and prior allows an attacker to cause a DoS condition in the database server by getting a legitimate user to import a configuration file containing specially crafted stored procedures into GENESIS64, ICONICS Suite, MC Works64, or GENESIS32 and execute commands against the database from GENESIS64, ICONICS Suite, MC Works64, or GENESIS32.

Jan 21, 2022
5.9
CVE-2021-38424MEDIUM

The tag interface of Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to an attacker injecting formulas into the tag data. Those formulas may then be executed when it is opened with a spreadsheet application.

Nov 3, 2021
5.9
CVE-2021-20600MEDIUM

Uncontrolled resource consumption in Mitsubishi Electric MELSEC iQ-R series C Controller Module R12CCPU-V Firmware Versions "16" and prior allows a remote unauthenticated attacker to cause a denial-of-service (DoS) condition by sending a large number of packets in a short time while the module starting up. System reset is required for recovery.

Oct 8, 2021
5.9
CVE-2019-19097MEDIUM

ABB eSOMS versions 4.0 to 6.0.3 accept connections using medium strength ciphers. If a connection is enabled using such a cipher, an attacker might be able to eavesdrop and/or intercept the connection.

Apr 2, 2020
5.9
CVE-2019-13555MEDIUM

In Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU: serial number 21081 and prior, Q04/06/13/26UDPVCPU: serial number 21081 and prior, and Q03UDECPU, Q04/06/10/13/20/26/50/100UDEHCPU: serial number 21081 and prior, MELSEC-L Series L02/06/26CPU, L26CPU-BT: serial number 21101 and prior, L02/06/26CPU-P, L26CPU-PBT: serial number 21101 and prior, and L02/06/26CPU-CM, L26CPU-BT-CM: serial number 21101 and prior, a remote attacker can cause the FTP service to enter a denial-of-service condition dependent on the timing at which a remote attacker connects to the FTP server on the above CPU modules.

Nov 13, 2019
5.9
CVE-2019-10997MEDIUM

An issue was discovered on Phoenix Contact AXC F 2152 (No.2404267) before 2019.0 LTS and AXC F 2152 STARTERKIT (No.1046568) before 2019.0 LTS devices. Protocol Fuzzing on PC WORX Engineer by a man in the middle attacker stops the PLC service. The device must be rebooted, or the PLC service must be restarted manually via a Linux shell.

Jun 17, 2019
5.9
CVE-2017-16718MEDIUM

Beckhoff TwinCAT 3 supports communication over ADS. ADS is a protocol for industrial automation in protected environments. This protocol uses user configured routes, that can be edited remotely via ADS. This special command supports encrypted authentication with username/password. The encryption uses a fixed key, that could be extracted by an attacker. Precondition of the exploitation of this weakness is network access at the moment a route is added.

Jun 27, 2018
5.9
CVE-2017-9968MEDIUM

A security misconfiguration vulnerability exists in Schneider Electric's IGSS Mobile application versions 3.01 and prior in which a lack of certificate pinning during the TLS/SSL connection establishing process can result in a man-in-the-middle attack.

Feb 12, 2018
5.9
CVE-2017-12740MEDIUM

Siemens LOGO! Soft Comfort (All versions before V8.2) lacks integrity verification of software packages downloaded via an unprotected communication channel. This could allow a remote attacker to manipulate the software package while performing a Man-in-the-Middle (MitM) attack.

Dec 26, 2017
5.9
CVE-2017-6141MEDIUM

In F5 BIG-IP LTM, AAM, AFM, APM, ASM, Link Controller, PEM, and WebSafe 12.1.0 through 12.1.2, certain values in a TLS abbreviated handshake when using a client SSL profile with the Session Ticket option enabled may cause disruption of service to the Traffic Management Microkernel (TMM). The Session Ticket option is disabled by default.

Oct 20, 2017
5.9
CVE-2017-6024MEDIUM

A Resource Exhaustion issue was discovered in Rockwell Automation ControlLogix 5580 controllers V28.011, V28.012, and V28.013; ControlLogix 5580 controllers V29.011; CompactLogix 5380 controllers V28.011; and CompactLogix 5380 controllers V29.011. This vulnerability may allow an attacker to cause a denial of service condition by sending a series of specific CIP-based commands to the controller.

May 6, 2017
5.9
CVE-2025-7745MEDIUM

Buffer Over-read vulnerability in ABB AC500 V2.This issue affects AC500 V2: through 2.5.2.

Jul 24, 2025
5.8
CVE-2020-6998MEDIUM

The connection establishment algorithm found in Rockwell Automation CompactLogix 5370 and ControlLogix 5570 versions 33 and prior does not sufficiently manage its control flow during execution, creating an infinite loop. This may allow an attacker to send specially crafted CIP packet requests to a controller, which may cause denial-of-service conditions in communications with other products.

Jul 27, 2022
5.8
CVE-2022-1261MEDIUM

Matrikon, a subsidary of Honeywell Matrikon OPC Server (all versions) is vulnerable to a condition where a low privileged user allowed to connect to the OPC server to use the functions of the IPersisFile to execute operating system processes with system-level privileges.

May 26, 2022
5.8
CVE-2020-11637MEDIUM

A memory leak in the TFTP service in B&R Automation Runtime versions <N4.26, <N4.34, <F4.45, <E4.53, <D4.63, <A4.73 and prior could allow an unauthenticated attacker with network access to cause a denial of service (DoS) condition.

Oct 15, 2020
5.8
CVE-2018-14825MEDIUM

On Honeywell Mobile Computers (CT60 running Android OS 7.1, CN80 running Android OS 7.1, CT40 running Android OS 7.1, CK75 running Android OS 6.0, CN75 running Android OS 6.0, CN75e running Android OS 6.0, CT50 running Android OS 6.0, D75e running Android OS 6.0, CT50 running Android OS 4.4, D75e running Android OS 4.4, CN51 running Android OS 6.0, EDA50k running Android 4.4, EDA50 running Android OS 7.1, EDA50k running Android OS 7.1, EDA70 running Android OS 7.1, EDA60k running Android OS 7.1, and EDA51 running Android OS 8.1), a skilled attacker with advanced knowledge of the target system could exploit this vulnerability by creating an application that would successfully bind to the service and gain elevated system privileges. This could enable the attacker to obtain access to keystrokes, passwords, personal identifiable information, photos, emails, or business-critical documents.

Sep 24, 2018
5.8
CVE-2018-5477MEDIUM

An Information Exposure issue was discovered in ABB netCADOPS Web Application Version 3.4 and prior, netCADOPS Web Application Version 7.1 and prior, netCADOPS Web Application Version 7.2x and prior, netCADOPS Web Application Version 8.0 and prior, and netCADOPS Web Application Version 8.1 and prior. A vulnerability exists in the password entry section of netCADOPS Web Application that may expose critical database information.

Feb 20, 2018
5.8
CVE-2017-9965MEDIUM

An exposure of sensitive information vulnerability exists in Schneider Electric's Pelco VideoXpert Enterprise versions 2.0 and prior. Using a directory traversal attack, an unauthorized person can view web server files.

Jan 2, 2018
5.8
CVE-2016-4500MEDIUM

Moxa UC-7408 LX-Plus devices allow remote authenticated users to write to the firmware, and consequently render a device unusable, by leveraging root access.

Jun 1, 2016
5.8
CVE-2015-5717MEDIUM

The Siemens COMPAS Mobile application before 1.6 for Android does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

Aug 31, 2015
5.8
CVE-2015-3963MEDIUM

Wind River VxWorks before 5.5.1, 6.5.x through 6.7.x before 6.7.1.1, 6.8.x before 6.8.3, 6.9.x before 6.9.4.4, and 7.x before 7 ipnet_coreip 1.2.2.0, as used on Schneider Electric SAGE RTU devices before J2 and other devices, does not properly generate TCP initial sequence number (ISN) values, which makes it easier for remote attackers to spoof TCP sessions by predicting an ISN value.

Aug 4, 2015
5.8
CVE-2015-1596MEDIUM

The Siemens SPCanywhere application for Android and iOS does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

Mar 7, 2015
5.8
CVE-2014-2909MEDIUM

CRLF injection vulnerability in the integrated web server on Siemens SIMATIC S7-1200 CPU devices 2.x and 3.x allows remote attackers to inject arbitrary HTTP headers via unspecified vectors.

Apr 25, 2014
5.8
CVE-2014-2249MEDIUM

Cross-site request forgery (CSRF) vulnerability on Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 and SIMATIC S7-1200 CPU PLC devices with firmware before 4.0 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.

Mar 16, 2014
5.8
CVE-2014-2247MEDIUM

The integrated web server on Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allows remote attackers to inject headers via unspecified vectors.

Mar 16, 2014
5.8
CVE-2013-4912MEDIUM

Open redirect vulnerability in Siemens WinCC (TIA Portal) 11 and 12 before 12 SP1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks by leveraging improper configuration of SIMATIC HMI panels by the WinCC product.

Aug 1, 2013
5.8
CVE-2013-0253MEDIUM

The default configuration of Apache Maven 3.0.4, when using Maven Wagon 2.1, disables SSL certificate checks, which allows remote attackers to spoof servers via a man-in-the-middle (MITM) attack.

Apr 9, 2013
5.8
CVE-2013-0677MEDIUM

The web server in Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, allows remote attackers to obtain sensitive information or cause a denial of service via a crafted project file.

Mar 21, 2013
5.8
CVE-2012-3003MEDIUM

Open redirect vulnerability in an unspecified web application in Siemens WinCC 7.0 SP3 before Update 2 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in a GET request.

Jun 8, 2012
5.8
CVE-2011-4056MEDIUM

An unspecified ActiveX control in ActBar.ocx in Siemens Tecnomatix FactoryLink 6.6.1 (aka 6.6 SP1), 7.5.217 (aka 7.5 SP2), and 8.0.2.54 allows remote attackers to create or overwrite arbitrary files via the save method.

Jan 8, 2012
5.8
CVE-2024-49501MEDIUM

Sysmac Studio provided by OMRON Corporation contains an incorrect authorization vulnerability. If this vulnerability is exploited, an attacker may access the program which is protected by Data Protection function.

Nov 1, 2024
5.7
CVE-2024-37187MEDIUM

Advantech ADAM-5550 share user credentials with a low level of encryption, consisting of base 64 encoding.

Sep 27, 2024
5.7
CVE-2024-34542MEDIUM

Advantech ADAM-5630 shares user credentials plain text between the device and the user source device during the login process.

Sep 27, 2024
5.7
CVE-2024-3036MEDIUM

Improper Input Validation vulnerability in ABB 800xA Base. An attacker who successfully exploited this vulnerability could cause services to crash by sending specifically crafted messages. This issue affects 800xA Base: from 6.0.0 through 6.1.1-2.

Jun 21, 2024
5.7
CVE-2019-7231MEDIUM

The ABB IDAL FTP server is vulnerable to a buffer overflow when a long string is sent by an authenticated attacker. This overflow is handled, but terminates the process. An authenticated attacker can send a FTP command string of 472 bytes or more to overflow a buffer, causing an exception that terminates the server.

Jun 24, 2019
5.7
CVE-2022-29825MEDIUM

Use of Hard-coded Password vulnerability in Mitsubishi Electric GX Works3 versions from 1.000A to 1.090U, GT Designer3 Version1 (GOT2000) versions from 1.122C to 1.290C, and MT Works2 versions from 1.100E to 1.200J allows an unauthenticated attacker to disclose sensitive information. As a result, unauthenticated users may view programs and project files or execute programs illegally.

Nov 25, 2022
5.6
CVE-2022-50549MEDIUM

In the Linux kernel, the following vulnerability has been resolved: dm thin: Fix ABBA deadlock between shrink_slab and dm_pool_abort_metadata Following concurrent processes: P1(drop cache) P2(kworker) drop_caches_sysctl_handler drop_slab shrink_slab down_read(&shrinker_rwsem) - LOCK A do_shrink_slab super_cache_scan prune_icache_sb dispose_list evict ext4_evict_inode ext4_clear_inode ext4_discard_preallocations ext4_mb_load_buddy_gfp ext4_mb_init_cache ext4_read_block_bitmap_nowait ext4_read_bh_nowait submit_bh dm_submit_bio do_worker process_deferred_bios commit metadata_operation_failed dm_pool_abort_metadata down_write(&pmd->root_lock) - LOCK B __destroy_persistent_data_objects dm_block_manager_destroy dm_bufio_client_destroy unregister_shrinker down_write(&shrinker_rwsem) thin_map | dm_thin_find_block ↓ down_read(&pmd->root_lock) --> ABBA deadlock , which triggers hung task: [ 76.974820] INFO: task kworker/u4:3:63 blocked for more than 15 seconds. [ 76.976019] Not tainted 6.1.0-rc4-00011-g8f17dd350364-dirty #910 [ 76.978521] task:kworker/u4:3 state:D stack:0 pid:63 ppid:2 [ 76.978534] Workqueue: dm-thin do_worker [ 76.978552] Call Trace: [ 76.978564] __schedule+0x6ba/0x10f0 [ 76.978582] schedule+0x9d/0x1e0 [ 76.978588] rwsem_down_write_slowpath+0x587/0xdf0 [ 76.978600] down_write+0xec/0x110 [ 76.978607] unregister_shrinker+0x2c/0xf0 [ 76.978616] dm_bufio_client_destroy+0x116/0x3d0 [ 76.978625] dm_block_manager_destroy+0x19/0x40 [ 76.978629] __destroy_persistent_data_objects+0x5e/0x70 [ 76.978636] dm_pool_abort_metadata+0x8e/0x100 [ 76.978643] metadata_operation_failed+0x86/0x110 [ 76.978649] commit+0x6a/0x230 [ 76.978655] do_worker+0xc6e/0xd90 [ 76.978702] process_one_work+0x269/0x630 [ 76.978714] worker_thread+0x266/0x630 [ 76.978730] kthread+0x151/0x1b0 [ 76.978772] INFO: task test.sh:2646 blocked for more than 15 seconds. [ 76.979756] Not tainted 6.1.0-rc4-00011-g8f17dd350364-dirty #910 [ 76.982111] task:test.sh state:D stack:0 pid:2646 ppid:2459 [ 76.982128] Call Trace: [ 76.982139] __schedule+0x6ba/0x10f0 [ 76.982155] schedule+0x9d/0x1e0 [ 76.982159] rwsem_down_read_slowpath+0x4f4/0x910 [ 76.982173] down_read+0x84/0x170 [ 76.982177] dm_thin_find_block+0x4c/0xd0 [ 76.982183] thin_map+0x201/0x3d0 [ 76.982188] __map_bio+0x5b/0x350 [ 76.982195] dm_submit_bio+0x2b6/0x930 [ 76.982202] __submit_bio+0x123/0x2d0 [ 76.982209] submit_bio_noacct_nocheck+0x101/0x3e0 [ 76.982222] submit_bio_noacct+0x389/0x770 [ 76.982227] submit_bio+0x50/0xc0 [ 76.982232] submit_bh_wbc+0x15e/0x230 [ 76.982238] submit_bh+0x14/0x20 [ 76.982241] ext4_read_bh_nowait+0xc5/0x130 [ 76.982247] ext4_read_block_bitmap_nowait+0x340/0xc60 [ 76.982254] ext4_mb_init_cache+0x1ce/0xdc0 [ 76.982259] ext4_mb_load_buddy_gfp+0x987/0xfa0 [ 76.982263] ext4_discard_preallocations+0x45d/0x830 [ 76.982274] ext4_clear_inode+0x48/0xf0 [ 76.982280] ext4_evict_inode+0xcf/0xc70 [ 76.982285] evict+0x119/0x2b0 [ 76.982290] dispose_list+0x43/0xa0 [ 76.982294] prune_icache_sb+0x64/0x90 [ 76.982298] super_cache_scan+0x155/0x210 [ 76.982303] do_shrink_slab+0x19e/0x4e0 [ 76.982310] shrink_slab+0x2bd/0x450 [ 76.982317] drop_slab+0xcc/0x1a0 [ 76.982323] drop_caches_sysctl_handler+0xb7/0xe0 [ 76.982327] proc_sys_call_handler+0x1bc/0x300 [ 76.982331] proc_sys_write+0x17/0x20 [ 76.982334] vfs_write+0x3d3/0x570 [ 76.982342] ksys_write+0x73/0x160 [ 76.982347] __x64_sys_write+0x1e/0x30 [ 76.982352] do_syscall_64+0x35/0x80 [ 76.982357] entry_SYSCALL_64_after_hwframe+0x63/0xcd Funct ---truncated---

Oct 7, 2025
5.5
CVE-2023-53591MEDIUM

In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix deadlock in tc route query code Cited commit causes ABBA deadlock[0] when peer flows are created while holding the devcom rw semaphore. Due to peer flows offload implementation the lock is taken much higher up the call chain and there is no obvious way to easily fix the deadlock. Instead, since tc route query code needs the peer eswitch structure only to perform a lookup in xarray and doesn't perform any sleeping operations with it, refactor the code for lockless execution in following ways: - RCUify the devcom 'data' pointer. When resetting the pointer synchronously wait for RCU grace period before returning. This is fine since devcom is currently only used for synchronization of pairing/unpairing of eswitches which is rare and already expensive as-is. - Wrap all usages of 'paired' boolean in {READ|WRITE}_ONCE(). The flag has already been used in some unlocked contexts without proper annotations (e.g. users of mlx5_devcom_is_paired() function), but it wasn't an issue since all relevant code paths checked it again after obtaining the devcom semaphore. Now it is also used by mlx5_devcom_get_peer_data_rcu() as "best effort" check to return NULL when devcom is being unpaired. Note that while RCU read lock doesn't prevent the unpaired flag from being changed concurrently it still guarantees that reader can continue to use 'data'. - Refactor mlx5e_tc_query_route_vport() function to use new mlx5_devcom_get_peer_data_rcu() API which fixes the deadlock. [0]: [ 164.599612] ====================================================== [ 164.600142] WARNING: possible circular locking dependency detected [ 164.600667] 6.3.0-rc3+ #1 Not tainted [ 164.601021] ------------------------------------------------------ [ 164.601557] handler1/3456 is trying to acquire lock: [ 164.601998] ffff88811f1714b0 (&esw->offloads.encap_tbl_lock){+.+.}-{3:3}, at: mlx5e_attach_encap+0xd8/0x8b0 [mlx5_core] [ 164.603078] but task is already holding lock: [ 164.603617] ffff88810137fc98 (&comp->sem){++++}-{3:3}, at: mlx5_devcom_get_peer_data+0x37/0x80 [mlx5_core] [ 164.604459] which lock already depends on the new lock. [ 164.605190] the existing dependency chain (in reverse order) is: [ 164.605848] -> #1 (&comp->sem){++++}-{3:3}: [ 164.606380] down_read+0x39/0x50 [ 164.606772] mlx5_devcom_get_peer_data+0x37/0x80 [mlx5_core] [ 164.607336] mlx5e_tc_query_route_vport+0x86/0xc0 [mlx5_core] [ 164.607914] mlx5e_tc_tun_route_lookup+0x1a4/0x1d0 [mlx5_core] [ 164.608495] mlx5e_attach_decap_route+0xc6/0x1e0 [mlx5_core] [ 164.609063] mlx5e_tc_add_fdb_flow+0x1ea/0x360 [mlx5_core] [ 164.609627] __mlx5e_add_fdb_flow+0x2d2/0x430 [mlx5_core] [ 164.610175] mlx5e_configure_flower+0x952/0x1a20 [mlx5_core] [ 164.610741] tc_setup_cb_add+0xd4/0x200 [ 164.611146] fl_hw_replace_filter+0x14c/0x1f0 [cls_flower] [ 164.611661] fl_change+0xc95/0x18a0 [cls_flower] [ 164.612116] tc_new_tfilter+0x3fc/0xd20 [ 164.612516] rtnetlink_rcv_msg+0x418/0x5b0 [ 164.612936] netlink_rcv_skb+0x54/0x100 [ 164.613339] netlink_unicast+0x190/0x250 [ 164.613746] netlink_sendmsg+0x245/0x4a0 [ 164.614150] sock_sendmsg+0x38/0x60 [ 164.614522] ____sys_sendmsg+0x1d0/0x1e0 [ 164.614934] ___sys_sendmsg+0x80/0xc0 [ 164.615320] __sys_sendmsg+0x51/0x90 [ 164.615701] do_syscall_64+0x3d/0x90 [ 164.616083] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 164.616568] -> #0 (&esw->offloads.encap_tbl_lock){+.+.}-{3:3}: [ 164.617210] __lock_acquire+0x159e/0x26e0 [ 164.617638] lock_acquire+0xc2/0x2a0 [ 164.618018] __mutex_lock+0x92/0xcd0 [ 164.618401] mlx5e_attach_encap+0xd8/0x8b0 [mlx5_core] [ 164.618943] post_process_attr+0x153/0x2d0 [ ---truncated---

Oct 4, 2025
5.5
CVE-2022-50268MEDIUM

In the Linux kernel, the following vulnerability has been resolved: mmc: moxart: fix return value check of mmc_add_host() mmc_add_host() may return error, if we ignore its return value, the memory that allocated in mmc_alloc_host() will be leaked and it will lead a kernel crash because of deleting not added device in the remove path. So fix this by checking the return value and goto error path which will call mmc_free_host().

Sep 15, 2025
5.5
CVE-2025-57704MEDIUM

Delta Electronics EIP Builder version 1.11 is vulnerable to a File Parsing XML External Entity Processing Information Disclosure Vulnerability.

Aug 26, 2025
5.5
CVE-2025-41658MEDIUM

CODESYS Runtime Toolkit-based products may expose sensitive files to local low-privileged operating system users due to default file permissions.

Aug 4, 2025
5.5
CVE-2022-49943MEDIUM

In the Linux kernel, the following vulnerability has been resolved: USB: gadget: Fix obscure lockdep violation for udc_mutex A recent commit expanding the scope of the udc_lock mutex in the gadget core managed to cause an obscure and slightly bizarre lockdep violation. In abbreviated form: ====================================================== WARNING: possible circular locking dependency detected 5.19.0-rc7+ #12510 Not tainted ------------------------------------------------------ udevadm/312 is trying to acquire lock: ffff80000aae1058 (udc_lock){+.+.}-{3:3}, at: usb_udc_uevent+0x54/0xe0 but task is already holding lock: ffff000002277548 (kn->active#4){++++}-{0:0}, at: kernfs_seq_start+0x34/0xe0 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #3 (kn->active#4){++++}-{0:0}:        lock_acquire+0x68/0x84        __kernfs_remove+0x268/0x380        kernfs_remove_by_name_ns+0x58/0xac        sysfs_remove_file_ns+0x18/0x24        device_del+0x15c/0x440 -> #2 (device_links_lock){+.+.}-{3:3}:        lock_acquire+0x68/0x84        __mutex_lock+0x9c/0x430        mutex_lock_nested+0x38/0x64        device_link_remove+0x3c/0xa0        _regulator_put.part.0+0x168/0x190        regulator_put+0x3c/0x54        devm_regulator_release+0x14/0x20 -> #1 (regulator_list_mutex){+.+.}-{3:3}:        lock_acquire+0x68/0x84        __mutex_lock+0x9c/0x430        mutex_lock_nested+0x38/0x64        regulator_lock_dependent+0x54/0x284        regulator_enable+0x34/0x80        phy_power_on+0x24/0x130        __dwc2_lowlevel_hw_enable+0x100/0x130        dwc2_lowlevel_hw_enable+0x18/0x40        dwc2_hsotg_udc_start+0x6c/0x2f0        gadget_bind_driver+0x124/0x1f4 -> #0 (udc_lock){+.+.}-{3:3}:        __lock_acquire+0x1298/0x20cc        lock_acquire.part.0+0xe0/0x230        lock_acquire+0x68/0x84        __mutex_lock+0x9c/0x430        mutex_lock_nested+0x38/0x64        usb_udc_uevent+0x54/0xe0 Evidently this was caused by the scope of udc_mutex being too large. The mutex is only meant to protect udc->driver along with a few other things. As far as I can tell, there's no reason for the mutex to be held while the gadget core calls a gadget driver's ->bind or ->unbind routine, or while a UDC is being started or stopped. (This accounts for link #1 in the chain above, where the mutex is held while the dwc2_hsotg_udc is started as part of driver probing.) Gadget drivers' ->disconnect callbacks are problematic. Even though usb_gadget_disconnect() will now acquire the udc_mutex, there's a window in usb_gadget_bind_driver() between the times when the mutex is released and the ->bind callback is invoked. If a disconnect occurred during that window, we could call the driver's ->disconnect routine before its ->bind routine. To prevent this from happening, it will be necessary to prevent a UDC from connecting while it has no gadget driver. This should be done already but it doesn't seem to be; currently usb_gadget_connect() has no check for this. Such a check will have to be added later. Some degree of mutual exclusion is required in soft_connect_store(), which can dereference udc->driver at arbitrary times since it is a sysfs callback. The solution here is to acquire the gadget's device lock rather than the udc_mutex. Since the driver core guarantees that the device lock is always held during driver binding and unbinding, this will make the accesses in soft_connect_store() mutually exclusive with any changes to udc->driver. Lastly, it turns out there is one place which should hold the udc_mutex but currently does not: The function_show() routine needs protection while it dereferences udc->driver. The missing lock and unlock calls are added.

Jun 18, 2025
5.5
CVE-2022-49931MEDIUM

In the Linux kernel, the following vulnerability has been resolved: IB/hfi1: Correctly move list in sc_disable() Commit 13bac861952a ("IB/hfi1: Fix abba locking issue with sc_disable()") incorrectly tries to move a list from one list head to another. The result is a kernel crash. The crash is triggered when a link goes down and there are waiters for a send to complete. The following signature is seen: BUG: kernel NULL pointer dereference, address: 0000000000000030 [...] Call Trace: sc_disable+0x1ba/0x240 [hfi1] pio_freeze+0x3d/0x60 [hfi1] handle_freeze+0x27/0x1b0 [hfi1] process_one_work+0x1b0/0x380 ? process_one_work+0x380/0x380 worker_thread+0x30/0x360 ? process_one_work+0x380/0x380 kthread+0xd7/0x100 ? kthread_complete_and_exit+0x20/0x20 ret_from_fork+0x1f/0x30 The fix is to use the correct call to move the list.

May 1, 2025
5.5
CVE-2025-22030MEDIUM

In the Linux kernel, the following vulnerability has been resolved: mm: zswap: fix crypto_free_acomp() deadlock in zswap_cpu_comp_dead() Currently, zswap_cpu_comp_dead() calls crypto_free_acomp() while holding the per-CPU acomp_ctx mutex. crypto_free_acomp() then holds scomp_lock (through crypto_exit_scomp_ops_async()). On the other hand, crypto_alloc_acomp_node() holds the scomp_lock (through crypto_scomp_init_tfm()), and then allocates memory. If the allocation results in reclaim, we may attempt to hold the per-CPU acomp_ctx mutex. The above dependencies can cause an ABBA deadlock. For example in the following scenario: (1) Task A running on CPU #1: crypto_alloc_acomp_node() Holds scomp_lock Enters reclaim Reads per_cpu_ptr(pool->acomp_ctx, 1) (2) Task A is descheduled (3) CPU #1 goes offline zswap_cpu_comp_dead(CPU #1) Holds per_cpu_ptr(pool->acomp_ctx, 1)) Calls crypto_free_acomp() Waits for scomp_lock (4) Task A running on CPU #2: Waits for per_cpu_ptr(pool->acomp_ctx, 1) // Read on CPU #1 DEADLOCK Since there is no requirement to call crypto_free_acomp() with the per-CPU acomp_ctx mutex held in zswap_cpu_comp_dead(), move it after the mutex is unlocked. Also move the acomp_request_free() and kfree() calls for consistency and to avoid any potential sublte locking dependencies in the future. With this, only setting acomp_ctx fields to NULL occurs with the mutex held. This is similar to how zswap_cpu_comp_prepare() only initializes acomp_ctx fields with the mutex held, after performing all allocations before holding the mutex. Opportunistically, move the NULL check on acomp_ctx so that it takes place before the mutex dereference.

Apr 16, 2025
5.5
CVE-2025-3618MEDIUM

A denial-of-service vulnerability exists in the Rockwell Automation ThinManager. The software fails to adequately verify the outcome of memory allocation while processing Type 18 messages. If exploited, a threat actor could cause a denial-of-service on the target software.

Apr 15, 2025
5.5
CVE-2025-21807MEDIUM

In the Linux kernel, the following vulnerability has been resolved: block: fix queue freeze vs limits lock order in sysfs store methods queue_attr_store() always freezes a device queue before calling the attribute store operation. For attributes that control queue limits, the store operation will also lock the queue limits with a call to queue_limits_start_update(). However, some drivers (e.g. SCSI sd) may need to issue commands to a device to obtain limit values from the hardware with the queue limits locked. This creates a potential ABBA deadlock situation if a user attempts to modify a limit (thus freezing the device queue) while the device driver starts a revalidation of the device queue limits. Avoid such deadlock by not freezing the queue before calling the ->store_limit() method in struct queue_sysfs_entry and instead use the queue_limits_commit_update_frozen helper to freeze the queue after taking the limits lock. This also removes taking the sysfs lock for the store_limit method as it doesn't protect anything here, but creates even more nesting. Hopefully it will go away from the actual sysfs methods entirely soon. (commit log adapted from a similar patch from Damien Le Moal)

Feb 27, 2025
5.5
CVE-2024-54683MEDIUM

In the Linux kernel, the following vulnerability has been resolved: netfilter: IDLETIMER: Fix for possible ABBA deadlock Deletion of the last rule referencing a given idletimer may happen at the same time as a read of its file in sysfs: | ====================================================== | WARNING: possible circular locking dependency detected | 6.12.0-rc7-01692-g5e9a28f41134-dirty #594 Not tainted | ------------------------------------------------------ | iptables/3303 is trying to acquire lock: | ffff8881057e04b8 (kn->active#48){++++}-{0:0}, at: __kernfs_remove+0x20 | | but task is already holding lock: | ffffffffa0249068 (list_mutex){+.+.}-{3:3}, at: idletimer_tg_destroy_v] | | which lock already depends on the new lock. A simple reproducer is: | #!/bin/bash | | while true; do | iptables -A INPUT -i foo -j IDLETIMER --timeout 10 --label "testme" | iptables -D INPUT -i foo -j IDLETIMER --timeout 10 --label "testme" | done & | while true; do | cat /sys/class/xt_idletimer/timers/testme >/dev/null | done Avoid this by freeing list_mutex right after deleting the element from the list, then continuing with the teardown.

Jan 11, 2025
5.5
CVE-2024-49976MEDIUM

In the Linux kernel, the following vulnerability has been resolved: tracing/timerlat: Drop interface_lock in stop_kthread() stop_kthread() is the offline callback for "trace/osnoise:online", since commit 5bfbcd1ee57b ("tracing/timerlat: Add interface_lock around clearing of kthread in stop_kthread()"), the following ABBA deadlock scenario is introduced: T1 | T2 [BP] | T3 [AP] osnoise_hotplug_workfn() | work_for_cpu_fn() | cpuhp_thread_fun() | _cpu_down() | osnoise_cpu_die() mutex_lock(&interface_lock) | | stop_kthread() | cpus_write_lock() | mutex_lock(&interface_lock) cpus_read_lock() | cpuhp_kick_ap() | As the interface_lock here in just for protecting the "kthread" field of the osn_var, use xchg() instead to fix this issue. Also use for_each_online_cpu() back in stop_per_cpu_kthreads() as it can take cpu_read_lock() again.

Oct 21, 2024
5.5
CVE-2024-42294MEDIUM

In the Linux kernel, the following vulnerability has been resolved: block: fix deadlock between sd_remove & sd_release Our test report the following hung task: [ 2538.459400] INFO: task "kworker/0:0":7 blocked for more than 188 seconds. [ 2538.459427] Call trace: [ 2538.459430] __switch_to+0x174/0x338 [ 2538.459436] __schedule+0x628/0x9c4 [ 2538.459442] schedule+0x7c/0xe8 [ 2538.459447] schedule_preempt_disabled+0x24/0x40 [ 2538.459453] __mutex_lock+0x3ec/0xf04 [ 2538.459456] __mutex_lock_slowpath+0x14/0x24 [ 2538.459459] mutex_lock+0x30/0xd8 [ 2538.459462] del_gendisk+0xdc/0x350 [ 2538.459466] sd_remove+0x30/0x60 [ 2538.459470] device_release_driver_internal+0x1c4/0x2c4 [ 2538.459474] device_release_driver+0x18/0x28 [ 2538.459478] bus_remove_device+0x15c/0x174 [ 2538.459483] device_del+0x1d0/0x358 [ 2538.459488] __scsi_remove_device+0xa8/0x198 [ 2538.459493] scsi_forget_host+0x50/0x70 [ 2538.459497] scsi_remove_host+0x80/0x180 [ 2538.459502] usb_stor_disconnect+0x68/0xf4 [ 2538.459506] usb_unbind_interface+0xd4/0x280 [ 2538.459510] device_release_driver_internal+0x1c4/0x2c4 [ 2538.459514] device_release_driver+0x18/0x28 [ 2538.459518] bus_remove_device+0x15c/0x174 [ 2538.459523] device_del+0x1d0/0x358 [ 2538.459528] usb_disable_device+0x84/0x194 [ 2538.459532] usb_disconnect+0xec/0x300 [ 2538.459537] hub_event+0xb80/0x1870 [ 2538.459541] process_scheduled_works+0x248/0x4dc [ 2538.459545] worker_thread+0x244/0x334 [ 2538.459549] kthread+0x114/0x1bc [ 2538.461001] INFO: task "fsck.":15415 blocked for more than 188 seconds. [ 2538.461014] Call trace: [ 2538.461016] __switch_to+0x174/0x338 [ 2538.461021] __schedule+0x628/0x9c4 [ 2538.461025] schedule+0x7c/0xe8 [ 2538.461030] blk_queue_enter+0xc4/0x160 [ 2538.461034] blk_mq_alloc_request+0x120/0x1d4 [ 2538.461037] scsi_execute_cmd+0x7c/0x23c [ 2538.461040] ioctl_internal_command+0x5c/0x164 [ 2538.461046] scsi_set_medium_removal+0x5c/0xb0 [ 2538.461051] sd_release+0x50/0x94 [ 2538.461054] blkdev_put+0x190/0x28c [ 2538.461058] blkdev_release+0x28/0x40 [ 2538.461063] __fput+0xf8/0x2a8 [ 2538.461066] __fput_sync+0x28/0x5c [ 2538.461070] __arm64_sys_close+0x84/0xe8 [ 2538.461073] invoke_syscall+0x58/0x114 [ 2538.461078] el0_svc_common+0xac/0xe0 [ 2538.461082] do_el0_svc+0x1c/0x28 [ 2538.461087] el0_svc+0x38/0x68 [ 2538.461090] el0t_64_sync_handler+0x68/0xbc [ 2538.461093] el0t_64_sync+0x1a8/0x1ac T1: T2: sd_remove del_gendisk __blk_mark_disk_dead blk_freeze_queue_start ++q->mq_freeze_depth bdev_release mutex_lock(&disk->open_mutex) sd_release scsi_execute_cmd blk_queue_enter wait_event(!q->mq_freeze_depth) mutex_lock(&disk->open_mutex) SCSI does not set GD_OWNS_QUEUE, so QUEUE_FLAG_DYING is not set in this scenario. This is a classic ABBA deadlock. To fix the deadlock, make sure we don't try to acquire disk->open_mutex after freezing the queue.

Aug 17, 2024
5.5
CVE-2024-6326MEDIUM

An exposure of sensitive information vulnerability exists in the Rockwell Automation FactoryTalk® System Service. A malicious user could exploit this vulnerability by starting a back-up or restore process, which temporarily exposes private keys, passwords, pre-shared keys, and database folders when they are temporarily copied to an interim folder. This vulnerability is due to the lack of explicit permissions set on the backup folder. If private keys are obtained by a malicious user, they could impersonate resources on the secured network.

Jul 16, 2024
5.5
CVE-2024-27435MEDIUM

In the Linux kernel, the following vulnerability has been resolved: nvme: fix reconnection fail due to reserved tag allocation We found a issue on production environment while using NVMe over RDMA, admin_q reconnect failed forever while remote target and network is ok. After dig into it, we found it may caused by a ABBA deadlock due to tag allocation. In my case, the tag was hold by a keep alive request waiting inside admin_q, as we quiesced admin_q while reset ctrl, so the request maked as idle and will not process before reset success. As fabric_q shares tagset with admin_q, while reconnect remote target, we need a tag for connect command, but the only one reserved tag was held by keep alive command which waiting inside admin_q. As a result, we failed to reconnect admin_q forever. In order to fix this issue, I think we should keep two reserved tags for admin queue.

May 17, 2024
5.5
CVE-2024-27004MEDIUM

In the Linux kernel, the following vulnerability has been resolved: clk: Get runtime PM before walking tree during disable_unused Doug reported [1] the following hung task: INFO: task swapper/0:1 blocked for more than 122 seconds. Not tainted 5.15.149-21875-gf795ebc40eb8 #1 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:swapper/0 state:D stack: 0 pid: 1 ppid: 0 flags:0x00000008 Call trace: __switch_to+0xf4/0x1f4 __schedule+0x418/0xb80 schedule+0x5c/0x10c rpm_resume+0xe0/0x52c rpm_resume+0x178/0x52c __pm_runtime_resume+0x58/0x98 clk_pm_runtime_get+0x30/0xb0 clk_disable_unused_subtree+0x58/0x208 clk_disable_unused_subtree+0x38/0x208 clk_disable_unused_subtree+0x38/0x208 clk_disable_unused_subtree+0x38/0x208 clk_disable_unused_subtree+0x38/0x208 clk_disable_unused+0x4c/0xe4 do_one_initcall+0xcc/0x2d8 do_initcall_level+0xa4/0x148 do_initcalls+0x5c/0x9c do_basic_setup+0x24/0x30 kernel_init_freeable+0xec/0x164 kernel_init+0x28/0x120 ret_from_fork+0x10/0x20 INFO: task kworker/u16:0:9 blocked for more than 122 seconds. Not tainted 5.15.149-21875-gf795ebc40eb8 #1 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/u16:0 state:D stack: 0 pid: 9 ppid: 2 flags:0x00000008 Workqueue: events_unbound deferred_probe_work_func Call trace: __switch_to+0xf4/0x1f4 __schedule+0x418/0xb80 schedule+0x5c/0x10c schedule_preempt_disabled+0x2c/0x48 __mutex_lock+0x238/0x488 __mutex_lock_slowpath+0x1c/0x28 mutex_lock+0x50/0x74 clk_prepare_lock+0x7c/0x9c clk_core_prepare_lock+0x20/0x44 clk_prepare+0x24/0x30 clk_bulk_prepare+0x40/0xb0 mdss_runtime_resume+0x54/0x1c8 pm_generic_runtime_resume+0x30/0x44 __genpd_runtime_resume+0x68/0x7c genpd_runtime_resume+0x108/0x1f4 __rpm_callback+0x84/0x144 rpm_callback+0x30/0x88 rpm_resume+0x1f4/0x52c rpm_resume+0x178/0x52c __pm_runtime_resume+0x58/0x98 __device_attach+0xe0/0x170 device_initial_probe+0x1c/0x28 bus_probe_device+0x3c/0x9c device_add+0x644/0x814 mipi_dsi_device_register_full+0xe4/0x170 devm_mipi_dsi_device_register_full+0x28/0x70 ti_sn_bridge_probe+0x1dc/0x2c0 auxiliary_bus_probe+0x4c/0x94 really_probe+0xcc/0x2c8 __driver_probe_device+0xa8/0x130 driver_probe_device+0x48/0x110 __device_attach_driver+0xa4/0xcc bus_for_each_drv+0x8c/0xd8 __device_attach+0xf8/0x170 device_initial_probe+0x1c/0x28 bus_probe_device+0x3c/0x9c deferred_probe_work_func+0x9c/0xd8 process_one_work+0x148/0x518 worker_thread+0x138/0x350 kthread+0x138/0x1e0 ret_from_fork+0x10/0x20 The first thread is walking the clk tree and calling clk_pm_runtime_get() to power on devices required to read the clk hardware via struct clk_ops::is_enabled(). This thread holds the clk prepare_lock, and is trying to runtime PM resume a device, when it finds that the device is in the process of resuming so the thread schedule()s away waiting for the device to finish resuming before continuing. The second thread is runtime PM resuming the same device, but the runtime resume callback is calling clk_prepare(), trying to grab the prepare_lock waiting on the first thread. This is a classic ABBA deadlock. To properly fix the deadlock, we must never runtime PM resume or suspend a device with the clk prepare_lock held. Actually doing that is near impossible today because the global prepare_lock would have to be dropped in the middle of the tree, the device runtime PM resumed/suspended, and then the prepare_lock grabbed again to ensure consistency of the clk tree topology. If anything changes with the clk tree in the meantime, we've lost and will need to start the operation all over again. Luckily, most of the time we're simply incrementing or decrementing the runtime PM count on an active device, so we don't have the chance to schedule away with the prepare_lock held. Let's fix this immediate problem that can be ---truncated---

May 1, 2024
5.5
CVE-2024-26725MEDIUM

In the Linux kernel, the following vulnerability has been resolved: dpll: fix possible deadlock during netlink dump operation Recently, I've been hitting following deadlock warning during dpll pin dump: [52804.637962] ====================================================== [52804.638536] WARNING: possible circular locking dependency detected [52804.639111] 6.8.0-rc2jiri+ #1 Not tainted [52804.639529] ------------------------------------------------------ [52804.640104] python3/2984 is trying to acquire lock: [52804.640581] ffff88810e642678 (nlk_cb_mutex-GENERIC){+.+.}-{3:3}, at: netlink_dump+0xb3/0x780 [52804.641417] but task is already holding lock: [52804.642010] ffffffff83bde4c8 (dpll_lock){+.+.}-{3:3}, at: dpll_lock_dumpit+0x13/0x20 [52804.642747] which lock already depends on the new lock. [52804.643551] the existing dependency chain (in reverse order) is: [52804.644259] -> #1 (dpll_lock){+.+.}-{3:3}: [52804.644836] lock_acquire+0x174/0x3e0 [52804.645271] __mutex_lock+0x119/0x1150 [52804.645723] dpll_lock_dumpit+0x13/0x20 [52804.646169] genl_start+0x266/0x320 [52804.646578] __netlink_dump_start+0x321/0x450 [52804.647056] genl_family_rcv_msg_dumpit+0x155/0x1e0 [52804.647575] genl_rcv_msg+0x1ed/0x3b0 [52804.648001] netlink_rcv_skb+0xdc/0x210 [52804.648440] genl_rcv+0x24/0x40 [52804.648831] netlink_unicast+0x2f1/0x490 [52804.649290] netlink_sendmsg+0x36d/0x660 [52804.649742] __sock_sendmsg+0x73/0xc0 [52804.650165] __sys_sendto+0x184/0x210 [52804.650597] __x64_sys_sendto+0x72/0x80 [52804.651045] do_syscall_64+0x6f/0x140 [52804.651474] entry_SYSCALL_64_after_hwframe+0x46/0x4e [52804.652001] -> #0 (nlk_cb_mutex-GENERIC){+.+.}-{3:3}: [52804.652650] check_prev_add+0x1ae/0x1280 [52804.653107] __lock_acquire+0x1ed3/0x29a0 [52804.653559] lock_acquire+0x174/0x3e0 [52804.653984] __mutex_lock+0x119/0x1150 [52804.654423] netlink_dump+0xb3/0x780 [52804.654845] __netlink_dump_start+0x389/0x450 [52804.655321] genl_family_rcv_msg_dumpit+0x155/0x1e0 [52804.655842] genl_rcv_msg+0x1ed/0x3b0 [52804.656272] netlink_rcv_skb+0xdc/0x210 [52804.656721] genl_rcv+0x24/0x40 [52804.657119] netlink_unicast+0x2f1/0x490 [52804.657570] netlink_sendmsg+0x36d/0x660 [52804.658022] __sock_sendmsg+0x73/0xc0 [52804.658450] __sys_sendto+0x184/0x210 [52804.658877] __x64_sys_sendto+0x72/0x80 [52804.659322] do_syscall_64+0x6f/0x140 [52804.659752] entry_SYSCALL_64_after_hwframe+0x46/0x4e [52804.660281] other info that might help us debug this: [52804.661077] Possible unsafe locking scenario: [52804.661671] CPU0 CPU1 [52804.662129] ---- ---- [52804.662577] lock(dpll_lock); [52804.662924] lock(nlk_cb_mutex-GENERIC); [52804.663538] lock(dpll_lock); [52804.664073] lock(nlk_cb_mutex-GENERIC); [52804.664490] The issue as follows: __netlink_dump_start() calls control->start(cb) with nlk->cb_mutex held. In control->start(cb) the dpll_lock is taken. Then nlk->cb_mutex is released and taken again in netlink_dump(), while dpll_lock still being held. That leads to ABBA deadlock when another CPU races with the same operation. Fix this by moving dpll_lock taking into dumpit() callback which ensures correct lock taking order.

Apr 3, 2024
5.5
CVE-2023-29024MEDIUM

A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product A cross site scripting vulnerability was discovered that could potentially allow a malicious user to view and modify sensitive data or make the web page unavailable. User interaction, such as a phishing attack, is required for successful exploitation of this vulnerability.

May 11, 2023
5.5
CVE-2023-22322MEDIUM

Improper restriction of XML external entity reference (XXE) vulnerability exists in OMRON CX-Motion Pro 1.4.6.013 and earlier. If a user opens a specially crafted project file created by an attacker, sensitive information in the file system where CX-Motion Pro is installed may be disclosed.

Jan 30, 2023
5.5
CVE-2022-2759MEDIUM

Delta Electronics Delta Robot Automation Studio (DRAS) versions prior to 1.13.20 are affected by improper restrictions where the software processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output. This may allow an attacker to view sensitive documents and information on the affected host.

Aug 31, 2022
5.5
CVE-2022-1794MEDIUM

The CODESYS OPC DA Server prior V3.5.18.20 stores PLC passwords as plain text in its configuration file so that it is visible to all authorized Microsoft Windows users of the system.

Jul 11, 2022
5.5
CVE-2021-27416MEDIUM

An attacker could exploit this vulnerability in Hitachi ABB Power Grids Ellipse Enterprise Asset Management (EAM) versions prior to and including 9.0.25 by tricking a user to click on a link containing malicious code that would then be run by the web browser. This can result in the compromise of confidential information, or even the takeover of the user’s session.

Mar 11, 2022
5.5
CVE-2021-27414MEDIUM

An attacker could trick a user of Hitachi ABB Power Grids Ellipse Enterprise Asset Management (EAM) versions prior to and including 9.0.25 into visiting a malicious website posing as a login page for the Ellipse application and gather authentication credentials.

Mar 11, 2022
5.5
CVE-2021-22809MEDIUM

A CWE-125:Out-of-Bounds Read vulnerability exists that could cause unintended data disclosure when a malicious *.gd1 configuration file is loaded into the GUIcon tool. Affected Product: Eurotherm by Schneider Electric GUIcon Version 2.0 (Build 683.003) and prior

Jan 28, 2022
5.5
CVE-2022-23129MEDIUM

Plaintext Storage of a Password vulnerability in Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) and prior and ICONICS GENESIS64 versions 10.90 to 10.97 allows a local authenticated attacker to gain authentication information and to access the database illegally. This is because when configuration information of GridWorX, a database linkage function of GENESIS64 and MC Works64, is exported to a CSV file, the authentication information is saved in plaintext, and an attacker who can access this CSV file can gain the authentication information.

Jan 21, 2022
5.5
CVE-2021-20607MEDIUM

Integer Underflow vulnerability in Mitsubishi Electric GX Works2 versions 1.606G and prior, Mitsubishi Electric MELSOFT Navigator versions 2.84N and prior and Mitsubishi Electric EZSocket versions 5.4 and prior allows an attacker to cause a DoS condition in the software by getting a user to open malicious project file specially crafted by an attacker.

Dec 17, 2021
5.5
CVE-2021-20606MEDIUM

Out-of-bounds Read vulnerability in Mitsubishi Electric GX Works2 versions 1.606G and prior, Mitsubishi Electric MELSOFT Navigator versions 2.84N and prior and Mitsubishi Electric EZSocket versions 5.4 and prior allows an attacker to cause a DoS condition in the software by getting a user to open malicious project file specially crafted by an attacker.

Dec 17, 2021
5.5
CVE-2021-38488MEDIUM

Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to cross-site scripting because an authenticated attacker can inject arbitrary JavaScript code into the parameter comment of the API events, which may allow an attacker to remotely execute code.

Nov 3, 2021
5.5
CVE-2021-38428MEDIUM

Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to cross-site scripting because an authenticated attacker can inject arbitrary JavaScript code into the parameter name of the API schedule, which may allow an attacker to remotely execute code.

Nov 3, 2021
5.5
CVE-2021-38411MEDIUM

Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to cross-site scripting because an authenticated attacker can inject arbitrary JavaScript code into the parameter deviceName of the API modbusWriter-Reader, which may allow an attacker to remotely execute code.

Nov 3, 2021
5.5
CVE-2021-38407MEDIUM

Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to cross-site scripting because an authenticated attacker can inject arbitrary JavaScript code into the parameter name of the API devices, which may allow an attacker to remotely execute code.

Nov 3, 2021
5.5
CVE-2021-38403MEDIUM

Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to cross-site scripting because an authenticated attacker can inject arbitrary JavaScript code into the parameter supplier of the API maintenance, which may allow an attacker to remotely execute code.

Nov 3, 2021
5.5
CVE-2021-33003MEDIUM

Delta Electronics DIAEnergie Version 1.7.5 and prior may allow an attacker to retrieve passwords in cleartext due to a weak hashing algorithm.

Aug 30, 2021
5.5
CVE-2021-27455MEDIUM

Delta Electronics DOPSoft Versions 4.0.10.17 and prior are vulnerable to an out-of-bounds read while processing project files, which may allow an attacker to disclose information.

Jul 2, 2021
5.5
CVE-2020-12518MEDIUM

On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS an attacker can use the knowledge gained by reading the insufficiently protected sensitive information to plan further attacks.

Dec 17, 2020
5.5
CVE-2020-16211MEDIUM

Advantech WebAccess HMI Designer, Versions 2.1.9.31 and prior. An out-of-bounds read vulnerability may be exploited by processing specially crafted project files, which may allow an attacker to read information.

Aug 6, 2020
5.5
CVE-2019-19102MEDIUM

A directory traversal vulnerability in SharpZipLib used in the upgrade service in B&R Automation Studio versions 4.0.x, 4.1.x and 4.2.x allow unauthenticated users to write to certain local directories. The vulnerability is also known as zip slip.

Apr 29, 2020
5.5
CVE-2020-8472MEDIUM

Insufficient folder permissions used by system functions in ABB System 800xA products OPCServer for AC800M (versions 6.0 and earlier) and Control Builder M Professional, MMSServer for AC800M, Base Software for SoftControl (version 6.1 and earlier) allow low privileged users to read, modify, add and delete system and application files. An authenticated attacker who successfully exploited the vulnerabilities could escalate his/her privileges, cause system functions to stop and to corrupt user applications.

Apr 29, 2020
5.5
CVE-2019-5177MEDIUM

An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service ‘I/O-Check’ functionality of WAGO PFC 200 Firmware version 03.02.02(14). The destination buffer sp+0x440 is overflowed with the call to sprintf() for any domainname values that are greater than 1024-len(‘/etc/config-tools/edit_dns_server domain-name=‘) in length. A domainname value of length 0x3fa will cause the service to crash.

Mar 12, 2020
5.5
CVE-2019-5176MEDIUM

An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service ‘I/O-Check’ functionality of WAGO PFC 200 Firmware version 03.02.02(14). An attacker can send a specially crafted packet to trigger the parsing of this cache file.The destination buffer sp+0x40 is overflowed with the call to sprintf() for any gateway values that are greater than 512-len(‘/etc/config-tools/config_default_gateway number=0 state=enabled value=‘) in length. A gateway value of length 0x7e2 will cause the service to crash.

Mar 12, 2020
5.5
CVE-2019-5182MEDIUM

An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service ‘I/O-Check’ functionality of WAGO PFC 200 Firmware version 03.02.02(14). An attacker can send a specially crafted packet to trigger the parsing of this cache file.The destination buffer sp+0x440 is overflowed with the call to sprintf() for any type values that are greater than 1024-len(‘/etc/config-tools/config_interfaces interface=X1 state=enabled config-type=‘) in length. A type value of length 0x3d9 will cause the service to crash.

Mar 11, 2020
5.5
CVE-2019-5106MEDIUM

A hard-coded encryption key vulnerability exists in the authentication functionality of WAGO e!Cockpit version 1.5.1.1. An attacker with access to communications between e!Cockpit and CoDeSyS Gateway can trivially recover the password of any user attempting to log in, in plain text.

Mar 11, 2020
5.5
CVE-2019-10976MEDIUM

Mitsubishi Electric FR Configurator2, Version 1.16S and prior. This vulnerability is triggered when input passed to the XML parser is not sanitized while parsing the XML project and/or template file (.frc2). Once a user opens the file, the attacker could read arbitrary files.

Jul 26, 2019
5.5
CVE-2019-10972MEDIUM

Mitsubishi Electric FR Configurator2, Version 1.16S and prior. This vulnerability can be triggered when an attacker provides the target with a rogue project file (.frc2). Once a user opens the rogue project, CPU exhaustion occurs, which causes the software to quit responding until the application is restarted.

Jul 26, 2019
5.5
CVE-2019-10992MEDIUM

Delta Electronics CNCSoft ScreenEditor, Versions 1.00.89 and prior. Multiple out-of-bounds read vulnerabilities may cause information disclosure due to lacking user input validation for processing project files.

Jul 24, 2019
5.5
CVE-2018-8843MEDIUM

Rockwell Automation Arena versions 15.10.00 and prior contains a use after free vulnerability caused by processing specially crafted Arena Simulation Software files that may cause the software application to crash, potentially losing any unsaved data..

May 14, 2018
5.5
CVE-2017-14025MEDIUM

An Improper Input Validation issue was discovered in ABB FOX515T release 1.0. An improper input validation vulnerability has been identified, allowing a local attacker to provide a malicious parameter to the script that is not validated by the application, This could enable the attacker to retrieve any file on the server.

Nov 6, 2017
5.5
CVE-2017-9959MEDIUM

A vulnerability exists in Schneider Electric's U.motion Builder software versions 1.2.1 and prior in which the system accepts reboot in session from unauthenticated users, supporting a denial of service condition.

Sep 26, 2017
5.5
CVE-2017-7972MEDIUM

A vulnerability exists in Schneider Electric's PowerSCADA Anywhere v1.0 redistributed with PowerSCADA Expert v8.1 and PowerSCADA Expert v8.2 and Citect Anywhere version 1.0 that allows the ability to escape out of remote PowerSCADA Anywhere applications and launch other processes.

Sep 26, 2017
5.5
CVE-2017-7967MEDIUM

All versions of VAMPSET software produced by Schneider Electric, prior to V2.2.189, are susceptible to a memory corruption vulnerability when a corrupted vf2 file is used. This vulnerability causes the software to halt or not start when trying to open the corrupted file. This vulnerability occurs when fill settings are intentionally malformed and is opened in a standalone state, without connection to a protection relay. This attack is not considered to be remotely exploitable. This vulnerability has no effect on the operation of the protection relay to which VAMPSET is connected. As Windows operating system remains operational and VAMPSET responds, it is able to be shut down through its normal closing protocol.

May 9, 2017
5.5
CVE-2016-9354MEDIUM

An issue was discovered in Moxa DACenter Versions 1.4 and older. A specially crafted project file may cause the program to crash because of Uncontrolled Resource Consumption.

Feb 13, 2017
5.5
CVE-2012-2596MEDIUM

The XPath functionality in unspecified web applications in Siemens WinCC 7.0 SP3 before Update 2 does not properly handle special characters in parameters, which allows remote authenticated users to read or modify settings via a crafted URL, related to an "XML injection" attack.

Jun 8, 2012
5.5
CVE-2025-66595MEDIUM

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product is vulnerable to Cross-Site Request Forgery (CSRF). When a user accesses a link crafted by an attacker, the user’s account could be compromised. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Feb 9, 2026
5.4
CVE-2025-34266MEDIUM

Advantech WISE-DeviceOn Server versions prior to 5.4 contain a stored cross-site scripting (XSS) vulnerability in the /rmm/v1/plugin-config/addins/menus endpoint. When an authenticated user adds or edits an AddIns menu entry, the label and path values are stored in plugin configuration data and later rendered in the AddIns UI without proper HTML sanitation. An attacker can inject malicious script into either field, which is then executed in the browser context of users who view or interact with the affected AddIns entry, potentially enabling session compromise and unauthorized actions as the victim.

Dec 5, 2025
5.4
CVE-2025-34265MEDIUM

Advantech WISE-DeviceOn Server versions prior to 5.4 contain a stored cross-site scripting (XSS) vulnerability in the /rmm/v1/rule-engines endpoint. When an authenticated user creates or updates a rule for an agent, the rule fields min, max, and unit are stored and later rendered in rule listings or detail views without proper HTML sanitation. An attacker can inject malicious script into one or more of these fields, which is then executed in the browser context of users who view or interact with the affected rule, potentially enabling session compromise and unauthorized actions as the victim.

Dec 5, 2025
5.4
CVE-2025-34264MEDIUM

Advantech WISE-DeviceOn Server versions prior to 5.4 contain a stored cross-site scripting (XSS) vulnerability in the /rmm/v1/dog/{agentId} endpoint. When an authenticated user adds or edits Software Watchdog process rules for an agent, the monitored process name is stored in the settings array and later rendered in the Software Watchdog UI without proper HTML sanitation. An attacker can inject malicious script into the process name, which is then executed in the browser context of users who view or interact with the affected rules, potentially enabling session compromise and unauthorized actions as the victim.

Dec 5, 2025
5.4
CVE-2025-34263MEDIUM

Advantech WISE-DeviceOn Server versions prior to 5.4 contain a stored cross-site scripting (XSS) vulnerability in the /rmm/v1/plugin-config/dashboards/menus endpoint. When an authenticated user adds or edits a dashboard entry, the label and path values are stored in plugin configuration data and later rendered in the dashboard UI without proper HTML sanitation. An attacker can inject malicious script into either field, which is then executed in the browser context of users who view or interact with the affected dashboard, potentially enabling session compromise and unauthorized actions as the victim.

Dec 5, 2025
5.4
CVE-2025-34262MEDIUM

Advantech WISE-DeviceOn Server versions prior to 5.4 contain a stored cross-site scripting (XSS) vulnerability in the /rmm/v1/devices/name/{agent_id} endpoint. When an authenticated user renames a device, the new_name value is stored and later rendered in device listings or detail views without proper HTML sanitation. An attacker can inject malicious script into the device name, which is then executed in the browser context of users who view or interact with the affected device, potentially enabling session compromise and unauthorized actions as the victim.

Dec 5, 2025
5.4
CVE-2025-34261MEDIUM

Advantech WISE-DeviceOn Server versions prior to 5.4 contain a stored cross-site scripting (XSS) vulnerability in the /rmm/v1/devicegroups/ endpoint. When an authenticated user creates a device group, the name and description values are stored and later rendered in device group listings without proper HTML sanitation. An attacker can inject malicious script into either field, which is then executed in the browser context of users who view or interact with the affected device group, potentially enabling session compromise and unauthorized actions as the victim.

Dec 5, 2025
5.4
CVE-2025-34260MEDIUM

Advantech WISE-DeviceOn Server versions prior to 5.4 contain a stored cross-site scripting (XSS) vulnerability in the /rmm/v1/action/schedule endpoint. When an authenticated user adds a schedule to an existing task, the schedule name is stored and later rendered in schedule listings without HTML sanitation. An attacker can inject malicious script into the schedule name, which is then executed in the browser context of users who view or interact with the affected schedule, potentially enabling session compromise and unauthorized actions as the victim.

Dec 5, 2025
5.4
CVE-2025-34259MEDIUM

Advantech WISE-DeviceOn Server versions prior to 5.4 contain a stored cross-site scripting (XSS) vulnerability in the /rmm/v1/devicemap/building endpoint. When an authenticated user creates a map entry, the name parameter is stored and later rendered in the map list UI without HTML sanitzation. An attacker can inject malicious script into the map entry name, which is then executed in the browser context of users who view or interact with the affected map entry, potentially enabling session compromise and unauthorized actions as the victim.

Dec 5, 2025
5.4
CVE-2025-34258MEDIUM

Advantech WISE-DeviceOn Server versions prior to 5.4 contain a stored cross-site scripting (XSS) vulnerability in the /rmm/v1/devicemap/plan endpoint. When an authenticated user adds an area to a map entry, the name parameter is stored and later rendered in the map list without HTML sanitization. An attacker can inject malicious script into the area name, which is then executed in the browser context of users who view or interact with the affected map entry, potentially enabling session compromise and unauthorized actions as the victim.

Dec 5, 2025
5.4
CVE-2025-34257MEDIUM

Advantech WISE-DeviceOn Server versions prior to 5.4 contain a stored cross-site scripting (XSS) vulnerability in the /rmm/v1/action/defined endpoint. When an authenticated user creates a task, the defined_name value is stored and later rendered in the Overview page without HTML sanitization. An attacker can inject malicious script into defined_name, which is then executed in the browser context of users who view the affected task, potentially enabling session compromise and unauthorized actions as the victim.

Dec 5, 2025
5.4
CVE-2025-34237MEDIUM

Advantech WebAccess/VPN versions prior to 1.1.5 contain a stored cross-site scripting (XSS) vulnerability via StandaloneVpnClientsController.addStandaloneVpnClientAction(). Insufficient validation or escaping of user-supplied input may allow an attacker to inject and execute arbitrary script in the context of a victim's browser.

Nov 6, 2025
5.4
CVE-2025-34236MEDIUM

Advantech WebAccess/VPN versions prior to 1.1.5 contain a stored cross-site scripting (XSS) vulnerability via NetworksController.addNetworkAction(). Insufficient validation or escaping of user-supplied input may allow an attacker to inject and execute arbitrary script in the context of a victim's browser.

Nov 6, 2025
5.4
CVE-2025-53519MEDIUM

A vulnerability exists in Advantech iView versions prior to 5.7.05 build 7057, which could allow a reflected cross-site scripting (XSS) attack. By manipulating specific parameters, an attacker could execute unauthorized scripts in the user's browser, potentially leading to information disclosure or other malicious activities.

Jul 11, 2025
5.4
CVE-2025-53397MEDIUM

A vulnerability exists in Advantech iView versions prior to 5.7.05 build 7057, which could allow a reflected cross-site scripting (XSS) attack. By exploiting this flaw, an attacker could execute unauthorized scripts in the user's browser, potentially leading to information disclosure or other malicious activities.

Jul 11, 2025
5.4
CVE-2025-41442MEDIUM

A vulnerability exists in Advantech iView versions prior to 5.7.05 build 7057, which could allow a reflected cross-site scripting (XSS) attack. By manipulating certain input parameters, an attacker could execute unauthorized scripts in the user's browser, potentially leading to information disclosure or other malicious activities.

Jul 11, 2025
5.4
CVE-2023-0580MEDIUM

Insecure Storage of Sensitive Information vulnerability in ABB My Control System (on-premise) allows an attacker who successfully exploited this vulnerability to gain access to the secure application data or take control of the application. Of the services that make up the My Control System (on-premise) application, the following ones are affected by this vulnerability: User Interface System Monitoring1 Asset Inventory This issue affects My Control System (on-premise): from 5.0;0 through 5.13.

Apr 6, 2023
5.4
CVE-2022-41313MEDIUM

A stored cross-site scripting vulnerability exists in the web application functionality of Moxa SDS-3008 Series Industrial Ethernet Switch 2.1. A specially-crafted HTTP request can lead to arbitrary Javascript execution. An attacker can send an HTTP request to trigger this vulnerability.Form field id="switch_contact"

Feb 7, 2023
5.4
CVE-2022-41312MEDIUM

A stored cross-site scripting vulnerability exists in the web application functionality of Moxa SDS-3008 Series Industrial Ethernet Switch 2.1. A specially-crafted HTTP request can lead to arbitrary Javascript execution. An attacker can send an HTTP request to trigger this vulnerability.Form field id="Switch Description", name "switch_description"

Feb 7, 2023
5.4
CVE-2022-41311MEDIUM

A stored cross-site scripting vulnerability exists in the web application functionality of Moxa SDS-3008 Series Industrial Ethernet Switch 2.1. A specially-crafted HTTP request can lead to arbitrary Javascript execution. An attacker can send an HTTP request to trigger this vulnerability.Form field id="webLocationMessage_text" name="webLocationMessage_text"

Feb 7, 2023
5.4
CVE-2022-42141MEDIUM

Delta Electronics DX-2100-L1-CN 2.42 is vulnerable to Cross Site Scripting (XSS) via lform/urlfilter.

Dec 14, 2022
5.4
CVE-2022-1658MEDIUM

Vulnerable versions of the Jupiter Theme (<= 6.10.1) allow arbitrary plugin deletion by any authenticated user, including users with the subscriber role, via the abb_remove_plugin AJAX action registered in the framework/admin/control-panel/logic/plugin-management.php file. Using this functionality, any logged-in user can delete any installed plugin on the site.

Jun 13, 2022
5.4
CVE-2020-12523MEDIUM

On Phoenix Contact mGuard Devices versions before 8.8.3 LAN ports get functional after reboot even if they are disabled in the device configuration. For mGuard devices with integrated switch on the LAN side, single switch ports can be disabled by device configuration. After a reboot these ports get functional independent from their configuration setting: Missing Initialization of Resource

Dec 17, 2020
5.4
CVE-2019-19095MEDIUM

Lack of adequate input/output validation for ABB eSOMS versions 4.0 to 6.0.2 might allow an attacker to attack such as stored cross-site scripting by storing malicious content in the database.

Apr 2, 2020
5.4
CVE-2019-14928MEDIUM

An issue was discovered on Mitsubishi Electric Europe B.V. ME-RTU devices through 2.02 and INEA ME-RTU devices through 3.0. A number of stored cross-site script (XSS) vulnerabilities allow an attacker to inject malicious code directly into the application. An example input variable vulnerable to stored XSS is SerialInitialModemString in the index.php page.

Oct 28, 2019
5.4
CVE-2015-6462MEDIUM

Reflected Cross-Site Scripting (nonpersistent) allows an attacker to craft a specific URL, which contains Java script that will be executed on the Schneider Electric Modicon BMXNOC0401, BMXNOE0100, BMXNOE0110, BMXNOE0110H, BMXNOR0200H, BMXP342020, BMXP342020H, BMXP342030, BMXP3420302, BMXP3420302H, or BMXP342030H PLC client browser.

Mar 21, 2019
5.4
CVE-2015-6461MEDIUM

Remote file inclusion allows an attacker to craft a specific URL referencing the Schneider Electric Modicon BMXNOC0401, BMXNOE0100, BMXNOE0110, BMXNOE0110H, BMXNOR0200H, BMXP342020, BMXP342020H, BMXP342030, BMXP3420302, BMXP3420302H, or BMXP342030H PLC web server, which, when launched, will result in the browser redirecting to a remote file via a Java script loaded with the web page.

Mar 21, 2019
5.4
CVE-2018-15707MEDIUM

Advantech WebAccess 8.3.1 and 8.3.2 are vulnerable to cross-site scripting in the Bwmainleft.asp page. An attacker could leverage this vulnerability to disclose credentials amongst other things.

Oct 31, 2018
5.4
CVE-2018-12981MEDIUM

An issue was discovered on WAGO e!DISPLAY 762-3000 through 762-3003 devices with firmware before FW 02. The vulnerability can be exploited by authenticated and unauthenticated users by sending special crafted requests to the web server allowing injecting code within the WBM. The code will be rendered and/or executed in the browser of the user's browser.

Jul 12, 2018
5.4
CVE-2017-6871MEDIUM

A vulnerability was discovered in Siemens SIMATIC WinCC Sm@rtClient for Android (All versions before V1.0.2.2) and SIMATIC WinCC Sm@rtClient for Android Lite (All versions before V1.0.2.2). An attacker with physical access to an unlocked mobile device, that has the affected app running, could bypass the app's authentication mechanism under certain conditions.

Aug 8, 2017
5.4
CVE-2017-6864MEDIUM

The integrated web server in Siemens RUGGEDCOM ROX I (all versions) at port 10000/TCP could allow an authenticated user to perform stored Cross-Site Scripting attacks.

Mar 29, 2017
5.4
CVE-2015-3948MEDIUM

Cross-site scripting (XSS) vulnerability in Advantech WebAccess before 8.1 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.

Jan 15, 2016
5.4
CVE-2015-3610MEDIUM

The Siemens HomeControl for Room Automation application before 2.0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information or modify data via a crafted certificate.

May 7, 2015
5.4
CVE-2014-6759MEDIUM

The Downton Abbey Fan Portal (aka com.downton.abbey.fan.portal) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

Sep 28, 2014
5.4
CVE-2024-55023MEDIUM

Weintek cMT-3072XH2 easyweb v2.1.53, OS v20231011 was discovered to contain a hardcoded encryption key which could allow attackers to access sensitive information.

Mar 3, 2026
5.3
CVE-2025-66594MEDIUM

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. Detailed messages are displayed on the error page. This information could be exploited by an attacker for other attacks. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Feb 9, 2026
5.3
CVE-2025-66607MEDIUM

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. The response header contains an insecure setting. Users could be redirected to malicious sites by an attacker. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Feb 9, 2026
5.3
CVE-2025-66605MEDIUM

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. Since there are input fields on this webpage with the autocomplete attribute enabled, the input content could be saved in the browser the user is using. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Feb 9, 2026
5.3
CVE-2025-66604MEDIUM

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. The library version could be displayed on the web page. This information could be exploited by an attacker for other attacks. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Feb 9, 2026
5.3
CVE-2025-10259MEDIUM

Improper Validation of Specified Quantity in Input vulnerability in TCP Communication Function on Mitsubishi Electric Corporation MELSEC iQ-F Series CPU module allows a remote attacker to disconnect the connection by sending specially crafted TCP packets to cause a denial-of-service (DoS) condition on the products. There is no impact on connections other than the attacked one.

Nov 6, 2025
5.3
CVE-2025-5514MEDIUM

Improper Handling of Length Parameter Inconsistency vulnerability in web server function on Mitsubishi Electric Corporation MELSEC iQ-F Series CPU module allows a remote unauthenticated attacker to delay the processing of the web server function and prevent legitimate users from utilizing the web server function, by sending a specially crafted HTTP request.

Aug 25, 2025
5.3
CVE-2025-5241MEDIUM

Overly Restrictive Account Lockout Mechanism vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series allows a remote unauthenticated attacker to lockout legitimate users for a certain period by repeatedly attempting to login with incorrect passwords. The legitimate users will be unable to login until a certain period has passed after the lockout or until the product is reset.

Jul 11, 2025
5.3
CVE-2025-6071MEDIUM

Use of Hard-coded Cryptographic Key vulnerability in ABB RMC-100, ABB RMC-100 LITE. An attacker can gain access to salted information to decrypt MQTT information. This issue affects RMC-100: from 2105457-043 through 2105457-045; RMC-100 LITE: from 2106229-015 through 2106229-016.

Jul 3, 2025
5.3
CVE-2025-2595MEDIUM

An unauthenticated remote attacker can bypass the user management in CODESYS Visualization and read visualization template files or static elements by means of forced browsing.

Apr 23, 2025
5.3
CVE-2023-52891MEDIUM

A vulnerability has been identified in SIMATIC Energy Manager Basic (All versions < V7.5), SIMATIC Energy Manager PRO (All versions < V7.5), SIMATIC IPC DiagBase (All versions), SIMATIC IPC DiagMonitor (All versions), SIMIT V10 (All versions), SIMIT V11 (All versions < V11.1). Unified Automation .NET based OPC UA Server SDK before 3.2.2 used in Siemens products are affected by a similar vulnerability as documented in CVE-2023-27321 for the OPC Foundation UA .NET Standard implementation. A successful attack may lead to high load situation and memory exhaustion, and may block the server.

Jul 9, 2024
5.3
CVE-2024-21914MEDIUM

A vulnerability exists in the affected product that allows a malicious user to restart the Rockwell Automation PanelView™ Plus 7 terminal remotely without security protections. If the vulnerability is exploited, it could lead to the loss of view or control of the PanelView™ product.

Mar 25, 2024
5.3
CVE-2023-7033MEDIUM

Insufficient Resource Pool vulnerability in Ethernet function of Mitsubishi Electric Corporation MELSEC iQ-R series CPU module, MELSEC iQ-L series CPU module, MELSEC iQ-R Ethernet Interface Module, MELSEC iQ-R CC-Link IE TSN Master/Local Module, CC-Link IE TSN Remote I/O Module, CC-Link IE TSN Analog-Digital Converter Module, CC-Link IE TSN Digital-Analog Converter Module, CC-Link IE TSN - CC-Link IE Field Network Bridge Module, CC-Link IE TSN - AnyWireASLINK Bridge Module, CC-Link IE TSN FPGA Module, CC-Link IE TSN Remote Station Communication LSI CP620 with GbE-PHY, MELSEC iQ-R Motion Module, MELSEC iQ-L Motion Module, MELSEC iQ-F FX5 Motion Module, MELSEC iQ-F Series CPU module, MELSEC iQ-F Series Ethernet module, MELSEC iQ-F Series Ethernet/IP module, MELSEC iQ-F Series OPC UA Module, MELSEC iQ-F Series CC-Link IE TSN master/local module, GOT2000 Series CC-Link IE TSN Communication Unit, FR-A800-E series inverters, FR-F800-E series inverters, FR-E800-E series inverters, INVERTER CC-Link IE TSN Plug-in option, INVERTER CC-Link IE TSN Safety Plug-in option, INVERTER CC-Link IE TSN communication function built-in type, MR-J5 series AC Servos MELSERVO, MR-JET series AC Servos MELSERVO, MR-MD333G series AC Servos MELSERVO, MR-JE series AC Servos MELSERVO, MELSERVO-J4 AC Servos MELSERVO and Embedded Type Servo System Controller allow a remote attacker to cause a temporary Denial of Service condition for a certain period of time in Ethernet communication of the products by performing TCP SYN Flood attack.

Feb 27, 2024
5.3
CVE-2023-5390MEDIUM

An attacker could potentially exploit this vulnerability, leading to files being read from the Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC. This exploit could be used to read files from the controller that may expose limited information from the device. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning.

Jan 31, 2024
5.3
CVE-2023-5915MEDIUM

A vulnerability of Uncontrolled Resource Consumption has been identified in STARDOM provided by Yokogawa Electric Corporation. This vulnerability may allow to a remote attacker to cause a denial-of-service condition to the FCN/FCJ controller by sending a crafted packet. While sending the packet, the maintenance homepage of the controller could not be accessed. Therefore, functions of the maintenance homepage, changing configuration, viewing logs, etc. are not available. But the controller’s operation is not stopped by the condition. The affected products and versions are as follows: STARDOM FCN/FCJ R1.01 to R4.31.

Dec 1, 2023
5.3
CVE-2023-3379MEDIUM

Wago web-based management of multiple products has a vulnerability which allows an local authenticated attacker to change the passwords of other non-admin users and thus to escalate non-root privileges.

Nov 20, 2023
5.3
CVE-2023-4625MEDIUM

Improper Restriction of Excessive Authentication Attempts vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F/iQ-R Series CPU modules Web server function allows a remote unauthenticated attacker to prevent legitimate users from logging into the Web server function for a certain period after the attacker has attempted to log in illegally by continuously attempting unauthorized login to the Web server function. The impact of this vulnerability will persist while the attacker continues to attempt unauthorized login.

Nov 6, 2023
5.3
CVE-2023-32657MEDIUM

Weintek Weincloud v0.13.6 could allow an attacker to efficiently develop a brute force attack on credentials with authentication hints from error message responses.

Jul 19, 2023
5.3
CVE-2023-2673MEDIUM

Improper Input Validation vulnerability in PHOENIX CONTACT FL/TC MGUARD Family in multiple versions may allow UDP packets to bypass the filter rules and access the solely connected device behind the MGUARD which can be used for flooding attacks.

Jun 13, 2023
5.3
CVE-2022-3192MEDIUM

Improper Input Validation vulnerability in ABB AC500 V2 PM5xx allows Client-Server Protocol Manipulation.This issue affects AC500 V2: from 2.0.0 before 2.8.6.

Mar 31, 2023
5.3
CVE-2023-1258MEDIUM

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in ABB Flow-X firmware on Flow-X embedded hardware (web service modules) allows Footprinting.This issue affects Flow-X: before 4.0.

Mar 31, 2023
5.3
CVE-2023-0027MEDIUM

Rockwell Automation Modbus TCP Server AOI prior to 2.04.00 is vulnerable to an unauthorized user sending a malformed message that could cause the controller to respond with a copy of the most recent response to the last valid request. If exploited, an unauthorized user could read the connected device’s Modbus TCP Server AOI information.

Mar 17, 2023
5.3
CVE-2022-40691MEDIUM

An information disclosure vulnerability exists in the web application functionality of Moxa SDS-3008 Series Industrial Ethernet Switch 2.1. A specially-crafted HTTP request can lead to a disclosure of sensitive information. An attacker can send an HTTP request to trigger this vulnerability.

Feb 7, 2023
5.3
CVE-2019-9011MEDIUM

In Pilz PMC programming tool 3.x before 3.5.17 (based on CODESYS Development System), an attacker can identify valid usernames.

Dec 26, 2022
5.3
CVE-2022-40266MEDIUM

Improper Input Validation vulnerability in Mitsubishi Electric GOT2000 Series GT27 model FTP server versions 01.39.000 and prior, Mitsubishi Electric GOT2000 Series GT25 model FTP server versions 01.39.000 and prior and Mitsubishi Electric GOT2000 Series GT23 model FTP server versions 01.39.000 and prior allows a remote authenticated attacker to cause a Denial of Service condition by sending specially crafted command.

Nov 24, 2022
5.3
CVE-2022-1989MEDIUM

All CODESYS Visualization versions before V4.2.0.0 generate a login dialog vulnerable to information exposure allowing a remote, unauthenticated attacker to enumerate valid users.

Aug 23, 2022
5.3
CVE-2022-31803MEDIUM

In CODESYS Gateway Server V2 an insufficient check for the activity of TCP client connections allows an unauthenticated attacker to consume all available TCP connections and prevent legitimate users or clients from establishing a new connection to the CODESYS Gateway Server V2. Existing connections are not affected and therefore remain intact.

Jun 24, 2022
5.3
CVE-2022-25162MEDIUM

Improper Input Validation vulnerability in Mitsubishi Electric MELSEC iQ-F series FX5U-xMy/z(x=32,64,80, y=T,R, z=ES,DS,ESS,DSS) with serial number 17X**** or later and versions prior to 1.270, Mitsubishi Electric Mitsubishi Electric MELSEC iQ-F series FX5U-xMy/z(x=32,64,80, y=T,R, z=ES,DS,ESS,DSS) with serial number 179**** and prior and versions prior to 1.073, MELSEC iQ-F series FX5UC-xMy/z(x=32,64,96, y=T,R, z=D,DSS) with serial number 17X**** or later and versions prior to 1.270, Mitsubishi Electric MELSEC iQ-F series FX5UC-xMy/z(x=32,64,96, y=T,R, z=D,DSS) with serial number 179**** and prior and versions prior to 1.073, Mitsubishi Electric MELSEC iQ-F series FX5UC-32MT/DS-TS versions prior to 1.270, Mitsubishi Electric MELSEC iQ-F series FX5UC-32MT/DSS-TS versions prior to 1.270, Mitsubishi Electric MELSEC iQ-F series FX5UC-32MR/DS-TS versions prior to 1.270, Mitsubishi Electric MELSEC iQ-F series FX5UJ-xMy/z(x=24,40,60, y=T,R, z=ES,ESS) versions prior to 1.030, Mitsubishi Electric MELSEC iQ-F series FX5UJ-xMy/ES-A(x=24,40,60, y=T,R) versions prior to 1.031 and Mitsubishi Electric MELSEC iQ-F series FX5S-xMy/z(x=30,40,60,80, y=T,R, z=ES,ESS) version 1.000 allows a remote unauthenticated attacker to cause a temporary DoS condition for the product's communication by sending specially crafted packets.

May 18, 2022
5.3
CVE-2020-25180MEDIUM

Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x includes the functionality of setting a password that is required to execute privileged commands. The password value passed to ISaGRAF Runtime is the result of encryption performed with a fixed key value using the tiny encryption algorithm (TEA) on an entered or saved password. A remote, unauthenticated attacker could pass their own encrypted password to the ISaGRAF 5 Runtime, which may result in information disclosure on the device.

Mar 18, 2022
5.3
CVE-2021-20598MEDIUM

Overly Restrictive Account Lockout Mechanism vulnerability in Mitsubishi Electric MELSEC iQ-R series CPU modules (R08/16/32/120SFCPU all versions, R08/16/32/120PSFCPU all versions) allows a remote unauthenticated attacker to lockout a legitimate user by continuously trying login with incorrect password.

Aug 6, 2021
5.3
CVE-2021-21003MEDIUM

In Phoenix Contact FL SWITCH SMCS series products in multiple versions fragmented TCP-Packets may cause a Denial of Service of Web-, SNMP- and ICMP-Echo services. The switching functionality of the device is not affected.

Jun 25, 2021
5.3
CVE-2021-30187MEDIUM

CODESYS V2 runtime system SP before 2.4.7.55 has Improper Neutralization of Special Elements used in an OS Command.

May 25, 2021
5.3
CVE-2021-21000MEDIUM

On WAGO PFC200 devices in different firmware versions with special crafted packets an attacker with network access to the device could cause a denial of service for the login service of the runtime.

May 24, 2021
5.3
CVE-2021-20996MEDIUM

In multiple managed switches by WAGO in different versions special crafted requests can lead to cookies being transferred to third parties.

May 13, 2021
5.3
CVE-2021-20995MEDIUM

In multiple managed switches by WAGO in different versions the webserver cookies of the web based UI contain user credentials.

May 13, 2021
5.3
CVE-2021-20993MEDIUM

In multiple managed switches by WAGO in different versions the activated directory listing provides an attacker with the index of the resources located inside the directory.

May 13, 2021
5.3
CVE-2020-12526MEDIUM

TwinCAT OPC UA Server in versions up to 2.3.0.12 and IPC Diagnostics UA Server in versions up to 3.1.0.1 from Beckhoff Automation GmbH & Co. KG are vulnerable to denial of service attacks. The attacker needs to send several specifically crafted requests to the running OPC UA server. After some of these requests the OPC UA server is no longer responsive to any client. This is without effect to the real-time functionality of IPCs.

May 13, 2021
5.3
CVE-2020-25192MEDIUM

The built-in WEB server for MOXA NPort IAW5000A-I/O firmware version 2.1 or lower allows sensitive information to be displayed without proper authorization.

Dec 23, 2020
5.3
CVE-2020-16240MEDIUM

GE Digital APM Classic, Versions 4.4 and prior. An insecure direct object reference (IDOR) vulnerability allows user account data to be downloaded in JavaScript object notation (JSON) format by users who should not have access to such functionality. An attacker can download sensitive data related to user accounts without having the proper privileges.

Sep 23, 2020
5.3
CVE-2020-12494MEDIUM

Beckhoff's TwinCAT RT network driver for Intel 8254x and 8255x is providing EtherCAT functionality. The driver implements real-time features. Except for Ethernet frames sent from real-time functionality, all other Ethernet frames sent through the driver are not padded if their payload is less than the minimum Ethernet frame size. Instead, arbitrary memory content is transmitted within in the padding bytes of the frame. Most likely this memory contains slices from previously transmitted or received frames. By this method, memory content is disclosed, however, an attacker can hardly control which memory content is affected. For example, the disclosure can be provoked with small sized ICMP echo requests sent to the device.

Jun 16, 2020
5.3
CVE-2020-12117MEDIUM

Moxa Service in Moxa NPort 5150A firmware version 1.5 and earlier allows attackers to obtain sensitive configuration values via a crafted packet to UDP port 4800. NOTE: Moxa Service is an unauthenticated service that runs upon a first-time installation but can be disabled without ill effect.

May 1, 2020
5.3
CVE-2020-8478MEDIUM

Insufficient protection of the inter-process communication functions in ABB System 800xA products OPC Server for AC 800M, MMS Server for AC 800M and Base Software for SoftControl (all published versions) enables an attacker authenticated on the local system to inject data, affecting the online view of runtime data shown in Control Builder.

Apr 29, 2020
5.3
CVE-2020-8476MEDIUM

For the Central Licensing Server component used in ABB products ABB Ability™ System 800xA and related system extensions versions 5.1, 6.0 and 6.1, Compact HMI versions 5.1 and 6.0, Control Builder Safe 1.0, 1.1 and 2.0, Symphony Plus -S+ Operations 3.0 to 3.2 Symphony Plus -S+ Engineering 1.1 to 2.2, Composer Harmony 5.1, 6.0 and 6.1, Melody Composer 5.3, 6.1/6.2 and SPE for Melody 1.0SPx (Composer 6.3), Harmony OPC Server (HAOPC) Standalone 6.0, 6.1 and 7.0, ABB Ability™ System 800xA/ Advant® OCS Control Builder A 1.3 and 1.4, Advant® OCS AC100 OPC Server 5.1, 6.0 and 6.1, Composer CTK 6.1 and 6.2, AdvaBuild 3.7 SP1 and SP2, OPCServer for MOD 300 (non-800xA) 1.4, OPC Data Link 2.1 and 2.2, Knowledge Manager 8.0, 9.0 and 9.1, Manufacturing Operations Management 1812 and 1909, ABB AbilityTM SCADAvantage versions 5.1 to 5.6.5, a weakness in validation of input exists that allows an attacker to alter licenses assigned to the system nodes by sending specially crafted messages to the CLS web service.

Apr 29, 2020
5.3
CVE-2020-8475MEDIUM

For the Central Licensing Server component used in ABB products ABB Ability™ System 800xA and related system extensions versions 5.1, 6.0 and 6.1, Compact HMI versions 5.1 and 6.0, Control Builder Safe 1.0, 1.1 and 2.0, Symphony Plus -S+ Operations 3.0 to 3.2 Symphony Plus -S+ Engineering 1.1 to 2.2, Composer Harmony 5.1, 6.0 and 6.1, Melody Composer 5.3, 6.1/6.2 and SPE for Melody 1.0SPx (Composer 6.3), Harmony OPC Server (HAOPC) Standalone 6.0, 6.1 and 7.0, ABB Ability™ System 800xA/ Advant® OCS Control Builder A 1.3 and 1.4, Advant® OCS AC100 OPC Server 5.1, 6.0 and 6.1, Composer CTK 6.1 and 6.2, AdvaBuild 3.7 SP1 and SP2, OPCServer for MOD 300 (non-800xA) 1.4, OPC Data Link 2.1 and 2.2, Knowledge Manager 8.0, 9.0 and 9.1, Manufacturing Operations Management 1812 and 1909, ABB AbilityTM SCADAvantage versions 5.1 to 5.6.5, a weakness in validation of input exists that allows an attacker to block license handling by sending specially crafted messages to the CLS web service.

Apr 29, 2020
5.3
CVE-2019-19003MEDIUM

For ABB eSOMS versions 4.0 to 6.0.2, the HTTPOnly flag is not set. This can allow Javascript to access the cookie contents, which in turn might enable Cross Site Scripting.

Apr 2, 2020
5.3
CVE-2019-5135MEDIUM

An exploitable timing discrepancy vulnerability exists in the authentication functionality of the Web-Based Management (WBM) web application on WAGO PFC100/200 controllers. The WBM application makes use of the PHP crypt() function which can be exploited to disclose hashed user credentials. This affects WAGO PFC200 Firmware version 03.00.39(12) and version 03.01.07(13), and WAGO PFC100 Firmware version 03.00.39(12).

Mar 11, 2020
5.3
CVE-2019-9103MEDIUM

An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. An attacker can access sensitive information (e.g., conduct username disclosure attacks) on the built-in WEB-service without authorization.

Mar 11, 2020
5.3
CVE-2019-9097MEDIUM

An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 devices before 3.1, MB3660 devices before 2.3, and MB3180 devices before 2.1. A high rate of transit traffic may cause a low-memory condition and a denial of service.

Mar 11, 2020
5.3
CVE-2019-5073MEDIUM

An exploitable information exposure vulnerability exists in the iocheckd service "I/O-Check" functionality of WAGO PFC200 Firmware versions 03.01.07(13) and 03.00.39(12), and WAGO PFC100 Firmware version 03.00.39(12). A specially crafted set of packets can cause an external tool to fail, resulting in uninitialized stack data to be copied to the response packet buffer. An attacker can send unauthenticated packets to trigger this vulnerability.

Dec 18, 2019
5.3
CVE-2019-5636MEDIUM

When a Beckhoff TwinCAT Runtime receives a malformed UDP packet, the ADS Discovery Service shuts down. Note that the TwinCAT devices are still performing as normal. This issue affects TwinCAT 2 version 2304 (and prior) and TwinCAT 3.1 version 4204.0 (and prior).

Nov 21, 2019
5.3
CVE-2019-18202MEDIUM

Information Disclosure is possible on WAGO Series PFC100 and PFC200 devices before FW12 due to improper access control. A remote attacker can check for the existence of paths and file names via crafted HTTP requests.

Oct 19, 2019
5.3
CVE-2019-13523MEDIUM

In Honeywell Performance IP Cameras and Performance NVRs, the integrated web server of the affected devices could allow remote attackers to obtain web configuration data in JSON format for IP cameras and NVRs (Network Video Recorders), which can be accessed without authentication over the network. Affected performance IP Cameras: HBD3PR2,H4D3PRV3,HED3PR3,H4D3PRV2,HBD3PR1,H4W8PR2,HBW8PR2,H2W2PC1M,H2W4PER3,H2W2PER3,HEW2PER3,HEW4PER3B,HBW2PER1,HEW4PER2,HEW4PER2B,HEW2PER2,H4W2PER2,HBW2PER2,H4W2PER3, and HPW2P1. Affected Performance Series NVRs: HEN08104,HEN08144,HEN081124,HEN16104,HEN16144,HEN16184,HEN16204,HEN162244,HEN16284,HEN16304,HEN16384,HEN32104,HEN321124,HEN32204,HEN32284,HEN322164,HEN32304, HEN32384,HEN323164,HEN64204,HEN64304,HEN643164,HEN643324,HEN643484,HEN04103,HEN04113,HEN04123,HEN08103,HEN08113,HEN08123,HEN08143,HEN16103,HEN16123,HEN16143,HEN16163,HEN04103L,HEN08103L,HEN16103L,HEN32103L.

Sep 26, 2019
5.3
CVE-2018-13991MEDIUM

The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions 1.0 to 1.34 leaks private information in firmware images.

May 7, 2019
5.3
CVE-2018-17902MEDIUM

Yokogawa STARDOM Controllers FCJ, FCN-100, FCN-RTU, FCN-500, All versions R4.10 and prior, The application utilizes multiple methods of session management which could result in a denial of service to the remote management functions.

Oct 12, 2018
5.3
CVE-2018-7787MEDIUM

In Schneider Electric U.motion Builder software versions prior to v1.3.4, this vulnerability is due to improper validation of input of context parameter in HTTP GET request.

Jul 3, 2018
5.3
CVE-2018-10729MEDIUM

All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 allow reading the configuration file by an unauthenticated user.

May 17, 2018
5.3
CVE-2018-7244MEDIUM

An information disclosure vulnerability exists In Schneider Electric's 66074 MGE Network Management Card Transverse installed in MGE UPS and MGE STS. The integrated web server (Port 80/443/TCP) of the affected devices could allow a remote attacker to obtain sensitive device information if network access was obtained.

Apr 18, 2018
5.3
CVE-2018-8836MEDIUM

Wago 750 Series PLCs with firmware version 10 and prior include a remote attack may take advantage of an improper implementation of the 3 way handshake during a TCP connection affecting the communications with commission and service tools. Specially crafted packets may also be sent to Port 2455/TCP/IP, used in Codesys management software, which may result in a denial-of-service condition of communications with commissioning and service tools.

Apr 3, 2018
5.3
CVE-2018-7525MEDIUM

In Omron CX-Supervisor Versions 3.30 and prior, processing a malformed packet by a certain executable may cause an untrusted pointer dereference vulnerability.

Mar 21, 2018
5.3
CVE-2018-7523MEDIUM

In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause a double free vulnerability.

Mar 21, 2018
5.3
CVE-2018-7521MEDIUM

In Omron CX-Supervisor Versions 3.30 and prior, use after free vulnerabilities can be exploited when CX Supervisor parses a specially crafted project file.

Mar 21, 2018
5.3
CVE-2018-7519MEDIUM

In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause a heap-based buffer overflow.

Mar 21, 2018
5.3
CVE-2018-7517MEDIUM

In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause an out of bounds vulnerability.

Mar 21, 2018
5.3
CVE-2018-7515MEDIUM

In Omron CX-Supervisor Versions 3.30 and prior, access of uninitialized pointer vulnerabilities can be exploited when CX Supervisor indirectly calls an initialized pointer when parsing malformed packets.

Mar 21, 2018
5.3
CVE-2018-7513MEDIUM

In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause a stack-based buffer overflow.

Mar 21, 2018
5.3
CVE-2018-7227MEDIUM

A vulnerability exists in Schneider Electric's Pelco Sarix Professional in all firmware versions prior to 3.29.67 which could allow retrieving of specially crafted URLs without authentication that can reveal sensitive information to an attacker.

Mar 9, 2018
5.3
CVE-2018-5445MEDIUM

A Path Traversal issue was discovered in Advantech WebAccess/SCADA versions prior to V8.2_20170817. An attacker has read access to files within the directory structure of the target device.

Jan 25, 2018
5.3
CVE-2018-5443MEDIUM

A SQL Injection issue was discovered in Advantech WebAccess/SCADA versions prior to V8.2_20170817. WebAccess/SCADA does not properly sanitize its inputs for SQL commands.

Jan 25, 2018
5.3
CVE-2017-16741MEDIUM

An Information Exposure issue was discovered in PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, and 48xxx Series products running firmware Version 1.0 to 1.32. A remote unauthenticated attacker may be able to use Monitor Mode on the device to read diagnostic information.

Jan 12, 2018
5.3
CVE-2017-13702MEDIUM

An issue was discovered on MOXA EDS-G512E 5.1 build 16072215 devices. Cookies can be stolen, manipulated, and reused.

Nov 17, 2017
5.3
CVE-2017-12737MEDIUM

An issue was discovered on Siemens SICAM RTUs SM-2556 COM Modules with the firmware variants ENOS00, ERAC00, ETA2, ETLS00, MODi00, and DNPi00. The integrated web server (port 80/tcp) of the affected devices could allow unauthenticated remote attackers to obtain sensitive device information over the network.

Nov 15, 2017
5.3
CVE-2017-9947MEDIUM

A vulnerability has been identified in Siemens APOGEE PXC and TALON TC BACnet Automation Controllers in all versions <V3.5. A directory traversal vulnerability could allow a remote attacker with network access to the integrated web server (80/tcp and 443/tcp) to obtain information on the structure of the file system of the affected devices.

Oct 23, 2017
5.3
CVE-2017-9960MEDIUM

An information disclosure vulnerability exists in Schneider Electric's U.motion Builder software versions 1.2.1 and prior in which the system response to error provides more information than should be available to an unauthenticated user.

Sep 26, 2017
5.3
CVE-2017-6032MEDIUM

A Violation of Secure Design Principles issue was discovered in Schneider Electric Modicon Modbus Protocol. The Modicon Modbus protocol has a session-related weakness making it susceptible to brute-force attacks.

Jun 30, 2017
5.3
CVE-2017-5160MEDIUM

An Inadequate Encryption Strength issue was discovered in Schneider Electric Wonderware InTouch Access Anywhere, version 11.5.2 and prior. The software will connect via Transport Layer Security without verifying the peer's SSL certificate properly.

Apr 20, 2017
5.3
CVE-2016-8725MEDIUM

An exploitable information disclosure vulnerability exists in the Web Application functionality of the Moxa AWK-3131A wireless access point running firmware 1.1. Retrieving a specific URL without authentication can reveal sensitive information to an attacker.

Apr 13, 2017
5.3
CVE-2016-8724MEDIUM

An exploitable information disclosure vulnerability exists in the serviceAgent functionality of Moxa AWK-3131A Wireless Access Point running firmware 1.1. A specially crafted TCP query will allow an attacker to retrieve potentially sensitive information.

Apr 13, 2017
5.3
CVE-2016-8722MEDIUM

An exploitable Information Disclosure vulnerability exists in the Web Application functionality of Moxa AWK-3131A Series Industrial IEEE 802.11a/b/g/n wireless AP/bridge/client. Retrieving a specific URL without authentication can reveal sensitive information to an attacker.

Apr 13, 2017
5.3
CVE-2016-9346MEDIUM

An issue was discovered in Moxa MiiNePort E1 versions prior to 1.8, E2 versions prior to 1.4, and E3 versions prior to 1.1. Configuration data are stored in a file that is not encrypted.

Feb 13, 2017
5.3
CVE-2016-8367MEDIUM

An issue was discovered in Schneider Electric Magelis HMI Magelis GTO Advanced Optimum Panels, all versions, Magelis GTU Universal Panel, all versions, Magelis STO5xx and STU Small panels, all versions, Magelis XBT GH Advanced Hand-held Panels, all versions, Magelis XBT GK Advanced Touchscreen Panels with Keyboard, all versions, Magelis XBT GT Advanced Touchscreen Panels, all versions, and Magelis XBT GTW Advanced Open Touchscreen Panels (Windows XPe). An attacker can open multiple connections to a targeted web server and keep connections open preventing new connections from being made, rendering the web server unavailable during an attack.

Feb 13, 2017
5.3
CVE-2016-3963MEDIUM

Siemens SCALANCE S613 allows remote attackers to cause a denial of service (web-server outage) via traffic to TCP port 443.

Apr 8, 2016
5.3
CVE-2015-6485MEDIUM

Schneider Electric Telvent Sage 2300 RTUs with firmware before C3413-500-S01, and LANDAC II-2, Sage 1410, Sage 1430, Sage 1450, Sage 2400, and Sage 3030M RTUs with firmware before C3414-500-S02J2, allow remote attackers to obtain sensitive information from device memory by reading a padding field of an Ethernet packet.

Mar 12, 2016
5.3
CVE-2016-2283MEDIUM

Moxa ioLogik E2200 devices before 3.12 and ioAdmin Configuration Utility before 3.18 do not properly encrypt data, which makes it easier for remote attackers to obtain the associated cleartext via unspecified vectors.

Mar 4, 2016
5.3
CVE-2016-2282MEDIUM

Moxa ioLogik E2200 devices before 3.12 and ioAdmin Configuration Utility before 3.18 do not properly encrypt credentials, which makes it easier for remote attackers to obtain the associated cleartext via unspecified vectors.

Mar 4, 2016
5.3
CVE-2016-2201MEDIUM

Siemens SIMATIC S7-1500 CPU devices before 1.8.3 allow remote attackers to bypass a replay protection mechanism via packets on TCP port 102.

Feb 8, 2016
5.3
CVE-2015-3943MEDIUM

Advantech WebAccess before 8.1 allows remote attackers to read sensitive cleartext information about e-mail project accounts via unspecified vectors.

Jan 15, 2016
5.3
CVE-2015-4941MEDIUM

IBM WebSphere MQ Light 1.x before 1.0.2 mishandles abbreviated TLS handshakes, which allows remote attackers to cause a denial of service (MQXR service crash) via unspecified vectors.

Jan 1, 2016
5.3
CVE-2023-47262MEDIUM

The startup process and device configurations of the Abbott ID NOW device, before v7.1, can be interrupted and/or modified via physical access to an internal serial port. Direct physical access is required to exploit.

Nov 14, 2023
5.2
CVE-2025-11009MEDIUM

Cleartext Storage of Sensitive Information vulnerability in Mitsubishi Electric GT Designer3 Version1 (GOT2000) all versions and Mitsubishi Electric GT Designer3 Version1 (GOT1000) all versions allows a local unauthenticated attacker to obtain plaintext credentials from the project file for GT Designer3. This could allow the attacker to operate illegally GOT2000 series or GOT1000 series by using the obtained credentials.

Dec 17, 2025
5.1
CVE-2017-7457MEDIUM

XML External Entity via ".AOP" files used by Moxa MX-AOPC Server 1.5 result in remote file disclosure.

Apr 14, 2017
5.0
CVE-2016-4528MEDIUM

Buffer overflow in Advantech WebAccess before 8.1_20160519 allows local users to cause a denial of service via a crafted DLL file.

Jun 25, 2016
5.0
CVE-2015-6484MEDIUM

3S-Smart CODESYS Gateway Server before 2.3.9.48 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted (1) GET or (2) POST request.

Oct 25, 2015
5.0
CVE-2015-6482MEDIUM

Runtime Toolkit before 2.4.7.48 in 3S-Smart CODESYS before 2.3.9.48 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted request.

Oct 18, 2015
5.0
CVE-2015-0987MEDIUM

Omron CX-One CX-Programmer before 9.6, CJ2M PLC devices before 2.1, and CJ2H PLC devices before 1.5 rely on cleartext password transmission, which allows remote attackers to obtain sensitive information by sniffing the network during a PLC unlock request.

Oct 6, 2015
5.0
CVE-2015-3962MEDIUM

Schneider Electric StruxureWare Building Expert MPM before 2.15 does not use encryption for the client-server data stream, which allows remote attackers to discover credentials by sniffing the network.

Sep 18, 2015
5.0
CVE-2015-2847MEDIUM

Honeywell Tuxedo Touch before 5.2.19.0_VA relies on client-side authentication involving JavaScript, which allows remote attackers to bypass intended access restrictions by removing USERACCT requests from the client-server data stream.

Jul 26, 2015
5.0
CVE-2015-0997MEDIUM

Schneider Electric InduSoft Web Studio before 7.1.3.4 SP3 Patch 4 and InTouch Machine Edition 2014 before 7.1.3.4 SP3 Patch 4 provide an HMI user interface that lists all valid usernames, which makes it easier for remote attackers to obtain access via a brute-force password-guessing attack.

Mar 29, 2015
5.0
CVE-2015-1358MEDIUM

The remote-management module in the (1) Multi Panels, (2) Comfort Panels, and (3) RT Advanced functionality in Siemens SIMATIC WinCC (TIA Portal) before 13 SP1 and in the (4) panels and (5) runtime functionality in SIMATIC WinCC flexible before 2008 SP3 Up7 does not properly encrypt credentials in transit, which makes it easier for remote attackers to determine cleartext credentials by sniffing the network and conducting a decryption attack.

Feb 18, 2015
5.0
CVE-2015-1357MEDIUM

Siemens Ruggedcom WIN51xx devices with firmware before SS4.4.4624.35, WIN52xx devices with firmware before SS4.4.4624.35, WIN70xx devices with firmware before BS4.4.4621.32, and WIN72xx devices with firmware before BS4.4.4621.32 allow context-dependent attackers to discover password hashes by reading (1) files or (2) security logs.

Feb 2, 2015
5.0
CVE-2014-8552MEDIUM

The WinCC server in Siemens SIMATIC WinCC 7.0 through SP3, 7.2 before Update 9, and 7.3 before Update 2; SIMATIC PCS 7 7.1 through SP4, 8.0 through SP2, and 8.1; and TIA Portal 13 before Update 6 allows remote attackers to read arbitrary files via crafted packets.

Nov 26, 2014
5.0
CVE-2014-4682MEDIUM

The WebNavigator server in Siemens SIMATIC WinCC before 7.3, as used in PCS7 and other products, allows remote attackers to obtain sensitive information via an HTTP request.

Jul 24, 2014
5.0
CVE-2014-2733MEDIUM

Siemens SINEMA Server before 12 SP1 allows remote attackers to cause a denial of service (web-interface outage) via crafted HTTP requests to port (1) 4999 or (2) 80.

Apr 19, 2014
5.0
CVE-2014-2732MEDIUM

Multiple directory traversal vulnerabilities in the integrated web server in Siemens SINEMA Server before 12 SP1 allow remote attackers to access arbitrary files via HTTP traffic to port (1) 4999 or (2) 80.

Apr 19, 2014
5.0
CVE-2014-0789MEDIUM

Multiple buffer overflows in the OPC Automation 2.0 Server Object ActiveX control in Schneider Electric OPC Factory Server (OFS) TLXCDSUOFS33 3.5 and earlier, TLXCDSTOFS33 3.5 and earlier, TLXCDLUOFS33 3.5 and earlier, TLXCDLTOFS33 3.5 and earlier, and TLXCDLFOFS33 3.5 and earlier allow remote attackers to cause a denial of service via long arguments to unspecified functions.

Apr 4, 2014
5.0
CVE-2014-2590MEDIUM

The web management interface in Siemens RuggedCom ROS before 3.11, ROS 3.11 before 3.11.5 for RS950G, ROS 3.12, and ROS 4.0 for RSG2488 allows remote attackers to cause a denial of service (interface outage) via crafted HTTP packets.

Apr 1, 2014
5.0
CVE-2014-1699MEDIUM

Siemens SIMATIC WinCC OA before 3.12 P002 January allows remote attackers to cause a denial of service (monitoring-service outage) via malformed HTTP requests to port 4999.

Feb 7, 2014
5.0
CVE-2014-1698MEDIUM

Directory traversal vulnerability in Siemens SIMATIC WinCC OA before 3.12 P002 January allows remote attackers to read arbitrary files via crafted packets to TCP port 4999.

Feb 7, 2014
5.0
CVE-2014-1696MEDIUM

Siemens SIMATIC WinCC OA before 3.12 P002 January uses a weak hash algorithm for passwords, which makes it easier for remote attackers to obtain access via a brute-force attack.

Feb 7, 2014
5.0
CVE-2013-6143MEDIUM

The Schneider Electric Telvent SAGE 3030 RTU with firmware C3413-500-001D3_P4 and C3413-500-001F0_PB allows remote attackers to cause a denial of service (temporary outage and CPU consumption) via malformed DNP3 traffic.

Jan 31, 2014
5.0
CVE-2013-2763MEDIUM

The Schneider Electric M340 PLC modules allow remote attackers to cause a denial of service (resource consumption) via unspecified vectors. NOTE: the vendor reportedly disputes this issue because it "could not be duplicated" and "an attacker could not remotely exploit this observed behavior to deny PLC control functions.

Apr 4, 2013
5.0
CVE-2012-4712MEDIUM

Moxa EDR-G903 series routers with firmware before 2.11 have a hardcoded account, which allows remote attackers to obtain unspecified device access via unknown vectors.

Feb 15, 2013
5.0
CVE-2012-6441MEDIUM

An information exposure of confidential information results when the device receives a specially crafted CIP packet to Port 2222/TCP, Port 2222/UDP, Port 44818/TCP, or Port 44818/UDP. Successful exploitation of this vulnerability could cause loss of confidentiality. Rockwell Automation EtherNet/IP products; 1756-ENBT, 1756-EWEB, 1768-ENBT, and 1768-EWEB communication modules; CompactLogix L32E and L35E controllers; 1788-ENBT FLEXLogix adapter; 1794-AENTR FLEX I/O EtherNet/IP adapter; ControlLogix 18 and earlier; CompactLogix 18 and earlier; GuardLogix 18 and earlier; SoftLogix 18 and earlier; CompactLogix controllers 19 and earlier; SoftLogix controllers 19 and earlier; ControlLogix controllers 20 and earlier; GuardLogix controllers 20 and earlier; and MicroLogix 1100 and 1400

Jan 24, 2013
5.0
CVE-2012-3030MEDIUM

WebNavigator in Siemens WinCC 7.0 SP3 and earlier, as used in SIMATIC PCS7 and other products, stores sensitive information under the web root with insufficient access control, which allows remote attackers to read a (1) log file or (2) configuration file via a direct request.

Sep 18, 2012
5.0
CVE-2012-0222MEDIUM

The FactoryTalk (FT) RNADiagReceiver service in Rockwell Automation Allen-Bradley FactoryTalk CPR9 through SR5 and RSLogix 5000 17 through 20 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted packet.

Apr 2, 2012
5.0
CVE-2012-0221MEDIUM

The FactoryTalk (FT) RNADiagReceiver service in Rockwell Automation Allen-Bradley FactoryTalk CPR9 through SR5 and RSLogix 5000 17 through 20 does not properly handle the return value from an unspecified function, which allows remote attackers to cause a denial of service (service outage) via a crafted packet.

Apr 2, 2012
5.0
CVE-2012-0241MEDIUM

Advantech/BroadWin WebAccess before 7.0 allows remote attackers to cause a denial of service (memory corruption) via a modified stream identifier to a function.

Feb 21, 2012
5.0
CVE-2012-0239MEDIUM

uaddUpAdmin.asp in Advantech/BroadWin WebAccess before 7.0 does not properly perform authentication, which allows remote attackers to modify an administrative password via a password-change request.

Feb 21, 2012
5.0
CVE-2012-0236MEDIUM

Advantech/BroadWin WebAccess 7.0 and earlier allows remote attackers to obtain sensitive information via a direct request to a URL. NOTE: the vendor reportedly "does not consider it to be a security risk."

Feb 21, 2012
5.0
CVE-2011-4512MEDIUM

CRLF injection vulnerability in the HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.

Feb 3, 2012
5.0
CVE-2011-4532MEDIUM

Absolute path traversal vulnerability in the ALMListView.ALMListCtrl ActiveX control in almaxcx.dll in the graphical user interface in Siemens Automation License Manager (ALM) 2.0 through 5.1+SP1+Upd2 allows remote attackers to overwrite arbitrary files via the Save method.

Jan 8, 2012
5.0
CVE-2011-4531MEDIUM

Siemens Automation License Manager (ALM) 4.0 through 5.1+SP1+Upd1 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via crafted content in a (1) get_target_ocx_param or (2) send_target_ocx_param command.

Jan 8, 2012
5.0
CVE-2011-4530MEDIUM

Siemens Automation License Manager (ALM) 4.0 through 5.1+SP1+Upd1 does not properly copy fields obtained from clients, which allows remote attackers to cause a denial of service (exception and daemon crash) via long fields, as demonstrated by fields to the (1) open_session->workstation->NAME or (2) grant->VERSION function.

Jan 8, 2012
5.0
CVE-2011-5009MEDIUM

The CmpWebServer.dll module in the Control service in 3S CoDeSys 3.4 SP4 Patch 2 allows remote attackers to cause a denial of service (NULL pointer dereference) via (1) a crafted Content-Length in an HTTP POST or (2) an invalid HTTP request method.

Dec 25, 2011
5.0
CVE-2011-4036MEDIUM

Directory traversal vulnerability in Schneider Electric Vijeo Historian 4.30 and earlier, CitectHistorian 4.30 and earlier, and CitectSCADAReports 4.10 and earlier allows remote attackers to read arbitrary files via unspecified vectors.

Dec 2, 2011
5.0
CVE-2011-3486MEDIUM

Beckhoff TwinCAT 2.11.0.2004 and earlier allows remote attackers to cause a denial of service via a crafted request to UDP port 48899, which triggers an out-of-bounds read.

Sep 16, 2011
5.0
CVE-2010-0939MEDIUM

Visialis ABB Forum 1.1 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database via a direct request for fpdb/abb.mdb.

Mar 8, 2010
5.0
CVE-2009-4007MEDIUM

Unspecified vulnerability in the NormaliseTrainConsist function in src/train_cmd.cpp in OpenTTD before 0.7.5-RC1 allows remote attackers to cause a denial of service (daemon crash) via certain game actions involving a wagon and a dual-headed engine.

Dec 28, 2009
5.0
CVE-2008-7199MEDIUM

Phoenix Contact FL IL 24 BK-PAC allows remote attackers to cause a denial of service (hang) via (1) unspecified manipulations as demonstrated by a Nessus scan or (2) malformed input to TCP port 502.

Sep 10, 2009
5.0
CVE-2009-0474MEDIUM

The web interface in the Rockwell Automation ControlLogix 1756-ENBT/A EtherNet/IP Bridge Module allows remote attackers to obtain "internal web page information" and "internal information about the module" via unspecified vectors. NOTE: this may overlap CVE-2002-1603.

Feb 6, 2009
5.0
CVE-2006-3907MEDIUM

Siemens SpeedStream 2624 allows remote attackers to cause a denial of service (device hang) by sending a crafted packet to the web administrative interface.

Jul 27, 2006
5.0
CVE-2002-0122MEDIUM

Siemens 3568i WAP mobile phones allows remote attackers to cause a denial of service (crash) via an SMS message containing unusual characters.

Mar 25, 2002
5.0
CVE-2023-37858MEDIUM

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 an authenticated, remote attacker with admin privileges is able to read hardcoded cryptographic keys allowing to decrypt an encrypted web application login password.

Aug 9, 2023
4.9
CVE-2023-3569MEDIUM

In PHOENIX CONTACTs TC ROUTER and TC CLOUD CLIENT in versions prior to 2.07.2 as well as CLOUD CLIENT 1101T-TX/TX prior to 2.06.10 an authenticated remote attacker with admin privileges could upload a crafted XML file which causes a denial-of-service.

Aug 8, 2023
4.9
CVE-2023-1620MEDIUM

Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a specifically crafted packet to the CODESYS V2 runtime.

Jun 26, 2023
4.9
CVE-2023-1619MEDIUM

Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a malformed packet.

Jun 26, 2023
4.9
CVE-2018-7824MEDIUM

An Externally Controlled Reference to a Resource (CWE-610) vulnerability exists in Schneider Electric Modbus Serial Driver (For 64-bit Windows OS:V3.17 IE 37 and prior , For 32-bit Windows OS:V2.17 IE 27 and prior, and as part of the Driver Suite version:V14.12 and prior) which could allow write access to system files available only to users with SYSTEM privilege or other important user files.

May 22, 2019
4.9
CVE-2014-9563MEDIUM

CRLF injection vulnerability in the web-based management (WBM) interface in Unify (former Siemens) OpenStage SIP and OpenScape Desk Phone IP V3 devices before R3.32.0 allows remote authenticated users to modify the root password and consequently access the debug port using the serial interface via the ssh-password parameter to page.cmd.

Apr 12, 2018
4.9
CVE-2017-14023MEDIUM

An Improper Input Validation issue was discovered in Siemens SIMATIC PCS 7 V8.1 prior to V8.1 SP1 with WinCC V7.3 Upd 13, and V8.2 all versions. The improper input validation vulnerability has been identified, which may allow an authenticated remote attacker who is a member of the administrators group to crash services by sending specially crafted messages to the DCOM interface.

Nov 6, 2017
4.9
CVE-2017-6867MEDIUM

A vulnerability was discovered in Siemens SIMATIC WinCC (V7.3 before Upd 11 and V7.4 before SP1), SIMATIC WinCC Runtime Professional (V13 before SP2 and V14 before SP1), SIMATIC WinCC (TIA Portal) Professional (V13 before SP2 and V14 before SP1) that could allow an authenticated, remote attacker who is member of the "administrators" group to crash services by sending specially crafted messages to the DCOM interface.

May 11, 2017
4.9
CVE-2016-5810MEDIUM

upAdminPg.asp in Advantech WebAccess before 8.1_20160519 allows remote authenticated administrators to obtain sensitive password information via unspecified vectors.

May 2, 2017
4.9
CVE-2015-1010MEDIUM

Rockwell Automation RSView32 7.60.00 (aka CPR9 SR4) and earlier does not properly encrypt credentials, which allows local users to obtain sensitive information by reading a file and conducting a decryption attack.

May 31, 2015
4.9
CVE-2014-5411MEDIUM

Multiple cross-site scripting (XSS) vulnerabilities in Schneider Electric StruxureWare SCADA Expert ClearSCADA 2010 R3 through 2014 R1 allow remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.

Sep 18, 2014
4.9
CVE-2014-4683MEDIUM

The WebNavigator server in Siemens SIMATIC WinCC before 7.3, as used in PCS7 and other products, allows remote authenticated users to gain privileges via a (1) HTTP or (2) HTTPS request.

Jul 24, 2014
4.9
CVE-2008-2235MEDIUM

OpenSC before 0.11.5 uses weak permissions (ADMIN file control information of 00) for the 5015 directory on smart cards and USB crypto tokens running Siemens CardOS M4, which allows physically proximate attackers to change the PIN.

Aug 1, 2008
4.9
CVE-2021-34582MEDIUM

In Phoenix Contact FL MGUARD 1102 and 1105 in Versions 1.4.0, 1.4.1 and 1.5.0 a user with high privileges can inject HTML code (XSS) through web-based management or the REST API with a manipulated certificate file.

Nov 10, 2021
4.8
CVE-2017-13700MEDIUM

An issue was discovered on MOXA EDS-G512E 5.1 build 16072215 devices. There is XSS in the administration interface.

Nov 17, 2017
4.8
CVE-2024-45003MEDIUM

In the Linux kernel, the following vulnerability has been resolved: vfs: Don't evict inode under the inode lru traversing context The inode reclaiming process(See function prune_icache_sb) collects all reclaimable inodes and mark them with I_FREEING flag at first, at that time, other processes will be stuck if they try getting these inodes (See function find_inode_fast), then the reclaiming process destroy the inodes by function dispose_list(). Some filesystems(eg. ext4 with ea_inode feature, ubifs with xattr) may do inode lookup in the inode evicting callback function, if the inode lookup is operated under the inode lru traversing context, deadlock problems may happen. Case 1: In function ext4_evict_inode(), the ea inode lookup could happen if ea_inode feature is enabled, the lookup process will be stuck under the evicting context like this: 1. File A has inode i_reg and an ea inode i_ea 2. getfattr(A, xattr_buf) // i_ea is added into lru // lru->i_ea 3. Then, following three processes running like this: PA PB echo 2 > /proc/sys/vm/drop_caches shrink_slab prune_dcache_sb // i_reg is added into lru, lru->i_ea->i_reg prune_icache_sb list_lru_walk_one inode_lru_isolate i_ea->i_state |= I_FREEING // set inode state inode_lru_isolate __iget(i_reg) spin_unlock(&i_reg->i_lock) spin_unlock(lru_lock) rm file A i_reg->nlink = 0 iput(i_reg) // i_reg->nlink is 0, do evict ext4_evict_inode ext4_xattr_delete_inode ext4_xattr_inode_dec_ref_all ext4_xattr_inode_iget ext4_iget(i_ea->i_ino) iget_locked find_inode_fast __wait_on_freeing_inode(i_ea) ----→ AA deadlock dispose_list // cannot be executed by prune_icache_sb wake_up_bit(&i_ea->i_state) Case 2: In deleted inode writing function ubifs_jnl_write_inode(), file deleting process holds BASEHD's wbuf->io_mutex while getting the xattr inode, which could race with inode reclaiming process(The reclaiming process could try locking BASEHD's wbuf->io_mutex in inode evicting function), then an ABBA deadlock problem would happen as following: 1. File A has inode ia and a xattr(with inode ixa), regular file B has inode ib and a xattr. 2. getfattr(A, xattr_buf) // ixa is added into lru // lru->ixa 3. Then, following three processes running like this: PA PB PC echo 2 > /proc/sys/vm/drop_caches shrink_slab prune_dcache_sb // ib and ia are added into lru, lru->ixa->ib->ia prune_icache_sb list_lru_walk_one inode_lru_isolate ixa->i_state |= I_FREEING // set inode state inode_lru_isolate __iget(ib) spin_unlock(&ib->i_lock) spin_unlock(lru_lock) rm file B ib->nlink = 0 rm file A iput(ia) ubifs_evict_inode(ia) ubifs_jnl_delete_inode(ia) ubifs_jnl_write_inode(ia) make_reservation(BASEHD) // Lock wbuf->io_mutex ubifs_iget(ixa->i_ino) iget_locked find_inode_fast __wait_on_freeing_inode(ixa) | iput(ib) // ib->nlink is 0, do evict | ubifs_evict_inode | ubifs_jnl_delete_inode(ib) ↓ ubifs_jnl_write_inode ABBA deadlock ←-----make_reservation(BASEHD) dispose_list // cannot be executed by prune_icache_sb wake_up_bit(&ixa->i_state) Fix the possible deadlock by using new inode state flag I_LRU_ISOLATING to pin the inode in memory while inode_lru_isolate( ---truncated---

Sep 4, 2024
4.7
CVE-2023-6545MEDIUM

The package authelia-bhf included in Beckhoffs TwinCAT/BSD is prone to an open redirect that allows a remote unprivileged attacker to redirect a user to another site. This may have limited impact to integrity and does solely affect anthelia-bhf the Beckhoff fork of authelia.

Dec 14, 2023
4.7
CVE-2023-29029MEDIUM

A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product that could potentially allow a malicious user with admin privileges and network access to view user data and modify the web interface. Additionally, a malicious user could potentially cause interruptions to the availability of the web page.

May 11, 2023
4.7
CVE-2023-29028MEDIUM

A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product that could potentially allow a malicious user with admin privileges and network access to view user data and modify the web interface. Additionally, a malicious user could potentially cause interruptions to the availability of the web page.

May 11, 2023
4.7
CVE-2023-29027MEDIUM

A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product that could potentially allow a malicious user with admin privileges and network access to view user data and modify the web interface. Additionally, a malicious user could potentially cause interruptions to the availability of the web page.

May 11, 2023
4.7
CVE-2023-29026MEDIUM

A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product that could potentially allow a malicious user with admin privileges and network access to view user data and modify the web interface. Additionally, a malicious user could potentially cause interruptions to the availability of the web page.

May 11, 2023
4.7
CVE-2023-29025MEDIUM

A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product that could potentially allow a malicious user with admin privileges and network access to view user data and modify the web interface. Additionally, a malicious user could potentially cause interruptions to the availability of the web page.

May 11, 2023
4.7
CVE-2023-29022MEDIUM

A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product that could potentially allow a malicious user with admin privileges and network access to view user data and modify the web interface. Additionally, a malicious user could potentially cause interruptions to the availability of the web page.

May 11, 2023
4.7
CVE-2022-2789MEDIUM

Emerson Electric's Proficy Machine Edition Version 9.00 and prior is vulnerable to CWE-345 Insufficient Verification of Data Authenticity, and can display logic that is different than the compiled logic.

Aug 19, 2022
4.7
CVE-2020-7520MEDIUM

A CWE-601: URL Redirection to Untrusted Site ('Open Redirect') vulnerability exists in Schneider Electric Software Update (SESU), V2.4.0 and prior, which could cause execution of malicious code on the victim's machine. In order to exploit this vulnerability, an attacker requires privileged access on the engineering workstation to modify a Windows registry key which would divert all traffic updates to go through a server in the attacker's possession. A man-in-the-middle attack is then used to complete the exploit.

Jul 23, 2020
4.7
CVE-2016-7959MEDIUM

Siemens SIMATIC STEP 7 (TIA Portal) before 14 improperly stores pre-shared key data in TIA project files, which makes it easier for local users to obtain sensitive information by leveraging access to a file and conducting a brute-force attack.

Oct 13, 2016
4.7
CVE-2022-1607MEDIUM

Cross-Site Request Forgery (CSRF) vulnerability in ABB Pulsar Plus System Controller NE843_S, ABB Infinity DC Power Plant allows Cross Site Request Forgery.This issue affects Pulsar Plus System Controller NE843_S : comcode 150042936; Infinity DC Power Plant: H5692448 G104 G842 G224L G630-4 G451C(2) G461(2) – comcode 150047415.

Feb 24, 2023
4.6
CVE-2022-30314MEDIUM

Honeywell Experion PKS Safety Manager 5.02 uses Hard-coded Credentials. According to FSCT-2022-0052, there is a Honeywell Experion PKS Safety Manager hardcoded credentials issue. The affected components are characterized as: POLO bootloader. The potential impact is: Manipulate firmware. The Honeywell Experion PKS Safety Manager utilizes the DCOM-232/485 serial interface for firmware management purposes. When booting, the Safety Manager exposes the Enea POLO bootloader via this interface. Access to the boot configuration is controlled by means of credentials hardcoded in the Safety Manager firmware. The credentials for the bootloader are hardcoded in the firmware. An attacker with access to the serial interface (either through physical access, a compromised EWS or an exposed serial-to-ethernet gateway) can utilize these credentials to control the boot process and manipulate the unauthenticated firmware image (see FSCT-2022-0054).

Jul 28, 2022
4.6
CVE-2018-4847MEDIUM

A vulnerability has been identified in SIMATIC WinCC OA Operator iOS App (All versions < V1.4). Insufficient protection of sensitive information (e.g. session key for accessing server) in Siemens WinCC OA Operator iOS app could allow an attacker with physical access to the mobile device to read unencrypted data from the app's directory. Siemens provides mitigations to resolve the security issue.

Apr 23, 2018
4.6
CVE-2014-4685MEDIUM

Siemens SIMATIC WinCC before 7.3, as used in PCS7 and other products, allows local users to gain privileges by leveraging weak system-object access control.

Jul 24, 2014
4.6
CVE-2014-2369MEDIUM

Cross-site request forgery (CSRF) vulnerability in the web application on Omron NS5, NS8, NS10, NS12, and NS15 HMI terminals 8.1xx through 8.68x allows remote authenticated users to hijack the authentication of unspecified victims via unknown vectors.

Jul 24, 2014
4.6
CVE-2013-3927MEDIUM

Unspecified vulnerability in the client library in Siemens COMOS 9.2 before 9.2.0.6.10 and 10.0 before 10.0.3.0.4 allows local users to obtain unintended write access to the database by leveraging read access.

Jun 18, 2013
4.6
CVE-2011-4515MEDIUM

Siemens WinCC (TIA Portal) 11 uses a reversible algorithm for storing HMI web-application passwords in world-readable and world-writable files, which allows local users to obtain sensitive information by leveraging (1) physical access or (2) Sm@rt Server access.

Mar 21, 2013
4.6
CVE-2011-5163MEDIUM

Buffer overflow in an unspecified third-party component in the Batch module for Schneider Electric CitectSCADA before 7.20 and Mitsubishi MX4 SCADA before 7.20 allows local users to execute arbitrary code via a long string in a login sequence.

Sep 15, 2012
4.6
CVE-2005-0504MEDIUM

Buffer overflow in the MoxaDriverIoctl function for the moxa serial driver (moxa.c) in Linux 2.2.x, 2.4.x, and 2.6.x before 2.6.22 allows local users to execute arbitrary code via a certain modified length value.

Mar 14, 2005
4.6
CVE-2024-21920MEDIUM

A memory buffer vulnerability in Rockwell Automation Arena Simulation could potentially let a threat actor read beyond the intended memory boundaries. This could reveal sensitive information and even cause the application to crash, resulting in a denial-of-service condition. To trigger this, the user would unwittingly need to open a malicious file shared by the threat actor.

Mar 26, 2024
4.4
CVE-2017-12127MEDIUM

A password storage vulnerability exists in the operating system functionality of Moxa EDR-810 V4.1 build 17030317. An attacker with shell access could extract passwords in clear text from the device.

May 14, 2018
4.4
CVE-2014-8390MEDIUM

Multiple buffer overflows in Schneider Electric VAMPSET before 2.2.168 allow local users to gain privileges via malformed disturbance-recording data in a (1) CFG or (2) DAT file.

Apr 3, 2015
4.4
CVE-2015-1356MEDIUM

Siemens SIMATIC STEP 7 (TIA Portal) before 13 SP1 determines a user's privileges on the basis of project-file fields that lack integrity protection, which allows remote attackers to establish arbitrary authorization data via a modified file.

Feb 18, 2015
4.4
CVE-2025-15094MEDIUM

A weakness has been identified in sunkaifei FlyCMS up to abbaa5a8daefb146ad4d61027035026b052cb414. The impacted element is the function userLogin of the file src/main/java/com/flycms/web/front/UserController.java of the component User Login. Executing a manipulation of the argument redirectUrl can lead to cross site scripting. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The project was informed of the problem early through an issue report but has not responded yet.

Dec 26, 2025
4.3
CVE-2025-15093MEDIUM

A security flaw has been discovered in sunkaifei FlyCMS up to abbaa5a8daefb146ad4d61027035026b052cb414. The affected element is an unknown function of the file src/main/java/com/flycms/web/system/IndexAdminController.java of the component Admin Login. Performing a manipulation of the argument redirectUrl results in cross site scripting. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.

Dec 26, 2025
4.3
CVE-2025-67653MEDIUM

Advantech WebAccess/SCADA is vulnerable to directory traversal, which may allow an attacker to determine the existence of arbitrary files.

Dec 18, 2025
4.3
CVE-2025-14848MEDIUM

Advantech WebAccess/SCADA is vulnerable to absolute directory traversal, which may allow an attacker to determine the existence of arbitrary files.

Dec 18, 2025
4.3
CVE-2025-46704MEDIUM

A vulnerability exists in Advantech iView in NetworkServlet.processImportRequest() that could allow for a directory traversal attack. This issue requires an authenticated attacker with at least user-level privileges. A specific parameter is not properly sanitized or normalized, potentially allowing an attacker to determine the existence of arbitrary files on the server.

Jul 11, 2025
4.3
CVE-2024-9877MEDIUM

: Use of GET Request Method With Sensitive Query Strings vulnerability in ABB ANC, ABB ANC-L, ABB ANC-mini.This issue affects ANC: through 1.1.4; ANC-L: through 1.1.4; ANC-mini: through 1.1.4.

Apr 30, 2025
4.3
CVE-2023-37856MEDIUM

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with low privileges is able to gain limited read-access to the device-filesystem through a configuration dialog within the embedded Qt browser .

Aug 9, 2023
4.3
CVE-2023-37855MEDIUM

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with low privileges is able to gain limited read-access to the device-filesystem within the embedded Qt browser.

Aug 9, 2023
4.3
CVE-2022-22508MEDIUM

Improper Input Validation vulnerability in multiple CODESYS V3 products allows an authenticated remote attacker to block consecutive logins of a specific type.

May 15, 2023
4.3
CVE-2021-38431MEDIUM

An authenticated user using Advantech WebAccess SCADA in versions 9.0.3 and prior can use API functions to disclose project names and paths from other users.

Oct 15, 2021
4.3
CVE-2021-32991MEDIUM

Delta Electronics DIAEnergie Version 1.7.5 and prior is vulnerable to cross-site request forgery, which may allow an attacker to cause a user to carry out an action unintentionally.

Aug 30, 2021
4.3
CVE-2020-12027MEDIUM

All versions of FactoryTalk View SE disclose the hostnames and file paths for certain files within the system. A remote, authenticated attacker may be able to leverage this information for reconnaissance efforts. Rockwell Automation recommends enabling built in security features found within FactoryTalk View SE. Users should follow guidance found in knowledge base articles 109056 and 1126943 to set up IPSec and/or HTTPs.

Jul 20, 2020
4.3
CVE-2019-19091MEDIUM

For ABB eSOMS versions 4.0 to 6.0.3, HTTPS responses contain comments with sensitive information about the application. An attacker might use this detail information to specifically craft the attack.

Apr 2, 2020
4.3
CVE-2019-18997MEDIUM

The HMISimulator component of ABB PB610 Panel Builder 600 uses the readFile/writeFile interface to manipulate the work file. Path configuration in PB610 HMISimulator versions 2.8.0.424 and earlier potentially allows access to files outside of the working directory, thus potentially supporting unauthorized file access.

Dec 18, 2019
4.3
CVE-2019-18995MEDIUM

The HMISimulator component of ABB PB610 Panel Builder 600 versions 2.8.0.424 and earlier fails to validate the content-length field for HTTP requests, exposing HMISimulator to denial of service via crafted HTTP requests manipulating the content-length setting.

Dec 18, 2019
4.3
CVE-2019-10963MEDIUM

Moxa EDR 810, all versions 5.1 and prior, allows an unauthenticated attacker to be able to retrieve some log files from the device, which may allow sensitive information disclosure. Log files must have previously been exported by a legitimate user.

Oct 8, 2019
4.3
CVE-2018-7776MEDIUM

The vulnerability exists within error.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. System information is returned to the attacker that contains sensitive data.

Jul 3, 2018
4.3
CVE-2018-7764MEDIUM

The vulnerability exists within runscript.php applet in Schneider Electric U.motion Builder software versions prior to v1.3.4. There is a directory traversal vulnerability in the processing of the 's' parameter of the applet.

Jul 3, 2018
4.3
CVE-2018-7763MEDIUM

The vulnerability exists within css.inc.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. The 'css' parameter contains a directory traversal vulnerability.

Jul 3, 2018
4.3
CVE-2016-8720MEDIUM

An exploitable HTTP Header Injection vulnerability exists in the Web Application functionality of the Moxa AWK-3131A Wireless Access Point running firmware 1.1. A specially crafted HTTP request can inject a payload in the bkpath parameter which will be copied in to Location header of the HTTP response.

Apr 13, 2017
4.3
CVE-2015-6929MEDIUM

Multiple cross-site scripting (XSS) vulnerabilities in Nokia Networks (formerly Nokia Solutions and Networks and Nokia Siemens Networks) @vantage Commander allow remote attackers to inject arbitrary web script or HTML via the (1) idFilter or (2) nameFilter parameter to cftraces/filter/fl_copy.jsp; the (3) flName parameter to cftraces/filter/fl_crea1.jsp; the (4) serchStatus, (5) refreshTime, or (6) serchNode parameter to cftraces/process/pr_show_process.jsp; the (7) MaxActivationTime, (8) NumberOfBytes, (9) NumberOfTracefiles, (10) SessionName, or (11) serchSessionkind parameter to cftraces/session/se_crea.jsp; the (12) serchSessionDescription parameter to cftraces/session/se_show.jsp; the (13) serchApplication or (14) serchApplicationkind parameter to cftraces/session/tr_crea_filter.jsp; the (15) columKeyUnique, (16) columParameter, (17) componentName, (18) criteria1, (19) criteria2, (20) criteria3, (21) description, (22) filter, (23) id, (24) pathName, (25) tableName, or (26) component parameter to cftraces/session/tr_create_tagg_para.jsp; or the (27) userid parameter to home/certificate_association.jsp.

Sep 16, 2015
4.3
CVE-2015-6675MEDIUM

Siemens RUGGEDCOM ROS 3.8.0 through 4.1.x permanently enables the IP forwarding feature, which allows remote attackers to bypass a VLAN isolation protection mechanism via IP traffic.

Sep 11, 2015
4.3
CVE-2015-6466MEDIUM

Cross-site scripting (XSS) vulnerability in the Diagnosis Ping feature in the administrative web interface on Moxa EDS-405A and EDS-408A switches with firmware before 3.6 allows remote attackers to inject arbitrary web script or HTML via an unspecified field.

Sep 11, 2015
4.3
CVE-2015-5537MEDIUM

The SSL layer of the HTTPS service in Siemens RuggedCom ROS before 4.2.0 and ROX II does not properly implement CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, a different vulnerability than CVE-2014-3566.

Aug 3, 2015
4.3
CVE-2015-4174MEDIUM

Cross-site scripting (XSS) vulnerability in the integrated web server on the Siemens Climatix BACnet/IP communication module with firmware before 10.34 allows remote attackers to inject arbitrary web script or HTML via a crafted URL.

Jun 28, 2015
4.3
CVE-2015-2822MEDIUM

Siemens SIMATIC HMI Comfort Panels before WinCC (TIA Portal) 13 SP1 Upd2 and SIMATIC WinCC Runtime Advanced before WinCC (TIA Portal) 13 SP1 Upd2 allow man-in-the-middle attackers to cause a denial of service via crafted packets on TCP port 102.

Apr 8, 2015
4.3
CVE-2015-1595MEDIUM

The Siemens SPCanywhere application for Android and iOS does not use encryption during lookups of system ID to IP address mappings, which allows man-in-the-middle attackers to discover alarm IP addresses and spoof servers by intercepting the client-server data stream.

Mar 7, 2015
4.3
CVE-2015-1048MEDIUM

Open redirect vulnerability in the integrated web server on Siemens SIMATIC S7-1200 CPU devices with firmware before 4.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.

Jan 21, 2015
4.3
CVE-2014-3110MEDIUM

Multiple cross-site scripting (XSS) vulnerabilities on Honeywell FALCON XLWeb Linux controller devices 2.04.01 and earlier and FALCON XLWeb XLWebExe controller devices 2.02.11 and earlier allow remote attackers to inject arbitrary web script or HTML via invalid input.

Jul 24, 2014
4.3
CVE-2014-2908MEDIUM

Cross-site scripting (XSS) vulnerability in the integrated web server on Siemens SIMATIC S7-1200 CPU devices 2.x and 3.x allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Apr 25, 2014
4.3
CVE-2014-2248MEDIUM

Open redirect vulnerability in the integrated web server on Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.

Mar 16, 2014
4.3
CVE-2014-2246MEDIUM

Cross-site scripting (XSS) vulnerability in the integrated web server on Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Mar 16, 2014
4.3
CVE-2013-6142MEDIUM

DNP3Driver.exe in the DNP3 driver in Schneider Electric ClearSCADA 2010 R2 through 2010 R3.1 and SCADA Expert ClearSCADA 2013 R1 through 2013 R1.2 allows remote attackers to cause a denial of service (resource consumption) via IP packets containing errors that trigger event-journal messages.

Jan 15, 2014
4.3
CVE-2013-4779MEDIUM

Cross-site scripting (XSS) vulnerability in core/handleTw.php on the Siemens Enterprise OpenScape Branch appliance and OpenScape Session Border Controller (SBC) before 2 R0.32.0, and 7 before 7 R1.7.0, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Jul 18, 2013
4.3
CVE-2013-2301MEDIUM

The OMRON OpenWnn application before 1.3.6 for Android uses weak permissions for unspecified files, which allows attackers to obtain sensitive information via an application that accesses the local filesystem.

Mar 29, 2013
4.3
CVE-2013-0670MEDIUM

CRLF injection vulnerability in the HMI web application in Siemens WinCC (TIA Portal) 11 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted URL.

Mar 21, 2013
4.3
CVE-2013-0668MEDIUM

Multiple cross-site scripting (XSS) vulnerabilities in the HMI web application in Siemens WinCC (TIA Portal) 11 allow remote attackers to inject arbitrary web script or HTML via a crafted URL.

Mar 21, 2013
4.3
CVE-2013-0667MEDIUM

Cross-site scripting (XSS) vulnerability in the HMI web application in Siemens WinCC (TIA Portal) 11 allows remote attackers to inject arbitrary web script or HTML via a crafted URL.

Mar 21, 2013
4.3
CVE-2012-4698MEDIUM

Siemens RuggedCom Rugged Operating System (ROS) before 3.12, ROX I OS through 1.14.5, ROX II OS through 2.3.0, and RuggedMax OS through 4.2.1.4621.22 use hardcoded private keys for SSL and SSH communication, which makes it easier for man-in-the-middle attackers to spoof servers and decrypt network traffic by leveraging the availability of these keys within ROS files at all customer installations.

Dec 23, 2012
4.3
CVE-2012-3040MEDIUM

Cross-site scripting (XSS) vulnerability in the web server on Siemens SIMATIC S7-1200 PLCs 2.x through 3.0.1 allows remote attackers to inject arbitrary web script or HTML via a crafted URI.

Oct 10, 2012
4.3
CVE-2012-3037MEDIUM

The Siemens SIMATIC S7-1200 2.x PLC does not properly protect the private key of the SIMATIC CONTROLLER Certification Authority certificate, which allows remote attackers to spoof the S7-1200 web server by using this key to create a forged certificate.

Sep 25, 2012
4.3
CVE-2012-3034MEDIUM

WebNavigator in Siemens WinCC 7.0 SP3 and earlier, as used in SIMATIC PCS7 and other products, allows remote attackers to discover a username and password via crafted parameters to unspecified methods in ActiveX controls.

Sep 18, 2012
4.3
CVE-2012-3031MEDIUM

Multiple cross-site scripting (XSS) vulnerabilities in WebNavigator in Siemens WinCC 7.0 SP3 and earlier, as used in SIMATIC PCS7 and other products, allow remote attackers to inject arbitrary web script or HTML via a (1) GET parameter, (2) POST parameter, or (3) Referer HTTP header.

Sep 18, 2012
4.3
CVE-2012-2598MEDIUM

Buffer overflow in the DiagAgent web server in Siemens WinCC 7.0 SP3 through Update 2 allows remote attackers to cause a denial of service (agent outage) via crafted input.

Jun 8, 2012
4.3
CVE-2012-2595MEDIUM

Multiple cross-site scripting (XSS) vulnerabilities in unspecified web applications in Siemens WinCC 7.0 SP3 before Update 2 allow remote attackers to inject arbitrary web script or HTML via vectors involving special characters in parameters.

Jun 8, 2012
4.3
CVE-2012-1990MEDIUM

Multiple cross-site scripting (XSS) vulnerabilities in Schneider Electric Kerweb before 3.0.1 and Kerwin before 6.0.1 allow remote attackers to inject arbitrary web script or HTML via (1) the evtvariablename parameter in an evts.xml action to kw.dll, (2) unspecified search fields, or (3) unspecified content-display fields.

May 22, 2012
4.3
CVE-2012-0233MEDIUM

Cross-site scripting (XSS) vulnerability in Advantech/BroadWin WebAccess before 7.0 allows remote attackers to inject arbitrary web script or HTML via a malformed URL.

Feb 21, 2012
4.3
CVE-2011-4523MEDIUM

Cross-site scripting (XSS) vulnerability in bwview.asp in Advantech/BroadWin WebAccess before 7.0 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters.

Feb 21, 2012
4.3
CVE-2011-4522MEDIUM

Cross-site scripting (XSS) vulnerability in bwerrdn.asp in Advantech/BroadWin WebAccess before 7.0 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters.

Feb 21, 2012
4.3
CVE-2011-4511MEDIUM

Cross-site scripting (XSS) vulnerability in the HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2011-4510.

Feb 3, 2012
4.3
CVE-2011-4510MEDIUM

Cross-site scripting (XSS) vulnerability in the HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka TIA portal) before SP2 Update 1; the TP, OP, MP, Comfort Panels, and Mobile Panels SIMATIC HMI panels; WinCC V11 Runtime Advanced; and WinCC flexible Runtime allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2011-4511.

Feb 3, 2012
4.3
CVE-2011-4263MEDIUM

Cross-site scripting (XSS) vulnerability in Schneider Electric PowerChute Business Edition before 8.5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Dec 7, 2011
4.3
CVE-2011-4035MEDIUM

Cross-site scripting (XSS) vulnerability in Schneider Electric Vijeo Historian 4.30 and earlier, CitectHistorian 4.30 and earlier, and CitectSCADAReports 4.10 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Dec 2, 2011
4.3
CVE-2011-4033MEDIUM

Buffer overflow in the Steema TeeChart ActiveX control, as used in Schneider Electric Vijeo Historian 4.30 and earlier, CitectHistorian 4.30 and earlier, and CitectSCADAReports 4.10 and earlier, allows remote attackers to cause a denial of service via unspecified vectors.

Dec 2, 2011
4.3
CVE-2009-0472MEDIUM

Multiple cross-site scripting (XSS) vulnerabilities in the web interface in the Rockwell Automation ControlLogix 1756-ENBT/A EtherNet/IP Bridge Module allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.

Feb 6, 2009
4.3
CVE-2007-4488MEDIUM

Multiple cross-site scripting (XSS) vulnerabilities in the Siemens Gigaset SE361 WLAN router with firmware 1.00.0 allow remote attackers to inject arbitrary web script or HTML via the portion of the URI immediately following the filename for (1) a GIF filename, which triggers display of the GIF file in text format and an unspecified denial of service (crash); or (2) the login.tri filename, which triggers a continuous loop of the browser attempting to visit the login page.

Aug 22, 2007
4.3
CVE-2025-3449MEDIUM

A Generation of Predictable Numbers or Identifiers vulnerability in the SDM component of B&R Automation Runtime versions before 6.4 may allow an unauthenticated network-based attacker to take over already established sessions.

Oct 7, 2025
4.2
CVE-2023-2639MEDIUM

The underlying feedback mechanism of Rockwell Automation's FactoryTalk System Services that transfers the FactoryTalk Policy Manager rules to relevant devices on the network does not verify that the origin of the communication is from a legitimate local client device.  This may allow a threat actor to craft a malicious website that, when visited, will send a malicious script that can connect to the local WebSocket endpoint and wait for events as if it was a valid client device. If successfully exploited, this would allow a threat actor to receive information including whether FactoryTalk Policy Manager is installed and potentially the entire security policy. 

Jun 13, 2023
4.1
CVE-2017-9637MEDIUM

Schneider Electric Ampla MES 6.4 provides capability to interact with data from third party databases. When connectivity to those databases is configured to use a SQL user name and password, an attacker may be able to sniff details from the connection string. Schneider Electric recommends that users of Ampla MES versions 6.4 and prior should upgrade to Ampla MES version 6.5 as soon as possible.

May 18, 2018
4.1
CVE-2014-5407MEDIUM

Multiple stack-based buffer overflows in Schneider Electric VAMPSET 2.2.136 and earlier allow local users to cause a denial of service (application halt) via a malformed (1) setting file or (2) disturbance recording file.

Sep 15, 2014
4.1
CVE-2025-59301MEDIUM

Delta Electronics DVP15MC11T lacks proper validation of the modbus/tcp packets and can lead to denial of service.

Dec 22, 2025
4.0
CVE-2017-7937MEDIUM

An Improper Authentication issue was discovered in Phoenix Contact GmbH mGuard firmware versions 8.3.0 to 8.4.2. An attacker may be able to gain unauthorized access to the user firewall when RADIUS servers are unreachable.

May 19, 2017
4.0
CVE-2016-7090MEDIUM

The integrated web server on Siemens SCALANCE M-800 and S615 modules with firmware before 4.02 does not set the secure flag for the session cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session.

Sep 29, 2016
4.0
CVE-2014-2370MEDIUM

Cross-site scripting (XSS) vulnerability in the web application on Omron NS5, NS8, NS10, NS12, and NS15 HMI terminals 8.1xx through 8.68x allows remote authenticated users to inject arbitrary web script or HTML via crafted data.

Jul 24, 2014
4.0
CVE-2013-3959MEDIUM

The Web Navigator in Siemens WinCC before 7.2 Update 1, as used in SIMATIC PCS7 8.0 SP1 and earlier and other products, exhibits different behavior for NetBIOS user names depending on whether the user account exists, which allows remote authenticated users to enumerate account names via crafted URL parameters.

Jun 14, 2013
4.0
CVE-2013-2761MEDIUM

The Schneider Electric M340 BMXNOE01xx and BMXP3420xx PLC modules allow remote authenticated users to cause a denial of service (module crash) via crafted FTP traffic, as demonstrated by the FileZilla FTP client.

Apr 4, 2013
4.0
CVE-2013-0679MEDIUM

Directory traversal vulnerability in the web server in Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, allows remote authenticated users to read arbitrary files via vectors involving a query for a pathname.

Mar 21, 2013
4.0
CVE-2013-0678MEDIUM

Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, does not properly represent WebNavigator credentials in a database, which makes it easier for remote authenticated users to obtain sensitive information via a SQL query.

Mar 21, 2013
4.0
CVE-2013-0676MEDIUM

Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, does not properly assign privileges for the database containing WebNavigator credentials, which allows remote authenticated users to obtain sensitive information via a SQL query.

Mar 21, 2013
4.0
CVE-2013-0671MEDIUM

Directory traversal vulnerability in Siemens WinCC (TIA Portal) 11 allows remote authenticated users to read HMI web-application source code and user-defined scripts via a crafted URL.

Mar 21, 2013
4.0
CVE-2013-0669MEDIUM

The HMI web application in Siemens WinCC (TIA Portal) 11 allows remote authenticated users to cause a denial of service (daemon crash) via a crafted HTTP request.

Mar 21, 2013
4.0
CVE-2012-2597MEDIUM

Multiple directory traversal vulnerabilities in Siemens WinCC 7.0 SP3 before Update 2 allow remote authenticated users to read arbitrary files via a crafted parameter in a URL.

Jun 8, 2012
4.0
CVE-2022-2788LOW

Emerson Electric's Proficy Machine Edition Version 9.80 and prior is vulnerable to CWE-29 Path Traversal: '\..\Filename', also known as a ZipSlip attack, through an upload procedure which enables attackers to implant a malicious .BLZ file on the PLC. The file can transfer through the engineering station onto Windows in a way that executes the malicious code.

Aug 19, 2022
3.9
CVE-2019-18994LOW

Due to a lack of file length check, the HMIStudio component of ABB PB610 Panel Builder 600 versions 2.8.0.424 and earlier crashes when trying to load an empty *.JPR application file. An attacker with access to the file system might be able to cause application malfunction such as denial of service.

Dec 18, 2019
3.9
CVE-2017-9635LOW

Schneider Electric Ampla MES 6.4 provides capability to configure users and their privileges. When Ampla MES users are configured to use Simple Security, a weakness in the password hashing algorithm could be exploited to reverse the user's password. Schneider Electric recommends that users of Ampla MES versions 6.4 and prior should upgrade to Ampla MES version 6.5 as soon as possible.

May 18, 2018
3.9
CVE-2023-37857LOW

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 an authenticated, remote attacker with admin privileges is able to read hardcoded cryptographic keys allowing the attacker to create valid session cookies. These session-cookies created by the attacker are not sufficient to obtain a valid session on the device.

Aug 9, 2023
3.8
CVE-2021-22799LOW

A CWE-331: Insufficient Entropy vulnerability exists that could cause unintended connection from an internal network to an external network when an attacker manages to decrypt the SESU proxy password from the registry. Affected Product: Schneider Electric Software Update, V2.3.0 through V2.5.1

Jan 28, 2022
3.8
CVE-2023-5461LOW

A vulnerability was found in Delta Electronics WPLSoft 2.51. It has been classified as problematic. Affected is an unknown function of the component Modbus Handler. The manipulation leads to cleartext transmission of sensitive information. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-241584. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Oct 9, 2023
3.7
CVE-2022-29832LOW

Cleartext Storage of Sensitive Information in Memory vulnerability in Mitsubishi Electric Corporation GX Works3 versions 1.015R and later, GX Works2 all versions and GX Developer versions 8.40S and later allows a remote unauthenticated attacker to disclose sensitive information. As a result, unauthenticated users could obtain information about the project file for MELSEC safety CPU modules or project file for MELSEC Q/FX/L series with security setting.

Nov 25, 2022
3.7
CVE-2016-8344LOW

An issue was discovered in Honeywell Experion Process Knowledge System (PKS) platform: Experion PKS, Release 3xx and prior, Experion PKS, Release 400, Experion PKS, Release 410, Experion PKS, Release 430, and Experion PKS, Release 431. Experion PKS does not properly validate input. By sending a specially crafted packet, an attacker could cause the process to terminate. A successful exploit would prevent firmware uploads to the Series-C devices.

Feb 13, 2017
3.7
CVE-2004-2626LOW

GUI overlay vulnerability in the Java API in Siemens S55 cellular phones allows remote attackers to send unauthorized SMS messages by overlaying a confirmation message with a malicious message.

Dec 31, 2004
3.7
CVE-2024-6620LOW

Honeywell PC42t, PC42tp, and PC42d Printers, T10.19.020016 to T10.20.060398, contain a cross-site scripting vulnerability. A(n) attacker could potentially inject malicious code which may lead to information disclosure, session theft, or client-side request forgery. Honeywell recommends updating to the most recent version of this firmware, PC42 Printer Firmware Version 20.6 T10.20.060398.

Jul 29, 2024
3.5
CVE-2023-5460LOW

A vulnerability was found in Delta Electronics WPLSoft up to 2.51 and classified as problematic. This issue affects some unknown processing of the component Modbus Data Packet Handler. The manipulation leads to heap-based buffer overflow. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-241583. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Oct 9, 2023
3.5
CVE-2019-19092LOW

ABB eSOMS versions 4.0 to 6.0.3 use ASP.NET Viewstate without Message Authentication Code (MAC). Alterations to Viewstate might thus not be noticed.

Apr 2, 2020
3.5
CVE-2019-19090LOW

For ABB eSOMS versions 4.0 to 6.0.2, the Secure Flag is not set in the HTTP response header. Unencrypted connections might access the cookie information, thus making it susceptible to eavesdropping.

Apr 2, 2020
3.5
CVE-2019-13936LOW

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in webclient of Siemens AG Polarion could allow an attacker to exploit a persistent XSS vulnerability. This issue affects: Siemens AG Polarion All versions < 19.2.

Nov 27, 2019
3.5
CVE-2019-13935LOW

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in webclient of Siemens AG Polarion could allow an attacker to exploit a reflected XSS vulnerability. This issue affects: Siemens AG Polarion All versions < 19.2.

Nov 27, 2019
3.5
CVE-2019-13934LOW

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in webclient of Siemens AG Polarion could allow an attacker to exploit a reflected XSS vulnerability. This issue affects: Siemens AG Polarion All versions < 19.2.

Nov 27, 2019
3.5
CVE-2013-2299LOW

Cross-site scripting (XSS) vulnerability in Advantech WebAccess (formerly BroadWin WebAccess) before 7.1 2013.05.30 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.

Aug 22, 2013
3.5
CVE-2013-0672LOW

Cross-site scripting (XSS) vulnerability in the HMI web application in Siemens WinCC (TIA Portal) 11 allows remote authenticated users to inject arbitrary web script or HTML via unspecified data.

Mar 21, 2013
3.5
CVE-2016-3155LOW

Siemens APOGEE Insight uses weak permissions for the application folder, which allows local users to obtain sensitive information or modify data via unspecified vectors.

Mar 18, 2016
3.4
CVE-2023-3669LOW

A missing Brute-Force protection in CODESYS Development System prior to 3.5.19.20 allows a local attacker to have unlimited attempts of guessing the password within an import dialog.

Aug 3, 2023
3.3
CVE-2022-2966LOW

Out-of-bounds Read vulnerability in Delta Electronics DOPSoft.This issue affects DOPSoft: All Versions.

Dec 16, 2022
3.3
CVE-2022-1404LOW

Delta Electronics CNCSoft (All versions prior to 1.01.32) does not properly sanitize input while processing a specific project file, allowing a possible out-of-bounds read condition.

Aug 31, 2022
3.3
CVE-2020-12025LOW

Rockwell Automation Logix Designer Studio 5000 Versions 32.00, 32.01, and 32.02 vulnerable to an xml external entity (XXE) vulnerability, which may allow an attacker to view hostnames or other resources from the program.

Jul 14, 2020
3.3
CVE-2020-6980LOW

Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, MicroLogix 1100 Controller, all versions, RSLogix 500 Software v12.001 and prior, If Simple Mail Transfer Protocol (SMTP) account data is saved in RSLogix 500, a local attacker with access to a victim’s project may be able to gather SMTP server authentication data as it is written to the project file in cleartext.

Mar 16, 2020
3.3
CVE-2019-13511LOW

Rockwell Automation Arena Simulation Software versions 16.00.00 and earlier contain an INFORMATION EXPOSURE CWE-200. A maliciously crafted Arena file opened by an unsuspecting user may result in the limited exposure of information related to the targeted workstation.

Aug 15, 2019
3.3
CVE-2018-17907LOW

When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior and tampering with the value of an offset, an attacker can force the application to read a value outside of an array.

Nov 5, 2018
3.3
CVE-2016-9348LOW

An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions prior to 3.6, NPort 5200 Series versions prior to 2.8, NPort 5400 Series versions prior to 3.11, NPort 5600 Series versions prior to 3.7, NPort 5100A Series & NPort P5150A versions prior to 1.3, NPort 5200A Series versions prior to 1.3, NPort 5150AI-M12 Series versions prior to 1.2, NPort 5250AI-M12 Series versions prior to 1.2, NPort 5450AI-M12 Series versions prior to 1.2, NPort 5600-8-DT Series versions prior to 2.4, NPort 5600-8-DTL Series versions prior to 2.4, NPort 6x50 Series versions prior to 1.13.11, NPort IA5450A versions prior to v1.4. A configuration file contains parameters that represent passwords in plaintext.

Feb 13, 2017
3.3
CVE-2016-5812LOW

Moxa OnCell G3100V2 devices before 2.8 and G3111, G3151, G3211, and G3251 devices before 1.7 use cleartext password storage, which makes it easier for local users to obtain sensitive information by reading a configuration file.

Aug 24, 2016
3.3
CVE-2016-4527LOW

ABB PCM600 before 2.7 improperly stores PCM600 authentication credentials, which allows local users to obtain sensitive information via unspecified vectors.

Jun 10, 2016
3.3
CVE-2016-4516LOW

ABB PCM600 before 2.7 improperly stores the main application password after a password change, which allows local users to obtain sensitive information via unspecified vectors.

Jun 10, 2016
3.3
CVE-2015-7836LOW

Siemens RUGGEDCOM ROS before 4.2.1 allows remote attackers to obtain sensitive information by sniffing the network for VLAN data within the padding section of an Ethernet frame.

Oct 28, 2015
3.3
CVE-2015-0998LOW

Schneider Electric InduSoft Web Studio before 7.1.3.4 SP3 Patch 4 and InTouch Machine Edition 2014 before 7.1.3.4 SP3 Patch 4 transmit cleartext credentials, which allows remote attackers to obtain sensitive information by sniffing the network.

Mar 29, 2015
3.3
CVE-2012-4691LOW

Memory leak in Siemens Automation License Manager (ALM) 4.x and 5.x before 5.2 allows remote attackers to cause a denial of service (memory consumption) via crafted packets.

Dec 18, 2012
3.3
CVE-2014-7251LOW

XML external entity (XXE) vulnerability in the WebHMI server in Yokogawa Electric Corporation FAST/TOOLS before R9.05-SP2 allows local users to cause a denial of service (CPU or network traffic consumption) or read arbitrary files via unspecified vectors.

Dec 6, 2014
3.2
CVE-2023-2876LOW

Sensitive Cookie Without 'HttpOnly' Flag vulnerability in ABB REX640 PCL1 (firmware modules), ABB REX640 PCL2 (Firmware modules), ABB REX640 PCL3 (firmware modules) allows Cross-Site Scripting (XSS).This issue affects REX640 PCL1: from 1.0;0 before 1.0.8; REX640 PCL2: from 1.0;0 before 1.1.4; REX640 PCL3: from 1.0;0 before 1.2.1.

Jun 13, 2023
3.1
CVE-2020-16232LOW

In Yokogawa WideField3 R1.01 - R4.03, a buffer overflow could be caused when a user loads a maliciously crafted project file.

Mar 18, 2022
2.8
CVE-2016-4511LOW

ABB PCM600 before 2.7 uses an improper hash algorithm for the main application password, which makes it easier for local users to obtain sensitive cleartext information by leveraging read access to the ACTConfig configuration file.

Jun 10, 2016
2.8
CVE-2023-4089LOW

On affected Wago products an remote attacker with administrative privileges can access files to which he has already access to through an undocumented local file inclusion. This access is logged in a different log file than expected.

Oct 17, 2023
2.7
CVE-2016-9338LOW

An issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 controller 1763-L16AWA, Series A and B, Version 14.000 and prior versions; 1763-L16BBB, Series A and B, Version 14.000 and prior versions; 1763-L16BWA, Series A and B, Version 14.000 and prior versions; and 1763-L16DWD, Series A and B, Version 14.000 and prior versions. Because of an Incorrect Permission Assignment for Critical Resource, users with administrator privileges may be able to remove all administrative users requiring a factory reset to restore ancillary web server function. Exploitation of this vulnerability will still allow the affected device to function in its capacity as a controller.

Feb 13, 2017
2.7
CVE-2006-2406LOW

Directory traversal vulnerability in bb_lib/abbc.css.php in Unclassified NewsBoard (UNB) 1.5.3-d and possibly earlier versions, when register_globals is enabled, allows remote attackers to include arbitrary files via .. (dot dot) sequences and a trailing null byte (%00) in the design_path parameter. NOTE: this is closely related, but a different vulnerability than the ABBC[Config][smileset] parameter.

May 16, 2006
2.6
CVE-2016-7960LOW

Siemens SIMATIC STEP 7 (TIA Portal) before 14 uses an improper format for managing TIA project files during version updates, which makes it easier for local users to obtain sensitive configuration information via unspecified vectors.

Oct 13, 2016
2.5
CVE-2016-5849LOW

Siemens SICAM PAS through 8.07 allows local users to obtain sensitive configuration information by leveraging database stoppage.

Jul 4, 2016
2.5
CVE-2015-1015LOW

Omron CX-One CX-Programmer before 9.6, CJ2M PLC devices before 2.1, and CJ2H PLC devices before 1.5 use a reversible format for password storage in object files on Compact Flash cards, which makes it easier for local users to obtain sensitive information by reading a file.

Oct 6, 2015
2.1
CVE-2015-0988LOW

Omron CX-One CX-Programmer before 9.6 uses a reversible format for password storage in project source-code files, which makes it easier for local users to obtain sensitive information by reading a file.

Oct 6, 2015
2.1
CVE-2015-5084LOW

The Siemens SIMATIC WinCC Sm@rtClient and Sm@rtClient Lite applications before 01.00.01.00 for Android do not properly store passwords, which allows physically proximate attackers to obtain sensitive information via unspecified vectors.

Aug 3, 2015
2.1
CVE-2015-1602LOW

Siemens SIMATIC STEP 7 (TIA Portal) 12 and 13 before 13 SP1 Upd1 improperly stores password data within project files, which makes it easier for local users to determine cleartext (1) protection-level passwords or (2) web-server passwords by leveraging the ability to read these files.

Apr 6, 2015
2.1
CVE-2015-0999LOW

Schneider Electric InduSoft Web Studio before 7.1.3.4 SP3 Patch 4 and InTouch Machine Edition 2014 before 7.1.3.4 SP3 Patch 4 store cleartext OPC User credentials in a configuration file, which allows local users to obtain sensitive information by reading this file.

Mar 29, 2015
2.1
CVE-2015-0996LOW

Schneider Electric InduSoft Web Studio before 7.1.3.4 SP3 Patch 4 and InTouch Machine Edition 2014 before 7.1.3.4 SP3 Patch 4 rely on a hardcoded cleartext password to control read access to Project files and Project Configuration files, which makes it easier for local users to obtain sensitive information by discovering this password.

Mar 29, 2015
2.1
CVE-2015-1599LOW

The Siemens SPCanywhere application for iOS allows physically proximate attackers to bypass intended access restrictions by leveraging a filesystem architectural error.

Mar 7, 2015
2.1
CVE-2015-1598LOW

The Siemens SPCanywhere application for Android does not properly store application passwords, which allows physically proximate attackers to obtain sensitive information by examining the device filesystem.

Mar 7, 2015
2.1
CVE-2015-1355LOW

Siemens SIMATIC STEP 7 (TIA Portal) before 13 SP1 uses a weak password-hash algorithm, which makes it easier for local users to determine cleartext passwords by reading a project file and conducting a brute-force attack.

Feb 18, 2015
2.1
CVE-2014-5231LOW

The Siemens SIMATIC WinCC Sm@rtClient app before 1.0.2 for iOS allows physically proximate attackers to extract the password from storage via unspecified vectors.

Jan 14, 2015
2.1
CVE-2014-5398LOW

Schneider Electric Wonderware Information Server (WIS) Portal 4.0 SP1 through 5.5 allows remote attackers to read arbitrary files or cause a denial of service via an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

Aug 28, 2014
2.1
CVE-2014-2381LOW

Schneider Electric Wonderware Information Server (WIS) Portal 4.0 SP1 through 5.5 uses weak encryption, which allows local users to obtain sensitive information by reading a credential file.

Aug 28, 2014
2.1
CVE-2014-5233LOW

The Siemens SIMATIC WinCC Sm@rtClient app before 1.0.2 for iOS allows physically proximate attackers to discover Sm@rtServer credentials by leveraging an error in the credential-processing mechanism.

Jan 14, 2015
1.9
CVE-2014-5232LOW

The Siemens SIMATIC WinCC Sm@rtClient app before 1.0.2 for iOS allows local users to bypass an intended application-password requirement by leveraging the running of the app in the background state.

Jan 14, 2015
1.9
CVE-2012-4693LOW

Invensys Wonderware InTouch 2012 R2 and earlier and Siemens ProcessSuite use a weak encryption algorithm for data in Ps_security.ini, which makes it easier for local users to discover passwords by reading this file.

Dec 18, 2012
1.9
CVE-2015-1009LOW

Schneider Electric InduSoft Web Studio before 7.1.3.5 Patch 5 and Wonderware InTouch Machine Edition through 7.1 SP3 Patch 4 use cleartext for project-window password storage, which allows local users to obtain sensitive information by reading a file.

Aug 1, 2015
1.7
CVE-2026-1876Awaiting Analysis

Improper Resource Shutdown or Release vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5-ENET/IP Ethernet Module FX5-ENET/IP all versions allows a remote attacker to cause a denial-of-service (DoS) condition on the products by continuously sending UDP packets to the products. A system reset of the product is required for recovery.

Mar 3, 2026
0.0
CVE-2026-1875Awaiting Analysis

Improper Resource Shutdown or Release vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5-EIP EtherNet/IP Module FX5-EIP all versions allows a remote attacker to cause a denial-of-service (DoS) condition on the products by continuously sending UDP packets to the products. A system reset of the product is required for recovery.

Mar 3, 2026
0.0
CVE-2026-1874Awaiting Analysis

Always-Incorrect Control Flow Implementation vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5-ENET/IP Ethernet Module FX5-ENET/IP versions 1.106 and prior and Mitsubishi Electric Corporation MELSEC iQ-F Series FX5-EIP EtherNet/IP Module FX5-EIP all versions allows a remote attacker to cause a denial-of-service (DoS) condition on the products by continuously sending UDP packets to the products. A system reset of the product is required for recovery.

Mar 3, 2026
0.0
CVE-2025-66600Awaiting Analysis

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This product lacks HSTS (HTTP Strict Transport Security) configuration. When an attacker performs a Man in the middle (MITM) attack, communications with the web server could be sniffed. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Feb 9, 2026
0.0
CVE-2025-66599Awaiting Analysis

A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. Physical paths could be displayed on web pages. This information could be exploited by an attacker for other attacks. The affected products and versions are as follows: FAST/TOOLS (Packages: RVSVRN, UNSVRN, HMIWEB, FTEES, HMIMOB) R9.01 to R10.04

Feb 9, 2026
0.0
CVE-2025-15080Awaiting Analysis

Improper Validation of Specified Quantity in Input vulnerability in Mitsubishi Electric MELSEC iQ-R Series R08PCPU, R16PCPU, R32PCPU, and R120PCPU allows an unauthenticated attacker to read device data or part of a control program from the affected product, write device data in the affected product, or cause a denial of service (DoS) condition on the affected product by sending a specially crafted packet containing a specific command to the affected product.

Feb 5, 2026
0.0
CVE-2026-23036Awaiting Analysis

In the Linux kernel, the following vulnerability has been resolved: btrfs: release path before iget_failed() in btrfs_read_locked_inode() In btrfs_read_locked_inode() if we fail to lookup the inode, we jump to the 'out' label with a path that has a read locked leaf and then we call iget_failed(). This can result in a ABBA deadlock, since iget_failed() triggers inode eviction and that causes the release of the delayed inode, which must lock the delayed inode's mutex, and a task updating a delayed inode starts by taking the node's mutex and then modifying the inode's subvolume btree. Syzbot reported the following lockdep splat for this: ====================================================== WARNING: possible circular locking dependency detected syzkaller #0 Not tainted ------------------------------------------------------ btrfs-cleaner/8725 is trying to acquire lock: ffff0000d6826a48 (&delayed_node->mutex){+.+.}-{4:4}, at: __btrfs_release_delayed_node+0xa0/0x9b0 fs/btrfs/delayed-inode.c:290 but task is already holding lock: ffff0000dbeba878 (btrfs-tree-00){++++}-{4:4}, at: btrfs_tree_read_lock_nested+0x44/0x2ec fs/btrfs/locking.c:145 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #1 (btrfs-tree-00){++++}-{4:4}: __lock_release kernel/locking/lockdep.c:5574 [inline] lock_release+0x198/0x39c kernel/locking/lockdep.c:5889 up_read+0x24/0x3c kernel/locking/rwsem.c:1632 btrfs_tree_read_unlock+0xdc/0x298 fs/btrfs/locking.c:169 btrfs_tree_unlock_rw fs/btrfs/locking.h:218 [inline] btrfs_search_slot+0xa6c/0x223c fs/btrfs/ctree.c:2133 btrfs_lookup_inode+0xd8/0x38c fs/btrfs/inode-item.c:395 __btrfs_update_delayed_inode+0x124/0xed0 fs/btrfs/delayed-inode.c:1032 btrfs_update_delayed_inode fs/btrfs/delayed-inode.c:1118 [inline] __btrfs_commit_inode_delayed_items+0x15f8/0x1748 fs/btrfs/delayed-inode.c:1141 __btrfs_run_delayed_items+0x1ac/0x514 fs/btrfs/delayed-inode.c:1176 btrfs_run_delayed_items_nr+0x28/0x38 fs/btrfs/delayed-inode.c:1219 flush_space+0x26c/0xb68 fs/btrfs/space-info.c:828 do_async_reclaim_metadata_space+0x110/0x364 fs/btrfs/space-info.c:1158 btrfs_async_reclaim_metadata_space+0x90/0xd8 fs/btrfs/space-info.c:1226 process_one_work+0x7e8/0x155c kernel/workqueue.c:3263 process_scheduled_works kernel/workqueue.c:3346 [inline] worker_thread+0x958/0xed8 kernel/workqueue.c:3427 kthread+0x5fc/0x75c kernel/kthread.c:463 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:844 -> #0 (&delayed_node->mutex){+.+.}-{4:4}: check_prev_add kernel/locking/lockdep.c:3165 [inline] check_prevs_add kernel/locking/lockdep.c:3284 [inline] validate_chain kernel/locking/lockdep.c:3908 [inline] __lock_acquire+0x1774/0x30a4 kernel/locking/lockdep.c:5237 lock_acquire+0x14c/0x2e0 kernel/locking/lockdep.c:5868 __mutex_lock_common+0x1d0/0x2678 kernel/locking/mutex.c:598 __mutex_lock kernel/locking/mutex.c:760 [inline] mutex_lock_nested+0x2c/0x38 kernel/locking/mutex.c:812 __btrfs_release_delayed_node+0xa0/0x9b0 fs/btrfs/delayed-inode.c:290 btrfs_release_delayed_node fs/btrfs/delayed-inode.c:315 [inline] btrfs_remove_delayed_node+0x68/0x84 fs/btrfs/delayed-inode.c:1326 btrfs_evict_inode+0x578/0xe28 fs/btrfs/inode.c:5587 evict+0x414/0x928 fs/inode.c:810 iput_final fs/inode.c:1914 [inline] iput+0x95c/0xad4 fs/inode.c:1966 iget_failed+0xec/0x134 fs/bad_inode.c:248 btrfs_read_locked_inode+0xe1c/0x1234 fs/btrfs/inode.c:4101 btrfs_iget+0x1b0/0x264 fs/btrfs/inode.c:5837 btrfs_run_defrag_inode fs/btrfs/defrag.c:237 [inline] btrfs_run_defrag_inodes+0x520/0xdc4 fs/btrf ---truncated---

Jan 31, 2026
0.0
CVE-2025-71079Awaiting Analysis

In the Linux kernel, the following vulnerability has been resolved: net: nfc: fix deadlock between nfc_unregister_device and rfkill_fop_write A deadlock can occur between nfc_unregister_device() and rfkill_fop_write() due to lock ordering inversion between device_lock and rfkill_global_mutex. The problematic lock order is: Thread A (rfkill_fop_write): rfkill_fop_write() mutex_lock(&rfkill_global_mutex) rfkill_set_block() nfc_rfkill_set_block() nfc_dev_down() device_lock(&dev->dev) <- waits for device_lock Thread B (nfc_unregister_device): nfc_unregister_device() device_lock(&dev->dev) rfkill_unregister() mutex_lock(&rfkill_global_mutex) <- waits for rfkill_global_mutex This creates a classic ABBA deadlock scenario. Fix this by moving rfkill_unregister() and rfkill_destroy() outside the device_lock critical section. Store the rfkill pointer in a local variable before releasing the lock, then call rfkill_unregister() after releasing device_lock. This change is safe because rfkill_fop_write() holds rfkill_global_mutex while calling the rfkill callbacks, and rfkill_unregister() also acquires rfkill_global_mutex before cleanup. Therefore, rfkill_unregister() will wait for any ongoing callback to complete before proceeding, and device_del() is only called after rfkill_unregister() returns, preventing any use-after-free. The similar lock ordering in nfc_register_device() (device_lock -> rfkill_global_mutex via rfkill_register) is safe because during registration the device is not yet in rfkill_list, so no concurrent rfkill operations can occur on this device.

Jan 13, 2026
0.0
CVE-2023-54224Awaiting Analysis

In the Linux kernel, the following vulnerability has been resolved: btrfs: fix lockdep splat and potential deadlock after failure running delayed items When running delayed items we are holding a delayed node's mutex and then we will attempt to modify a subvolume btree to insert/update/delete the delayed items. However if have an error during the insertions for example, btrfs_insert_delayed_items() may return with a path that has locked extent buffers (a leaf at the very least), and then we attempt to release the delayed node at __btrfs_run_delayed_items(), which requires taking the delayed node's mutex, causing an ABBA type of deadlock. This was reported by syzbot and the lockdep splat is the following: WARNING: possible circular locking dependency detected 6.5.0-rc7-syzkaller-00024-g93f5de5f648d #0 Not tainted ------------------------------------------------------ syz-executor.2/13257 is trying to acquire lock: ffff88801835c0c0 (&delayed_node->mutex){+.+.}-{3:3}, at: __btrfs_release_delayed_node+0x9a/0xaa0 fs/btrfs/delayed-inode.c:256 but task is already holding lock: ffff88802a5ab8e8 (btrfs-tree-00){++++}-{3:3}, at: __btrfs_tree_lock+0x3c/0x2a0 fs/btrfs/locking.c:198 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #1 (btrfs-tree-00){++++}-{3:3}: __lock_release kernel/locking/lockdep.c:5475 [inline] lock_release+0x36f/0x9d0 kernel/locking/lockdep.c:5781 up_write+0x79/0x580 kernel/locking/rwsem.c:1625 btrfs_tree_unlock_rw fs/btrfs/locking.h:189 [inline] btrfs_unlock_up_safe+0x179/0x3b0 fs/btrfs/locking.c:239 search_leaf fs/btrfs/ctree.c:1986 [inline] btrfs_search_slot+0x2511/0x2f80 fs/btrfs/ctree.c:2230 btrfs_insert_empty_items+0x9c/0x180 fs/btrfs/ctree.c:4376 btrfs_insert_delayed_item fs/btrfs/delayed-inode.c:746 [inline] btrfs_insert_delayed_items fs/btrfs/delayed-inode.c:824 [inline] __btrfs_commit_inode_delayed_items+0xd24/0x2410 fs/btrfs/delayed-inode.c:1111 __btrfs_run_delayed_items+0x1db/0x430 fs/btrfs/delayed-inode.c:1153 flush_space+0x269/0xe70 fs/btrfs/space-info.c:723 btrfs_async_reclaim_metadata_space+0x106/0x350 fs/btrfs/space-info.c:1078 process_one_work+0x92c/0x12c0 kernel/workqueue.c:2600 worker_thread+0xa63/0x1210 kernel/workqueue.c:2751 kthread+0x2b8/0x350 kernel/kthread.c:389 ret_from_fork+0x2e/0x60 arch/x86/kernel/process.c:145 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304 -> #0 (&delayed_node->mutex){+.+.}-{3:3}: check_prev_add kernel/locking/lockdep.c:3142 [inline] check_prevs_add kernel/locking/lockdep.c:3261 [inline] validate_chain kernel/locking/lockdep.c:3876 [inline] __lock_acquire+0x39ff/0x7f70 kernel/locking/lockdep.c:5144 lock_acquire+0x1e3/0x520 kernel/locking/lockdep.c:5761 __mutex_lock_common+0x1d8/0x2530 kernel/locking/mutex.c:603 __mutex_lock kernel/locking/mutex.c:747 [inline] mutex_lock_nested+0x1b/0x20 kernel/locking/mutex.c:799 __btrfs_release_delayed_node+0x9a/0xaa0 fs/btrfs/delayed-inode.c:256 btrfs_release_delayed_node fs/btrfs/delayed-inode.c:281 [inline] __btrfs_run_delayed_items+0x2b5/0x430 fs/btrfs/delayed-inode.c:1156 btrfs_commit_transaction+0x859/0x2ff0 fs/btrfs/transaction.c:2276 btrfs_sync_file+0xf56/0x1330 fs/btrfs/file.c:1988 vfs_fsync_range fs/sync.c:188 [inline] vfs_fsync fs/sync.c:202 [inline] do_fsync fs/sync.c:212 [inline] __do_sys_fsync fs/sync.c:220 [inline] __se_sys_fsync fs/sync.c:218 [inline] __x64_sys_fsync+0x196/0x1e0 fs/sync.c:218 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd other info that ---truncated---

Dec 30, 2025
0.0
CVE-2025-1680Awaiting Analysis

An acceptance of extraneous untrusted data with trusted data vulnerability has been identified in Moxa’s Ethernet switches, which allows attackers with administrative privileges to manipulate HTTP Host headers by injecting a specially crafted Host header into HTTP requests sent to an affected device’s web service. This vulnerability is classified as Host Header Injection, where invalid Host headers can manipulate to redirect users, forge links, or phishing attacks. There is no impact to the confidentiality, integrity, and availability of the affected device; no loss of confidentiality, integrity, and availability within any subsequent systems.

Oct 23, 2025
0.0
CVE-2025-1679Awaiting Analysis

Cross-site Scripting has been identified in Moxa’s Ethernet switches, which allows an authenticated administrative attacker to inject malicious scripts to an affected device’s web service that could impact authenticated users interacting with the device’s web interface. This vulnerability is classified as stored cross-site scripting (XSS); attackers inject malicious scripts into the system, and the scripts persist across sessions. There is no impact to the confidentiality, integrity, and availability of the affected device; no loss of availability within any subsequent systems but has some loss of confidentiality and integrity within the subsequent system.

Oct 23, 2025
0.0
CVE-2025-6950Awaiting Analysis

An Use of Hard-coded Credentials vulnerability has been identified in Moxa’s network security appliances and routers. The system employs a hard-coded secret key to sign JSON Web Tokens (JWT) used for authentication. This insecure implementation allows an unauthenticated attacker to forge valid tokens, thereby bypassing authentication controls and impersonating any user. Exploitation of this vulnerability can result in complete system compromise, enabling unauthorized access, data theft, and full administrative control over the affected device. While successful exploitation can severely impact the confidentiality, integrity, and availability of the affected device itself, there is no loss of confidentiality or integrity within any subsequent systems.

Oct 17, 2025
0.0
CVE-2025-6949Awaiting Analysis

An Execution with Unnecessary Privileges vulnerability has been identified in Moxa’s network security appliances and routers. A critical authorization flaw in the API allows an authenticated, low-privileged user to create a new administrator account, including accounts with usernames identical to existing users. In certain scenarios, this vulnerability could allow an attacker to gain full administrative control over the affected device, leading to potential account impersonation. While successful exploitation can severely impact the confidentiality, integrity, and availability of the affected device itself, there is no loss of confidentiality or integrity within any subsequent systems.

Oct 17, 2025
0.0
CVE-2025-6894Awaiting Analysis

An Execution with Unnecessary Privileges vulnerability has been identified in Moxa’s network security appliances and routers. A flaw in the API authorization logic of the affected device allows an authenticated, low-privileged user to execute the administrative `ping` function, which is restricted to higher-privileged roles. This vulnerability enables the user to perform internal network reconnaissance, potentially discovering internal hosts or services that would otherwise be inaccessible. Repeated exploitation could lead to minor resource consumption. While the overall impact is limited, it may result in some loss of confidentiality and availability on the affected device. There is no impact on the integrity of the device, and the vulnerability does not affect any subsequent systems.

Oct 17, 2025
0.0
CVE-2025-6893Awaiting Analysis

An Execution with Unnecessary Privileges vulnerability has been identified in Moxa’s network security appliances and routers. A flaw in broken access control has been identified in the /api/v1/setting/data endpoint of the affected device. This flaw allows a low-privileged authenticated user to call the API without the required permissions, thereby gaining the ability to access or modify system configuration data. Successful exploitation may lead to privilege escalation, allowing the attacker to access or modify sensitive system settings. While the overall impact is high, there is no loss of confidentiality or integrity within any subsequent systems.

Oct 17, 2025
0.0
CVE-2025-6892Awaiting Analysis

An Incorrect Authorization vulnerability has been identified in Moxa’s network security appliances and routers. A flaw in the API authentication mechanism allows unauthorized access to protected API endpoints, including those intended for administrative functions. This vulnerability can be exploited after a legitimate user has logged in, as the system fails to properly validate session context or privilege boundaries. An attacker may leverage this flaw to perform unauthorized privileged operations. While successful exploitation can severely impact the confidentiality, integrity, and availability of the affected device itself, there is no loss of confidentiality or integrity within any subsequent systems.

Oct 17, 2025
0.0
CVE-2025-58318Awaiting Analysis

Delta Electronics DIAView has an authentication bypass vulnerability.

Sep 1, 2025
0.0
CVE-2025-5191Awaiting Analysis

An Unquoted Search Path vulnerability has been identified in the utility for Moxa’s industrial computers (Windows). Due to the unquoted path configuration in the SerialInterfaceService.exe utility, a local attacker with limited privileges could place a malicious executable in a higher-priority directory within the search path. When the Serial Interface service starts, the malicious executable could be run with SYSTEM privileges. Successful exploitation could allow privilege escalation or enable an attacker to maintain persistence on the affected system. While successful exploitation can severely impact the confidentiality, integrity, and availability of the affected device itself, there is no loss of confidentiality, integrity, or availability within any subsequent systems.

Aug 25, 2025
0.0
CVE-2025-7353Awaiting Analysis

A security issue exists due to the web-based debugger agent enabled on Rockwell Automation ControlLogix® Ethernet Modules. If a specific IP address is used to connect to the WDB agent, it can allow remote attackers to perform memory dumps, modify memory, and control execution flow.

Aug 14, 2025
0.0
CVE-2025-0676Awaiting Analysis

This vulnerability involves command injection in tcpdump within Moxa products, enabling an authenticated attacker with console access to exploit improper input validation to inject and execute systems commands. Successful exploitation could result in privilege escalation, allowing the attacker to gain root shell access and maintain persistent control over the device, potentially disrupting network services and affecting the availability of downstream systems that rely on its connectivity.

Apr 2, 2025
0.0
CVE-2025-1449Awaiting Analysis

A vulnerability exists in the Rockwell Automation Verve Asset Manager due to insufficient variable sanitizing. A portion of the administrative web interface for Verve's Legacy Agentless Device Inventory (ADI) capability (deprecated since the 1.36 release) allows users to change a variable with inadequate sanitizing. If exploited, it could allow a threat actor with administrative access to run arbitrary commands in the context of the container running the service.

Mar 31, 2025
0.0
CVE-2023-5878Awaiting Analysis

Honeywell OneWireless Wireless Device Manager (WDM) for the following versions R310.x, R320.x, R321.x, R322.1, R322.2, R323.x, R330.1 contains a command injection vulnerability. An attacker who is authenticated could use the firmware update process to potentially exploit the vulnerability, leading to a command injection. Honeywell recommends updating to R322.3, R330.2 or the most recent version of this product2.

Feb 6, 2025
0.0
CVE-2025-0659Awaiting Analysis

A path traversal vulnerability exists in the Rockwell Automation DataEdge Platform DataMosaix Private Cloud. By specifying the character sequence in the body of the vulnerable endpoint, it is possible to overwrite files outside of the intended directory. A threat actor with admin privileges could leverage this vulnerability to overwrite reports including user projects.

Jan 28, 2025
0.0
CVE-2024-12297Awaiting Analysis

Moxa’s Ethernet switch is vulnerable to an authentication bypass because of flaws in its authorization mechanism. Although both client-side and back-end server verification are involved in the process, attackers can exploit weaknesses in its implementation. These vulnerabilities may enable brute-force attacks to guess valid credentials or MD5 collision attacks to forge authentication hashes, potentially compromising the security of the device.

Jan 15, 2025
0.0
CVE-2024-12373Awaiting Analysis

A denial-of-service vulnerability exists in the Rockwell Automation Power Monitor 1000. The vulnerability results in a buffer-overflow, potentially causing denial-of-service.

Dec 18, 2024
0.0
CVE-2024-12372Awaiting Analysis

A denial-of-service and possible remote code execution vulnerability exists in the Rockwell Automation Power Monitor 1000. The vulnerability results in corruption of the heap memory which may compromise the integrity of the system, potentially allowing for remote code execution or a denial-of-service attack.

Dec 18, 2024
0.0
CVE-2024-12371Awaiting Analysis

A device takeover vulnerability exists in the Rockwell Automation Power Monitor 1000. This vulnerability allows configuration of a new Policyholder user without any authentication via API. Policyholder user is the most privileged user that can perform edit operations, creating admin users and performing factory reset.

Dec 18, 2024
0.0
CVE-2024-9412Awaiting Analysis

An improper authorization vulnerability exists in the Rockwell Automation affected products that could allow an unauthorized user to sign in. While removal of all role mappings is unlikely, it could occur in the case of unexpected or accidental removal by the administrator. If exploited, an unauthorized user could access data they previously but should no longer have access to.

Oct 8, 2024
0.0
CVE-2024-7567Awaiting Analysis

A denial-of-service vulnerability exists via the CIP/Modbus port in the Rockwell Automation Micro850/870 (2080 -L50E/2080 -L70E). If exploited, the CIP/Modbus communication may be disrupted for short duration.

Aug 13, 2024
0.0
CVE-2024-6079Awaiting Analysis

A vulnerability exists in the Rockwell Automation Emulate3D™, which could be leveraged to execute a DLL Hijacking attack. The application loads shared libraries, which are readable and writable by any user. If exploited, a malicious user could leverage a malicious dll and perform a remote code execution attack.

Aug 13, 2024
0.0
CVE-2024-5801Awaiting Analysis

Enabled IP Forwarding feature in B&R Automation Runtime versions before 6.0.2 may allow remote attack-ers to compromise network security by routing IP-based packets through the host, potentially by-passing firewall, router, or NAC filtering.

Aug 12, 2024
0.0
CVE-2024-6242Awaiting Analysis

A vulnerability exists in Rockwell Automation affected products that allows a threat actor to bypass the Trusted® Slot feature in a ControlLogix® controller. If exploited on any affected module in a 1756 chassis, a threat actor could potentially execute CIP commands that modify user projects and/or device configuration on a Logix controller in the chassis.

Aug 1, 2024
0.0
CVE-2024-3640Awaiting Analysis

An unquoted executable path exists in the Rockwell Automation FactoryTalk® Remote Access™ possibly resulting in remote code execution if exploited. While running the FTRA installer package, the executable path is not properly quoted, which could allow a threat actor to enter a malicious executable and run it as a System user. A threat actor needs admin privileges to exploit this vulnerability.

May 16, 2024
0.0
CVE ID ⇅Severity ↓CVSS ⇅DescriptionPublished ⇅
CVE-2026-3611CRITICAL
10.0
The Honeywell IQ4x building management controller, exposes its full web-based HMI without authentica…Mar 12, 2026›
CVE-2025-9574CRITICAL
10.0
Missing Authentication for Critical Function vulnerability in ABB ALS-mini-s4 IP, ABB ALS-mini-s8 IP…Oct 20, 2025›
CVE-2025-3450CRITICAL
10.0
An Improper Resource Locking vulnerability in the SDM component of B&R Automation Runtime versions b…Oct 7, 2025›
CVE-2025-58321CRITICAL
10.0
Delta Electronics DIALink has an Directory Traversal Authentication Bypass Vulnerability.Sep 11, 2025›
CVE-2024-51555CRITICAL
10.0
Default Credentail vulnerabilities allows access to an Aspect device using publicly available defaul…Dec 5, 2024›
CVE-2024-51551CRITICAL
10.0
Default Credentail vulnerabilities in ASPECT on Linux allows access to the product using publicly av…Dec 5, 2024›
CVE-2024-51550CRITICAL
10.0
Data Validation / Data Sanitization vulnerabilities in Linux allows unvalidated and unsanitized dat…Dec 5, 2024›
CVE-2024-51549CRITICAL
10.0
Absolute File Traversal vulnerabilities allows access and modification of un-intended resources.  A…Dec 5, 2024›
CVE-2024-51545CRITICAL
10.0
Username Enumeration vulnerabilities allow access to application level username add, delete, modify …Dec 5, 2024›
CVE-2024-48840CRITICAL
10.0
Unauthorized Access vulnerabilities allow Remote Code Execution.  Affected products: ABB ASPECT - …Dec 5, 2024›
CVE-2024-48839CRITICAL
10.0
Improper Input Validation vulnerability allows Remote Code Execution.  Affected products: ABB ASPE…Dec 5, 2024›
CVE-2024-11317CRITICAL
10.0
Session Fixation vulnerabilities allow an attacker to fix a users session identifier before login pr…Dec 5, 2024›
CVE-2024-6298CRITICAL
10.0
Unauthorized file access in WEB Server in ABB ASPECT - Enterprise v3.08.01; NEXUS Series v3.08.01 …Jul 5, 2024›
CVE-2024-6209CRITICAL
10.0
Unauthorized file access in WEB Server in ABB ASPECT - Enterprise v3.08.01; NEXUS Series v3.08.01 …Jul 5, 2024›
CVE-2023-4699CRITICAL
10.0
Missing Authentication for Critical Function vulnerability in Mitsubishi Electric Corporation MELSEC…Nov 6, 2023›
CVE-2023-3572CRITICAL
10.0
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote, unauthenticated …Aug 8, 2023›
CVE-2023-1424CRITICAL
10.0
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Mitsubishi E…May 24, 2023›
CVE-2021-38397CRITICAL
10.0
Honeywell Experion PKS C200, C200E, C300, and ACE controllers are vulnerable to unrestricted file up…Oct 28, 2022›
CVE-2021-27446CRITICAL
10.0
The Weintek cMT product line is vulnerable to code injection, which may allow an unauthenticated rem…May 16, 2022›
CVE-2021-27476CRITICAL
10.0
A vulnerability exists in the SaveConfigFile function of the RACompare Service, which may allow for …Mar 23, 2022›
CVE-2021-27474CRITICAL
10.0
Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier does not properly restrict all functi…Mar 23, 2022›
CVE-2021-27472CRITICAL
10.0
A vulnerability exists in the RunSearch function of SearchService service in Rockwell Automation Fac…Mar 23, 2022›
CVE-2021-27470CRITICAL
10.0
A deserialization vulnerability exists in how the LogService.rem service in Rockwell Automation Fact…Mar 23, 2022›
CVE-2021-27468CRITICAL
10.0
The AosService.rem service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier exposes…Mar 23, 2022›
CVE-2021-27466CRITICAL
10.0
A deserialization vulnerability exists in how the ArchiveService.rem service in Rockwell Automation …Mar 23, 2022›
CVE-2021-27464CRITICAL
10.0
The ArchiveService.rem service in Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier exp…Mar 23, 2022›
CVE-2021-27462CRITICAL
10.0
A deserialization vulnerability exists in how the AosService.rem service in Rockwell Automation Fact…Mar 23, 2022›
CVE-2021-27460CRITICAL
10.0
Rockwell Automation FactoryTalk AssetCentre v10.00 and earlier components contain .NET remoting endp…Mar 23, 2022›
CVE-2021-38454CRITICAL
10.0
A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 …Oct 12, 2021›
CVE-2021-20998CRITICAL
10.0
In multiple managed switches by WAGO in different versions without authorization and with specially …May 13, 2021›
CVE-2020-14516CRITICAL
10.0
In Rockwell Automation FactoryTalk Services Platform Versions 6.10.00 and 6.11.00, there is an issue…Mar 18, 2021›
CVE-2020-12522CRITICAL
10.0
The reported vulnerability allows an attacker who has network access to the device to execute code w…Dec 17, 2020›
CVE-2017-14459CRITICAL
10.0
An exploitable OS Command Injection vulnerability exists in the Telnet, SSH, and console login funct…Apr 11, 2018›
CVE-2017-16740CRITICAL
10.0
A Buffer Overflow issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1400 Controll…Jan 9, 2018›
CVE-2016-9343CRITICAL
10.0
An issue was discovered in Rockwell Automation Logix5000 Programmable Automation Controller FRN 16.0…Feb 13, 2017›
CVE-2016-8363CRITICAL
10.0
An issue was discovered in Moxa OnCell OnCellG3470A-LTE, AWK-1131A/3131A/4131A Series, AWK-3191 Seri…Feb 13, 2017›
CVE-2016-8352CRITICAL
10.0
An issue was discovered in Schneider Electric ConneXium firewalls TCSEFEC23F3F20 all versions, TCSEF…Feb 13, 2017›
CVE-2012-6069CRITICAL
10.0
The CoDeSys Runtime Toolkit’s file transfer functionality does not perform input validation, which …Jan 21, 2013›
CVE-2026-28363CRITICAL
9.9
In OpenClaw before 2026.2.23, tools.exec.safeBins validation for sort could be bypassed via GNU long…Feb 27, 2026›
CVE-2025-2605CRITICAL
9.9
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerabi…May 2, 2025›
CVE-2024-6784CRITICAL
9.9
Server-Side Request Forgery vulnerabilities were found providing a potential for access to unauthori…Dec 5, 2024›
CVE-2024-51548CRITICAL
9.9
Dangerous File Upload vulnerabilities allow upload of malicious scripts.  Affected products: ABB A…Dec 5, 2024›
CVE-2023-3710CRITICAL
9.9
Improper Input Validation vulnerability in Honeywell PM43 on 32 bit, ARM (Printer web page modules) …Sep 12, 2023›
CVE-2019-5138CRITICAL
9.9
An exploitable command injection vulnerability exists in encrypted diagnostic script functionality o…Feb 25, 2020›
CVE-2026-3630CRITICAL
9.8
Delta Electronics COMMGR2 has Stack-based Buffer Overflow vulnerability.Mar 9, 2026›
CVE-2024-55026CRITICAL
9.8
An issue in the reset_pj.cgi endpoint of Weintek cMT-3072XH2 easyweb v2.1.53, OS v20231011 allows un…Mar 3, 2026›
CVE-2024-55024CRITICAL
9.8
An authentication bypass vulnerability in the authorization mechanism of Weintek cMT-3072XH2 easyweb…Mar 3, 2026›
CVE-2024-55020CRITICAL
9.8
A command injection vulnerability in the DHCP activation feature of Weintek cMT-3072XH2 easyweb Web …Mar 3, 2026›
CVE-2025-66603CRITICAL
9.8
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. The web s…Feb 9, 2026›
CVE-2025-66602CRITICAL
9.8
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. The web s…Feb 9, 2026›
CVE-2025-62582CRITICAL
9.8
Delta Electronics DIAView has multiple vulnerabilities.Jan 16, 2026›
CVE-2025-62581CRITICAL
9.8
Delta Electronics DIAView has multiple vulnerabilities.Jan 16, 2026›
CVE-2022-50926CRITICAL
9.8
WAGO 750-8212 PFC200 G2 2ETH RS firmware contains a privilege escalation vulnerability that allows a…Jan 13, 2026›
CVE-2025-34256CRITICAL
9.8
Advantech WISE-DeviceOn Server versions prior to 5.4 contain a hard-coded cryptographic key vulnerab…Dec 5, 2025›
CVE-2022-50593CRITICAL
9.8
Advantech iView versions prior to v5.7.04 build 6425 contain a vulnerability within the SNMP managem…Nov 6, 2025›
CVE-2022-50591CRITICAL
9.8
Advantech iView versions prior to v5.7.04 build 6425 contain a vulnerability within the SNMP managem…Nov 6, 2025›
CVE-2025-3128CRITICAL
9.8
A remote unauthenticated attacker who has bypassed authentication could execute arbitrary OS comman…Aug 21, 2025›
CVE-2025-3699CRITICAL
9.8
Missing Authentication for Critical Function vulnerability in Mitsubishi Electric Corporation G-50 a…Jun 26, 2025›
CVE-2025-1863CRITICAL
9.8
Insecure default settings have been found in recorder products provided by Yokogawa Electric Corpora…Apr 18, 2025›
CVE-2025-3495CRITICAL
9.8
Delta Electronics COMMGR v1 and v2 uses insufficiently randomized values to generate session IDs (CW…Apr 16, 2025›
CVE-2024-51547CRITICAL
9.8
Use of Hard-coded Credentials vulnerability in ABB ASPECT-Enterprise, ABB NEXUS Series, ABB MATRIX S…Feb 6, 2025›
CVE-2025-0498CRITICAL
9.8
A data exposure vulnerability exists in all versions prior to V15.00.001 of Rockwell Automation Fact…Jan 30, 2025›
CVE-2025-0497CRITICAL
9.8
A data exposure vulnerability exists in all versions prior to V15.00.001 of Rockwell Automation Fact…Jan 30, 2025›
CVE-2025-0477CRITICAL
9.8
An encryption vulnerability exists in all versions prior to V15.00.001 of Rockwell Automation Factor…Jan 30, 2025›
CVE-2024-9140CRITICAL
9.8
Moxa’s cellular routers, secure routers, and network security appliances are affected by a critical …Jan 3, 2025›
CVE-2024-50375CRITICAL
9.8
A CWE-306 "Missing Authentication for Critical Function" was discovered affecting the following devi…Nov 26, 2024›
CVE-2024-50374CRITICAL
9.8
A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')…Nov 26, 2024›
CVE-2024-50373CRITICAL
9.8
A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')…Nov 26, 2024›
CVE-2024-50372CRITICAL
9.8
A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')…Nov 26, 2024›
CVE-2024-50371CRITICAL
9.8
A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')…Nov 26, 2024›
CVE-2024-50370CRITICAL
9.8
A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')…Nov 26, 2024›
CVE-2024-10456CRITICAL
9.8
Delta Electronics InfraSuite Device Master versions prior to 1.0.12 are affected by a deserializatio…Oct 30, 2024›
CVE-2024-43699CRITICAL
9.8
Delta Electronics DIAEnergie is vulnerable to an SQL injection in the script AM_RegReport.aspx. An u…Oct 3, 2024›
CVE-2024-7961CRITICAL
9.8
A path traversal vulnerability exists in the Rockwell Automation affected product. If exploited, th…Sep 12, 2024›
CVE-2024-8255CRITICAL
9.8
Delta Electronics DTN Soft version 2.0.1 and prior are vulnerable to an attacker achieving remote co…Aug 29, 2024›
CVE-2024-7988CRITICAL
9.8
A remote code execution vulnerability exists in the Rockwell Automation ThinManager® ThinServer™ tha…Aug 26, 2024›
CVE-2024-5989CRITICAL
9.8
Due to an improper input validation, an unauthenticated threat actor can send a malicious message to…Jun 25, 2024›
CVE-2024-5988CRITICAL
9.8
Due to an improper input validation, an unauthenticated threat actor can send a malicious message to…Jun 25, 2024›
CVE-2024-39331CRITICAL
9.8
In Emacs before 29.4, org-link-expand-abbrev in lisp/ol.el expands a %(...) link abbrev even when it…Jun 23, 2024›
CVE-2024-4609CRITICAL
9.8
A vulnerability exists in the Rockwell Automation FactoryTalk® View SE Datalog function that could a…May 16, 2024›
CVE-2024-3871CRITICAL
9.8
The Delta Electronics DVW-W02W2-E2 devices expose a web administration interface to users. This inte…Apr 16, 2024›
CVE-2024-1917CRITICAL
9.8
Integer Overflow or Wraparound vulnerability in Mitsubishi Electric Corporation MELSEC-Q Series and …Mar 15, 2024›
CVE-2024-1916CRITICAL
9.8
Integer Overflow or Wraparound vulnerability in Mitsubishi Electric Corporation MELSEC-Q Series and …Mar 15, 2024›
CVE-2024-1915CRITICAL
9.8
Incorrect Pointer Scaling vulnerability in Mitsubishi Electric Corporation MELSEC-Q Series and MELSE…Mar 15, 2024›
CVE-2024-0803CRITICAL
9.8
Integer Overflow or Wraparound vulnerability in Mitsubishi Electric Corporation MELSEC-Q Series and …Mar 15, 2024›
CVE-2024-0802CRITICAL
9.8
Incorrect Pointer Scaling vulnerability in Mitsubishi Electric Corporation MELSEC-Q Series and MELSE…Mar 15, 2024›
CVE-2024-0323CRITICAL
9.8
The FTP server used on the B&R Automation Runtime supports unsecure encryption mechanisms, such as S…Feb 5, 2024›
CVE-2024-21917CRITICAL
9.8
A vulnerability exists in Rockwell Automation FactoryTalk® Service Platform that allows a malicious …Jan 31, 2024›
CVE-2023-6943CRITICAL
9.8
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') vulnerability in …Jan 30, 2024›
CVE-2023-46141CRITICAL
9.8
Incorrect Permission Assignment for Critical Resource vulnerability in multiple products of the PHOE…Dec 14, 2023›
CVE-2023-0757CRITICAL
9.8
Incorrect Permission Assignment for Critical Resource vulnerability in PHOENIX CONTACT MULTIPROG, PH…Dec 14, 2023›
CVE-2023-47207CRITICAL
9.8
In Delta Electronics InfraSuite Device Master v.1.0.7, a vulnerability exists that allows an unauthe…Nov 30, 2023›
CVE-2023-39226CRITICAL
9.8
In Delta Electronics InfraSuite Device Master v.1.0.7, a vulnerability exists that allows an unauthe…Nov 30, 2023›
CVE-2023-5777CRITICAL
9.8
Weintek EasyBuilder Pro contains a vulnerability that, even when the private key is immediately d…Nov 6, 2023›
CVE-2023-43492CRITICAL
9.8
In Weintek's cMT3000 HMI Web CGI device, the cgi-bin codesys.cgi contains a stack-based buf…Oct 19, 2023›
CVE-2023-38584CRITICAL
9.8
In Weintek's cMT3000 HMI Web CGI device, the cgi-bin command_wb.cgi contains a stack-based bu…Oct 19, 2023›
CVE-2023-5642CRITICAL
9.8
Advantech R-SeeNet v2.4.23 allows an unauthenticated remote attacker to read from and write to the s…Oct 18, 2023›
CVE-2023-2262CRITICAL
9.8
A buffer overflow vulnerability exists in the Rockwell Automation select 1756-EN* communication d…Sep 20, 2023›
CVE-2023-2071CRITICAL
9.8
Rockwell Automation FactoryTalk View Machine Edition on the PanelView Plus, improperly verifies use…Sep 12, 2023›
CVE-2023-2917CRITICAL
9.8
The Rockwell Automation Thinmanager Thinserver is impacted by an improper input validation vulnerabi…Aug 17, 2023›
CVE-2023-1437CRITICAL
9.8
All versions prior to 9.1.4 of Advantech WebAccess/SCADA are vulnerable to use of untrusted pointers…Aug 2, 2023›
CVE-2023-25770CRITICAL
9.8
Controller DoS may occur due to buffer overflow when an error is generated in response to a speciall…Jul 13, 2023›
CVE-2023-25178CRITICAL
9.8
Controller may be loaded with malicious firmware which could enable remote code execution. See Honey…Jul 13, 2023›
CVE-2023-25078CRITICAL
9.8
Server or Console Station DoS due to heap overflow occurring during the handling of a specially craf…Jul 13, 2023›
CVE-2023-24480CRITICAL
9.8
Controller DoS due to stack overflow when decoding a message from the server.  See Honeywell Securi…Jul 13, 2023›
CVE-2023-23585CRITICAL
9.8
Experion server DoS due to heap overflow occurring during the handling of a specially crafted messag…Jul 13, 2023›
CVE-2023-3595CRITICAL
9.8
Where this vulnerability exists in the Rockwell Automation 1756 EN2* and 1756 EN3* ControlLogix com…Jul 12, 2023›
CVE-2023-2611CRITICAL
9.8
Advantech R-SeeNet versions 2.4.22 is installed with a hidden root-level user that is not availab…Jun 22, 2023›
CVE-2023-27396CRITICAL
9.8
FINS (Factory Interface Network Service) is a message communication protocol, which is designed to b…Jun 19, 2023›
CVE-2023-1698CRITICAL
9.8
In multiple products of WAGO a vulnerability allows an unauthenticated, remote attacker to create ne…May 15, 2023›
CVE-2023-28697CRITICAL
9.8
Moxa MiiNePort E1 has a vulnerability of insufficient access control. An unauthenticated remote user…Apr 27, 2023›
CVE-2023-1140CRITICAL
9.8
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contain a vulnerability that coul…Mar 27, 2023›
CVE-2023-1136CRITICAL
9.8
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an unauthenticated attacker c…Mar 27, 2023›
CVE-2023-1133CRITICAL
9.8
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contain a vulnerability in which …Mar 27, 2023›
CVE-2023-27855CRITICAL
9.8
In affected versions, a path traversal exists when processing a message in Rockwell Automation's Th…Mar 22, 2023›
CVE-2022-42971CRITICAL
9.8
A CWE-434: Unrestricted Upload of File with Dangerous Type vulnerability exists that could cause rem…Feb 1, 2023›
CVE-2022-42970CRITICAL
9.8
A CWE-306: Missing Authentication for Critical Function The software does not perform any authentica…Feb 1, 2023›
CVE-2023-22357CRITICAL
9.8
Active debug code exists in OMRON CP1L-EL20DR-D all versions, which may lead to a command that is no…Jan 17, 2023›
CVE-2022-41778CRITICAL
9.8
Delta Electronics InfraSuite Device Master versions 00.00.01a and prior deserialize user-supplied d…Jan 13, 2023›
CVE-2021-34569CRITICAL
9.8
In WAGO I/O-Check Service in multiple products an attacker can send a specially crafted packet conta…Nov 9, 2022›
CVE-2022-33321CRITICAL
9.8
Cleartext Transmission of Sensitive Information vulnerability due to the use of Basic Authentication…Nov 8, 2022›
CVE-2022-41772CRITICAL
9.8
Delta Electronics InfraSuite Device Master Versions 00.00.01a and prior mishandle .ZIP archives con…Oct 31, 2022›
CVE-2022-41688CRITICAL
9.8
Delta Electronics InfraSuite Device Master versions 00.00.01a and prior lack proper authentication …Oct 31, 2022›
CVE-2022-41657CRITICAL
9.8
Delta Electronics InfraSuite Device Master Versions 00.00.01a and prior allow attacker provided dat…Oct 31, 2022›
CVE-2022-40202CRITICAL
9.8
The database backup function in Delta Electronics InfraSuite Device Master Versions 00.00.01a and p…Oct 31, 2022›
CVE-2022-38142CRITICAL
9.8
Delta Electronics InfraSuite Device Master versions 00.00.01a and prior deserialize user-supplied d…Oct 31, 2022›
CVE-2022-3386CRITICAL
9.8
Advantech R-SeeNet Versions 2.4.17 and prior are vulnerable to a stack-based buffer overflow. An un…Oct 27, 2022›
CVE-2022-3385CRITICAL
9.8
Advantech R-SeeNet Versions 2.4.17 and prior are vulnerable to a stack-based buffer overflow. An un…Oct 27, 2022›
CVE-2022-43775CRITICAL
9.8
The HICT_Loop class in Delta Electronics DIAEnergy v1.9 contains a SQL Injection flaw that could all…Oct 26, 2022›
CVE-2022-43774CRITICAL
9.8
The HandlerPageP_KID class in Delta Electronics DIAEnergy v1.9 contains a SQL Injection flaw that co…Oct 26, 2022›
CVE-2022-30318CRITICAL
9.8
Honeywell ControlEdge through R151.1 uses Hard-coded Credentials. According to FSCT-2022-0056, there…Aug 31, 2022›
CVE-2022-30315CRITICAL
9.8
Honeywell Experion PKS Safety Manager (SM and FSC) through 2022-05-06 has Insufficient Verification …Jul 28, 2022›
CVE-2022-31207CRITICAL
9.8
The Omron SYSMAC Cx product family PLCs (CS series, CJ series, and CP series) through 2022-05-18 lac…Jul 26, 2022›
CVE-2022-31206CRITICAL
9.8
The Omron SYSMAC Nx product family PLCs (NJ series, NY series, NX series, and PMAC series) through 2…Jul 26, 2022›
CVE-2022-33318CRITICAL
9.8
Deserialization of Untrusted Data vulnerability in Mitsubishi Electric GENESIS64 versions 10.97 to 1…Jul 20, 2022›
CVE-2022-31806CRITICAL
9.8
In CODESYS V2 PLCWinNT and Runtime Toolkit 32 in versions prior to V2.4.7.57 password protection is …Jun 24, 2022›
CVE-2022-31802CRITICAL
9.8
In CODESYS Gateway Server V2 for versions prior to V2.3.9.38 only a part of the the specified passwo…Jun 24, 2022›
CVE-2022-25163CRITICAL
9.8
Improper Input Validation vulnerability in Mitsubishi Electric MELSEC-Q Series QJ71E71-100 first 5 d…Jun 2, 2022›
CVE-2021-27444CRITICAL
9.8
The Weintek cMT product line is vulnerable to various improper access controls, which may allow an u…May 16, 2022›
CVE-2022-1378CRITICAL
9.8
Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerabil…May 2, 2022›
CVE-2022-1377CRITICAL
9.8
Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerabil…May 2, 2022›
CVE-2022-1376CRITICAL
9.8
Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerabil…May 2, 2022›
CVE-2022-1375CRITICAL
9.8
Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerabil…May 2, 2022›
CVE-2022-1374CRITICAL
9.8
Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerabil…May 2, 2022›
CVE-2022-1372CRITICAL
9.8
Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerabil…May 2, 2022›
CVE-2022-1371CRITICAL
9.8
Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerabil…May 2, 2022›
CVE-2022-1370CRITICAL
9.8
Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerabil…May 2, 2022›
CVE-2022-1369CRITICAL
9.8
Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerabil…May 2, 2022›
CVE-2022-1367CRITICAL
9.8
Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerabil…May 2, 2022›
CVE-2022-1366CRITICAL
9.8
Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerabil…May 2, 2022›
CVE-2021-40390CRITICAL
9.8
An authentication bypass vulnerability exists in the Web Application functionality of Moxa MXView Se…Apr 14, 2022›
CVE-2021-30064CRITICAL
9.8
On Schneider Electric ConneXium Tofino Firewall TCSEFEA23F3F22 before 03.23, TCSEFEA23F3F20/21, and …Apr 3, 2022›
CVE-2021-32976CRITICAL
9.8
Five buffer overflows in the built-in web server in Moxa NPort IAW5000A-I/O series firmware version …Apr 1, 2022›
CVE-2021-32974CRITICAL
9.8
Improper input validation in the built-in web server in Moxa NPort IAW5000A-I/O series firmware vers…Apr 1, 2022›
CVE-2022-27175CRITICAL
9.8
Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerabil…Mar 29, 2022›
CVE-2022-26887CRITICAL
9.8
Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerabil…Mar 29, 2022›
CVE-2022-26836CRITICAL
9.8
Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerabil…Mar 29, 2022›
CVE-2022-26667CRITICAL
9.8
Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerabil…Mar 29, 2022›
CVE-2022-26666CRITICAL
9.8
Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerabil…Mar 29, 2022›
CVE-2022-26514CRITICAL
9.8
Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerabil…Mar 29, 2022›
CVE-2022-26349CRITICAL
9.8
Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerabil…Mar 29, 2022›
CVE-2022-26338CRITICAL
9.8
Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerabil…Mar 29, 2022›
CVE-2022-26069CRITICAL
9.8
Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerabil…Mar 29, 2022›
CVE-2022-26065CRITICAL
9.8
Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerabil…Mar 29, 2022›
CVE-2022-26059CRITICAL
9.8
Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerabil…Mar 29, 2022›
CVE-2022-26013CRITICAL
9.8
Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerabil…Mar 29, 2022›
CVE-2022-25980CRITICAL
9.8
Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerabil…Mar 29, 2022›
CVE-2022-25880CRITICAL
9.8
Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerabil…Mar 29, 2022›
CVE-2022-25347CRITICAL
9.8
Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) is vulnerable to path traversal atta…Mar 29, 2022›
CVE-2022-0923CRITICAL
9.8
Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerabil…Mar 29, 2022›
CVE-2022-23402CRITICAL
9.8
The following Yokogawa Electric products hard-code the password for CAMS server applications: CENTUM…Mar 11, 2022›
CVE-2022-21194CRITICAL
9.8
The following Yokogawa Electric products do not change the passwords of the internal Windows account…Mar 11, 2022›
CVE-2021-39363CRITICAL
9.8
Honeywell HDZP252DI 1.00.HW02.4 and HBW2PER1 1.000.HW01.3 devices allow a video replay attack after …Feb 24, 2022›
CVE-2021-46560CRITICAL
9.8
The firmware on Moxa TN-5900 devices through 3.1 allows command injection that could lead to device …Jan 26, 2022›
CVE-2022-23128CRITICAL
9.8
Incomplete List of Disallowed Inputs vulnerability in Mitsubishi Electric MC Works64 versions 4.00A …Jan 21, 2022›
CVE-2021-38389CRITICAL
9.8
Advantech WebAccess versions 9.02 and prior are vulnerable to a stack-based buffer overflow, which m…Oct 18, 2021›
CVE-2021-33023CRITICAL
9.8
Advantech WebAccess versions 9.02 and prior are vulnerable to a heap-based buffer overflow, which ma…Oct 18, 2021›
CVE-2021-38458CRITICAL
9.8
A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 …Oct 12, 2021›
CVE-2021-38456CRITICAL
9.8
A use of hard-coded password vulnerability in the Moxa MXview Network Management software Versions 3…Oct 12, 2021›
CVE-2021-38408CRITICAL
9.8
A stack-based buffer overflow vulnerability in Advantech WebAccess Versions 9.02 and prior caused by…Sep 9, 2021›
CVE-2021-34578CRITICAL
9.8
This vulnerability allows an attacker who has access to the WBM to read and write settings-parameter…Aug 31, 2021›
CVE-2021-38393CRITICAL
9.8
A Blind SQL injection vulnerability exists in the /DataHandler/HandlerAlarmGroup.ashx endpoint of De…Aug 30, 2021›
CVE-2021-38391CRITICAL
9.8
A Blind SQL injection vulnerability exists in the /DataHandler/AM/AM_Handler.ashx endpoint of Delta …Aug 30, 2021›
CVE-2021-38390CRITICAL
9.8
A Blind SQL injection vulnerability exists in the /DataHandler/HandlerEnergyType.ashx endpoint of De…Aug 30, 2021›
CVE-2021-32983CRITICAL
9.8
A Blind SQL injection vulnerability exists in the /DataHandler/Handler_CFG.ashx endpoint of Delta El…Aug 30, 2021›
CVE-2021-32967CRITICAL
9.8
Delta Electronics DIAEnergie Version 1.7.5 and prior may allow an attacker to add a new administrati…Aug 30, 2021›
CVE-2021-32955CRITICAL
9.8
Delta Electronics DIAEnergie Version 1.7.5 and prior allows unrestricted file uploads, which may all…Aug 30, 2021›
CVE-2021-21805CRITICAL
9.8
An OS Command Injection vulnerability exists in the ping.php script functionality of Advantech R-See…Aug 5, 2021›
CVE-2021-33485CRITICAL
9.8
CODESYS Control Runtime system before 3.5.17.10 has a Heap-based Buffer Overflow.Aug 3, 2021›
CVE-2020-20741CRITICAL
9.8
Incorrect Access Control in Beckhoff Automation GmbH & Co. KG CX9020 with firmware version CX9020_CB…Jul 23, 2021›
CVE-2021-21804CRITICAL
9.8
A local file inclusion (LFI) vulnerability exists in the options.php script functionality of Advante…Jul 16, 2021›
CVE-2021-30193CRITICAL
9.8
CODESYS V2 Web-Server before 1.1.9.20 has an Out-of-bounds Write.May 25, 2021›
CVE-2021-30192CRITICAL
9.8
CODESYS V2 Web-Server before 1.1.9.20 has an Improperly Implemented Security Check.May 25, 2021›
CVE-2021-30190CRITICAL
9.8
CODESYS V2 Web-Server before 1.1.9.20 has Improper Access Control.May 25, 2021›
CVE-2021-30189CRITICAL
9.8
CODESYS V2 Web-Server before 1.1.9.20 has a Stack-based Buffer Overflow.May 25, 2021›
CVE-2021-30188CRITICAL
9.8
CODESYS V2 runtime system SP before 2.4.7.55 has a Stack-based Buffer Overflow.May 25, 2021›
CVE-2019-18235CRITICAL
9.8
Advantech Spectre RT ERT351 Versions 5.1.3 and prior has insufficient login authentication parameter…Mar 17, 2021›
CVE-2021-22681CRITICAL
9.8
Rockwell Automation Studio 5000 Logix Designer Versions 21 and later, and RSLogix 5000 Versions 16 t…Mar 3, 2021›
CVE-2021-22658CRITICAL
9.8
Advantech iView versions prior to v5.7.03.6112 are vulnerable to a SQL injection, which may allow an…Feb 11, 2021›
CVE-2021-22652CRITICAL
9.8
Access to the Advantech iView versions prior to v5.7.03.6112 configuration are missing authenticatio…Feb 11, 2021›
CVE-2020-28144CRITICAL
9.8
Certain Moxa Inc products are affected by an improper restriction of operations in EDR-G903 Series F…Feb 3, 2021›
CVE-2020-27265CRITICAL
9.8
KEPServerEX: v6.0 to v6.9, ThingWorx Kepware Server: v6.8 and v6.9, ThingWorx Industrial Connectivit…Jan 14, 2021›
CVE-2020-25196CRITICAL
9.8
The built-in WEB server for MOXA NPort IAW5000A-I/O firmware version 2.1 or lower allows SSH/Telnet …Dec 23, 2020›
CVE-2020-25153CRITICAL
9.8
The built-in web service for MOXA NPort IAW5000A-I/O firmware version 2.1 or lower does not require …Dec 23, 2020›
CVE-2020-23639CRITICAL
9.8
A command injection vulnerability exists in Moxa Inc VPort 461 Series Firmware Version 3.4 or lower …Nov 2, 2020›
CVE-2020-16226CRITICAL
9.8
Multiple Mitsubishi Electric products are vulnerable to impersonations of a legitimate device by a m…Oct 5, 2020›
CVE-2020-16245CRITICAL
9.8
Advantech iView, Versions 5.7 and prior. The affected product is vulnerable to path traversal vulner…Aug 25, 2020›
CVE-2020-12007CRITICAL
9.8
A specially crafted communication packet sent to the affected devices could allow remote code execut…Jul 16, 2020›
CVE-2020-12011CRITICAL
9.8
A specially crafted communication packet sent to the affected systems could cause a denial-of-servic…Jul 16, 2020›
CVE-2020-10287CRITICAL
9.8
The IRC5 family with UAS service enabled comes by default with credentials that can be found on publ…Jul 15, 2020›
CVE-2020-14503CRITICAL
9.8
Advantech iView, versions 5.6 and prior, has an improper input validation vulnerability. Successful …Jul 15, 2020›
CVE-2020-14501CRITICAL
9.8
Advantech iView, versions 5.6 and prior, has an improper authentication for critical function (CWE-3…Jul 15, 2020›
CVE-2020-14507CRITICAL
9.8
Advantech iView, versions 5.6 and prior, is vulnerable to multiple path traversal vulnerabilities th…Jul 15, 2020›
CVE-2020-14505CRITICAL
9.8
Advantech iView, versions 5.6 and prior, has an improper neutralization of special elements used in …Jul 15, 2020›
CVE-2020-14497CRITICAL
9.8
Advantech iView, versions 5.6 and prior, contains multiple SQL injection vulnerabilities that are vu…Jul 15, 2020›
CVE-2020-5599CRITICAL
9.8
TCP/IP function included in the firmware of Mitsubishi Electric GOT2000 series (CoreOS with version …Jul 7, 2020›
CVE-2020-5595CRITICAL
9.8
TCP/IP function included in the firmware of Mitsubishi Electric GOT2000 series (CoreOS with version …Jul 7, 2020›
CVE-2020-5594CRITICAL
9.8
Mitsubishi Electric MELSEC iQ-R, iQ-F, Q, L, and FX series CPU modules all versions contain a vulner…Jun 23, 2020›
CVE-2020-12022CRITICAL
9.8
Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. An improper validation vulnerabili…May 8, 2020›
CVE-2020-12006CRITICAL
9.8
Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple relative path traversal v…May 8, 2020›
CVE-2020-12002CRITICAL
9.8
Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple stack-based buffer overfl…May 8, 2020›
CVE-2020-10638CRITICAL
9.8
Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple heap-based buffer overflo…May 8, 2020›
CVE-2019-5620CRITICAL
9.8
ABB MicroSCADA Pro SYS600 version 9.3 suffers from an instance of CWE-306: Missing Authentication fo…Apr 29, 2020›
CVE-2020-8481CRITICAL
9.8
For ABB products ABB Ability™ System 800xA and related system extensions versions 5.1, 6.0 and 6.1, …Apr 29, 2020›
CVE-2020-6974CRITICAL
9.8
Honeywell Notifier Web Server (NWS) Version 3.50 is vulnerable to a path traversal attack, which all…Apr 7, 2020›
CVE-2020-10245CRITICAL
9.8
CODESYS V3 web server before 3.5.15.40, as used in CODESYS Control runtime systems, has a buffer ove…Mar 26, 2020›
CVE-2020-7007CRITICAL
9.8
In Moxa EDS-G516E Series firmware, Version 5.2 or lower, the attacker may execute arbitrary codes or…Mar 24, 2020›
CVE-2020-6991CRITICAL
9.8
In Moxa EDS-G516E Series firmware, Version 5.2 or lower, weak password requirements may allow an att…Mar 24, 2020›
CVE-2020-6981CRITICAL
9.8
In Moxa EDS-G516E Series firmware, Version 5.2 or lower, an attacker may gain access to the system w…Mar 24, 2020›
CVE-2020-6995CRITICAL
9.8
In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or l…Mar 24, 2020›
CVE-2020-6985CRITICAL
9.8
In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or l…Mar 24, 2020›
CVE-2020-6989CRITICAL
9.8
In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or l…Mar 24, 2020›
CVE-2020-6967CRITICAL
9.8
In Rockwell Automation all versions of FactoryTalk Diagnostics software, a subsystem of the FactoryT…Mar 23, 2020›
CVE-2020-6990CRITICAL
9.8
Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, …Mar 16, 2020›
CVE-2020-5547CRITICAL
9.8
Resource Management Errors vulnerability in TCP function included in the firmware of Mitsubishi Elec…Mar 16, 2020›
CVE-2020-5545CRITICAL
9.8
TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware v…Mar 16, 2020›
CVE-2020-5544CRITICAL
9.8
Null Pointer Dereference vulnerability in TCP function included in the firmware of Mitsubishi Electr…Mar 16, 2020›
CVE-2020-5543CRITICAL
9.8
TCP function included in the firmware of Mitsubishi Electric MELQIC IU1 series IU1-1M20-D firmware v…Mar 16, 2020›
CVE-2020-5542CRITICAL
9.8
Buffer error vulnerability in TCP function included in the firmware of Mitsubishi Electric MELQIC IU…Mar 16, 2020›
CVE-2019-9099CRITICAL
9.8
An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 device…Mar 11, 2020›
CVE-2019-9096CRITICAL
9.8
An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 device…Mar 11, 2020›
CVE-2019-9095CRITICAL
9.8
An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 device…Mar 11, 2020›
CVE-2020-5531CRITICAL
9.8
Mitsubishi Electric MELSEC C Controller Module and MELIPC Series MI5000 MELSEC-Q Series C Controller…Feb 17, 2020›
CVE-2015-5628CRITICAL
9.8
Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50…Feb 5, 2020›
CVE-2015-5627CRITICAL
9.8
Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50…Feb 5, 2020›
CVE-2015-5626CRITICAL
9.8
Stack-based buffer overflow in Yokogawa CENTUM CS 1000 R3.08.70 and earlier, CENTUM CS 3000 R3.09.50…Feb 5, 2020›
CVE-2019-5082CRITICAL
9.8
An exploitable heap buffer overflow vulnerability exists in the iocheckd service I/O-Check functiona…Jan 8, 2020›
CVE-2019-16871CRITICAL
9.8
Beckhoff Embedded Windows PLCs through 3.1.4024.0, and Beckhoff Twincat on Windows Engineering stati…Dec 19, 2019›
CVE-2019-5079CRITICAL
9.8
An exploitable heap buffer overflow vulnerability exists in the iocheckd service "I/O-Check" functio…Dec 18, 2019›
CVE-2019-5075CRITICAL
9.8
An exploitable stack buffer overflow vulnerability exists in the command line utility getcouplerdeta…Dec 18, 2019›
CVE-2019-5081CRITICAL
9.8
An exploitable heap buffer overflow vulnerability exists in the iocheckd service ''I/O-Chec'' functi…Dec 18, 2019›
CVE-2019-5074CRITICAL
9.8
An exploitable stack buffer overflow vulnerability exists in the iocheckd service ''I/O-Check'' func…Dec 18, 2019›
CVE-2019-18257CRITICAL
9.8
In Advantech DiagAnywhere Server, Versions 3.07.11 and prior, multiple stack-based buffer overflow v…Dec 17, 2019›
CVE-2019-18269CRITICAL
9.8
Omron’s CS and CJ series PLCs have an unrestricted externally accessible lock vulnerability.Dec 16, 2019›
CVE-2019-18261CRITICAL
9.8
In Omron PLC CS series, all versions, Omron PLC CJ series, all versions, and Omron PLC NJ series, al…Dec 16, 2019›
CVE-2019-18259CRITICAL
9.8
In Omron PLC CJ series, all versions and Omron PLC CS series, all versions, an attacker could spoof …Dec 16, 2019›
CVE-2019-3951CRITICAL
9.8
Advantech WebAccess before 8.4.3 allows unauthenticated remote attackers to execute arbitrary code o…Dec 12, 2019›
CVE-2019-18250CRITICAL
9.8
In all versions of ABB Power Generation Information Manager (PGIM) and Plant Connect, the affected p…Nov 26, 2019›
CVE-2019-18858CRITICAL
9.8
CODESYS 3 web server before 3.5.15.20, as distributed with CODESYS Control runtime systems, has a Bu…Nov 20, 2019›
CVE-2019-18226CRITICAL
9.8
Honeywell equIP series and Performance series IP cameras and recorders, A vulnerability exists in th…Oct 31, 2019›
CVE-2019-13551CRITICAL
9.8
Advantech WISE-PaaS/RMM, Versions 3.3.29 and prior. Path traversal vulnerabilities are caused by a l…Oct 31, 2019›
CVE-2019-13547CRITICAL
9.8
Advantech WISE-PaaS/RMM, Versions 3.3.29 and prior. There is an unsecured function that allows anyon…Oct 31, 2019›
CVE-2019-14931CRITICAL
9.8
An issue was discovered on Mitsubishi Electric Europe B.V. ME-RTU devices through 2.02 and INEA ME-R…Oct 28, 2019›
CVE-2019-14930CRITICAL
9.8
An issue was discovered on Mitsubishi Electric Europe B.V. ME-RTU devices through 2.02 and INEA ME-R…Oct 28, 2019›
CVE-2019-14929CRITICAL
9.8
An issue was discovered on Mitsubishi Electric Europe B.V. ME-RTU devices through 2.02 and INEA ME-R…Oct 28, 2019›
CVE-2019-14926CRITICAL
9.8
An issue was discovered on Mitsubishi Electric Europe B.V. ME-RTU devices through 2.02 and INEA ME-R…Oct 28, 2019›
CVE-2019-16265CRITICAL
9.8
CODESYS V2.3 ENI server up to V3.2.2.24 has a Buffer Overflow.Oct 25, 2019›
CVE-2019-13548CRITICAL
9.8
CODESYS V3 web server, all versions prior to 3.5.14.10, allows an attacker to send specially crafted…Sep 13, 2019›
CVE-2019-3975CRITICAL
9.8
Stack-based buffer overflow in Advantech WebAccess/SCADA 8.4.1 allows a remote, unauthenticated atta…Sep 10, 2019›
CVE-2019-9010CRITICAL
9.8
An issue was discovered in 3S-Smart CODESYS V3 products. The CODESYS Gateway does not correctly veri…Aug 15, 2019›
CVE-2019-10938CRITICAL
9.8
A vulnerability has been identified in SIPROTEC 5 devices with CPU variants CP200 (All versions < V7…Aug 2, 2019›
CVE-2019-10970CRITICAL
9.8
In Rockwell Automation PanelView 5510 (all versions manufactured before March 13, 2019 that have nev…Jul 11, 2019›
CVE-2018-11425CRITICAL
9.8
Memory corruption issue was discovered in Moxa OnCell G3470A-LTE Series version 1.6 Build 18021314 a…Jul 3, 2019›
CVE-2018-11422CRITICAL
9.8
Moxa OnCell G3100-HSPA Series version 1.6 Build 17100315 and prior use a proprietary configuration p…Jul 3, 2019›
CVE-2018-11421CRITICAL
9.8
Moxa OnCell G3100-HSPA Series version 1.6 Build 17100315 and prior use a proprietary monitoring prot…Jul 3, 2019›
CVE-2018-11420CRITICAL
9.8
There is Memory corruption in the web interface of Moxa OnCell G3100-HSPA Series version 1.5 Build 1…Jul 3, 2019›
CVE-2018-11426CRITICAL
9.8
A weak Cookie parameter is used in the web application of Moxa OnCell G3100-HSPA Series version 1.4 …Jul 3, 2019›
CVE-2019-12899CRITICAL
9.8
Delta Electronics DeviceNet Builder 2.04 has a User Mode Write AV starting at ntdll!RtlQueueWorkItem…Jun 19, 2019›
CVE-2019-12898CRITICAL
9.8
Delta Electronics DeviceNet Builder 2.04 has a User Mode Write AV starting at image00400000+0x000000…Jun 19, 2019›
CVE-2019-3954CRITICAL
9.8
Stack-based buffer overflow in Advantech WebAccess/SCADA 8.4.0 allows a remote, unauthenticated atta…Jun 19, 2019›
CVE-2019-3953CRITICAL
9.8
Stack-based buffer overflow in Advantech WebAccess/SCADA 8.4.0 allows a remote, unauthenticated atta…Jun 18, 2019›
CVE-2019-12550CRITICAL
9.8
WAGO 852-303 before FW06, 852-1305 before FW06, and 852-1505 before FW03 devices contain hardcoded u…Jun 17, 2019›
CVE-2019-12549CRITICAL
9.8
WAGO 852-303 before FW06, 852-1305 before FW06, and 852-1505 before FW03 devices contain hardcoded p…Jun 17, 2019›
CVE-2018-10698CRITICAL
9.8
An issue was discovered on Moxa AWK-3121 1.14 devices. The device enables an unencrypted TELNET serv…Jun 7, 2019›
CVE-2019-10712CRITICAL
9.8
The Web-GUI on WAGO Series 750-88x (750-330, 750-352, 750-829, 750-831, 750-852, 750-880, 750-881, 7…May 7, 2019›
CVE-2019-6526CRITICAL
9.8
Moxa IKS-G6824A series Versions 4.5 and prior, EDS-405A series Version 3.8 and prior, EDS-408A serie…Apr 15, 2019›
CVE-2019-3940CRITICAL
9.8
Advantech WebAccess 8.3.4 is vulnerable to file upload attacks via unauthenticated RPC call. An unau…Apr 9, 2019›
CVE-2014-9186CRITICAL
9.8
A file inclusion vulnerability exists in the confd.exe module in Honeywell Experion PKS R40x before …Apr 8, 2019›
CVE-2014-5435CRITICAL
9.8
An arbitrary memory write vulnerability exists in the dual_onsrv.exe module in Honeywell Experion PK…Apr 8, 2019›
CVE-2019-6552CRITICAL
9.8
Advantech WebAccess/SCADA, Versions 8.3.5 and prior. Multiple command injection vulnerabilities, cau…Apr 5, 2019›
CVE-2019-6550CRITICAL
9.8
Advantech WebAccess/SCADA, Versions 8.3.5 and prior. Multiple stack-based buffer overflow vulnerabil…Apr 5, 2019›
CVE-2018-19282CRITICAL
9.8
Rockwell Automation PowerFlex 525 AC Drives 5.001 and earlier allow remote attackers to cause a deni…Apr 4, 2019›
CVE-2019-6553CRITICAL
9.8
A vulnerability was found in Rockwell Automation RSLinx Classic versions 4.10.00 and prior. An input…Apr 4, 2019›
CVE-2010-5305CRITICAL
9.8
The potential exists for exposure of the product's password used to restrict unauthorized access to …Mar 26, 2019›
CVE-2014-9189CRITICAL
9.8
Multiple stack-based buffer overflow vulnerabilities were found in Honeywell Experion PKS all versio…Mar 25, 2019›
CVE-2014-9187CRITICAL
9.8
Multiple heap-based buffer overflow vulnerabilities exist in Honeywell Experion PKS all versions pri…Mar 25, 2019›
CVE-2019-6563CRITICAL
9.8
Moxa IKS and EDS generate a predictable cookie calculated with an MD5 hash, allowing an attacker to …Mar 5, 2019›
CVE-2019-6557CRITICAL
9.8
Several buffer overflow vulnerabilities have been identified in Moxa IKS and EDS, which may allow re…Mar 5, 2019›
CVE-2019-6524CRITICAL
9.8
Moxa IKS and EDS do not implement sufficient measures to prevent multiple failed authentication atte…Mar 5, 2019›
CVE-2019-9201CRITICAL
9.8
Multiple Phoenix Contact devices allow remote attackers to establish TCP sessions to port 1962 and o…Feb 26, 2019›
CVE-2019-5909CRITICAL
9.8
License Manager Service of YOKOGAWA products (CENTUM VP (R5.01.00 - R6.06.00), CENTUM VP Entry Class…Feb 13, 2019›
CVE-2018-13792CRITICAL
9.8
Multiple SQL injection vulnerabilities in the monitoring feature in the HTTP API in ABBYY FlexiCaptu…Feb 10, 2019›
CVE-2018-10612CRITICAL
9.8
In 3S-Smart Software Solutions GmbH CODESYS Control V3 products prior to version 3.5.14.0, user acce…Jan 29, 2019›
CVE-2018-0651CRITICAL
9.8
Buffer overflow in the license management function of YOKOGAWA products (iDefine for ProSafe-RS R1.1…Jan 9, 2019›
CVE-2018-18995CRITICAL
9.8
Pluto Safety PLC Gateway Ethernet devices ABB GATE-E1 and GATE-E2 all versions do not allow authenti…Jan 3, 2019›
CVE-2018-14816CRITICAL
9.8
Advantech WebAccess 8.3.1 and earlier has several stack-based buffer overflow vulnerabilities that h…Oct 23, 2018›
CVE-2018-14806CRITICAL
9.8
Advantech WebAccess 8.3.1 and earlier has a path traversal vulnerability which may allow an attacker…Oct 23, 2018›
CVE-2018-18396CRITICAL
9.8
Remote Code Execution in Moxa ThingsPro IIoT Gateway and Device Management Software Solutions versio…Oct 19, 2018›
CVE-2018-18395CRITICAL
9.8
Hidden Token Access in Moxa ThingsPro IIoT Gateway and Device Management Software Solutions version …Oct 19, 2018›
CVE-2018-18394CRITICAL
9.8
Sensitive Information Stored in Clear Text in Moxa ThingsPro IIoT Gateway and Device Management Soft…Oct 19, 2018›
CVE-2018-18393CRITICAL
9.8
Password Management Issue in Moxa ThingsPro IIoT Gateway and Device Management Software Solutions ve…Oct 19, 2018›
CVE-2018-17900CRITICAL
9.8
Yokogawa STARDOM Controllers FCJ, FCN-100, FCN-RTU, FCN-500, All versions R4.10 and prior, The web a…Oct 12, 2018›
CVE-2018-14829CRITICAL
9.8
Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. This vulnerability may allow a remote…Sep 20, 2018›
CVE-2018-7791CRITICAL
9.8
A Permissions, Privileges, and Access Control vulnerability exists in Schneider Electric's Modicon M…Aug 29, 2018›
CVE-2018-7790CRITICAL
9.8
An Information Management Error vulnerability exists in Schneider Electric's Modicon M221 product (a…Aug 29, 2018›
CVE-2018-14805CRITICAL
9.8
ABB eSOMS version 6.0.2 may allow unauthorized access to the system when LDAP is set to allow anonym…Aug 29, 2018›
CVE-2018-10592CRITICAL
9.8
Yokogawa STARDOM FCJ controllers R4.02 and prior, FCN-100 controllers R4.02 and prior, FCN-RTU contr…Jul 31, 2018›
CVE-2018-13791CRITICAL
9.8
The HTTP API in ABBYY FlexiCapture before 12 Release 1 Update 7 allows an attacker to conduct Access…Jul 9, 2018›
CVE-2018-7785CRITICAL
9.8
In Schneider Electric U.motion Builder software versions prior to v1.3.4, a remote command injection…Jul 3, 2018›
CVE-2018-7784CRITICAL
9.8
In Schneider Electric U.motion Builder software versions prior to v1.3.4, this exploit occurs when t…Jul 3, 2018›
CVE-2018-7780CRITICAL
9.8
In Schneider Electric Pelco Sarix Professional 1st generation cameras with firmware versions prior t…Jul 3, 2018›
CVE-2018-7778CRITICAL
9.8
In Schneider Electric Evlink Charging Station versions prior to v3.2.0-12_v1, the Web Interface has …Jul 3, 2018›
CVE-2018-10594CRITICAL
9.8
Delta Industrial Automation COMMGR from Delta Electronics versions 1.08 and prior with accompanying …Jun 26, 2018›
CVE-2018-4846CRITICAL
9.8
A vulnerability has been identified in RAPIDLab 1200 systems / RAPIDPoint 400 systems / RAPIDPoint 5…Jun 26, 2018›
CVE-2018-10623CRITICAL
9.8
Delta Electronics Delta Industrial Automation DOPSoft version 4.00.04 and prior performs read operat…Jun 18, 2018›
CVE-2018-10621CRITICAL
9.8
Delta Electronics Delta Industrial Automation DOPSoft version 4.00.04 and prior utilizes a fixed-len…Jun 18, 2018›
CVE-2018-10617CRITICAL
9.8
Delta Electronics Delta Industrial Automation DOPSoft version 4.00.04 and prior utilizes a fixed-len…Jun 18, 2018›
CVE-2017-7933CRITICAL
9.8
In ABB IP GATEWAY 3.39 and prior, some configuration files contain passwords stored in plain-text, w…Jun 6, 2018›
CVE-2017-7931CRITICAL
9.8
In ABB IP GATEWAY 3.39 and prior, by accessing a specific uniform resource locator (URL) on the web …Jun 6, 2018›
CVE-2018-8871CRITICAL
9.8
In Delta Electronics Automation TPEditor version 1.89 or prior, parsing a malformed program file may…May 25, 2018›
CVE-2017-9664CRITICAL
9.8
In ABB SREA-01 revisions A, B, C: application versions up to 3.31.5, and SREA-50 revision A: applica…May 24, 2018›
CVE-2018-8845CRITICAL
9.8
In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAcc…May 15, 2018›
CVE-2018-7505CRITICAL
9.8
In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAcc…May 15, 2018›
CVE-2018-7499CRITICAL
9.8
In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAcc…May 15, 2018›
CVE-2018-7497CRITICAL
9.8
In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAcc…May 15, 2018›
CVE-2018-10589CRITICAL
9.8
In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAcc…May 15, 2018›
CVE-2018-7761CRITICAL
9.8
A vulnerability exists in the HTTP request parser in Schneider Electric's Modicon M340, Modicon Prem…Apr 18, 2018›
CVE-2018-7760CRITICAL
9.8
An authorization bypass vulnerability exists in Schneider Electric's Modicon M340, Modicon Premium, …Apr 18, 2018›
CVE-2018-7246CRITICAL
9.8
A cleartext transmission of sensitive information vulnerability exists in Schneider Electric's 66074…Apr 18, 2018›
CVE-2018-7243CRITICAL
9.8
An authorization bypass vulnerability exists In Schneider Electric's 66074 MGE Network Management Ca…Apr 18, 2018›
CVE-2018-7242CRITICAL
9.8
Vulnerable hash algorithms exists in Schneider Electric's Modicon Premium, Modicon Quantum, Modicon …Apr 18, 2018›
CVE-2018-7241CRITICAL
9.8
Hard coded accounts exist in Schneider Electric's Modicon Premium, Modicon Quantum, Modicon M340, an…Apr 18, 2018›
CVE-2016-8717CRITICAL
9.8
An exploitable Use of Hard-coded Credentials vulnerability exists in the Moxa AWK-3131A Wireless Acc…Apr 2, 2018›
CVE-2018-4841CRITICAL
9.8
A vulnerability has been identified in TIM 1531 IRC (All versions < V1.1). A remote attacker with ne…Mar 29, 2018›
CVE-2018-7238CRITICAL
9.8
A buffer overflow vulnerability exist in the web-based GUI of Schneider Electric's Pelco Sarix Profe…Mar 9, 2018›
CVE-2018-7233CRITICAL
9.8
A vulnerability exists in Schneider Electric's Pelco Sarix Professional in all firmware versions pri…Mar 9, 2018›
CVE-2018-7232CRITICAL
9.8
A vulnerability exists in Schneider Electric's Pelco Sarix Professional in all firmware versions pri…Mar 9, 2018›
CVE-2018-7231CRITICAL
9.8
A vulnerability exists in Schneider Electric's Pelco Sarix Professional in all firmware versions pri…Mar 9, 2018›
CVE-2018-7229CRITICAL
9.8
A vulnerability exists in Schneider Electric's Pelco Sarix Professional in all firmware versions pri…Mar 9, 2018›
CVE-2018-7228CRITICAL
9.8
A vulnerability exists in Schneider Electric's Pelco Sarix Professional in all firmware versions pri…Mar 9, 2018›
CVE-2018-5455CRITICAL
9.8
A Reliance on Cookies without Validation and Integrity Checking issue was discovered in Moxa OnCell …Mar 5, 2018›
CVE-2018-5440CRITICAL
9.8
A Stack-based Buffer Overflow issue was discovered in 3S-Smart CODESYS Web Server. Specifically: all…Feb 15, 2018›
CVE-2018-5459CRITICAL
9.8
An Improper Authentication issue was discovered in WAGO PFC200 Series 3S CoDeSys Runtime versions 2.…Feb 13, 2018›
CVE-2018-6911CRITICAL
9.8
The VBWinExec function in Node\AspVBObj.dll in Advantech WebAccess 8.3.0 allows remote attackers to …Feb 13, 2018›
CVE-2018-6624CRITICAL
9.8
OMRON NS devices 1.1 through 1.3 allow remote attackers to bypass authentication via a direct reques…Feb 5, 2018›
CVE-2017-12729CRITICAL
9.8
A SQL Injection issue was discovered in Moxa SoftCMS Live Viewer through 1.6. An improper neutraliza…Jan 18, 2018›
CVE-2017-16743CRITICAL
9.8
An Improper Authorization issue was discovered in PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, and 48xxx Se…Jan 12, 2018›
CVE-2017-16724CRITICAL
9.8
A Stack-based Buffer Overflow issue was discovered in Advantech WebAccess versions prior to 8.3. The…Jan 5, 2018›
CVE-2017-9944CRITICAL
9.8
A vulnerability has been identified in Siemens 7KT PAC1200 data manager (7KT1260) in all versions < …Dec 27, 2017›
CVE-2017-13701CRITICAL
9.8
An issue was discovered on MOXA EDS-G512E 5.1 build 16072215 devices. The backup file contains sensi…Nov 23, 2017›
CVE-2017-12739CRITICAL
9.8
An issue was discovered on Siemens SICAM RTUs SM-2556 COM Modules with the firmware variants ENOS00,…Nov 15, 2017›
CVE-2017-14024CRITICAL
9.8
A Stack-based Buffer Overflow issue was discovered in Schneider Electric InduSoft Web Studio v8.0 SP…Nov 13, 2017›
CVE-2017-13997CRITICAL
9.8
A Missing Authentication for Critical Function issue was discovered in Schneider Electric InduSoft W…Oct 3, 2017›
CVE-2017-9957CRITICAL
9.8
A vulnerability exists in Schneider Electric's U.motion Builder software versions 1.2.1 and prior in…Sep 26, 2017›
CVE-2017-7974CRITICAL
9.8
A path traversal information disclosure vulnerability exists in Schneider Electric's U.motion Builde…Sep 26, 2017›
CVE-2017-7973CRITICAL
9.8
A SQL injection vulnerability exists in Schneider Electric's U.motion Builder software versions 1.2.…Sep 26, 2017›
CVE-2017-12708CRITICAL
9.8
An Improper Restriction Of Operations Within The Bounds Of A Memory Buffer issue was discovered in A…Aug 30, 2017›
CVE-2017-12706CRITICAL
9.8
A stack-based buffer overflow issue was discovered in Advantech WebAccess versions prior to V8.2_201…Aug 30, 2017›
CVE-2017-12698CRITICAL
9.8
An Improper Authentication issue was discovered in Advantech WebAccess versions prior to V8.2_201708…Aug 30, 2017›
CVE-2015-6473CRITICAL
9.8
WAGO IO 750-849 01.01.27 and WAGO IO 750-881 01.02.05 do not contain privilege separation.Aug 22, 2017›
CVE-2015-6472CRITICAL
9.8
WAGO IO 750-849 01.01.27 and 01.02.05, WAGO IO 750-881, and WAGO IO 758-870 have weak credential man…Aug 22, 2017›
CVE-2017-9939CRITICAL
9.8
A vulnerability was discovered in Siemens SiPass integrated (All versions before V2.70) that could a…Aug 8, 2017›
CVE-2017-6869CRITICAL
9.8
A vulnerability was discovered in Siemens ViewPort for Web Office Portal before revision number 1453…Aug 8, 2017›
CVE-2017-9629CRITICAL
9.8
A Stack-Based Buffer Overflow issue was discovered in Schneider Electric Wonderware ArchestrA Logger…Jul 7, 2017›
CVE-2017-7903CRITICAL
9.8
A Weak Password Requirements issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 11…Jun 30, 2017›
CVE-2017-7902CRITICAL
9.8
A "Reusing a Nonce, Key Pair in Encryption" issue was discovered in Rockwell Automation Allen-Bradle…Jun 30, 2017›
CVE-2017-7899CRITICAL
9.8
An Information Exposure issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 pr…Jun 30, 2017›
CVE-2017-7898CRITICAL
9.8
An Improper Restriction of Excessive Authentication Attempts issue was discovered in Rockwell Automa…Jun 30, 2017›
CVE-2017-6034CRITICAL
9.8
An Authentication Bypass by Capture-Replay issue was discovered in Schneider Electric Modicon Modbus…Jun 30, 2017›
CVE-2017-6028CRITICAL
9.8
An Insufficiently Protected Credentials issue was discovered in Schneider Electric Modicon PLCs Modi…Jun 30, 2017›
CVE-2017-7915CRITICAL
9.8
An Improper Restriction of Excessive Authentication Attempts issue was discovered in Moxa OnCell G31…May 29, 2017›
CVE-2017-7913CRITICAL
9.8
A Plaintext Storage of a Password issue was discovered in Moxa OnCell G3110-HSPA Version 1.3 build 1…May 29, 2017›
CVE-2017-6027CRITICAL
9.8
An Arbitrary File Upload issue was discovered in 3S-Smart Software Solutions GmbH CODESYS Web Server…May 19, 2017›
CVE-2017-6025CRITICAL
9.8
A Stack Buffer Overflow issue was discovered in 3S-Smart Software Solutions GmbH CODESYS Web Server.…May 19, 2017›
CVE-2017-7909CRITICAL
9.8
A Use of Client-Side Authentication issue was discovered in Advantech B+B SmartWorx MESR901 firmware…May 6, 2017›
CVE-2017-5158CRITICAL
9.8
An Information Exposure issue was discovered in Schneider Electric Wonderware InTouch Access Anywher…Apr 20, 2017›
CVE-2017-7689CRITICAL
9.8
A Command Injection vulnerability in Schneider Electric homeLYnk Controller exists in all versions b…Apr 11, 2017›
CVE-2017-7575CRITICAL
9.8
Schneider Electric Modicon TM221CE16R 1.3.3.3 devices allow remote attackers to discover the applica…Apr 6, 2017›
CVE-2017-7574CRITICAL
9.8
Schneider Electric SoMachine Basic 1.4 SP1 and Schneider Electric Modicon TM221CE16R 1.3.3.3 devices…Apr 6, 2017›
CVE-2017-5178CRITICAL
9.8
An issue was discovered in Schneider Electric Tableau Server/Desktop Versions 7.0 to 10.1.3 in Wonde…Mar 8, 2017›
CVE-2017-5159CRITICAL
9.8
An issue was discovered on Phoenix Contact mGuard devices that have been updated to Version 8.4.0. W…Feb 13, 2017›
CVE-2017-5154CRITICAL
9.8
An issue was discovered in Advantech WebAccess Version 8.1. To be able to exploit the SQL injection …Feb 13, 2017›
CVE-2017-5140CRITICAL
9.8
An issue was discovered in Honeywell XL Web II controller XL1000C500 XLWebExe-2-01-00 and prior, and…Feb 13, 2017›
CVE-2017-5139CRITICAL
9.8
An issue was discovered in Honeywell XL Web II controller XL1000C500 XLWebExe-2-01-00 and prior, and…Feb 13, 2017›
CVE-2016-9369CRITICAL
9.8
An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions pr…Feb 13, 2017›
CVE-2016-9366CRITICAL
9.8
An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions pr…Feb 13, 2017›
CVE-2016-9361CRITICAL
9.8
An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions pr…Feb 13, 2017›
CVE-2016-9333CRITICAL
9.8
An issue was discovered in Moxa SoftCMS versions prior to Version 1.6. The SoftCMS Application does …Feb 13, 2017›
CVE-2016-8567CRITICAL
9.8
An issue was discovered in Siemens SICAM PAS before 8.00. A factory account with hard-coded password…Feb 13, 2017›
CVE-2016-5818CRITICAL
9.8
An issue was discovered in Schneider Electric PowerLogic PM8ECC device 2.651 and older. Undocumented…Feb 13, 2017›
CVE-2016-5815CRITICAL
9.8
An issue was discovered on Schneider Electric IONXXXX series power meters ION73XX series, ION75XX se…Feb 13, 2017›
CVE-2016-9157CRITICAL
9.8
A vulnerability in Siemens SICAM PAS (all versions before V8.09) could allow a remote attacker to ca…Dec 5, 2016›
CVE-2016-9155CRITICAL
9.8
The following SIEMENS branded IP Camera Models CCMW3025, CVMW3025-IR, CFMW3025 prior to version 1.41…Nov 22, 2016›
CVE-2016-5799CRITICAL
9.8
Moxa OnCell G3100V2 devices before 2.8 and G3111, G3151, G3211, and G3251 devices before 1.7 do not …Aug 24, 2016›
CVE-2016-5792CRITICAL
9.8
SQL injection vulnerability in Moxa SoftCMS before 1.5 allows remote attackers to execute arbitrary …Aug 8, 2016›
CVE-2016-4522CRITICAL
9.8
SQL injection vulnerability in Rockwell Automation FactoryTalk EnergyMetrix before 2.20.00 allows re…Jul 28, 2016›
CVE-2016-5743CRITICAL
9.8
Siemens SIMATIC WinCC before 7.3 Update 10 and 7.4 before Update 1, SIMATIC BATCH before 8.1 SP1 Upd…Jul 22, 2016›
CVE-2016-5804CRITICAL
9.8
Moxa MGate MB3180 before 1.8, MGate MB3280 before 2.7, MGate MB3480 before 2.6, MGate MB3170 before …Jul 15, 2016›
CVE-2016-4520CRITICAL
9.8
Schneider Electric Pelco Digital Sentry Video Management System with firmware before 7.14 has hardco…Jul 15, 2016›
CVE-2016-4503CRITICAL
9.8
Moxa Device Server Web Console 5232-N allows remote attackers to bypass authentication, and conseque…Jul 12, 2016›
CVE-2016-2275CRITICAL
9.8
The web interface on Advantech/B+B SmartWorx VESP211-EU devices with firmware 1.7.2 and VESP211-232 …Feb 21, 2016›
CVE-2016-0868CRITICAL
9.8
Stack-based buffer overflow on Rockwell Automation Allen-Bradley MicroLogix 1100 devices A through 1…Jan 28, 2016›
CVE-2016-0859CRITICAL
9.8
Integer overflow in the Kernel service in Advantech WebAccess before 8.1 allows remote attackers to …Jan 15, 2016›
CVE-2016-0857CRITICAL
9.8
Multiple heap-based buffer overflows in Advantech WebAccess before 8.1 allow remote attackers to exe…Jan 15, 2016›
CVE-2016-0856CRITICAL
9.8
Multiple stack-based buffer overflows in Advantech WebAccess before 8.1 allow remote attackers to ex…Jan 15, 2016›
CVE-2016-0854CRITICAL
9.8
Unrestricted file upload vulnerability in the uploadImageCommon function in the UploadAjaxAction scr…Jan 15, 2016›
CVE-2015-7938CRITICAL
9.8
Advantech EKI-132x devices with firmware before 2015-12-31 allow remote attackers to bypass authenti…Jan 9, 2016›
CVE-2012-6068CRITICAL
9.8
The Runtime Toolkit in CODESYS Runtime System 2.3.x and 2.4.x does not require authentication, which…Jan 21, 2013›
CVE-2012-0931CRITICAL
9.8
Schneider Electric Modicon Quantum PLC does not perform authentication between the Unity software an…Jan 28, 2012›
CVE-2025-66606CRITICAL
9.6
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This prod…Feb 9, 2026›
CVE-2025-10571CRITICAL
9.6
Authentication Bypass Using an Alternate Path or Channel vulnerability in ABB ABB Ability Edgenius.T…Nov 20, 2025›
CVE-2024-6515CRITICAL
9.6
Web browser interface may manipulate application username/password in clear text or Base64 encoding …Dec 5, 2024›
CVE-2024-4008CRITICAL
9.6
FDSK Leak in ABB, Busch-Jaeger, FTS Display (version 1.00) and BCU (version 1.3.0.33) allows attacke…Jun 5, 2024›
CVE-2023-3526CRITICAL
9.6
In PHOENIX CONTACTs TC ROUTER and TC CLOUD CLIENT in versions prior to 2.07.2 as well as CLOUD CLIEN…Aug 8, 2023›
CVE-2023-2746CRITICAL
9.6
The Rockwell Automation Enhanced HIM software contains an API that the application uses that is no…Jul 11, 2023›
CVE-2022-4126CRITICAL
9.6
Use of Default Password vulnerability in ABB RCCMD on Windows, Linux, MacOS allows Try Common or Def…Mar 27, 2023›
CVE-2025-2523CRITICAL
9.4
The Honeywell Experion PKS and OneWireless WDM contains an Integer Underflow vulnerability …Jul 10, 2025›
CVE-2024-48845CRITICAL
9.4
Weak Password Reset Rules vulnerabilities where found providing a potiential for the storage of wea…Dec 5, 2024›
CVE-2024-9137CRITICAL
9.4
The affected product lacks an authentication check when sending commands to the server via the Moxa …Oct 14, 2024›
CVE-2023-1834CRITICAL
9.4
Rockwell Automation was made aware that Kinetix 5500 drives, manufactured between May 2022 and Janu…May 11, 2023›
CVE-2021-27442CRITICAL
9.4
The Weintek cMT product line is vulnerable to a cross-site scripting vulnerability, which could allo…May 16, 2022›
CVE-2020-8479CRITICAL
9.4
For the Central Licensing Server component used in ABB products ABB Ability™ System 800xA and relate…Apr 29, 2020›
CVE-2019-19108CRITICAL
9.4
An authentication weakness in the SNMP service in B&R Automation Runtime versions 2.96, 3.00, 3.01, …Apr 20, 2020›
CVE-2020-8768CRITICAL
9.4
An issue was discovered on Phoenix Contact Emalytics Controller ILC 2050 BI before 1.2.3 and BI-L be…Feb 17, 2020›
CVE-2023-4088CRITICAL
9.3
Incorrect Default Permissions vulnerability in Mitsubishi Electric Corporation multiple FA engineeri…Sep 20, 2023›
CVE-2023-0104CRITICAL
9.3
The listed versions for Weintek EasyBuilder Pro are vulnerable to a ZipSlip attack caused by decomp…Feb 22, 2023›
CVE-2024-4009CRITICAL
9.2
Replay Attack in ABB, Busch-Jaeger, FTS Display (version 1.00) and BCU (version 1.3.0.33) allows at…Jun 5, 2024›
CVE-2025-3755CRITICAL
9.1
Improper Validation of Specified Index, Position, or Offset in Input vulnerability in Mitsubishi Ele…May 29, 2025›
CVE-2024-51554CRITICAL
9.1
Default Credentail vulnerabilities in ASPECT on Linux allows access to the product using publicly av…Dec 5, 2024›
CVE-2024-7960CRITICAL
9.1
The Rockwell Automation affected product contains a vulnerability that allows a threat actor to view…Sep 12, 2024›
CVE-2023-5389CRITICAL
9.1
An attacker could potentially exploit this vulnerability, leading to the ability to modify files on…Jan 30, 2024›
CVE-2023-4562CRITICAL
9.1
Improper Authentication vulnerability in Mitsubishi Electric Corporation MELSEC-F Series main module…Oct 13, 2023›
CVE-2023-0811CRITICAL
9.1
Omron CJ1M unit v4.0 and prior has improper access controls on the memory region where the UM passw…Mar 16, 2023›
CVE-2022-3843CRITICAL
9.1
In WAGO Unmanaged Switch (852-111/000-001) in firmware version 01 an undocumented configuration inte…Feb 16, 2023›
CVE-2022-29830CRITICAL
9.1
Use of Hard-coded Cryptographic Key vulnerability in Mitsubishi Electric GX Works3 versions from 1.0…Nov 25, 2022›
CVE-2021-34566CRITICAL
9.1
In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a special…Nov 9, 2022›
CVE-2021-38395CRITICAL
9.1
Honeywell Experion PKS C200, C200E, C300, and ACE controllers are vulnerable to improper neutralizat…Oct 28, 2022›
CVE-2022-30317CRITICAL
9.1
Honeywell Experion LX through 2022-05-06 has Missing Authentication for a Critical Function. Accordi…Aug 31, 2022›
CVE-2022-29898CRITICAL
9.1
On various RAD-ISM-900-EN-* devices by PHOENIX CONTACT an admin user could use the configuration fil…May 11, 2022›
CVE-2022-29897CRITICAL
9.1
On various RAD-ISM-900-EN-* devices by PHOENIX CONTACT an admin user could use the traceroute utilit…May 11, 2022›
CVE-2022-25158CRITICAL
9.1
Cleartext Storage of Sensitive Information vulnerability in Mitsubishi Electric MELSEC iQ-F series F…Apr 1, 2022›
CVE-2022-25157CRITICAL
9.1
Use of Password Hash Instead of Password for Authentication vulnerability in Mitsubishi Electric MEL…Apr 1, 2022›
CVE-2020-25176CRITICAL
9.1
Some commands used by the Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x eXchange Layer (I…Mar 18, 2022›
CVE-2021-34584CRITICAL
9.1
Crafted web server requests can be utilised to read partial stack or heap memory or may trigger a de…Oct 26, 2021›
CVE-2021-20597CRITICAL
9.1
Insufficiently Protected Credentials vulnerability in Mitsubishi Electric MELSEC iQ-R series Safety …Aug 6, 2021›
CVE-2021-30194CRITICAL
9.1
CODESYS V2 Web-Server before 1.1.9.20 has an Out-of-bounds Read.May 25, 2021›
CVE-2021-21001CRITICAL
9.1
On WAGO PFC200 devices in different firmware versions with special crafted packets an authorised att…May 24, 2021›
CVE-2021-25848CRITICAL
9.1
Improper validation of the length field of LLDP-MED TLV in userdisk/vport_lldpd in Moxa Camera VPort…May 10, 2021›
CVE-2021-25847CRITICAL
9.1
Improper validation of the length field of LLDP-MED TLV in userdisk/vport_lldpd in Moxa Camera VPort…May 10, 2021›
CVE-2020-27267CRITICAL
9.1
KEPServerEX v6.0 to v6.9, ThingWorx Kepware Server v6.8 and v6.9, ThingWorx Industrial Connectivity …Jan 14, 2021›
CVE-2020-27263CRITICAL
9.1
KEPServerEX: v6.0 to v6.9, ThingWorx Kepware Server: v6.8 and v6.9, ThingWorx Industrial Connectivit…Jan 14, 2021›
CVE-2020-12506CRITICAL
9.1
Improper Authentication vulnerability in WAGO 750-8XX series with FW version <= FW03 allows an attac…Sep 30, 2020›
CVE-2020-12013CRITICAL
9.1
A specially crafted WCF client that interfaces to the may allow the execution of certain arbitrary S…Jul 16, 2020›
CVE-2019-19106CRITICAL
9.1
Improper implementation of Access Control in ABB Telephone Gateway TG/S 3.2 and Busch-Jaeger 6186/11…Apr 22, 2020›
CVE-2019-19104CRITICAL
9.1
The web server in ABB Telephone Gateway TG/S 3.2 and Busch-Jaeger 6186/11 Telefon-Gateway allows acc…Apr 22, 2020›
CVE-2020-6972CRITICAL
9.1
In Notifier Web Server (NWS) Version 3.50 and earlier, the Honeywell Fire Web Server’s authenticatio…Mar 24, 2020›
CVE-2019-5161CRITICAL
9.1
An exploitable remote code execution vulnerability exists in the Cloud Connectivity functionality of…Mar 11, 2020›
CVE-2019-5160CRITICAL
9.1
An exploitable improper host validation vulnerability exists in the Cloud Connectivity functionality…Mar 11, 2020›
CVE-2019-5080CRITICAL
9.1
An exploitable denial-of-service vulnerability exists in the iocheckd service "I/O-Check" functional…Dec 18, 2019›
CVE-2019-5078CRITICAL
9.1
An exploitable denial of service vulnerability exists in the iocheckd service "I/O-Check" functional…Dec 18, 2019›
CVE-2019-5077CRITICAL
9.1
An exploitable denial-of-service vulnerability exists in the iocheckd service ‘’I/O-Chec’’ functiona…Dec 18, 2019›
CVE-2019-6522CRITICAL
9.1
Moxa IKS and EDS fails to properly check array bounds which may allow an attacker to read device mem…Mar 5, 2019›
CVE-2017-16726CRITICAL
9.1
Beckhoff TwinCAT supports communication over ADS. ADS is a protocol for industrial automation in pro…Jun 27, 2018›
CVE-2018-10730CRITICAL
9.1
All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33…May 17, 2018›
CVE-2018-7245CRITICAL
9.1
An improper authorization vulnerability exists In Schneider Electric's 66074 MGE Network Management …Apr 18, 2018›
CVE-2018-7237CRITICAL
9.1
A vulnerability exists in Schneider Electric's Pelco Sarix Professional in all firmware versions pri…Mar 9, 2018›
CVE-2017-16727CRITICAL
9.1
A Credentials Management issue was discovered in Moxa NPort W2150A versions prior to 1.11, and NPort…Dec 22, 2017›
CVE-2017-6026CRITICAL
9.1
A Use of Insufficiently Random Values issue was discovered in Schneider Electric Modicon PLCs Modico…Jun 30, 2017›
CVE-2016-8721CRITICAL
9.1
An exploitable OS Command Injection vulnerability exists in the web application 'ping' functionality…Apr 20, 2017›
CVE-2017-5152CRITICAL
9.1
An issue was discovered in Advantech WebAccess Version 8.1. By accessing a specific uniform resource…Feb 13, 2017›
CVE-2017-5142CRITICAL
9.1
An issue was discovered in Honeywell XL Web II controller XL1000C500 XLWebExe-2-01-00 and prior, and…Feb 13, 2017›
CVE-2016-9362CRITICAL
9.1
An issue was discovered in WAGO 750-8202/PFC200 prior to FW04 (released August 2015), WAGO 750-881 p…Feb 13, 2017›
CVE-2016-8565CRITICAL
9.1
Siemens Automation License Manager (ALM) before 5.3 SP3 allows remote attackers to write to files, r…Oct 13, 2016›
CVE-2014-5415CRITICAL
9.1
Beckhoff Embedded PC images before 2014-10-22 and Automation Device Specification (ADS) TwinCAT comp…Oct 5, 2016›
CVE-2014-5414CRITICAL
9.1
Beckhoff Embedded PC images before 2014-10-22 and Automation Device Specification (ADS) TwinCAT comp…Oct 5, 2016›
CVE-2024-6516CRITICAL
9.0
Cross Site Scripting vulnerabilities where found providing a potential for malicious scripts to be i…Dec 5, 2024›
CVE-2024-21915CRITICAL
9.0
A privilege escalation vulnerability exists in Rockwell Automation FactoryTalk® Service Platform (F…Feb 16, 2024›
CVE-2023-4203CRITICAL
9.0
Advantech EKI-1524, EKI-1522, EKI-1521 devices through 1.21 are affected by a Stored Cross-Site Scri…Aug 8, 2023›
CVE-2023-4202CRITICAL
9.0
Advantech EKI-1524, EKI-1522, EKI-1521 devices through 1.21 are affected by a Stored Cross-Site Scri…Aug 8, 2023›
CVE-2022-0947CRITICAL
9.0
A vulnerability in ABB ARG600 Wireless Gateway series that could allow an attacker to exploit the vu…May 10, 2022›
CVE-2020-12029CRITICAL
9.0
All versions of FactoryTalk View SE do not properly validate input of filenames within a project dir…Jul 20, 2020›
CVE-2018-10731CRITICAL
9.0
All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33…May 17, 2018›
CVE-2017-2684CRITICAL
9.0
Siemens SIMATIC Logon prior to V1.5 SP3 Update 2 could allow an attacker with knowledge of a valid u…Feb 22, 2017›
CVE-2015-7937HIGH
10.0
Stack-based buffer overflow in the GoAhead Web Server on Schneider Electric Modicon M340 PLC BMXNOx …Dec 21, 2015›
CVE-2015-6476HIGH
10.0
Advantech EKI-122x-BE devices with firmware before 1.65, EKI-132x devices with firmware before 1.98,…Nov 7, 2015›
CVE-2015-6459HIGH
10.0
Absolute path traversal vulnerability in the download feature in FileDownloadServlet in GE Digital E…Sep 18, 2015›
CVE-2014-9208HIGH
10.0
Multiple stack-based buffer overflows in unspecified DLL files in Advantech WebAccess before 8.0.1 a…Sep 11, 2015›
CVE-2015-0984HIGH
10.0
Directory traversal vulnerability in the FTP server on Honeywell Excel Web XL1000C50 52 I/O, XL1000C…Mar 31, 2015›
CVE-2014-8385HIGH
10.0
Buffer overflow on Advantech EKI-1200 gateways with firmware before 1.63 allows remote attackers to …Feb 13, 2015›
CVE-2015-1449HIGH
10.0
Buffer overflow in the integrated web server on Siemens Ruggedcom WIN51xx devices with firmware befo…Feb 2, 2015›
CVE-2015-1448HIGH
10.0
The integrated management service on Siemens Ruggedcom WIN51xx devices with firmware before SS4.4.46…Feb 2, 2015›
CVE-2014-9198HIGH
10.0
The FTP server on the Schneider Electric ETG3000 FactoryCast HMI Gateway with firmware through 1.60 …Jan 27, 2015›
CVE-2014-9197HIGH
10.0
The Schneider Electric ETG3000 FactoryCast HMI Gateway with firmware before 1.60 IR 04 stores rde.ja…Jan 27, 2015›
CVE-2014-9195HIGH
10.0
Phoenix Contact ProConOs and MultiProg do not require authentication, which allows remote attackers …Jan 17, 2015›
CVE-2014-9190HIGH
10.0
Stack-based buffer overflow in Schneider Electric Wonderware InTouch Access Anywhere Server 10.6 and…Jan 10, 2015›
CVE-2014-9188HIGH
10.0
Buffer overflow in an ActiveX control in MDraw30.ocx in Schneider Electric ProClima before 6.1.7 all…Dec 27, 2014›
CVE-2014-8511HIGH
10.0
Buffer overflow in an ActiveX control in Atx45.ocx in Schneider Electric ProClima before 6.1.7 allow…Dec 27, 2014›
CVE-2014-8551HIGH
10.0
The WinCC server in Siemens SIMATIC WinCC 7.0 through SP3, 7.2 before Update 9, and 7.3 before Updat…Nov 26, 2014›
CVE-2014-0754HIGH
10.0
Directory traversal vulnerability in SchneiderWEB on Schneider Electric Modicon PLC Ethernet modules…Oct 3, 2014›
CVE-2013-6920HIGH
10.0
Siemens SINAMICS S/G controllers with firmware before 4.6.11 do not require authentication for FTP a…Dec 7, 2013›
CVE-2013-5944HIGH
10.0
The integrated web server on Siemens SCALANCE X-200 switches with firmware before 4.5.0 and X-200IRT…Oct 3, 2013›
CVE-2013-4652HIGH
10.0
Unspecified vulnerability in the command-line management interface on Siemens Scalance W7xx devices …Aug 1, 2013›
CVE-2013-4781HIGH
10.0
core/getLog.php on the Siemens Enterprise OpenScape Branch appliance and OpenScape Session Border Co…Jul 18, 2013›
CVE-2013-2781HIGH
10.0
Use-after-free vulnerability in the server application in 3S CODESYS Gateway 2.3.9.27 allows remote …May 23, 2013›
CVE-2012-4715HIGH
10.0
Buffer overflow in LogReceiver.exe in Rockwell Automation RSLinx Enterprise CPR9, CPR9-SR1, CPR9-SR2…Apr 18, 2013›
CVE-2013-2762HIGH
10.0
The Schneider Electric Magelis XBT HMI controller has a default password for authentication of confi…Apr 4, 2013›
CVE-2013-0659HIGH
10.0
The debugging feature on the Siemens CP 1604 and CP 1616 interface cards with firmware before 2.5.2 …Apr 1, 2013›
CVE-2012-4708HIGH
10.0
Stack-based buffer overflow in 3S CODESYS Gateway-Server before 2.3.9.27 allows remote attackers to …Feb 24, 2013›
CVE-2012-4707HIGH
10.0
3S CODESYS Gateway-Server before 2.3.9.27 allows remote attackers to execute arbitrary code via vect…Feb 24, 2013›
CVE-2012-4705HIGH
10.0
Directory traversal vulnerability in 3S CODESYS Gateway-Server before 2.3.9.27 allows remote attacke…Feb 24, 2013›
CVE-2012-4704HIGH
10.0
Array index error in 3S CODESYS Gateway-Server before 2.3.9.27 allows remote attackers to execute ar…Feb 24, 2013›
CVE-2013-0658HIGH
10.0
Heap-based buffer overflow in RFManagerService.exe in Schneider Electric Accutech Manager 2.00.1 and…Feb 15, 2013›
CVE-2012-6437HIGH
10.0
The device does not properly authenticate users and the potential exists for a remote user to upload…Jan 24, 2013›
CVE-2013-0657HIGH
10.0
Stack-based buffer overflow in Schneider Electric Interactive Graphical SCADA System (IGSS) 10 and e…Jan 21, 2013›
CVE-2012-5409HIGH
10.0
AscoServer.exe in the server in Siemens SiPass integrated MP2.6 and earlier does not properly handle…Nov 1, 2012›
CVE-2012-4879HIGH
10.0
The Linux Console on the WAGO I/O System 758 model 758-870, 758-874, 758-875, and 758-876 Industrial…Sep 7, 2012›
CVE-2012-3013HIGH
10.0
WAGO I/O System 758 model 758-870, 758-874, 758-875, and 758-876 Industrial PC (IPC) devices have de…Sep 7, 2012›
CVE-2012-1799HIGH
10.0
The web server on the Siemens Scalance S Security Module firewall S602 V2, S612 V2, and S613 V2 with…Apr 18, 2012›
CVE-2012-0245HIGH
10.0
Multiple stack-based buffer overflows in RobNetScanHost.exe in ABB Robot Communications Runtime befo…Mar 9, 2012›
CVE-2012-0243HIGH
10.0
Buffer overflow in an ActiveX control in bwocxrun.ocx in Advantech/BroadWin WebAccess before 7.0 all…Feb 21, 2012›
CVE-2012-0242HIGH
10.0
Format string vulnerability in Advantech/BroadWin WebAccess before 7.0 allows remote attackers to ex…Feb 21, 2012›
CVE-2012-0240HIGH
10.0
GbScriptAddUp.asp in Advantech/BroadWin WebAccess before 7.0 does not properly perform authenticatio…Feb 21, 2012›
CVE-2012-0238HIGH
10.0
Stack-based buffer overflow in opcImg.asp in Advantech/BroadWin WebAccess before 7.0 allows remote a…Feb 21, 2012›
CVE-2011-4526HIGH
10.0
Buffer overflow in an ActiveX control in Advantech/BroadWin WebAccess before 7.0 might allow remote …Feb 21, 2012›
CVE-2011-4525HIGH
10.0
Advantech/BroadWin WebAccess before 7.0 allows remote attackers to trigger the extraction of arbitra…Feb 21, 2012›
CVE-2011-4524HIGH
10.0
Buffer overflow in Advantech/BroadWin WebAccess before 7.0 allows remote attackers to execute arbitr…Feb 21, 2012›
CVE-2011-1914HIGH
10.0
Buffer overflow in the Advantech ADAM OLE for Process Control (OPC) Server ActiveX control in ADAM O…Feb 21, 2012›
CVE-2011-4041HIGH
10.0
webvrpcs.exe in Advantech/BroadWin WebAccess allows remote attackers to execute arbitrary code or ob…Feb 6, 2012›
CVE-2011-4514HIGH
10.0
The TELNET daemon in Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); …Feb 3, 2012›
CVE-2011-4513HIGH
10.0
Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal); the TP, OP, MP, Comfo…Feb 3, 2012›
CVE-2011-4509HIGH
10.0
The HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka TIA portal);…Feb 3, 2012›
CVE-2011-5007HIGH
10.0
Stack-based buffer overflow in the CmpWebServer component in 3S CoDeSys 3.4 SP4 Patch 2 and earlier,…Dec 25, 2011›
CVE-2011-4861HIGH
10.0
The modbus_125_handler function in the Schneider Electric Quantum Ethernet Module on the NOE 771 dev…Dec 17, 2011›
CVE-2011-4860HIGH
10.0
The ComputePassword function in the Schneider Electric Quantum Ethernet Module on the NOE 771 device…Dec 17, 2011›
CVE-2011-4859HIGH
10.0
The Schneider Electric Quantum Ethernet Module, as used in the Quantum 140NOE771* and 140CPU65* modu…Dec 17, 2011›
CVE-2010-4742HIGH
10.0
Stack-based buffer overflow in a certain ActiveX control in MediaDBPlayback.DLL 2.2.0.5 in the Moxa …Feb 18, 2011›
CVE-2011-0488HIGH
10.0
Stack-based buffer overflow in NTWebServer.exe in the test web service in InduSoft NTWebServer, as d…Jan 18, 2011›
CVE-2010-2965HIGH
10.0
The WDB target agent debug service in Wind River VxWorks 6.x, 5.x, and earlier, as used on the Rockw…Aug 5, 2010›
CVE-2009-3739HIGH
10.0
Multiple unspecified vulnerabilities on the Rockwell Automation AB Micrologix 1100 and 1400 controll…Jan 19, 2010›
CVE-2008-6993HIGH
10.0
Siemens Gigaset WLAN Camera 1.27 has an insecure default password, which allows remote attackers to …Aug 19, 2009›
CVE-2008-6916HIGH
10.0
Siemens SpeedStream 5200 with NetPort Software 1.1 allows remote attackers to bypass authentication …Aug 7, 2009›
CVE-2008-5848HIGH
10.0
The Advantech ADAM-6000 module has 00000000 as its default password, which makes it easier for remot…Jan 6, 2009›
CVE-2008-2474HIGH
10.0
Buffer overflow in x87 before 3.5.5 in ABB Process Communication Unit 400 (PCU400) 4.4 through 4.6 a…Sep 29, 2008›
CVE-2000-0704HIGH
10.0
Buffer overflow in SGI Omron WorldView Wnn allows remote attackers to execute arbitrary commands via…Oct 20, 2000›
CVE-2015-7908HIGH
9.3
Honeywell Midas gas detectors before 1.13b3 and Midas Black gas detectors before 2.13b3 allow remote…Dec 21, 2015›
CVE-2015-5386HIGH
9.3
Siemens SICAM MIC devices with firmware before 2404 allow remote attackers to bypass authentication …Jul 16, 2015›
CVE-2014-0769HIGH
9.3
The Festo CECX-X-C1 Modular Master Controller with CoDeSys and CECX-X-M1 Modular Controller with CoD…Apr 25, 2014›
CVE-2014-0760HIGH
9.3
The Festo CECX-X-C1 Modular Master Controller with CoDeSys and CECX-X-M1 Modular Controller with Co…Apr 25, 2014›
CVE-2014-2731HIGH
9.3
Multiple unspecified vulnerabilities in the integrated web server in Siemens SINEMA Server before 12…Apr 19, 2014›
CVE-2013-0662HIGH
9.3
Multiple stack-based buffer overflows in ModbusDrv.exe in Schneider Electric Modbus Serial Driver 1.…Apr 1, 2014›
CVE-2014-0781HIGH
9.3
Heap-based buffer overflow in BKCLogSvr.exe in Yokogawa CENTUM CS 3000 R3.09.50 and earlier allows r…Mar 14, 2014›
CVE-2013-2817HIGH
9.3
An ActiveX control in IcoLaunch.dll in Mitsubishi Electric Automation MC-WorX Suite 8.02 allows user…Feb 24, 2014›
CVE-2013-2782HIGH
9.3
Schneider Electric Trio J-Series License Free Ethernet Radio with firmware 3.6.0 through 3.6.3 uses …Aug 28, 2013›
CVE-2013-5021HIGH
9.3
Multiple absolute path traversal vulnerabilities in National Instruments cwui.ocx, as used in Nation…Aug 6, 2013›
CVE-2012-6440HIGH
9.3
The Web server password authentication mechanism used by the products is vulnerable to a MitM and Re…Jan 24, 2013›
CVE-2013-0655HIGH
9.3
The client in Schneider Electric Software Update (SESU) Utility 1.0.x and 1.1.x does not ensure that…Jan 21, 2013›
CVE-2011-4876HIGH
9.3
Directory traversal vulnerability in HmiLoad in the runtime loader in Siemens WinCC flexible 2004, 2…Feb 3, 2012›
CVE-2011-4875HIGH
9.3
Stack-based buffer overflow in HmiLoad in the runtime loader in Siemens WinCC flexible 2004, 2005, 2…Feb 3, 2012›
CVE-2011-4508HIGH
9.3
The HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; WinCC V11 (aka T…Feb 3, 2012›
CVE-2011-4055HIGH
9.3
Buffer overflow in the WebClient ActiveX control in Siemens Tecnomatix FactoryLink 6.6.1 (aka 6.6 SP…Jan 8, 2012›
CVE-2011-4034HIGH
9.3
Buffer overflow in the Steema TeeChart ActiveX control, as used in Schneider Electric Vijeo Historia…Dec 2, 2011›
CVE-2011-3321HIGH
9.3
Heap-based buffer overflow in the Siemens WinCC Runtime Advanced Loader, as used in SIMATIC WinCC fl…Sep 16, 2011›
CVE-2011-2530HIGH
9.3
Buffer overflow in RSEds.dll in RSHWare.exe in the EDS Hardware Installation Tool 1.0.5.1 and earlie…Jun 22, 2011›
CVE-2011-0340HIGH
9.3
Multiple buffer overflows in the ISSymbol ActiveX control in ISSymbol.ocx 61.6.0.0 and 301.1009.2904…May 4, 2011›
CVE-2011-0331HIGH
9.3
Use-after-free vulnerability in the addOSPLext method in the Honeywell ScanServer ActiveX control 78…Mar 22, 2011›
CVE-2010-4741HIGH
9.3
Stack-based buffer overflow in MDMUtil.dll in MDMTool.exe in MDM Tool before 2.3 in Moxa Device Mana…Feb 18, 2011›
CVE-2015-3974HIGH
9.0
EasyIO EasyIO-30P-SF controllers with firmware before 0.5.21 and 2.x before 2.0.5.21, as used in Acc…Sep 28, 2015›
CVE-2015-6456HIGH
9.0
GE Digital Energy MDS PulseNET and MDS PulseNET Enterprise before 3.1.5 have hardcoded credentials f…Sep 18, 2015›
CVE-2015-4051HIGH
9.0
Beckhoff IPC Diagnostics before 1.8 does not properly restrict access to functions in /config, which…Jun 8, 2015›
CVE-2014-8387HIGH
9.0
cgi/utility.cgi in Advantech EKI-6340 2.05 Wi-Fi Mesh Access Point allows remote authenticated users…Nov 20, 2014›
CVE-2014-2366HIGH
9.0
upAdminPg.asp in Advantech WebAccess before 7.2 allows remote authenticated users to discover creden…Jul 19, 2014›
CVE-2014-0783HIGH
9.0
Stack-based buffer overflow in BKHOdeq.exe in Yokogawa CENTUM CS 3000 R3.09.50 and earlier allows re…Mar 14, 2014›
CVE-2026-32059HIGH
8.8
OpenClaw version 2026.2.22-2 prior to 2026.2.23 tools.exec.safeBins validation for sort command fail…Mar 11, 2026›
CVE-2024-55022HIGH
8.8
Weintek cMT-3072XH2 easyweb v2.1.53, OS v20231011 was discovered to contain an authenticated command…Mar 3, 2026›
CVE-2025-10314HIGH
8.8
Incorrect Default Permissions vulnerability in Mitsubishi Electric Corporation FREQSHIP-mini for Win…Feb 5, 2026›
CVE-2025-4676HIGH
8.8
Incorrect Implementation of Authentication Algorithm vulnerability in ABB WebPro SNMP Card PowerValu…Jan 7, 2026›
CVE-2025-14849HIGH
8.8
Advantech WebAccess/SCADA  is vulnerable to unrestricted file upload, which may allow an attacker to…Dec 18, 2025›
CVE-2025-10205HIGH
8.8
Use of a One-Way Hash with a Predictable Salt vulnerability in ABB FLXEON.This issue affects FLXEON:…Sep 17, 2025›
CVE-2025-9065HIGH
8.8
A server-side request forgery security issue exists within Rockwell Automation ThinManager® software…Sep 9, 2025›
CVE-2025-53515HIGH
8.8
A vulnerability exists in Advantech iView that allows for SQL injection and remote code execution t…Jul 11, 2025›
CVE-2025-53475HIGH
8.8
A vulnerability exists in Advantech iView that could allow for SQL injection and remote code execut…Jul 11, 2025›
CVE-2025-52577HIGH
8.8
A vulnerability exists in Advantech iView that could allow SQL injection and remote code execution …Jul 11, 2025›
CVE-2024-41969HIGH
8.8
A low privileged remote attacker may modify the configuration of the CODESYS V3 service through a mi…Nov 18, 2024›
CVE-2024-42417HIGH
8.8
Delta Electronics DIAEnergie is vulnerable to an SQL injection in the script Handler_CFG.ashx. An au…Oct 3, 2024›
CVE-2024-38308HIGH
8.8
Advantech ADAM 5550's web application includes a "logs" page where all the HTTP requests received a…Sep 27, 2024›
CVE-2024-8533HIGH
8.8
A privilege escalation vulnerability exists in the Rockwell Automation affected products. The vulner…Sep 12, 2024›
CVE-2024-45044HIGH
8.8
Bareos is open source software for backup, archiving, and recovery of data for operating systems. Wh…Sep 10, 2024›
CVE-2020-11640HIGH
8.8
AdvaBuild uses a command queue to launch certain operations. An attacker who gains access to the com…Jul 23, 2024›
CVE-2024-39883HIGH
8.8
Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to co…Jul 9, 2024›
CVE-2024-39882HIGH
8.8
Delta Electronics CNCSoft-G2 lacks proper validation of user-supplied data, which can result in a re…Jul 9, 2024›
CVE-2024-39881HIGH
8.8
Delta Electronics CNCSoft-G2 lacks proper validation of user-supplied data, which can result in a me…Jul 9, 2024›
CVE-2024-4007HIGH
8.8
Default credential in install package in ABB ASPECT; NEXUS Series; MATRIX Series version 3.07 allows…Jul 1, 2024›
CVE-2023-51603HIGH
8.8
Honeywell Saia PG5 Controls Suite CAB File Parsing Directory Traversal Remote Code Execution Vulnera…May 3, 2024›
CVE-2023-51599HIGH
8.8
Honeywell Saia PG5 Controls Suite Directory Traversal Remote Code Execution Vulnerability. This vuln…May 3, 2024›
CVE-2024-34033HIGH
8.8
Delta Electronics DIAEnergie has insufficient input validation which makes it possible to perform a…May 3, 2024›
CVE-2024-34032HIGH
8.8
Delta Electronics DIAEnergie is vulnerable to an SQL injection vulnerability that exists in the Get…May 3, 2024›
CVE-2024-34031HIGH
8.8
Delta Electronics DIAEnergie is vulnerable to an SQL injection vulnerability that exists in the scr…May 3, 2024›
CVE-2023-43824HIGH
8.8
A stack based buffer overflow exists in Delta Electronics Delta Industrial Automation DOPSoft when p…Jan 18, 2024›
CVE-2023-43823HIGH
8.8
A stack based buffer overflow exists in Delta Electronics Delta Industrial Automation DOPSoft when p…Jan 18, 2024›
CVE-2023-43822HIGH
8.8
A stack based buffer overflow exists in Delta Electronics Delta Industrial Automation DOPSoft when p…Jan 18, 2024›
CVE-2023-43821HIGH
8.8
A stack based buffer overflow exists in Delta Electronics Delta Industrial Automation DOPSoft when p…Jan 18, 2024›
CVE-2023-43820HIGH
8.8
A stack based buffer overflow exists in Delta Electronics Delta Industrial Automation DOPSoft when p…Jan 18, 2024›
CVE-2023-43819HIGH
8.8
A stack based buffer overflow exists in Delta Electronics Delta Industrial Automation DOPSoft when p…Jan 18, 2024›
CVE-2023-43818HIGH
8.8
A buffer overflow exists in Delta Electronics Delta Industrial Automation DOPSoft. A remote, unauthe…Jan 18, 2024›
CVE-2023-50466HIGH
8.8
An authenticated command injection vulnerability in Weintek cMT2078X easyweb Web Version v2.1.3, OS …Dec 19, 2023›
CVE-2023-46690HIGH
8.8
In Delta Electronics InfraSuite Device Master v.1.0.7, a vulnerability exists that allows an attacke…Nov 30, 2023›
CVE-2023-40145HIGH
8.8
In Weintek's cMT3000 HMI Web CGI device, an anonymous attacker can execute arbitrary comman…Oct 19, 2023›
CVE-2023-29463HIGH
8.8
The JMX Console within the Rockwell Automation Pavilion8 is exposed to application users and does n…Sep 12, 2023›
CVE-2023-37861HIGH
8.8
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 an authenticated remote at…Aug 9, 2023›
CVE-2023-3573HIGH
8.8
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with low…Aug 8, 2023›
CVE-2023-3571HIGH
8.8
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with low…Aug 8, 2023›
CVE-2023-3570HIGH
8.8
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with low…Aug 8, 2023›
CVE-2022-4046HIGH
8.8
In CODESYS Control in multiple versions a improper restriction of operations within the bounds of a …Aug 3, 2023›
CVE-2023-3663HIGH
8.8
In CODESYS Development System versions from 3.5.11.20 and before 3.5.19.20 a missing integrity check…Aug 3, 2023›
CVE-2023-3983HIGH
8.8
An authenticated SQL injection vulnerability exists in Advantech iView versions prior to v5.7.4 buil…Jul 31, 2023›
CVE-2023-2072HIGH
8.8
The Rockwell Automation PowerMonitor 1000 contains stored cross-site scripting vulnerabilities withi…Jul 11, 2023›
CVE-2023-3256HIGH
8.8
Advantech R-SeeNet versions 2.4.22 allows low-level users to access and load the content of local …Jun 22, 2023›
CVE-2023-0863HIGH
8.8
Improper Authentication vulnerability in ABB Terra AC wallbox (UL40/80A), ABB Terra AC wallbox (UL32…May 17, 2023›
CVE-2022-47390HIGH
8.8
An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the Cmp…May 15, 2023›
CVE-2022-47389HIGH
8.8
An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the Cmp…May 15, 2023›
CVE-2022-47388HIGH
8.8
An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the Cmp…May 15, 2023›
CVE-2022-47387HIGH
8.8
An authenticated remote attacker may use a stack based out-of-bounds write vulnerability in the CmpT…May 15, 2023›
CVE-2022-47386HIGH
8.8
An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the Cmp…May 15, 2023›
CVE-2022-47385HIGH
8.8
An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the Cmp…May 15, 2023›
CVE-2022-47384HIGH
8.8
An authenticated remote attacker may use a stack based out-of-bounds write vulnerability in the CmpT…May 15, 2023›
CVE-2022-47383HIGH
8.8
An authenticated, remote attacker may use a stack based out-of-bounds write vulnerability in the Cmp…May 15, 2023›
CVE-2022-47382HIGH
8.8
An authenticated remote attacker may use a stack based out-of-bounds write vulnerability in the CmpT…May 15, 2023›
CVE-2022-47381HIGH
8.8
An authenticated remote attacker may use a stack based out-of-bounds write vulnerability in multiple…May 15, 2023›
CVE-2022-47380HIGH
8.8
An authenticated remote attacker may use a stack based  out-of-bounds write vulnerability in multipl…May 15, 2023›
CVE-2022-47379HIGH
8.8
An authenticated, remote attacker may use a out-of-bounds write vulnerability in multiple CODESYS pr…May 15, 2023›
CVE-2023-2575HIGH
8.8
Advantech EKI-1524, EKI-1522, EKI-1521 devices through 1.21 are affected by a Stack-based Buffer Ove…May 8, 2023›
CVE-2023-2574HIGH
8.8
Advantech EKI-1524, EKI-1522, EKI-1521 devices through 1.21 are affected by an command injection vul…May 8, 2023›
CVE-2023-2573HIGH
8.8
Advantech EKI-1524, EKI-1522, EKI-1521 devices through 1.21 are affected by an command injection vul…May 8, 2023›
CVE-2023-1109HIGH
8.8
In Phoenix Contacts ENERGY AXC PU Web service an authenticated restricted user of the web frontend c…Apr 17, 2023›
CVE-2023-1144HIGH
8.8
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contains an improper access contr…Mar 27, 2023›
CVE-2023-1143HIGH
8.8
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use Lua scr…Mar 27, 2023›
CVE-2023-1141HIGH
8.8
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contain a command injection vulne…Mar 27, 2023›
CVE-2023-1139HIGH
8.8
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 are affected by a deserialization…Mar 27, 2023›
CVE-2022-4224HIGH
8.8
In multiple products of CODESYS v3 in multiple versions a remote low privileged user could utilize t…Mar 23, 2023›
CVE-2018-25048HIGH
8.8
The CODESYS runtime system in multiple versions allows an remote low privileged attacker to use a pa…Mar 23, 2023›
CVE-2023-0228HIGH
8.8
Improper Authentication vulnerability in ABB Symphony Plus S+ Operations.This issue affects Symphony…Mar 2, 2023›
CVE-2023-0444HIGH
8.8
A privilege escalation vulnerability exists in Delta Electronics InfraSuite Device Master 00.00.02a.…Jan 26, 2023›
CVE-2022-42139HIGH
8.8
Delta Electronics DVW-W02W2-E2 1.5.0.10 is vulnerable to Command Injection via Crafted URL.Dec 14, 2022›
CVE-2022-43506HIGH
8.8
SQL Injection in HandlerTag_KID.ashx in Delta Electronics DIAEnergie versions prior to v1.9.0…Nov 17, 2022›
CVE-2022-43457HIGH
8.8
SQL Injection in HandlerPage_KID.ashx in Delta Electronics DIAEnergie versions prior to …Nov 17, 2022›
CVE-2022-43452HIGH
8.8
SQL Injection in FtyInfoSetting.aspx in Delta Electronics DIAEnergie versions prior to…Nov 17, 2022›
CVE-2022-43447HIGH
8.8
SQL Injection in AM_EBillAnalysis.aspx in Delta Electronics DIAEnergie versions prior to v…Nov 17, 2022›
CVE-2022-41775HIGH
8.8
SQL Injection in Handler_CFG.ashx in Delta Electronics DIAEnergie versions prior to v1.9.02.…Nov 17, 2022›
CVE-2022-41779HIGH
8.8
Delta Electronics InfraSuite Device Master versions 00.00.01a and prior deserialize network packets…Oct 31, 2022›
CVE-2022-41644HIGH
8.8
Delta Electronics InfraSuite Device Master versions 00.00.01a and prior lacks authentication for …Oct 31, 2022›
CVE-2022-3158HIGH
8.8
Rockwell Automation FactoryTalk VantagePoint versions 8.0, 8.10, 8.20, 8.30, 8.31 are vulnerable to …Oct 17, 2022›
CVE-2022-38743HIGH
8.8
Rockwell Automation FactoryTalk VantagePoint versions 8.0, 8.10, 8.20, 8.30, 8.31 are vulnerable to …Oct 17, 2022›
CVE-2022-2333HIGH
8.8
If an attacker manages to trick a valid user into loading a malicious DLL, the attacker may be able …Sep 16, 2022›
CVE-2022-30243HIGH
8.8
Honeywell Alerton Visual Logic through 2022-05-04 allows unauthenticated programming writes from rem…Jul 15, 2022›
CVE-2022-32143HIGH
8.8
In multiple CODESYS products, file download and upload function allows access to internal files in t…Jun 24, 2022›
CVE-2022-32138HIGH
8.8
In multiple CODESYS products, a remote attacker may craft a request which may cause an unexpected si…Jun 24, 2022›
CVE-2022-32137HIGH
8.8
In multiple CODESYS products, a low privileged remote attacker may craft a request, which may cause …Jun 24, 2022›
CVE-2022-22729HIGH
8.8
CAMS for HIS Server contained in the following Yokogawa Electric products improperly authenticate th…Mar 11, 2022›
CVE-2022-21808HIGH
8.8
Path traversal vulnerability exists in CAMS for HIS Server contained in the following Yokogawa Elect…Mar 11, 2022›
CVE-2022-22509HIGH
8.8
In Phoenix Contact FL SWITCH Series 2xxx in version 3.00 an incorrect privilege assignment allows an…Feb 2, 2022›
CVE-2021-40396HIGH
8.8
A privilege escalation vulnerability exists in the installation of Advantech DeviceOn/iService 1.1.7…Jan 28, 2022›
CVE-2021-40389HIGH
8.8
A privilege escalation vulnerability exists in the installation of Advantech DeviceOn/iEdge Server 1…Jan 28, 2022›
CVE-2021-40388HIGH
8.8
A privilege escalation vulnerability exists in Advantech SQ Manager Server 1.0.6. A specially-crafte…Jan 28, 2022›
CVE-2021-21917HIGH
8.8
An exploitable SQL injection vulnerability exist in the ‘group_list’ page of the Advantech R-SeeNet …Dec 22, 2021›
CVE-2021-21916HIGH
8.8
An exploitable SQL injection vulnerability exist in the ‘group_list’ page of the Advantech R-SeeNet …Dec 22, 2021›
CVE-2021-21915HIGH
8.8
An exploitable SQL injection vulnerability exist in the ‘group_list’ page of the Advantech R-SeeNet …Dec 22, 2021›
CVE-2021-38418HIGH
8.8
Delta Electronics DIALink versions 1.2.4.0 and prior runs by default on HTTP, which may allow an att…Nov 3, 2021›
CVE-2021-39279HIGH
8.8
Certain MOXA devices allow Authenticated Command Injection via /forms/web_importTFTP. This affects W…Sep 7, 2021›
CVE-2021-20994HIGH
8.8
In multiple managed switches by WAGO in different versions an attacker may trick a legitimate user t…May 13, 2021›
CVE-2021-29238HIGH
8.8
CODESYS Automation Server before 1.16.0 allows cross-site request forgery (CSRF).May 3, 2021›
CVE-2020-13555HIGH
8.8
An exploitable local privilege elevation vulnerability exists in the file system permissions of Adva…Feb 17, 2021›
CVE-2020-13553HIGH
8.8
An exploitable local privilege elevation vulnerability exists in the file system permissions of Adva…Feb 17, 2021›
CVE-2020-13552HIGH
8.8
An exploitable local privilege elevation vulnerability exists in the file system permissions of Adva…Feb 17, 2021›
CVE-2020-13551HIGH
8.8
An exploitable local privilege elevation vulnerability exists in the file system permissions of Adva…Feb 17, 2021›
CVE-2020-27261HIGH
8.8
The Omron CX-One Version 4.60 and prior is vulnerable to a stack-based buffer overflow, which may al…Feb 9, 2021›
CVE-2020-27259HIGH
8.8
The Omron CX-One Version 4.60 and prior may allow an attacker to supply a pointer to arbitrary memor…Feb 9, 2021›
CVE-2020-25198HIGH
8.8
The built-in WEB server for MOXA NPort IAW5000A-I/O firmware version 2.1 or lower has incorrectly im…Dec 23, 2020›
CVE-2020-25194HIGH
8.8
The built-in WEB server for MOXA NPort IAW5000A-I/O firmware version 2.1 or lower has improper privi…Dec 23, 2020›
CVE-2020-12519HIGH
8.8
On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS an attacker can use this vulne…Dec 17, 2020›
CVE-2020-12517HIGH
8.8
On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS an authenticated low privilege…Dec 17, 2020›
CVE-2020-12033HIGH
8.8
In Rockwell Automation FactoryTalk Services Platform, all versions, the redundancy host service (Rdc…Jun 23, 2020›
CVE-2020-12026HIGH
8.8
Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple relative path traversal v…May 8, 2020›
CVE-2020-6081HIGH
8.8
An exploitable code execution vulnerability exists in the PLC_Task functionality of 3S-Smart Softwar…May 7, 2020›
CVE-2020-8477HIGH
8.8
The installations for ABB System 800xA Information Manager versions 5.1, 6.0 to 6.0.3.2 and 6.1 wron…Apr 22, 2020›
CVE-2020-10607HIGH
8.8
In Advantech WebAccess, Versions 8.4.2 and prior. A stack-based buffer overflow vulnerability caused…Mar 27, 2020›
CVE-2020-6982HIGH
8.8
In Honeywell WIN-PAK 4.7.2, Web and prior versions, the header injection vulnerability has been iden…Mar 24, 2020›
CVE-2020-7005HIGH
8.8
In Honeywell WIN-PAK 4.7.2, Web and prior versions, the affected product is vulnerable to a cross-si…Mar 24, 2020›
CVE-2020-5546HIGH
8.8
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability in …Mar 16, 2020›
CVE-2020-9436HIGH
8.8
PHOENIX CONTACT TC ROUTER 3002T-4G through 2.05.3, TC ROUTER 2002T-3G through 2.05.3, TC ROUTER 3002…Mar 12, 2020›
CVE-2019-9102HIGH
8.8
An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 device…Mar 11, 2020›
CVE-2019-5162HIGH
8.8
An exploitable improper access control vulnerability exists in the iw_webs account settings function…Feb 25, 2020›
CVE-2019-5153HIGH
8.8
An exploitable remote code execution vulnerability exists in the iw_webs configuration parsing funct…Feb 25, 2020›
CVE-2019-5143HIGH
8.8
An exploitable format string vulnerability exists in the iw_console conio_writestr functionality of …Feb 25, 2020›
CVE-2019-5141HIGH
8.8
An exploitable command injection vulnerability exists in the iw_webs functionality of the Moxa AWK-3…Feb 25, 2020›
CVE-2019-5140HIGH
8.8
An exploitable command injection vulnerability exists in the iwwebs functionality of the Moxa AWK-31…Feb 25, 2020›
CVE-2019-5136HIGH
8.8
An exploitable privilege escalation vulnerability exists in the iw_console functionality of the Moxa…Feb 25, 2020›
CVE-2020-8997HIGH
8.8
Older generation Abbott FreeStyle Libre sensors allow remote attackers within close proximity to ena…Feb 16, 2020›
CVE-2020-8858HIGH
8.8
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Mo…Feb 14, 2020›
CVE-2019-10995HIGH
8.8
ABB CP651 HMI products revision BSP UN30 v1.76 and prior implement hidden administrative accounts th…Jan 14, 2020›
CVE-2019-18251HIGH
8.8
In Omron CX-Supervisor, Versions 3.5 (12) and prior, Omron CX-Supervisor ships with Teamviewer Versi…Nov 26, 2019›
CVE-2019-9008HIGH
8.8
An issue was discovered in 3S-Smart CODESYS V3 through 3.5.12.30. A user with low privileges can tak…Sep 17, 2019›
CVE-2019-9013HIGH
8.8
An issue was discovered in 3S-Smart CODESYS V3 products. The application may utilize non-TLS based e…Aug 15, 2019›
CVE-2019-10961HIGH
8.8
In Advantech WebAccess HMI Designer Version 2.1.9.23 and prior, processing specially crafted MCR fil…Aug 2, 2019›
CVE-2018-11427HIGH
8.8
CSRF tokens are not used in the web application of Moxa OnCell G3100-HSPA Series version 1.4 Build 1…Jul 3, 2019›
CVE-2019-7225HIGH
8.8
The ABB HMI components implement hidden administrative accounts that are used during the provisionin…Jun 27, 2019›
CVE-2019-7226HIGH
8.8
The ABB IDAL HTTP server CGI interface contains a URL that allows an unauthenticated attacker to byp…Jun 27, 2019›
CVE-2019-7228HIGH
8.8
The ABB IDAL HTTP server mishandles format strings in a username or cookie during the authentication…Jun 27, 2019›
CVE-2019-7232HIGH
8.8
The ABB IDAL HTTP server is vulnerable to a buffer overflow when a long Host header is sent in a web…Jun 24, 2019›
CVE-2019-7230HIGH
8.8
The ABB IDAL FTP server mishandles format strings in a username during the authentication process. A…Jun 24, 2019›
CVE-2019-12870HIGH
8.8
An issue was discovered in PHOENIX CONTACT PC Worx through 1.86, PC Worx Express through 1.86, and C…Jun 24, 2019›
CVE-2019-12869HIGH
8.8
An issue was discovered in PHOENIX CONTACT PC Worx through 1.86, PC Worx Express through 1.86, and C…Jun 24, 2019›
CVE-2019-12871HIGH
8.8
An issue was discovered in PHOENIX CONTACT PC Worx through 1.86, PC Worx Express through 1.86, and C…Jun 24, 2019›
CVE-2019-6584HIGH
8.8
A vulnerability has been identified in SIEMENS LOGO!8 (6ED1052-xyyxx-0BA8 FS:01 to FS:06 / Firmware …Jun 12, 2019›
CVE-2018-10703HIGH
8.8
An issue was discovered on Moxa AWK-3121 1.14 devices. It provides functionality so that an administ…Jun 7, 2019›
CVE-2018-10702HIGH
8.8
An issue was discovered on Moxa AWK-3121 1.14 devices. It provides functionality so that an administ…Jun 7, 2019›
CVE-2018-10701HIGH
8.8
An issue was discovered on Moxa AWK-3121 1.14 devices. It provides functionality so that an administ…Jun 7, 2019›
CVE-2018-10699HIGH
8.8
An issue was discovered on Moxa AWK-3121 1.14 devices. The Moxa AWK 3121 provides certfile upload fu…Jun 7, 2019›
CVE-2018-10697HIGH
8.8
An issue was discovered on Moxa AWK-3121 1.14 devices. The Moxa AWK 3121 provides ping functionality…Jun 7, 2019›
CVE-2018-10696HIGH
8.8
An issue was discovered on Moxa AWK-3121 1.14 devices. The device provides a web interface to allow …Jun 7, 2019›
CVE-2018-10695HIGH
8.8
An issue was discovered on Moxa AWK-3121 1.14 devices. It provides alert functionality so that an ad…Jun 7, 2019›
CVE-2018-10693HIGH
8.8
An issue was discovered on Moxa AWK-3121 1.14 devices. It provides ping functionality so that an adm…Jun 7, 2019›
CVE-2018-13993HIGH
8.8
The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions 1.0 to 1.34 is prone to CSRF.May 7, 2019›
CVE-2019-9744HIGH
8.8
An issue was discovered on PHOENIX CONTACT FL NAT SMCS 8TX, FL NAT SMN 8TX, FL NAT SMN 8TX-M, and FL…Mar 26, 2019›
CVE-2019-9743HIGH
8.8
An issue was discovered on PHOENIX CONTACT RAD-80211-XD and RAD-80211-XD/HP-BUS devices. Command inj…Mar 26, 2019›
CVE-2015-6458HIGH
8.8
Moxa SoftCMS 1.3 and prior is susceptible to a buffer overflow condition that may crash or allow rem…Mar 21, 2019›
CVE-2015-6457HIGH
8.8
Moxa SoftCMS 1.3 and prior is susceptible to a buffer overflow condition that may crash or allow rem…Mar 21, 2019›
CVE-2019-6561HIGH
8.8
Cross-site request forgery has been identified in Moxa IKS and EDS, which may allow for the executio…Mar 5, 2019›
CVE-2018-19660HIGH
8.8
An exploitable authenticated command-injection vulnerability exists in the web server functionality …Dec 6, 2018›
CVE-2018-19659HIGH
8.8
An exploitable authenticated command-injection vulnerability exists in the web server functionality …Dec 6, 2018›
CVE-2018-15704HIGH
8.8
Advantech WebAccess 8.3.2 and below is vulnerable to a stack buffer overflow vulnerability. A remote…Oct 22, 2018›
CVE-2018-18392HIGH
8.8
Privilege Escalation via Broken Access Control in Moxa ThingsPro IIoT Gateway and Device Management …Oct 19, 2018›
CVE-2018-18391HIGH
8.8
User Privilege Escalation in Moxa ThingsPro IIoT Gateway and Device Management Software Solutions ve…Oct 19, 2018›
CVE-2018-16282HIGH
8.8
A command injection vulnerability in the web server functionality of Moxa EDR-810 V4.2 build 1804101…Sep 20, 2018›
CVE-2018-12980HIGH
8.8
An issue was discovered on WAGO e!DISPLAY 762-3000 through 762-3003 devices with firmware before FW …Jul 12, 2018›
CVE-2018-13793HIGH
8.8
Multiple Cross Site Request Forgery (CSRF) vulnerabilities in the HTTP API in ABBYY FlexiCapture bef…Jul 9, 2018›
CVE-2018-7782HIGH
8.8
In Schneider Electric Pelco Sarix Professional 1st generation cameras with firmware versions prior t…Jul 3, 2018›
CVE-2018-7781HIGH
8.8
In Schneider Electric Pelco Sarix Professional 1st generation cameras with firmware versions prior t…Jul 3, 2018›
CVE-2018-7777HIGH
8.8
The vulnerability is due to insufficient handling of update_file request parameter on update_module.…Jul 3, 2018›
CVE-2018-7774HIGH
8.8
The vulnerability exists within processing of localize.php in Schneider Electric U.motion Builder so…Jul 3, 2018›
CVE-2018-7773HIGH
8.8
The vulnerability exists within processing of nfcserver.php in Schneider Electric U.motion Builder s…Jul 3, 2018›
CVE-2018-7772HIGH
8.8
The vulnerability exists within processing of applets which are exposed on the web service in Schnei…Jul 3, 2018›
CVE-2018-7769HIGH
8.8
The vulnerability exists within processing of xmlserver.php in Schneider Electric U.motion Builder s…Jul 3, 2018›
CVE-2018-7768HIGH
8.8
The vulnerability exists within processing of loadtemplate.php in Schneider Electric U.motion Builde…Jul 3, 2018›
CVE-2018-7767HIGH
8.8
The vulnerability exists within processing of editobject.php in Schneider Electric U.motion Builder …Jul 3, 2018›
CVE-2018-7766HIGH
8.8
The vulnerability exists within processing of track_getdata.php in Schneider Electric U.motion Build…Jul 3, 2018›
CVE-2018-7765HIGH
8.8
The vulnerability exists within processing of track_import_export.php in Schneider Electric U.motion…Jul 3, 2018›
CVE-2018-4845HIGH
8.8
A vulnerability has been identified in RAPIDLab 1200 systems / RAPIDPoint 400 systems / RAPIDPoint 5…Jun 26, 2018›
CVE-2017-7906HIGH
8.8
In ABB IP GATEWAY 3.39 and prior, the web server does not sufficiently verify that a request was per…Jun 6, 2018›
CVE-2017-14434HIGH
8.8
An exploitable command injection vulnerability exists in the web server functionality of Moxa EDR-81…May 14, 2018›
CVE-2017-14433HIGH
8.8
An exploitable command injection vulnerability exists in the web server functionality of Moxa EDR-81…May 14, 2018›
CVE-2017-14432HIGH
8.8
An exploitable command injection vulnerability exists in the web server functionality of Moxa EDR-81…May 14, 2018›
CVE-2017-12126HIGH
8.8
An exploitable cross-site request forgery vulnerability exists in the web server functionality of Mo…May 14, 2018›
CVE-2017-12125HIGH
8.8
An exploitable command injection vulnerability exists in the web server functionality of Moxa EDR-81…May 14, 2018›
CVE-2017-12123HIGH
8.8
An exploitable clear text transmission of password vulnerability exists in the web server and telnet…May 14, 2018›
CVE-2017-12121HIGH
8.8
An exploitable command injection vulnerability exists in the web server functionality of Moxa EDR-81…May 14, 2018›
CVE-2017-12120HIGH
8.8
An exploitable command injection vulnerability exists in the web server functionality of Moxa EDR-81…May 14, 2018›
CVE-2018-7509HIGH
8.8
WPLSoft in Delta Electronics versions 2.45.0 and prior writes data from a file outside the bounds of…May 4, 2018›
CVE-2018-7507HIGH
8.8
WPLSoft in Delta Electronics versions 2.45.0 and prior utilizes a fixed length heap buffer where a v…May 4, 2018›
CVE-2018-7494HIGH
8.8
WPLSoft in Delta Electronics versions 2.45.0 and prior utilizes a fixed length stack buffer where a …May 4, 2018›
CVE-2017-12712HIGH
8.8
The authentication algorithm in Abbott Laboratories pacemakers manufactured prior to Aug 28, 2017, w…Apr 25, 2018›
CVE-2018-7240HIGH
8.8
A vulnerability exists in Schneider Electric's Modicon Quantum in all versions of the communication …Apr 18, 2018›
CVE-2018-7230HIGH
8.8
A XML external entity (XXE) vulnerability exists in the import.cgi of the web interface component of…Mar 9, 2018›
CVE-2017-17888HIGH
8.8
cgi-bin/write.cgi in Anti-Web through 3.8.7, as used on NetBiter / HMS, Ouman EH-net, Alliance Syste…Dec 27, 2017›
CVE-2017-16731HIGH
8.8
An Unprotected Transport of Credentials issue was discovered in ABB Ellipse 8.3 through Ellipse 8.9 …Dec 20, 2017›
CVE-2017-7969HIGH
8.8
A cross-site request forgery vulnerability exists on the Secure Gateway component of Schneider Elect…Sep 26, 2017›
CVE-2017-12704HIGH
8.8
A heap-based buffer overflow issue was discovered in Advantech WebAccess versions prior to V8.2_2017…Aug 30, 2017›
CVE-2017-12702HIGH
8.8
An Externally Controlled Format String issue was discovered in Advantech WebAccess versions prior to…Aug 30, 2017›
CVE-2017-6328HIGH
8.8
The Symantec Messaging Gateway before 10.6.3-267 can encounter an issue of cross site request forger…Aug 11, 2017›
CVE-2017-7966HIGH
8.8
A DLL Hijacking vulnerability in the programming software in Schneider Electric's SoMachine HVAC v2.…Jun 7, 2017›
CVE-2017-7917HIGH
8.8
A Cross-Site Request Forgery issue was discovered in Moxa OnCell G3110-HSPA Version 1.3 build 150821…May 29, 2017›
CVE-2017-5156HIGH
8.8
A Cross-Site Request Forgery issue was discovered in Schneider Electric Wonderware InTouch Access An…Apr 20, 2017›
CVE-2016-8718HIGH
8.8
An exploitable Cross-Site Request Forgery vulnerability exists in the Web Application functionality …Apr 12, 2017›
CVE-2017-5671HIGH
8.8
Honeywell Intermec PM23, PM42, PM43, PC23, PC43, PD43, and PC42 industrial printers before 10.11.013…Mar 29, 2017›
CVE-2017-2689HIGH
8.8
Siemens RUGGEDCOM ROX I (all versions) allow an authenticated user to bypass access restrictions in …Mar 29, 2017›
CVE-2017-2688HIGH
8.8
The integrated web server in Siemens RUGGEDCOM ROX I (all versions) at port 10000/TCP could allow re…Mar 29, 2017›
CVE-2017-2682HIGH
8.8
The Siemens web application RUGGEDCOM NMS < V1.2 on port 8080/TCP and 8081/TCP could allow a remote …Feb 27, 2017›
CVE-2016-9365HIGH
8.8
An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions pr…Feb 13, 2017›
CVE-2016-5809HIGH
8.8
An issue was discovered on Schneider Electric IONXXXX series power meters ION73XX series, ION75XX se…Feb 13, 2017›
CVE-2016-5793HIGH
8.8
Unquoted Windows search path vulnerability in Moxa Active OPC Server before 2.4.19 allows local user…Sep 24, 2016›
CVE-2016-2285HIGH
8.8
Cross-site request forgery (CSRF) vulnerability on Moxa MiiNePort_E1_4641 devices with firmware 1.1.…May 31, 2016›
CVE-2015-3946HIGH
8.8
Cross-site request forgery (CSRF) vulnerability in Advantech WebAccess before 8.1 allows remote atta…Jan 15, 2016›
CVE-2025-53418HIGH
8.6
Delta Electronics COMMGR has Stack-based Buffer Overflow vulnerability.Aug 26, 2025›
CVE-2025-2521HIGH
8.6
The Honeywell Experion PKS and OneWireless WDM contains a Memory Buffer vulnerability in the compone…Jul 10, 2025›
CVE-2024-3493HIGH
8.6
A specific malformed fragmented packet type (fragmented packets may be generated automatically by d…Apr 15, 2024›
CVE-2024-21916HIGH
8.6
A denial-of-service vulnerability exists in specific Rockwell Automation ControlLogix ang GuardLogi…Jan 31, 2024›
CVE-2022-45790HIGH
8.6
The Omron FINS protocol has an authenticated feature to prevent access to memory regions. Authentica…Jan 22, 2024›
CVE-2023-2423HIGH
8.6
A vulnerability was discovered in the Rockwell Automation Armor PowerFlex device when the product s…Aug 8, 2023›
CVE-2023-0426HIGH
8.6
ABB is aware of vulnerabilities in the product versions listed below. An update is available that r…Aug 7, 2023›
CVE-2023-0425HIGH
8.6
ABB is aware of vulnerabilities in the product versions listed below. An update is available that r…Aug 7, 2023›
CVE-2022-3752HIGH
8.6
An unauthorized user could use a specially crafted sequence of Ethernet/IP messages, combined with h…Dec 19, 2022›
CVE-2022-3157HIGH
8.6
A vulnerability exists in the Rockwell Automation controllers that allows a malformed CIP request t…Dec 16, 2022›
CVE-2022-40265HIGH
8.6
Improper Input Validation vulnerability in Mitsubishi Electric Corporation MELSEC iQ-R Series RJ71EN…Nov 30, 2022›
CVE-2022-25164HIGH
8.6
Cleartext Storage of Sensitive Information vulnerability in Mitsubishi Electric GX Works3 versions f…Nov 25, 2022›
CVE-2022-2465HIGH
8.6
Rockwell Automation ISaGRAF Workbench software versions 6.0 through 6.6.9 are affected by a Deserial…Aug 25, 2022›
CVE-2022-25161HIGH
8.6
Improper Input Validation vulnerability in Mitsubishi Electric MELSEC iQ-F series FX5U-xMy/z(x=32,64…May 18, 2022›
CVE-2021-22275HIGH
8.6
Buffer Overflow vulnerability in B&R Automation Runtime webserver allows an unauthenticated network-…May 13, 2022›
CVE-2021-27475HIGH
8.6
Rockwell Automation Connected Components Workbench v12.00.00 and prior does not limit the objects th…Mar 23, 2022›
CVE-2021-33012HIGH
8.6
Rockwell Automation MicroLogix 1100, all versions, allows a remote, unauthenticated attacker sending…Jul 9, 2021›
CVE-2021-22659HIGH
8.6
Rockwell Automation MicroLogix 1400 Version 21.6 and below may allow a remote unauthenticated attack…Mar 25, 2021›
CVE-2020-24685HIGH
8.6
An unauthenticated specially crafted packet sent by an attacker over the network will cause a denial…Feb 9, 2021›
CVE-2019-13538HIGH
8.6
3S-Smart Software Solutions GmbH CODESYS V3 Library Manager, all versions prior to 3.5.16.0, allows …Sep 17, 2019›
CVE-2018-13990HIGH
8.6
The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions prior to 1.35 is vulnerable to brut…May 6, 2019›
CVE-2018-17924HIGH
8.6
Rockwell Automation MicroLogix 1400 Controllers and 1756 ControlLogix Communications Modules An unau…Dec 7, 2018›
CVE-2017-9627HIGH
8.6
An Uncontrolled Resource Consumption issue was discovered in Schneider Electric Wonderware ArchestrA…Jul 7, 2017›
CVE-2017-7901HIGH
8.6
A Predictable Value Range from Previous Values issue was discovered in Rockwell Automation Allen-Bra…Jun 30, 2017›
CVE-2017-7914HIGH
8.6
A Missing Authorization issue was discovered in Rockwell Automation PanelView Plus 6 700-1500 6.00.0…Jun 14, 2017›
CVE-2017-5143HIGH
8.6
An issue was discovered in Honeywell XL Web II controller XL1000C500 XLWebExe-2-01-00 and prior, and…Feb 13, 2017›
CVE-2016-8368HIGH
8.6
An issue was discovered in Mitsubishi Electric Automation MELSEC-Q series Ethernet interface modules…Feb 13, 2017›
CVE-2016-5814HIGH
8.6
Buffer overflow in Rockwell Automation RSLogix Micro Starter Lite, RSLogix Micro Developer, RSLogix …Sep 19, 2016›
CVE-2015-7907HIGH
8.6
Directory traversal vulnerability in the web server on Honeywell Midas gas detectors before 1.13b3 a…Dec 21, 2015›
CVE-2024-5650HIGH
8.5
DLL Hijacking vulnerability has been found in CENTUM CAMS Log server provided by Yokogawa Electric C…Jun 17, 2024›
CVE-2021-32960HIGH
8.5
Rockwell Automation FactoryTalk Services Platform v6.11 and earlier, if FactoryTalk Security is enab…Apr 1, 2022›
CVE-2015-6464HIGH
8.5
The administrative web interface on Moxa EDS-405A and EDS-408A switches with firmware before 3.6 all…Sep 11, 2015›
CVE-2013-0664HIGH
8.5
The FactoryCast service on the Schneider Electric Quantum 140NOE77111 and 140NWM10000, M340 BMXNOE01…Apr 4, 2013›
CVE-2012-6439HIGH
8.5
When an affected product receives a valid CIP message from an unauthorized or unintended source to…Jan 24, 2013›
CVE-2012-3009HIGH
8.5
Siemens COMOS before 9.1 Patch 413, 9.2 before Update 03 Patch 023, and 10.0 before Patch 005 allows…Aug 16, 2012›
CVE-2011-4879HIGH
8.5
miniweb.exe in the HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2008 before SP3; W…Feb 3, 2012›
CVE-2025-13779HIGH
8.3
Missing authentication for critical function vulnerability in ABB AWIN GW100 rev.2, ABB AWIN GW120.T…Mar 13, 2026›
CVE-2025-13777HIGH
8.3
Authentication bypass by capture-replay vulnerability in ABB AWIN GW100 rev.2, ABB AWIN GW120.This i…Mar 13, 2026›
CVE-2025-41659HIGH
8.3
A low-privileged attacker can remotely access the PKI folder of the CODESYS Control runtime system a…Aug 4, 2025›
CVE-2024-0220HIGH
8.3
B&R Automation Studio Upgrade Service and B&R Technology Guarding use insufficient cryptography for …Feb 22, 2024›
CVE-2021-22289HIGH
8.3
Improper Input Validation vulnerability in the project upload mechanism in B&R Automation Studio ver…Aug 11, 2022›
CVE-2020-14496HIGH
8.3
Successful exploitation of this vulnerability for multiple Mitsubishi Electric Factory Automation En…May 19, 2022›
CVE-2020-14523HIGH
8.3
Multiple Mitsubishi Electric Factory Automation products have a vulnerability that allows an attacke…Feb 11, 2022›
CVE-2020-14521HIGH
8.3
Multiple Mitsubishi Electric Factory Automation engineering software products have a malicious code …Feb 11, 2022›
CVE-2019-7229HIGH
8.3
The ABB CP635 HMI uses two different transmission methods to upgrade its firmware and its software c…Jun 24, 2019›
CVE-2015-6481HIGH
8.3
The login function in the RequestController class in Moxa OnCell Central Manager before 2.2 has a ha…Dec 21, 2015›
CVE-2015-6480HIGH
8.3
The MessageBrokerServlet servlet in Moxa OnCell Central Manager before 2.2 does not require authenti…Dec 21, 2015›
CVE-2014-3888HIGH
8.3
Stack-based buffer overflow in BKFSim_vhfd.exe in Yokogawa CENTUM CS 1000, CENTUM CS 3000 R3.09.50 a…Jul 10, 2014›
CVE-2014-0782HIGH
8.3
Stack-based buffer overflow in BKESimmgr.exe in the Expanded Test Functions package in Yokogawa CENT…May 16, 2014›
CVE-2014-2250HIGH
8.3
The random-number generator on Siemens SIMATIC S7-1200 CPU PLC devices with firmware before 4.0 does…Mar 24, 2014›
CVE-2014-2251HIGH
8.3
The random-number generator on Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 do…Mar 16, 2014›
CVE-2014-0784HIGH
8.3
Stack-based buffer overflow in BKBCopyD.exe in Yokogawa CENTUM CS 3000 R3.09.50 and earlier allows r…Mar 14, 2014›
CVE-2013-6925HIGH
8.3
The integrated HTTPS server in Siemens RuggedCom ROS before 3.12.2 allows remote attackers to hijack…Dec 17, 2013›
CVE-2013-5709HIGH
8.3
The authentication implementation in the web server on Siemens SCALANCE X-200 switches with firmware…Sep 17, 2013›
CVE-2025-1924HIGH
8.2
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporatio…Feb 13, 2026›
CVE-2025-11774HIGH
8.2
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerabi…Dec 19, 2025›
CVE-2025-3947HIGH
8.2
The Honeywell Experion PKS contains an Integer Underflow vulnerability in the component Control …Jul 10, 2025›
CVE-2025-3946HIGH
8.2
The Honeywell Experion PKS and OneWireless WDM contains a Deployment of Wrong Handler vulnera…Jul 10, 2025›
CVE-2024-51544HIGH
8.2
Service Control vulnerabilities allow access to service restart requests and vm configuration settin…Dec 5, 2024›
CVE-2024-51543HIGH
8.2
Information Disclosure vulnerabilities allow access to application configuration information.  Affec…Dec 5, 2024›
CVE-2024-51542HIGH
8.2
Configuration Download vulnerabilities allow access to dependency configuration information.  Affect…Dec 5, 2024›
CVE-2024-51541HIGH
8.2
Local File Inclusion vulnerabilities allow access to sensitive system information.  Affected product…Dec 5, 2024›
CVE-2024-48847HIGH
8.2
MD5 Checksum Bypass vulnerabilities where found exploiting a weakness in the way an application depe…Dec 5, 2024›
CVE-2024-1220HIGH
8.2
A stack-based buffer overflow in the built-in web server in Moxa NPort W2150A/W2250A Series firmware…Mar 6, 2024›
CVE-2023-5131HIGH
8.2
A heap buffer-overflow exists in Delta Electronics ISPSoft. An anonymous attacker can exploit this v…Jan 18, 2024›
CVE-2023-5130HIGH
8.2
A buffer overflow vulnerability exists in Delta Electronics WPLSoft. An anonymous attacker can explo…Jan 18, 2024›
CVE-2023-29464HIGH
8.2
FactoryTalk Linx, in the Rockwell Automation PanelView Plus, allows an unauthenticated threat actor…Oct 13, 2023›
CVE-2023-37862HIGH
8.2
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 an unauthenticated remote …Aug 9, 2023›
CVE-2021-34567HIGH
8.2
In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a special…Nov 9, 2022›
CVE-2022-2044HIGH
8.2
MOXA NPort 5110: Firmware Versions 2.10 is vulnerable to an out-of-bounds write that may allow an at…Aug 31, 2022›
CVE-2022-33319HIGH
8.2
Out-of-bounds Read vulnerability in Mitsubishi Electric GENESIS64 versions 10.97 to 10.97.1, Mitsubi…Jul 20, 2022›
CVE-2021-20595HIGH
8.2
Improper Restriction of XML External Entity Reference vulnerability in Mitsubishi Electric Air Condi…Jul 13, 2021›
CVE-2020-12505HIGH
8.2
Improper Authentication vulnerability in WAGO 750-8XX series with FW version <= FW07 allows an attac…Sep 30, 2020›
CVE-2020-12499HIGH
8.2
In PHOENIX CONTACT PLCnext Engineer version 2020.3.1 and earlier an improper path sanitation vulnera…Jul 21, 2020›
CVE-2019-18352HIGH
8.2
Improper access control exists on PHOENIX CONTACT FL NAT 2208 devices before V2.90 and FL NAT 2304-2…Feb 18, 2020›
CVE-2018-13992HIGH
8.2
The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions 1.0 to 1.34 allows for plaintext tr…May 7, 2019›
CVE-2017-12069HIGH
8.2
An XXE vulnerability has been identified in OPC Foundation UA .NET Sample Code before 2017-03-21 and…Aug 30, 2017›
CVE-2017-2683HIGH
8.2
A non-privileged user of the Siemens web application RUGGEDCOM NMS < V1.2 on port 8080/TCP and 8081/…Feb 27, 2017›
CVE-2025-14510HIGH
8.1
Incorrect Implementation of Authentication Algorithm vulnerability in ABB ABB Ability OPTIMAX.This i…Jan 16, 2026›
CVE-2025-14850HIGH
8.1
Advantech WebAccess/SCADA is vulnerable to directory traversal, which may allow an attacker to delet…Dec 18, 2025›
CVE-2023-5404HIGH
8.1
Server receiving a malformed message can cause a pointer to be overwritten which can result in a rem…Apr 17, 2024›
CVE-2023-5403HIGH
8.1
Server hostname translation to IP address manipulation which could lead to an attacker performing re…Apr 17, 2024›
CVE-2023-5401HIGH
8.1
Server receiving a malformed message based on a using the specified key values can cause a stack ove…Apr 17, 2024›
CVE-2023-5400HIGH
8.1
Server receiving a malformed message based on a using the specified key values can cause a heap over…Apr 17, 2024›
CVE-2023-5397HIGH
8.1
Server receiving a malformed message to create a new connection could lead to an attacker performing…Apr 17, 2024›
CVE-2023-5395HIGH
8.1
Server receiving a malformed message that uses the hostname in an internal table may cause a stack o…Apr 17, 2024›
CVE-2023-1841HIGH
8.1
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability i…Feb 29, 2024›
CVE-2022-38742HIGH
8.1
Rockwell Automation ThinManager ThinServer versions 11.0.0 - 13.0.0 is vulnerable to a heap-based bu…Sep 23, 2022›
CVE-2022-34838HIGH
8.1
Storing Passwords in a Recoverable Format vulnerability in ABB Zenon 8.20 allows an attacker who suc…Aug 24, 2022›
CVE-2022-0902HIGH
8.1
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Improper Neutralizat…Jul 21, 2022›
CVE-2022-32142HIGH
8.1
Multiple CODESYS Products are prone to a out-of bounds read or write access. A low privileged remote…Jun 24, 2022›
CVE-2022-1965HIGH
8.1
Multiple products of CODESYS implement a improper error handling. A low privilege remote attacker ma…Jun 24, 2022›
CVE-2022-22515HIGH
8.1
A remote, authenticated attacker could utilize the control program of the CODESYS Control runtime sy…Apr 7, 2022›
CVE-2022-25159HIGH
8.1
Authentication Bypass by Capture-replay vulnerability in Mitsubishi Electric MELSEC iQ-F series FX5U…Apr 1, 2022›
CVE-2022-25156HIGH
8.1
Use of Weak Hash vulnerability in Mitsubishi Electric MELSEC iQ-F series FX5U(C) CPU all versions, M…Apr 1, 2022›
CVE-2022-25155HIGH
8.1
Use of Password Hash Instead of Password for Authentication vulnerability in Mitsubishi Electric MEL…Apr 1, 2022›
CVE-2022-22151HIGH
8.1
CAMS for HIS Log Server contained in the following Yokogawa Electric products fails to properly neut…Mar 11, 2022›
CVE-2022-22145HIGH
8.1
CAMS for HIS Log Server contained in the following Yokogawa Electric products is vulnerable to uncon…Mar 11, 2022›
CVE-2022-21177HIGH
8.1
There is a path traversal vulnerability in CAMS for HIS Log Server contained in the following Yokoga…Mar 11, 2022›
CVE-2021-34595HIGH
8.1
A crafted request with invalid offsets may cause an out-of-bounds read or write access in CODESYS V2…Oct 26, 2021›
CVE-2019-13533HIGH
8.1
In Omron PLC CJ series, all versions, and Omron PLC CS series, all versions, an attacker could monit…Dec 16, 2019›
CVE-2018-10694HIGH
8.1
An issue was discovered on Moxa AWK-3121 1.14 devices. The device provides a Wi-Fi connection that i…Jun 7, 2019›
CVE-2018-10690HIGH
8.1
An issue was discovered on Moxa AWK-3121 1.14 devices. The device by default allows HTTP traffic thu…Jun 7, 2019›
CVE-2018-19616HIGH
8.1
An issue was discovered in Rockwell Automation Allen-Bradley PowerMonitor 1000. An unauthenticated u…Dec 26, 2018›
CVE-2018-17896HIGH
8.1
Yokogawa STARDOM Controllers FCJ, FCN-100, FCN-RTU, FCN-500, All versions R4.10 and prior, The affec…Oct 12, 2018›
CVE-2018-10728HIGH
8.1
All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33…May 17, 2018›
CVE-2018-8872HIGH
8.1
In Schneider Electric Triconex Tricon MP model 3008 firmware versions 10.0-10.4, system calls read d…May 4, 2018›
CVE-2014-8422HIGH
8.1
The web-based management (WBM) interface in Unify (former Siemens) OpenStage SIP and OpenScape Desk …Apr 12, 2018›
CVE-2018-7236HIGH
8.1
A vulnerability exists in Schneider Electric's Pelco Sarix Professional in all firmware versions pri…Mar 9, 2018›
CVE-2017-9963HIGH
8.1
A cross-site request forgery vulnerability exists on the Secure Gateway component of Schneider Elect…Feb 12, 2018›
CVE-2017-14263HIGH
8.1
Honeywell NVR devices allow remote attackers to create a user account in the admin group by leveragi…Sep 11, 2017›
CVE-2017-9940HIGH
8.1
A vulnerability was discovered in Siemens SiPass integrated (All versions before V2.70) that could a…Aug 8, 2017›
CVE-2017-6868HIGH
8.1
An Improper Authentication issue was discovered in Siemens SIMATIC CP 44x-1 RNA, all versions prior …Jul 7, 2017›
CVE-2016-8712HIGH
8.1
An exploitable nonce reuse vulnerability exists in the Web Application functionality of Moxa AWK-313…Apr 13, 2017›
CVE-2016-8379HIGH
8.1
An issue was discovered in Moxa ioLogik E1210, firmware Version V2.4 and prior, ioLogik E1211, firmw…Feb 13, 2017›
CVE-2016-8372HIGH
8.1
An issue was discovered in Moxa ioLogik E1210, firmware Version V2.4 and prior, ioLogik E1211, firmw…Feb 13, 2017›
CVE-2016-8360HIGH
8.1
An issue was discovered in Moxa SoftCMS versions prior to Version 1.6. A specially crafted URL reque…Feb 13, 2017›
CVE-2016-9160HIGH
8.1
A vulnerability in SIEMENS SIMATIC WinCC (All versions < SIMATIC WinCC V7.2) and SIEMENS SIMATIC PCS…Dec 17, 2016›
CVE-2016-0858HIGH
8.1
Race condition in Advantech WebAccess before 8.1 allows remote attackers to execute arbitrary code o…Jan 15, 2016›
CVE-2015-6467HIGH
8.1
Advantech WebAccess before 8.1 allows remote attackers to execute arbitrary code via vectors involvi…Jan 15, 2016›
CVE-2015-3947HIGH
8.1
SQL injection vulnerability in Advantech WebAccess before 8.1 allows remote authenticated users to e…Jan 15, 2016›
CVE-2021-22291HIGH
8.0
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerab…Oct 7, 2025›
CVE-2024-39275HIGH
8.0
Cookies of authenticated Advantech ADAM-5630 users remain as active valid cookies when a session is…Sep 27, 2024›
CVE-2024-28948HIGH
8.0
Advantech ADAM-5630 contains a cross-site request forgery (CSRF) vulnerability. It allows an attacke…Sep 27, 2024›
CVE-2022-30244HIGH
8.0
Honeywell Alerton Ascent Control Module (ACM) through 2022-05-04 allows unauthenticated programming …Jul 15, 2022›
CVE-2018-7771HIGH
8.0
The vulnerability exists within processing of editscript.php in Schneider Electric U.motion Builder …Jul 3, 2018›
CVE-2017-12129HIGH
8.0
An exploitable Weak Cryptography for Passwords vulnerability exists in the web server functionality …May 14, 2018›
CVE-2013-6926HIGH
8.0
The integrated HTTPS server in Siemens RuggedCom ROS before 3.12.2 allows remote authenticated users…Dec 17, 2013›
CVE-2026-3094HIGH
7.8
Delta Electronics CNCSoft-G2 lacks proper validation of the user-supplied file. If a user opens a ma…Mar 4, 2026›
CVE-2026-0975HIGH
7.8
Delta Electronics DIAView has Command Injection vulnerability.Jan 16, 2026›
CVE-2025-14252HIGH
7.8
An Improper Access Control vulnerability in Advantech SUSI driver (susi.sys) allows attackers to rea…Dec 16, 2025›
CVE-2025-41700HIGH
7.8
An unauthenticated attacker can trick a local user into executing arbitrary code by opening a delibe…Dec 1, 2025›
CVE-2025-40827HIGH
7.8
A vulnerability has been identified in Siemens Software Center (All versions < V3.5), Solid Edge SE2…Nov 11, 2025›
CVE-2025-9068HIGH
7.8
A security issue exists within the Rockwell Automation Driver Package x64 Microsoft Installer File (…Oct 14, 2025›
CVE-2025-59300HIGH
7.8
Delta Electronics DIAScreen lacks proper validation of the user-supplied file. If a user opens a mal…Oct 3, 2025›
CVE-2025-59299HIGH
7.8
Delta Electronics DIAScreen lacks proper validation of the user-supplied file. If a user opens a mal…Oct 3, 2025›
CVE-2025-59298HIGH
7.8
Delta Electronics DIAScreen lacks proper validation of the user-supplied file. If a user opens a mal…Oct 3, 2025›
CVE-2025-59297HIGH
7.8
Delta Electronics DIAScreen lacks proper validation of the user-supplied file. If a user opens a mal…Oct 3, 2025›
CVE-2025-58319HIGH
7.8
Delta Electronics CNCSoft-G2 lacks proper validation of the user-supplied file. If a user opens a ma…Sep 24, 2025›
CVE-2025-58317HIGH
7.8
Delta Electronics CNCSoft-G2 lacks proper validation of the user-supplied file. If a user opens a ma…Sep 24, 2025›
CVE-2025-53419HIGH
7.8
Delta Electronics COMMGR has Code Injection vulnerability.Aug 26, 2025›
CVE-2025-7033HIGH
7.8
A memory abuse issue exists in the Rockwell Automation Arena® Simulation. A custom file can force Ar…Aug 5, 2025›
CVE-2025-7032HIGH
7.8
A memory abuse issue exists in the Rockwell Automation Arena® Simulation. A custom file can force Ar…Aug 5, 2025›
CVE-2025-7025HIGH
7.8
A memory abuse issue exists in the Rockwell Automation Arena® Simulation. A custom file can force Ar…Aug 5, 2025›
CVE-2025-6377HIGH
7.8
A remote code execution security issue exists in the Rockwell Automation Arena®.  A crafted DOE file…Jul 9, 2025›
CVE-2025-6376HIGH
7.8
A remote code execution security issue exists in the Rockwell Automation Arena®.  A crafted DOE file…Jul 9, 2025›
CVE-2025-53416HIGH
7.8
Delta Electronics DTN Soft Project File Parsing Deserialization of Untrusted Data Remote Code Execut…Jun 30, 2025›
CVE-2025-53415HIGH
7.8
Delta Electronics DTM Soft Project File Parsing Deserialization of Untrusted Data Remote Code Execut…Jun 30, 2025›
CVE-2025-3394HIGH
7.8
Incorrect Permission Assignment for Critical Resource vulnerability in ABB Automation Builder.This i…Apr 30, 2025›
CVE-2025-4125HIGH
7.8
Delta Electronics ISPSoft version 3.20 is vulnerable to an Out-Of-Bounds Write vulnerability that co…Apr 30, 2025›
CVE-2025-4124HIGH
7.8
Delta Electronics ISPSoft version 3.20 is vulnerable to an Out-Of-Bounds Write vulnerability that co…Apr 30, 2025›
CVE-2025-22884HIGH
7.8
Delta Electronics ISPSoft version 3.20 is vulnerable to a Stack-Based buffer overflow vulnerability …Apr 30, 2025›
CVE-2025-22883HIGH
7.8
Delta Electronics ISPSoft version 3.20 is vulnerable to an Out-Of-Bounds Write vulnerability that co…Apr 30, 2025›
CVE-2025-22882HIGH
7.8
Delta Electronics ISPSoft version 3.20 is vulnerable to a Stack-Based buffer overflow vulnerability …Apr 30, 2025›
CVE-2025-3617HIGH
7.8
A privilege escalation vulnerability exists in the Rockwell Automation ThinManager. When the softwar…Apr 15, 2025›
CVE-2025-3289HIGH
7.8
A local code execution vulnerability exists in the Rockwell Automation Arena® due to a stack-based m…Apr 8, 2025›
CVE-2025-3288HIGH
7.8
A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor …Apr 8, 2025›
CVE-2025-3287HIGH
7.8
A local code execution vulnerability exists in the Rockwell Automation Arena® due to a stack-based m…Apr 8, 2025›
CVE-2025-3286HIGH
7.8
A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor …Apr 8, 2025›
CVE-2025-3285HIGH
7.8
A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor …Apr 8, 2025›
CVE-2025-2829HIGH
7.8
A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor …Apr 8, 2025›
CVE-2025-2293HIGH
7.8
A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor …Apr 8, 2025›
CVE-2025-2288HIGH
7.8
A local code execution vulnerability exists in the Rockwell Automation Arena® due to a threat actor …Apr 8, 2025›
CVE-2025-2287HIGH
7.8
A local code execution vulnerability exists in the Rockwell Automation Arena®  due to an uninitializ…Apr 8, 2025›
CVE-2025-2286HIGH
7.8
A local code execution vulnerability exists in the Rockwell Automation Arena®  due to an uninitializ…Apr 8, 2025›
CVE-2025-2285HIGH
7.8
A local code execution vulnerability exists in the Rockwell Automation Arena®  due to an uninitializ…Apr 8, 2025›
CVE-2025-22881HIGH
7.8
Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to co…Feb 26, 2025›
CVE-2025-22880HIGH
7.8
Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to co…Feb 7, 2025›
CVE-2024-12836HIGH
7.8
Delta Electronics DRASimuCAD STP File Parsing Type Confusion Remote Code Execution Vulnerability. Th…Dec 30, 2024›
CVE-2024-12835HIGH
7.8
Delta Electronics DRASimuCAD ICS File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerabilit…Dec 30, 2024›
CVE-2024-12834HIGH
7.8
Delta Electronics DRASimuCAD STP File Parsing Type Confusion Remote Code Execution Vulnerability. Th…Dec 30, 2024›
CVE-2024-12677HIGH
7.8
Delta Electronics DTM Soft deserializes objects, which could allow an attacker to execute arbitrary …Dec 20, 2024›
CVE-2024-12175HIGH
7.8
Another “use after free” code execution vulnerability exists in the Rockwell Automation Arena® that …Dec 19, 2024›
CVE-2024-12130HIGH
7.8
An “out of bounds read” code execution vulnerability exists in the Rockwell Automation Arena® that…Dec 5, 2024›
CVE-2024-11156HIGH
7.8
An “out of bounds write” code execution vulnerability exists in the Rockwell Automation Arena® t…Dec 5, 2024›
CVE-2024-11155HIGH
7.8
A “use after free” code execution vulnerability exists in the Rockwell Automation Arena® that could…Dec 5, 2024›
CVE-2024-9852HIGH
7.8
Uncontrolled Search Path Element vulnerability in Mitsubishi Electric GENESIS64 all versions, Mitsub…Nov 28, 2024›
CVE-2024-8299HIGH
7.8
Uncontrolled Search Path Element vulnerability in Mitsubishi Electric GENESIS64 all versions, Mitsub…Nov 28, 2024›
CVE-2024-47131HIGH
7.8
If an attacker tricks a valid user into running Delta Electronics DIAScreen with a file containing m…Nov 11, 2024›
CVE-2024-39605HIGH
7.8
If an attacker tricks a valid user into running Delta Electronics DIAScreen with a file containing m…Nov 11, 2024›
CVE-2024-39354HIGH
7.8
If an attacker tricks a valid user into running Delta Electronics DIAScreen with a file containing m…Nov 11, 2024›
CVE-2024-7587HIGH
7.8
Incorrect Default Permissions vulnerability in GenBroker32, which is included in the installers for …Oct 22, 2024›
CVE-2024-47966HIGH
7.8
Delta Electronics CNCSoft-G2 lacks proper initialization of memory prior to accessing it. An attacke…Oct 10, 2024›
CVE-2024-47965HIGH
7.8
Delta Electronics CNCSoft-G2 lacks proper validation of user-supplied data, which can result in a re…Oct 10, 2024›
CVE-2024-47964HIGH
7.8
Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to co…Oct 10, 2024›
CVE-2024-47963HIGH
7.8
Delta Electronics CNCSoft-G2 lacks proper validation of user-supplied data, which can result in a wr…Oct 10, 2024›
CVE-2024-47962HIGH
7.8
Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to co…Oct 10, 2024›
CVE-2024-7987HIGH
7.8
A remote code execution vulnerability exists in the Rockwell Automation ThinManager® ThinServer™ tha…Aug 26, 2024›
CVE-2024-7502HIGH
7.8
A crafted DPA file could force Delta Electronics DIAScreen to overflow a stack-based buffer, which c…Aug 6, 2024›
CVE-2024-5402HIGH
7.8
Unquoted Search Path or Element vulnerability in ABB Mint Workbench. A local attacker who success…Jul 15, 2024›
CVE-2024-39880HIGH
7.8
Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to co…Jul 9, 2024›
CVE-2021-47302HIGH
7.8
In the Linux kernel, the following vulnerability has been resolved: igc: Fix use-after-free error d…May 21, 2024›
CVE-2024-4192HIGH
7.8
Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to c…Apr 30, 2024›
CVE-2024-2929HIGH
7.8
A memory corruption vulnerability in Rockwell Automation Arena Simulation software could potentiall…Mar 26, 2024›
CVE-2024-21919HIGH
7.8
An uninitialized pointer in Rockwell Automation Arena Simulation software could potentially allow a…Mar 26, 2024›
CVE-2024-21918HIGH
7.8
A memory buffer vulnerability in Rockwell Automation Arena Simulation software could potentially al…Mar 26, 2024›
CVE-2024-21913HIGH
7.8
A heap-based memory buffer overflow vulnerability in Rockwell Automation Arena Simulation software …Mar 26, 2024›
CVE-2024-21912HIGH
7.8
An arbitrary code execution vulnerability in Rockwell Automation Arena Simulation could let a malic…Mar 26, 2024›
CVE-2024-1941HIGH
7.8
Delta Electronics CNCSoft-B versions 1.0.0.4 and prior are vulnerable to a stack-based buffer overf…Mar 1, 2024›
CVE-2024-1595HIGH
7.8
Delta Electronics CNCSoft-B DOPSoft prior to v4.0.0.82 insecurely loads libraries, which may allow…Feb 29, 2024›
CVE-2022-48626HIGH
7.8
In the Linux kernel, the following vulnerability has been resolved: moxart: fix potential use-after…Feb 26, 2024›
CVE-2023-5944HIGH
7.8
Delta Electronics DOPSoft is vulnerable to a stack-based buffer overflow, which may allow for arbit…Dec 4, 2023›
CVE-2023-5247HIGH
7.8
Malicious Code Execution Vulnerability due to External Control of File Name or Path in multiple Mits…Nov 30, 2023›
CVE-2023-6179HIGH
7.8
Honeywell ProWatch, 4.5, including all Service Pack versions, contain a Vulnerability in Application…Nov 17, 2023›
CVE-2023-27858HIGH
7.8
Rockwell Automation Arena Simulation contains an arbitrary code execution vulnerability that could …Oct 27, 2023›
CVE-2023-27854HIGH
7.8
An arbitrary code execution vulnerability was reported to Rockwell Automation in Arena Simulation t…Oct 27, 2023›
CVE-2023-5068HIGH
7.8
Delta Electronics DIAScreen may write past the end of an allocated buffer while parsing a specially…Sep 21, 2023›
CVE-2023-4685HIGH
7.8
Delta Electronics' CNCSoft-B version 1.0.0.4 and DOPSoft versions 4.0.0.82 and prior are vulnerable …Sep 7, 2023›
CVE-2021-41544HIGH
7.8
A vulnerability has been identified in Siemens Software Center (All versions < V3.0). A DLL Hijackin…Aug 8, 2023›
CVE-2023-25177HIGH
7.8
Delta Electronics' CNCSoft-B DOPSoft versions 1.0.0.4 and prior are vulnerable to stack-based buff…Jun 7, 2023›
CVE-2023-24014HIGH
7.8
Delta Electronics' CNCSoft-B DOPSoft versions 1.0.0.4 and prior are vulnerable to heap-based buffer…Jun 7, 2023›
CVE-2023-0635HIGH
7.8
Improper Privilege Management vulnerability in ABB Ltd. ASPECT®-Enterprise on ASPECT®-Enterprise, Li…Jun 5, 2023›
CVE-2022-0010HIGH
7.8
Insertion of Sensitive Information into Log File vulnerability in ABB QCS 800xA, ABB QCS AC450, ABB …May 22, 2023›
CVE-2023-29462HIGH
7.8
An arbitrary code execution vulnerability contained in Rockwell Automation's Arena Simulation softwa…May 9, 2023›
CVE-2023-29461HIGH
7.8
An arbitrary code execution vulnerability contained in Rockwell Automation's Arena Simulation softwa…May 9, 2023›
CVE-2023-29460HIGH
7.8
An arbitrary code execution vulnerability contained in Rockwell Automation's Arena Simulation softwa…May 9, 2023›
CVE-2023-26593HIGH
7.8
CENTUM series provided by Yokogawa Electric Corporation are vulnerable to cleartext storage of sensi…Apr 11, 2023›
CVE-2023-1145HIGH
7.8
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 are affected by a deserial…Mar 27, 2023›
CVE-2023-1135HIGH
7.8
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an a…Mar 27, 2023›
CVE-2023-0598HIGH
7.8
GE Digital Proficy iFIX 2022, GE Digital Proficy iFIX v6.1, and GE Digital Proficy iFIX v6.5 are vu…Mar 16, 2023›
CVE-2023-0251HIGH
7.8
Delta Electronics DIAScreen versions 1.2.1.23 and prior are vulnerable to a buffer overflow through …Feb 8, 2023›
CVE-2023-0250HIGH
7.8
Delta Electronics DIAScreen versions 1.2.1.23 and prior are vulnerable to a stack-based buffer overf…Feb 8, 2023›
CVE-2023-0249HIGH
7.8
Delta Electronics DIAScreen versions 1.2.1.23 and prior are vulnerable to out-of-bounds write, which…Feb 8, 2023›
CVE-2023-0124HIGH
7.8
Delta Electronics DOPSoft versions 4.00.16.22 and prior are vulnerable to an out-of-bounds write, wh…Feb 3, 2023›
CVE-2023-0123HIGH
7.8
Delta Electronics DOPSoft versions 4.00.16.22 and prior are vulnerable to a stack-based buffer overf…Feb 3, 2023›
CVE-2022-42973HIGH
7.8
A CWE-798: Use of Hard-coded Credentials vulnerability exists that could cause local privilege escal…Feb 1, 2023›
CVE-2022-42972HIGH
7.8
A CWE-732: Incorrect Permission Assignment for Critical Resource vulnerability exists that could cau…Feb 1, 2023›
CVE-2022-3156HIGH
7.8
A remote code execution vulnerability exists in Rockwell Automation Studio 5000 Logix Emulate softwa…Dec 27, 2022›
CVE-2020-12069HIGH
7.8
In CODESYS V3 products in all versions prior V3.5.16.0 containing the CmpUserMgr, the CODESYS Contro…Dec 26, 2022›
CVE-2022-3088HIGH
7.8
UC-8100A-ME-T System Image: Versions v1.0 to v1.6, UC-2100 System Image: Versions v1.0 to v1.12, UC-…Nov 28, 2022›
CVE-2022-3737HIGH
7.8
In PHOENIX CONTACT Automationworx Software Suite up to version 1.89 memory can be read beyond the in…Nov 15, 2022›
CVE-2022-3461HIGH
7.8
In PHOENIX CONTACT Automationworx Software Suite up to version 1.89 manipulated PC Worx or Config+ f…Nov 15, 2022›
CVE-2022-2069HIGH
7.8
The APDFL.dll in Siemens JT2Go prior to V13.3.0.5 and Siemens Teamcenter Visualization prior to V14.…Oct 20, 2022›
CVE-2022-3398HIGH
7.8
OMRON CX-Programmer 9.78 and prior is vulnerable to an Out-of-Bounds Write, which may allow an attac…Oct 6, 2022›
CVE-2022-3397HIGH
7.8
OMRON CX-Programmer 9.78 and prior is vulnerable to an Out-of-Bounds Write, which may allow an attac…Oct 6, 2022›
CVE-2022-3396HIGH
7.8
OMRON CX-Programmer 9.78 and prior is vulnerable to an Out-of-Bounds Write, which may allow an attac…Oct 6, 2022›
CVE-2022-33320HIGH
7.8
Deserialization of Untrusted Data vulnerability in Mitsubishi Electric GENESIS64 versions 10.97 to 1…Jul 20, 2022›
CVE-2022-33317HIGH
7.8
Inclusion of Functionality from Untrusted Control Sphere vulnerability in Mitsubishi Electric GENESI…Jul 20, 2022›
CVE-2022-33316HIGH
7.8
Deserialization of Untrusted Data vulnerability in Mitsubishi Electric GENESIS64 versions 10.97 to 1…Jul 20, 2022›
CVE-2022-33315HIGH
7.8
Deserialization of Untrusted Data vulnerability in Mitsubishi Electric GENESIS64 versions 10.97 to 1…Jul 20, 2022›
CVE-2022-29483HIGH
7.8
Incorrect Default Permissions vulnerability in ABB e-Design allows attacker to install malicious sof…Jun 2, 2022›
CVE-2021-32969HIGH
7.8
Delta Electronics DIAScreen versions prior to 1.1.0 are vulnerable to an out-of-bounds write conditi…May 24, 2022›
CVE-2021-32965HIGH
7.8
Delta Electronics DIAScreen versions prior to 1.1.0 are vulnerable to type confusion, which may allo…May 24, 2022›
CVE-2022-22516HIGH
7.8
The SysDrv3S driver in the CODESYS Control runtime system on Microsoft Windows allows any system use…Apr 7, 2022›
CVE-2022-26419HIGH
7.8
Omron CX-Position (versions 2.5.3 and prior) is vulnerable to multiple stack-based buffer overflow c…Apr 1, 2022›
CVE-2022-26417HIGH
7.8
Omron CX-Position (versions 2.5.3 and prior) is vulnerable to a use after free memory condition whil…Apr 1, 2022›
CVE-2022-26022HIGH
7.8
Omron CX-Position (versions 2.5.3 and prior) is vulnerable to an out-of-bounds write while processin…Apr 1, 2022›
CVE-2022-25959HIGH
7.8
Omron CX-Position (versions 2.5.3 and prior) is vulnerable to memory corruption while processing a s…Apr 1, 2022›
CVE-2022-1098HIGH
7.8
Delta Electronics DIAEnergie (all versions prior to 1.8.02.004) are vulnerable to a DLL hijacking co…Apr 1, 2022›
CVE-2022-26839HIGH
7.8
Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) is vulnerable to an incorrect defaul…Mar 29, 2022›
CVE-2020-25184HIGH
7.8
Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x stores the password in plaintext in a file …Mar 18, 2022›
CVE-2022-23401HIGH
7.8
The following Yokogawa Electric products contain insecure DLL loading issues. CENTUM CS 3000 version…Mar 11, 2022›
CVE-2022-22148HIGH
7.8
'Root Service' service implemented in the following Yokogawa Electric products creates some named pi…Mar 11, 2022›
CVE-2022-22141HIGH
7.8
'Long-term Data Archive Package' service implemented in the following Yokogawa Electric products cre…Mar 11, 2022›
CVE-2021-40397HIGH
7.8
A privilege escalation vulnerability exists in the installation of Advantech WISE-PaaS/OTA Server 3.…Jan 28, 2022›
CVE-2021-22808HIGH
7.8
A CWE-416: Use After Free vulnerability exists that could cause arbitrary code execution when a mali…Jan 28, 2022›
CVE-2021-22807HIGH
7.8
A CWE-787: Out-of-bounds Write vulnerability exists that could cause arbitrary code execution when a…Jan 28, 2022›
CVE-2022-21137HIGH
7.8
Omron CX-One Versions 4.60 and prior are vulnerable to a stack-based buffer overflow while processin…Jan 14, 2022›
CVE-2021-21912HIGH
7.8
A privilege escalation vulnerability exists in the Windows version of installation for Advantech R-S…Dec 22, 2021›
CVE-2021-21911HIGH
7.8
A privilege escalation vulnerability exists in the Windows version of installation for Advantech R-S…Dec 22, 2021›
CVE-2021-21910HIGH
7.8
A privilege escalation vulnerability exists in the Windows version of installation for Advantech R-S…Dec 22, 2021›
CVE-2021-43982HIGH
7.8
Delta Electronics CNCSoft Versions 1.01.30 and prior are vulnerable to a stack-based buffer overflow…Dec 9, 2021›
CVE-2021-34597HIGH
7.8
Improper Input Validation vulnerability in PC Worx Automation Suite of Phoenix Contact up to version…Nov 4, 2021›
CVE-2021-38422HIGH
7.8
Delta Electronics DIALink versions 1.2.4.0 and prior stores sensitive information in cleartext, whic…Nov 3, 2021›
CVE-2021-38420HIGH
7.8
Delta Electronics DIALink versions 1.2.4.0 and prior default permissions give extensive permissions …Nov 3, 2021›
CVE-2021-38416HIGH
7.8
Delta Electronics DIALink versions 1.2.4.0 and prior insecurely loads libraries, which may allow an …Nov 3, 2021›
CVE-2021-33019HIGH
7.8
A stack-based buffer overflow vulnerability in Delta Electronics DOPSoft Version 4.00.11 and prior m…Aug 30, 2021›
CVE-2021-33007HIGH
7.8
A heap-based buffer overflow in Delta Electronics TPEditor: v1.98.06 and prior may be exploited by p…Aug 30, 2021›
CVE-2021-21869HIGH
7.8
An unsafe deserialization vulnerability exists in the Engine.plugin ProfileInformation ProfileData f…Aug 25, 2021›
CVE-2021-21868HIGH
7.8
An unsafe deserialization vulnerability exists in the ObjectManager.plugin Project.get_MissingTypes(…Aug 18, 2021›
CVE-2021-21867HIGH
7.8
An unsafe deserialization vulnerability exists in the ObjectManager.plugin ObjectStream.ProfileByteA…Aug 18, 2021›
CVE-2021-21863HIGH
7.8
A unsafe deserialization vulnerability exists in the ComponentModel Profile.FromFile() functionality…Aug 5, 2021›
CVE-2021-21866HIGH
7.8
A unsafe deserialization vulnerability exists in the ObjectManager.plugin ProfileInformation.Profile…Aug 2, 2021›
CVE-2021-21865HIGH
7.8
A unsafe deserialization vulnerability exists in the PackageManagement.plugin ExtensionMethods.Clone…Aug 2, 2021›
CVE-2021-21864HIGH
7.8
A unsafe deserialization vulnerability exists in the ComponentModel ComponentManager.StartupCultureS…Aug 2, 2021›
CVE-2021-27412HIGH
7.8
Delta Electronics DOPSoft Versions 4.0.10.17 and prior are vulnerable to an out-of-bounds read, whic…Jul 2, 2021›
CVE-2021-33542HIGH
7.8
Phoenix Contact Classic Automation Worx Software Suite in Version 1.87 and below is affected by a re…Jun 25, 2021›
CVE-2021-27413HIGH
7.8
Omron CX-One Versions 4.60 and prior, including CX-Server Versions 5.0.29.0 and prior, are vulnerabl…May 13, 2021›
CVE-2021-22672HIGH
7.8
Delta Electronics' CNCSoft ScreenEditor in versions prior to v1.01.30 could allow the corruption of …May 10, 2021›
CVE-2021-29240HIGH
7.8
The Package Manager of CODESYS Development System 3 before 3.5.17.0 does not check the validity of p…May 4, 2021›
CVE-2021-29239HIGH
7.8
CODESYS Development System 3 before 3.5.17.0 displays or executes malicious documents or files embed…May 3, 2021›
CVE-2021-22665HIGH
7.8
Rockwell Automation DriveTools SP v5.13 and below and Drives AOP v4.12 and below both contain a vuln…Mar 18, 2021›
CVE-2020-13554HIGH
7.8
An exploitable local privilege elevation vulnerability exists in the file system permissions of Adva…Mar 3, 2021›
CVE-2020-27257HIGH
7.8
This vulnerability allows local attackers to execute arbitrary code due to the lack of proper valida…Feb 9, 2021›
CVE-2020-27293HIGH
7.8
Delta Electronics CNCSoft-B Versions 1.0.0.2 and prior has a type confusion issue while processing p…Jan 11, 2021›
CVE-2020-27291HIGH
7.8
Delta Electronics CNCSoft-B Versions 1.0.0.2 and prior is vulnerable to an out-of-bounds read while …Jan 11, 2021›
CVE-2020-27289HIGH
7.8
Delta Electronics CNCSoft-B Versions 1.0.0.2 and prior has a null pointer dereference issue while pr…Jan 11, 2021›
CVE-2020-27287HIGH
7.8
Delta Electronics CNCSoft-B Versions 1.0.0.2 and prior is vulnerable to an out-of-bounds write while…Jan 11, 2021›
CVE-2020-27281HIGH
7.8
A stack-based buffer overflow may exist in Delta Electronics CNCSoft ScreenEditor versions 1.01.26 a…Jan 11, 2021›
CVE-2020-27277HIGH
7.8
Delta Electronics DOPSoft Version 4.0.8.21 and prior has a null pointer dereference issue while proc…Jan 11, 2021›
CVE-2020-27275HIGH
7.8
Delta Electronics DOPSoft Version 4.0.8.21 and prior is vulnerable to an out-of-bounds write while p…Jan 11, 2021›
CVE-2020-13537HIGH
7.8
An exploitable local privilege elevation vulnerability exists in the file system permissions of Moxa…Nov 5, 2020›
CVE-2020-13536HIGH
7.8
An exploitable local privilege elevation vulnerability exists in the file system permissions of Moxa…Nov 5, 2020›
CVE-2020-7523HIGH
7.8
Improper Privilege Management vulnerability exists in Schneider Electric Modbus Serial Driver (see s…Aug 31, 2020›
CVE-2019-20383HIGH
7.8
ABBYY network license server in ABBYY FineReader 15 before Release 4 (aka 15.0.112.2130) allows esca…Aug 13, 2020›
CVE-2020-16227HIGH
7.8
Delta Electronics TPEditor Versions 1.97 and prior. An improper input validation may be exploited by…Aug 7, 2020›
CVE-2020-16225HIGH
7.8
Delta Electronics TPEditor Versions 1.97 and prior. A write-what-where condition may be exploited by…Aug 7, 2020›
CVE-2020-16223HIGH
7.8
Delta Electronics TPEditor Versions 1.97 and prior. A heap-based buffer overflow may be exploited by…Aug 7, 2020›
CVE-2020-16221HIGH
7.8
Delta Electronics TPEditor Versions 1.97 and prior. A stack-based buffer overflow may be exploited b…Aug 7, 2020›
CVE-2020-16219HIGH
7.8
Delta Electronics TPEditor Versions 1.97 and prior. An out-of-bounds read may be exploited by proces…Aug 7, 2020›
CVE-2020-16229HIGH
7.8
Advantech WebAccess HMI Designer, Versions 2.1.9.31 and prior. Processing specially crafted project …Aug 6, 2020›
CVE-2020-16217HIGH
7.8
Advantech WebAccess HMI Designer, Versions 2.1.9.31 and prior. A double free vulnerability caused by…Aug 6, 2020›
CVE-2020-16215HIGH
7.8
Advantech WebAccess HMI Designer, Versions 2.1.9.31 and prior. Processing specially crafted project …Aug 6, 2020›
CVE-2020-16213HIGH
7.8
Advantech WebAccess HMI Designer, Versions 2.1.9.31 and prior. Processing specially crafted project …Aug 6, 2020›
CVE-2020-16207HIGH
7.8
Advantech WebAccess HMI Designer, Versions 2.1.9.31 and prior. Multiple heap-based buffer overflow v…Aug 6, 2020›
CVE-2020-12498HIGH
7.8
mwe file parsing in Phoenix Contact PC Worx and PC Worx Express version 1.87 and earlier is vulnerab…Jul 1, 2020›
CVE-2020-12497HIGH
7.8
PLCopen XML file parsing in Phoenix Contact PC Worx and PC Worx Express version 1.87 and earlier can…Jul 1, 2020›
CVE-2020-8482HIGH
7.8
Insecure storage of sensitive information in ABB Device Library Wizard versions 6.0.X, 6.0.3.1 and 6…May 29, 2020›
CVE-2019-5621HIGH
7.8
ABBS Software Audio Media Player version 3.1 suffers from an instance of CWE-121: Stack-based Buffer…Apr 29, 2020›
CVE-2020-8489HIGH
7.8
Insufficient protection of the inter-process communication functions in ABB System 800xA Information…Apr 29, 2020›
CVE-2020-8488HIGH
7.8
Insufficient protection of the inter-process communication functions in ABB System 800xA Batch Manag…Apr 29, 2020›
CVE-2020-8485HIGH
7.8
Insufficient protection of the inter-process communication functions in ABB System 800xA for MOD 300…Apr 29, 2020›
CVE-2020-8484HIGH
7.8
Insufficient protection of the inter-process communication functions in ABB System 800xA for DCI (al…Apr 29, 2020›
CVE-2020-8471HIGH
7.8
For the Central Licensing Server component used in ABB products ABB Ability™ System 800xA and relate…Apr 29, 2020›
CVE-2020-8474HIGH
7.8
Weak Registry permissions in ABB System 800xA Base allow low privileged users to read and modify reg…Apr 22, 2020›
CVE-2020-10642HIGH
7.8
In Rockwell Automation RSLinx Classic versions 4.11.00 and prior, an authenticated local attacker co…Apr 13, 2020›
CVE-2020-10940HIGH
7.8
Local Privilege Escalation can occur in PHOENIX CONTACT PORTICO SERVER through 3.0.7 when installed …Mar 27, 2020›
CVE-2020-10939HIGH
7.8
Insecure, default path permissions in PHOENIX CONTACT PC WORX SRT through 1.14 allow for local privi…Mar 27, 2020›
CVE-2019-5184HIGH
7.8
An exploitable double free vulnerability exists in the iocheckd service "I/O-Check" functionality of…Mar 23, 2020›
CVE-2019-5181HIGH
7.8
An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service ‘I/O…Mar 12, 2020›
CVE-2019-5180HIGH
7.8
An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service ‘I/O…Mar 12, 2020›
CVE-2019-5179HIGH
7.8
An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service ‘I/O…Mar 12, 2020›
CVE-2019-5178HIGH
7.8
An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service ‘I/O…Mar 12, 2020›
CVE-2019-5171HIGH
7.8
An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function o…Mar 12, 2020›
CVE-2019-5170HIGH
7.8
An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function o…Mar 12, 2020›
CVE-2019-5169HIGH
7.8
An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function o…Mar 12, 2020›
CVE-2019-5175HIGH
7.8
An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function o…Mar 11, 2020›
CVE-2019-5174HIGH
7.8
An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function o…Mar 11, 2020›
CVE-2019-5173HIGH
7.8
An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function o…Mar 11, 2020›
CVE-2019-5172HIGH
7.8
An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function o…Mar 11, 2020›
CVE-2019-5168HIGH
7.8
An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function o…Mar 11, 2020›
CVE-2019-5167HIGH
7.8
An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function o…Mar 11, 2020›
CVE-2019-5166HIGH
7.8
An exploitable stack buffer overflow vulnerability exists in the iocheckd service ‘I/O-Check’ functi…Mar 11, 2020›
CVE-2019-5159HIGH
7.8
An exploitable improper input validation vulnerability exists in the firmware update functionality o…Mar 11, 2020›
CVE-2019-5158HIGH
7.8
An exploitable firmware downgrade vulnerability exists in the firmware update package functionality …Mar 11, 2020›
CVE-2020-6968HIGH
7.8
Honeywell INNCOM INNControl 3 allows workstation users to escalate application user privileges throu…Feb 20, 2020›
CVE-2019-13521HIGH
7.8
A maliciously crafted program file opened by an unsuspecting user of Rockwell Automation Arena Simul…Jan 27, 2020›
CVE-2019-13519HIGH
7.8
A maliciously crafted program file opened by an unsuspecting user of Rockwell Automation Arena Simul…Jan 27, 2020›
CVE-2019-6008HIGH
7.8
An unquoted search path vulnerability in Multiple Yokogawa products for Windows (Exaopc (R1.01.00 ? …Dec 26, 2019›
CVE-2019-16675HIGH
7.8
An issue was discovered in PHOENIX CONTACT PC Worx through 1.86, PC Worx Express through 1.86, and C…Oct 31, 2019›
CVE-2019-13527HIGH
7.8
In Rockwell Automation Arena Simulation Software Cat. 9502-Ax, Versions 16.00.00 and earlier, a mali…Sep 24, 2019›
CVE-2019-13544HIGH
7.8
Delta Electronics TPEditor, Versions 1.94 and prior. Multiple out-of-bounds write vulnerabilities ma…Sep 11, 2019›
CVE-2019-13540HIGH
7.8
Delta Electronics TPEditor, Versions 1.94 and prior. Multiple stack-based buffer overflow vulnerabil…Sep 11, 2019›
CVE-2019-13536HIGH
7.8
Delta Electronics TPEditor, Versions 1.94 and prior. Multiple heap-based buffer overflow vulnerabili…Sep 11, 2019›
CVE-2019-13510HIGH
7.8
Rockwell Automation Arena Simulation Software versions 16.00.00 and earlier contain a USE AFTER FREE…Aug 15, 2019›
CVE-2019-10982HIGH
7.8
Delta Electronics CNCSoft ScreenEditor, Versions 1.00.89 and prior. Multiple heap-based buffer overf…Jul 24, 2019›
CVE-2018-19008HIGH
7.8
The TextEditor 2.0 in ABB CP400 Panel Builder versions 2.0.7.05 and earlier contain a vulnerability …Feb 13, 2019›
CVE-2018-7815HIGH
7.8
A Type Confusion (CWE-843) vulnerability exists in Eurotherm by Schneider Electric GUIcon V2.0 (Gold…Feb 6, 2019›
CVE-2018-7814HIGH
7.8
A Stack-based Buffer Overflow (CWE-121) vulnerability exists in Eurotherm by Schneider Electric GUIc…Feb 6, 2019›
CVE-2018-7813HIGH
7.8
A Type Confusion (CWE-843) vulnerability exists in Eurotherm by Schneider Electric GUIcon V2.0 (Gold…Feb 6, 2019›
CVE-2018-17913HIGH
7.8
A type confusion vulnerability exists when processing project files in Omron CX-Supervisor Versions …Nov 5, 2018›
CVE-2018-17909HIGH
7.8
When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior, the application fai…Nov 5, 2018›
CVE-2018-17905HIGH
7.8
When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior and tampering with a…Nov 5, 2018›
CVE-2018-7799HIGH
7.8
A DLL hijacking vulnerability exists in Schneider Electric Software Update (SESU), all versions prio…Nov 2, 2018›
CVE-2018-14828HIGH
7.8
Advantech WebAccess 8.3.1 and earlier has an improper privilege management vulnerability, which may …Oct 23, 2018›
CVE-2018-14800HIGH
7.8
Delta Electronics ISPSoft version 3.0.5 and prior allow an attacker, by opening a crafted file, to c…Oct 3, 2018›
CVE-2018-13806HIGH
7.8
A vulnerability has been identified in SIEMENS TD Keypad Designer (All versions). A DLL hijacking vu…Sep 12, 2018›
CVE-2018-10616HIGH
7.8
ABB Panel Builder 800 all versions has an improper input validation vulnerability which may allow an…Jul 18, 2018›
CVE-2018-4858HIGH
7.8
A vulnerability has been identified in IEC 61850 system configurator (All versions < V5.80), DIGSI 5…Jul 9, 2018›
CVE-2018-8841HIGH
7.8
In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAcc…May 15, 2018›
CVE-2017-6015HIGH
7.8
Without quotation marks, any whitespace in the file path for Rockwell Automation FactoryTalk Activat…May 11, 2018›
CVE-2017-5175HIGH
7.8
Advantech WebAccess 8.1 and earlier contains a DLL hijacking vulnerability which may allow an attack…May 9, 2018›
CVE-2018-8839HIGH
7.8
Delta PMSoft versions 2.10 and prior have multiple stack-based buffer overflow vulnerabilities where…Apr 30, 2018›
CVE-2018-8837HIGH
7.8
Processing specially crafted .pm3 files in Advantech WebAccess HMI Designer 2.1.7.32 and prior may c…Apr 25, 2018›
CVE-2018-8835HIGH
7.8
Double free vulnerabilities in Advantech WebAccess HMI Designer 2.1.7.32 and prior caused by process…Apr 25, 2018›
CVE-2018-8833HIGH
7.8
Heap-based buffer overflow vulnerabilities in Advantech WebAccess HMI Designer 2.1.7.32 and prior ca…Apr 25, 2018›
CVE-2018-8834HIGH
7.8
Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following app…Apr 17, 2018›
CVE-2018-7530HIGH
7.8
Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following app…Apr 17, 2018›
CVE-2018-7514HIGH
7.8
Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following app…Apr 17, 2018›
CVE-2018-7502HIGH
7.8
Kernel drivers in Beckhoff TwinCAT 3.1 Build 4022.4, TwinCAT 2.11 R3 2259, and TwinCAT 3.1 lack prop…Mar 23, 2018›
CVE-2018-5476HIGH
7.8
A Stack-based Buffer Overflow issue was discovered in Delta Electronics Delta Industrial Automation …Mar 15, 2018›
CVE-2017-16751HIGH
7.8
A Stack-based Buffer Overflow issue was discovered in Delta Electronics Delta Industrial Automation …Mar 15, 2018›
CVE-2017-16749HIGH
7.8
A Use-after-Free issue was discovered in Delta Electronics Delta Industrial Automation Screen Editor…Mar 15, 2018›
CVE-2017-16747HIGH
7.8
An Out-of-bounds Write issue was discovered in Delta Electronics Delta Industrial Automation Screen …Mar 15, 2018›
CVE-2017-16745HIGH
7.8
A Type Confusion issue was discovered in Delta Electronics Delta Industrial Automation Screen Editor…Mar 15, 2018›
CVE-2018-7239HIGH
7.8
A DLL hijacking vulnerability exists in Schneider Electric's SoMove Software and associated DTM soft…Mar 9, 2018›
CVE-2018-1168HIGH
7.8
This vulnerability allows local attackers to escalate privileges on vulnerable installations of ABB …Feb 21, 2018›
CVE-2017-9967HIGH
7.8
A security misconfiguration vulnerability exists in Schneider Electric's IGSS SCADA Software version…Feb 12, 2018›
CVE-2018-5441HIGH
7.8
An Improper Validation of Integrity Check Value issue was discovered in PHOENIX CONTACT mGuard firmw…Jan 30, 2018›
CVE-2017-14030HIGH
7.8
An issue was discovered in Moxa MXview v2.8 and prior. The unquoted service path escalation vulnerab…Jan 12, 2018›
CVE-2017-12705HIGH
7.8
A Heap-Based Buffer Overflow issue was discovered in Advantech WebOP. A maliciously crafted project …Oct 25, 2017›
CVE-2017-9961HIGH
7.8
A vulnerability exists in Schneider Electric's Pro-Face GP Pro EX version 4.07.000 that allows an at…Sep 26, 2017›
CVE-2017-9958HIGH
7.8
An improper access control vulnerability exists in Schneider Electric's U.motion Builder software ve…Sep 26, 2017›
CVE-2017-12717HIGH
7.8
An Uncontrolled Search Path Element issue was discovered in Advantech WebAccess versions prior to V8…Aug 30, 2017›
CVE-2017-12713HIGH
7.8
An Incorrect Permission Assignment for Critical Resource issue was discovered in Advantech WebAccess…Aug 30, 2017›
CVE-2017-12711HIGH
7.8
An Incorrect Privilege Assignment issue was discovered in Advantech WebAccess versions prior to V8.2…Aug 30, 2017›
CVE-2017-9942HIGH
7.8
A vulnerability was discovered in Siemens SiPass integrated (All versions before V2.70) that could a…Aug 8, 2017›
CVE-2017-7968HIGH
7.8
An Incorrect Default Permissions issue was discovered in Schneider Electric Wonderware InduSoft Web …May 19, 2017›
CVE-2017-6033HIGH
7.8
A DLL Hijacking issue was discovered in Schneider Electric Interactive Graphical SCADA System (IGSS)…Apr 7, 2017›
CVE-2016-9356HIGH
7.8
An issue was discovered in Moxa DACenter Versions 1.4 and older. The application may suffer from an …Feb 13, 2017›
CVE-2016-9353HIGH
7.8
An issue was discovered in Advantech SUISAccess Server Version 3.0 and prior. The admin password is …Feb 13, 2017›
CVE-2016-8566HIGH
7.8
An issue was discovered in Siemens SICAM PAS before 8.00. Because of Storing Passwords in a Recovera…Feb 13, 2017›
CVE-2016-5805HIGH
7.8
An issue was discovered in Delta Electronics WPLSoft, Versions prior to V2.42.11, ISPSoft, Versions …Feb 13, 2017›
CVE-2016-5802HIGH
7.8
An issue was discovered in Delta Electronics WPLSoft, Versions prior to V2.42.11, ISPSoft, Versions …Feb 13, 2017›
CVE-2016-6486HIGH
7.8
Siemens SINEMA Server uses weak permissions for the application folder, which allows local users to …Aug 8, 2016›
CVE-2015-3938HIGH
7.8
The HTTP application on Mitsubishi Electric MELSEC FX3G PLC devices before April 2015 allows remote …Oct 6, 2015›
CVE-2015-2177HIGH
7.8
Siemens SIMATIC S7-300 CPU devices allow remote attackers to cause a denial of service (defect-mode …Mar 7, 2015›
CVE-2014-9369HIGH
7.8
Siemens SPC controllers SPC4000, SPC5000, and SPC6000 before 3.6.0 allow remote attackers to cause a…Mar 7, 2015›
CVE-2014-8478HIGH
7.8
The web server on Siemens SCALANCE X-300 switches with firmware before 4.0 and SCALANCE X 408 switch…Jan 21, 2015›
CVE-2014-2380HIGH
7.8
Schneider Electric Wonderware Information Server (WIS) Portal 4.0 SP1 through 5.5 uses weak encrypti…Aug 28, 2014›
CVE-2014-2258HIGH
7.8
Siemens SIMATIC S7-1200 CPU PLC devices with firmware before 4.0 allow remote attackers to cause a d…Mar 24, 2014›
CVE-2014-2254HIGH
7.8
Siemens SIMATIC S7-1200 CPU PLC devices with firmware before 4.0 allow remote attackers to cause a d…Mar 24, 2014›
CVE-2014-2256HIGH
7.8
Siemens SIMATIC S7-1200 CPU PLC devices with firmware before 4.0 allow remote attackers to cause a d…Mar 24, 2014›
CVE-2014-2259HIGH
7.8
Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allow remote attackers to cause a…Mar 16, 2014›
CVE-2014-2257HIGH
7.8
Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allow remote attackers to cause a…Mar 16, 2014›
CVE-2014-2255HIGH
7.8
Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allow remote attackers to cause a…Mar 16, 2014›
CVE-2013-2824HIGH
7.8
Schneider Electric StruxureWare SCADA Expert Vijeo Citect 7.40, Vijeo Citect 7.20 through 7.30SP1, C…Feb 26, 2014›
CVE-2014-1966HIGH
7.8
The SNMP implementation in Siemens RuggedCom ROS before 3.11, ROS 3.11 for RS950G, ROS 3.12 before 3…Feb 24, 2014›
CVE-2013-4780HIGH
7.8
core/getLog.php on the Siemens Enterprise OpenScape Branch appliance and OpenScape Session Border Co…Jul 18, 2013›
CVE-2013-4778HIGH
7.8
core/getLog.php on the Siemens Enterprise OpenScape Branch appliance and OpenScape Session Border Co…Jul 18, 2013›
CVE-2013-2780HIGH
7.8
Siemens SIMATIC S7-1200 PLCs 2.x and 3.x allow remote attackers to cause a denial of service (defect…Apr 22, 2013›
CVE-2013-0700HIGH
7.8
Siemens SIMATIC S7-1200 PLCs 2.x and 3.x allow remote attackers to cause a denial of service (defect…Apr 22, 2013›
CVE-2012-4714HIGH
7.8
Integer overflow in RNADiagnostics.dll in Rockwell Automation FactoryTalk Services Platform (FTSP) C…Apr 18, 2013›
CVE-2012-4713HIGH
7.8
Integer signedness error in RNADiagnostics.dll in Rockwell Automation FactoryTalk Services Platform …Apr 18, 2013›
CVE-2013-1627HIGH
7.8
Absolute path traversal vulnerability in NTWebServer.exe in Indusoft Studio 7.0 and earlier and Adva…Mar 11, 2013›
CVE-2012-4706HIGH
7.8
Integer signedness error in 3S CODESYS Gateway-Server before 2.3.9.27 allows remote attackers to cau…Feb 24, 2013›
CVE-2012-6442HIGH
7.8
When an affected product receives a valid CIP message from an unauthorized or unintended source to P…Jan 24, 2013›
CVE-2012-6438HIGH
7.8
The device does not properly validate the data being sent to the buffer. An attacker can send a malf…Jan 24, 2013›
CVE-2012-6436HIGH
7.8
The device does not properly validate the data being sent to the buffer. An attacker can send a malf…Jan 24, 2013›
CVE-2012-6435HIGH
7.8
When an affected product receives a valid CIP message from an unauthorized or unintended source to P…Jan 24, 2013›
CVE-2012-3017HIGH
7.8
Siemens SIMATIC S7-400 PN CPU devices with firmware 5.x allow remote attackers to cause a denial of …Jul 31, 2012›
CVE-2012-3016HIGH
7.8
Siemens SIMATIC S7-400 PN CPU devices with firmware 6 before 6.0.3 allow remote attackers to cause a…Jul 31, 2012›
CVE-2012-1802HIGH
7.8
Buffer overflow in the embedded web server on the Siemens Scalance X Industrial Ethernet switch X414…Apr 18, 2012›
CVE-2011-4878HIGH
7.8
Directory traversal vulnerability in miniweb.exe in the HMI web server in Siemens WinCC flexible 200…Feb 3, 2012›
CVE-2010-2772HIGH
7.8
Siemens Simatic WinCC and PCS 7 SCADA system uses a hard-coded password, which allows local users to…Jul 22, 2010›
CVE-2010-2568HIGH
7.8
Windows Shell in Microsoft Windows XP SP3, Server 2003 SP2, Vista SP1 and SP2, Server 2008 SP2 and R…Jul 22, 2010›
CVE-2009-3322HIGH
7.8
The Siemens Gigaset SE361 WLAN router allows remote attackers to cause a denial of service (device r…Sep 23, 2009›
CVE-2008-7065HIGH
7.8
Siemens C450 IP and C475 IP VoIP devices allow remote attackers to cause a denial of service (discon…Aug 25, 2009›
CVE-2008-1546HIGH
7.8
servlet/MIMEReceiveServlet in the web controller for Mitsubishi Electric GB-50 and GB-50A air-condit…Mar 28, 2008›
CVE-2008-1267HIGH
7.8
The Siemens SpeedStream 6520 router allows remote attackers to cause a denial of service (web interf…Mar 10, 2008›
CVE-2003-1464HIGH
7.8
Buffer overflow in Siemens 45 series mobile phones allows remote attackers to cause a denial of serv…Dec 31, 2003›
CVE-2025-10089HIGH
7.7
Uncontrolled Search Path Element Vulnerability in Setting and Operation Application for Lighting Con…Nov 18, 2025›
CVE-2024-48844HIGH
7.7
Denial of Service vulnerabilities where found providing a potiential for device service disruptions.…Dec 5, 2024›
CVE-2024-48843HIGH
7.7
Denial of Service vulnerabilities where found providing a potiential for device service disruptions.…Dec 5, 2024›
CVE-2024-7847HIGH
7.7
VULNERABILITY DETAILS Rockwell Automation used the latest versions of the CVSS scoring system to as…Oct 14, 2024›
CVE-2022-4048HIGH
7.7
Inadequate Encryption Strength in CODESYS Development System V3 versions prior to V3.5.18.40 allows …May 15, 2023›
CVE-2022-2464HIGH
7.7
Rockwell Automation ISaGRAF Workbench software versions 6.0 through 6.6.9 are affected by a Path Tra…Aug 25, 2022›
CVE-2022-1159HIGH
7.7
Rockwell Automation Studio 5000 Logix Designer (all versions) are vulnerable when an attacker who ac…Apr 1, 2022›
CVE-2021-27471HIGH
7.7
The parsing mechanism that processes certain file types does not provide input sanitization for file…Mar 23, 2022›
CVE-2021-35529HIGH
7.7
Insufficiently Protected Credentials vulnerability in client environment of Hitachi ABB Power Grids …Aug 20, 2021›
CVE-2020-13550HIGH
7.7
A local file inclusion vulnerability exists in the installation functionality of Advantech WebAccess…Feb 17, 2021›
CVE-2016-4514HIGH
7.7
Moxa PT-7728 devices with software 3.4 build 15081113 allow remote authenticated users to change the…Jun 19, 2016›
CVE-2015-3977HIGH
7.7
Buffer overflow in Schneider Electric IMT25 Magnetic Flow DTM before 1.500.004 for the HART Protocol…Nov 15, 2015›
CVE-2012-1801HIGH
7.7
Multiple stack-based buffer overflows in (1) COM and (2) ActiveX controls in ABB WebWare Server, Web…Apr 18, 2012›
CVE-2025-48891HIGH
7.6
A vulnerability exists in Advantech iView that could allow for SQL injection through the CUtils.che…Jul 11, 2025›
CVE-2023-1257HIGH
7.6
An attacker with physical access to the affected Moxa UC Series devices can initiate a restart of th…Mar 7, 2023›
CVE-2019-19094HIGH
7.6
Lack of input checks for SQL queries in ABB eSOMS versions 3.9 to 6.0.3 might allow an attacker SQL …Apr 2, 2020›
CVE-2014-2717HIGH
7.6
Honeywell FALCON XLWeb Linux controller devices 2.04.01 and earlier and FALCON XLWeb XLWebExe contro…Jul 24, 2014›
CVE-2012-4694HIGH
7.6
Moxa EDR-G903 series routers with firmware before 2.11 do not use a sufficient source of entropy for…Feb 15, 2013›
CVE-2026-3631HIGH
7.5
Delta Electronics COMMGR2 has Buffer Over-read DoS vulnerability.Mar 9, 2026›
CVE-2024-55027HIGH
7.5
Weintek cMT-3072XH2 easyweb v2.1.53, OS v20231011 was discovered to stroe credentials in plaintext i…Mar 3, 2026›
CVE-2024-55021HIGH
7.5
Weintek cMT-3072XH2 easyweb v2.1.53, OS v20231011 was discovered to contain a hardcoded password in …Mar 3, 2026›
CVE-2024-55019HIGH
7.5
Incorrect access control in the component download_wb.cgi of Weintek cMT-3072XH2 easyweb Web Version…Mar 3, 2026›
CVE-2025-66598HIGH
7.5
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This prod…Feb 9, 2026›
CVE-2025-66597HIGH
7.5
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This prod…Feb 9, 2026›
CVE-2025-66608HIGH
7.5
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This prod…Feb 9, 2026›
CVE-2025-13373HIGH
7.5
Advantech iView versions 5.7.05.7057 and prior do not properly sanitize SNMP v1 trap (Port 162) requ…Dec 4, 2025›
CVE-2025-41738HIGH
7.5
An unauthenticated remote attacker may cause the visualisation server of the CODESYS Control runtime…Dec 1, 2025›
CVE-2022-50594HIGH
7.5
Advantech iView versions prior to v5.7.04 build 6425 contain a vulnerability within the SNMP managem…Nov 6, 2025›
CVE-2025-7731HIGH
7.5
Cleartext Transmission of Sensitive Information vulnerability in Mitsubishi Electric Corporation MEL…Sep 1, 2025›
CVE-2025-8754HIGH
7.5
Missing Authentication for Critical Function vulnerability in ABB ABB AbilityTM zenon.This issue aff…Aug 13, 2025›
CVE-2025-41691HIGH
7.5
An unauthenticated remote attacker may trigger a NULL pointer dereference in the affected CODESYS Co…Aug 4, 2025›
CVE-2025-2520HIGH
7.5
The Honeywell Experion PKS contains an Uninitialized Variable in the common Epic Platform Analyzer (…Jul 10, 2025›
CVE-2025-6073HIGH
7.5
Stack-based Buffer Overflow vulnerability in ABB RMC-100, ABB RMC-100 LITE. When the REST interface…Jul 3, 2025›
CVE-2025-6072HIGH
7.5
Stack-based Buffer Overflow vulnerability in ABB RMC-100, ABB RMC-100 LITE. When the REST interfa…Jul 3, 2025›
CVE-2025-3511HIGH
7.5
Improper Validation of Specified Quantity in Input vulnerability in Mitsubishi Electric Corporation …Apr 25, 2025›
CVE-2025-1468HIGH
7.5
An unauthenticated remote attacker can gain access to sensitive information including authentication…Mar 18, 2025›
CVE-2024-8603HIGH
7.5
A “Use of a Broken or Risky Cryptographic Algorithm” vulnerability in the SSL/TLS component used in …Jan 15, 2025›
CVE-2024-51546HIGH
7.5
Credentials Disclosure vulnerabilities allow access to on board project back-up bundles.  Affected p…Dec 5, 2024›
CVE-2024-11316HIGH
7.5
Fileszie Check vulnerabilities allow a malicious user to bypass size limits or overload to the produ…Dec 5, 2024›
CVE-2024-9404HIGH
7.5
This vulnerability could lead to denial-of-service or service crashes. Exploitation of the moxa_cmd …Dec 4, 2024›
CVE-2023-52335HIGH
7.5
Advantech iView ConfigurationServlet SQL Injection Information Disclosure Vulnerability. This vulner…Nov 22, 2024›
CVE-2024-8403HIGH
7.5
Improper Validation of Specified Type of Input vulnerability in Mitsubishi Electric Corporation MELS…Nov 19, 2024›
CVE-2024-48989HIGH
7.5
A vulnerability in the PROFINET stack implementation of the IndraDrive (all versions) of Bosch Rexro…Nov 13, 2024›
CVE-2024-9124HIGH
7.5
A denial-of-service vulnerability exists in the Rockwell Automation PowerFlex® 600T. If the device i…Oct 8, 2024›
CVE-2024-8626HIGH
7.5
Due to a memory leak, a denial-of-service vulnerability exists in the Rockwell Automation affected p…Oct 8, 2024›
CVE-2024-8175HIGH
7.5
An unauthenticated remote attacker can causes the CODESYS web server to access invalid memory which …Sep 25, 2024›
CVE-2024-6077HIGH
7.5
A denial-of-service vulnerability exists in the Rockwell Automation affected products when specially…Sep 12, 2024›
CVE-2024-7986HIGH
7.5
A vulnerability exists in the Rockwell Automation ThinManager® ThinServer that allows a threat actor…Aug 23, 2024›
CVE-2024-5800HIGH
7.5
Diffie-Hellman groups with insufficient strength are used in the SSL/TLS stack of B&R Automation Run…Aug 12, 2024›
CVE-2024-6089HIGH
7.5
An input validation vulnerability exists in the Rockwell Automation 5015 - AENFTXT when a manipulate…Jul 16, 2024›
CVE-2024-5990HIGH
7.5
Due to an improper input validation, an unauthenticated threat actor can send a malicious message to…Jun 25, 2024›
CVE-2024-37368HIGH
7.5
A user authentication vulnerability exists in the Rockwell Automation FactoryTalk® View SE. The vuln…Jun 14, 2024›
CVE-2024-37367HIGH
7.5
A user authentication vulnerability exists in the Rockwell Automation FactoryTalk® View SE v12. The …Jun 14, 2024›
CVE-2024-5000HIGH
7.5
An unauthenticated remote attacker can use a malicious OPC UA client to send a crafted request to af…Jun 4, 2024›
CVE-2024-4549HIGH
7.5
A denial of service vulnerability exists in Delta Electronics DIAEnergie v1.10.1.8610 and prior. Whe…May 6, 2024›
CVE-2023-27336HIGH
7.5
Softing edgeConnector Siemens OPC UA Server Null Pointer Dereference Denial-of-Service Vulnerability…May 3, 2024›
CVE-2023-27334HIGH
7.5
Softing edgeConnector Siemens ConditionRefresh Resource Exhaustion Denial-of-Service Vulnerability. …May 3, 2024›
CVE-2024-2424HIGH
7.5
An input validation vulnerability exists in the Rockwell Automation 5015-AENFTXT that causes the se…Apr 15, 2024›
CVE-2023-5392HIGH
7.5
C300 information leak due to an analysis feature which allows extracting more memory over the networ…Apr 11, 2024›
CVE-2024-0335HIGH
7.5
ABB has internally identified a vulnerability in the ABB VPNI feature of the S+ Control API componen…Apr 3, 2024›
CVE-2024-2427HIGH
7.5
A denial-of-service vulnerability exists in the Rockwell Automation PowerFlex® 527 due to improper …Mar 25, 2024›
CVE-2024-2426HIGH
7.5
A denial-of-service vulnerability exists in the Rockwell Automation PowerFlex® 527 due to improper …Mar 25, 2024›
CVE-2024-2425HIGH
7.5
A denial-of-service vulnerability exists in the Rockwell Automation PowerFlex® 527 due to improper …Mar 25, 2024›
CVE-2023-6942HIGH
7.5
Missing Authentication for Critical Function vulnerability in Mitsubishi Electric Corporation EZSock…Jan 30, 2024›
CVE-2023-43817HIGH
7.5
A buffer overflow exists in Delta Electronics Delta Industrial Automation DOPSoft version 2 when par…Jan 18, 2024›
CVE-2023-5592HIGH
7.5
Download of Code Without Integrity Check vulnerability in PHOENIX CONTACT MULTIPROG, PHOENIX CONTACT…Dec 14, 2023›
CVE-2023-46143HIGH
7.5
Download of Code Without Integrity Check vulnerability in PHOENIX CONTACT classic line PLCs allows a…Dec 14, 2023›
CVE-2023-5188HIGH
7.5
The MMS Interpreter of WagoAppRTU in versions below 1.4.6.0 which is used by the WAGO Telecontrol Co…Dec 5, 2023›
CVE-2023-47279HIGH
7.5
In Delta Electronics InfraSuite Device Master v.1.0.7, A vulnerability exists that allows an unauthe…Nov 30, 2023›
CVE-2023-46590HIGH
7.5
A vulnerability has been identified in Siemens OPC UA Modelling Editor (SiOME) (All versions < V2.8)…Nov 14, 2023›
CVE-2023-46289HIGH
7.5
Rockwell Automation FactoryTalk View Site Edition insufficiently validates user input, which could …Oct 27, 2023›
CVE-2023-2915HIGH
7.5
The Rockwell Automation Thinmanager Thinserver is impacted by an improper input validation vulnerabi…Aug 17, 2023›
CVE-2023-2914HIGH
7.5
The Rockwell Automation Thinmanager Thinserver is impacted by an improper input validation vulnerabi…Aug 17, 2023›
CVE-2023-37860HIGH
7.5
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote unauthenticated a…Aug 9, 2023›
CVE-2023-0525HIGH
7.5
Weak Encoding for Password vulnerability in Mitsubishi Electric Corporation GOT2000 Series GT27 mode…Aug 4, 2023›
CVE-2023-34429HIGH
7.5
Weintek Weincloud v0.13.6 could allow an attacker to cause a denial-of-service condition for …Jul 19, 2023›
CVE-2023-2913HIGH
7.5
An executable used in Rockwell Automation ThinManager ThinServer can be configured to enable an API…Jul 18, 2023›
CVE-2023-2263HIGH
7.5
The Rockwell Automation Kinetix 5700 DC Bus Power Supply Series A is vulnerable to CIP fuzzing.  Th…Jul 18, 2023›
CVE-2023-26597HIGH
7.5
Controller DoS due to buffer overflow in the handling of a specially crafted message received by the…Jul 13, 2023›
CVE-2023-25948HIGH
7.5
Server information leak of configuration data when an error is generated in response to a specially …Jul 13, 2023›
CVE-2023-3596HIGH
7.5
Where this vulnerability exists in the Rockwell Automation 1756-EN4* Ethernet/IP communication prod…Jul 12, 2023›
CVE-2023-2846HIGH
7.5
Authentication Bypass by Capture-replay vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F…Jun 30, 2023›
CVE-2023-1150HIGH
7.5
Uncontrolled resource consumption in Series WAGO 750-3x/-8x products may allow an unauthenticated re…Jun 26, 2023›
CVE-2023-2778HIGH
7.5
A denial-of-service vulnerability exists in Rockwell Automation FactoryTalk Transaction Manager. Th…Jun 13, 2023›
CVE-2023-2060HIGH
7.5
Weak Password Requirements vulnerability in FTP function on Mitsubishi Electric Corporation MELSEC i…Jun 2, 2023›
CVE-2023-1618HIGH
7.5
Active Debug Code vulnerability in Mitsubishi Electric Corporation MELSEC WS Series WS0-GETH00200 Se…May 19, 2023›
CVE-2022-47391HIGH
7.5
In multiple CODESYS products in multiple versions an unauthorized, remote attacker may use a imprope…May 15, 2023›
CVE-2023-2443HIGH
7.5
Rockwell Automation ThinManager product allows the use of medium strength ciphers.  If the client r…May 11, 2023›
CVE-2023-1285HIGH
7.5
Signal Handler Race Condition vulnerability in Mitsubishi Electric India GC-ENET-COM whose first 2 d…Apr 14, 2023›
CVE-2023-1142HIGH
7.5
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use URL dec…Mar 27, 2023›
CVE-2023-1138HIGH
7.5
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contain an improper access contro…Mar 27, 2023›
CVE-2023-27857HIGH
7.5
In affected versions, a heap-based buffer over-read condition occurs when the message field indica…Mar 22, 2023›
CVE-2023-27856HIGH
7.5
In affected versions, path traversal exists when processing a message of type 8 in Rockwell Aut…Mar 22, 2023›
CVE-2023-0457HIGH
7.5
Plaintext Storage of a Password vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series,…Mar 3, 2023›
CVE-2022-40693HIGH
7.5
A cleartext transmission vulnerability exists in the web application functionality of Moxa SDS-3008 …Feb 7, 2023›
CVE-2022-40224HIGH
7.5
A denial of service vulnerability exists in the web server functionality of Moxa SDS-3008 Series Ind…Feb 7, 2023›
CVE-2022-33323HIGH
7.5
Active Debug Code vulnerability in robot controller of Mitsubishi Electric Corporation industrial ro…Feb 2, 2023›
CVE-2020-12067HIGH
7.5
In Pilz PMC programming tool 3.x before 3.5.17 (based on CODESYS Development System), a user's passw…Dec 26, 2022›
CVE-2022-33324HIGH
7.5
Improper Resource Shutdown or Release vulnerability in Mitsubishi Electric Corporation MELSEC iQ-R S…Dec 23, 2022›
CVE-2022-3166HIGH
7.5
Rockwell Automation was made aware that the webservers of the Micrologix 1100 and 1400 controllers …Dec 16, 2022›
CVE-2022-29831HIGH
7.5
Use of Hard-coded Password vulnerability in Mitsubishi Electric Corporation GX Works3 versions from …Nov 25, 2022›
CVE-2022-3480HIGH
7.5
A remote, unauthenticated attacker could cause a denial-of-service of PHOENIX CONTACT FL MGUARD and …Nov 15, 2022›
CVE-2021-34579HIGH
7.5
In Phoenix Contact: FL MGUARD DM version 1.12.0 and 1.13.0 access to the Apache web server being ins…Nov 9, 2022›
CVE-2021-34568HIGH
7.5
In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a special…Nov 9, 2022›
CVE-2022-41776HIGH
7.5
Delta Electronics InfraSuite Device Master versions 00.00.01a and prior allow unauthenticated users…Oct 31, 2022›
CVE-2022-41629HIGH
7.5
Delta Electronics InfraSuite Device Master versions 00.00.01a and prior allow unauthenticated users…Oct 31, 2022›
CVE-2021-38399HIGH
7.5
Honeywell Experion PKS C200, C200E, C300, and ACE controllers are vulnerable to relative path traver…Oct 28, 2022›
CVE-2022-38744HIGH
7.5
An unauthenticated attacker with network access to a victim's Rockwell Automation FactoryTalk Alarm…Oct 27, 2022›
CVE-2022-3281HIGH
7.5
WAGO Series PFC100/PFC200, Series Touch Panel 600, Compact Controller CC100 and Edge Controller in m…Oct 17, 2022›
CVE-2022-3323HIGH
7.5
An SQL injection vulnerability in Advantech iView 5.7.04.6469. The specific flaw exists within the C…Sep 27, 2022›
CVE-2022-2043HIGH
7.5
MOXA NPort 5110: Firmware Versions 2.10 is vulnerable to an out-of-bounds write that can cause the d…Aug 31, 2022›
CVE-2022-30313HIGH
7.5
Honeywell Experion PKS Safety Manager through 2022-05-06 has Missing Authentication for a Critical F…Jul 28, 2022›
CVE-2022-31205HIGH
7.5
In Omron CS series, CJ series, and CP series PLCs through 2022-05-18, the password for access to the…Jul 26, 2022›
CVE-2022-31204HIGH
7.5
Omron CS series, CJ series, and CP series PLCs through 2022-05-18 use cleartext passwords. They feat…Jul 26, 2022›
CVE-2022-29834HIGH
7.5
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Mits…Jul 20, 2022›
CVE-2022-30792HIGH
7.5
In CmpChannelServer of CODESYS V3 in multiple versions an uncontrolled ressource consumption allows …Jul 11, 2022›
CVE-2022-30791HIGH
7.5
In CmpBlkDrvTcp of CODESYS V3 in multiple versions an uncontrolled ressource consumption allows an u…Jul 11, 2022›
CVE-2022-33971HIGH
7.5
Authentication bypass by capture-replay vulnerability exists in Machine automation controller NX7 se…Jul 4, 2022›
CVE-2022-32284HIGH
7.5
Use of insufficiently random values vulnerability exists in Vnet/IP communication module VI461 of YO…Jul 4, 2022›
CVE-2022-31805HIGH
7.5
In the CODESYS Development System multiple components in multiple versions transmit the passwords fo…Jun 24, 2022›
CVE-2022-31804HIGH
7.5
The CODESYS Gateway Server V2 does not verifiy that the size of a request is within expected limits.…Jun 24, 2022›
CVE-2022-24946HIGH
7.5
Improper Resource Locking vulnerability in Mitsubishi Electric MELSEC iQ-R Series R12CCPU-V firmware…Jun 15, 2022›
CVE-2021-40392HIGH
7.5
An information disclosure vulnerability exists in the Web Application functionality of Moxa MXView S…Apr 14, 2022›
CVE-2022-22519HIGH
7.5
A remote, unauthenticated attacker can send a specific crafted HTTP or HTTPS requests causing a buff…Apr 7, 2022›
CVE-2022-22517HIGH
7.5
An unauthenticated, remote attacker can disrupt existing communication channels between CODESYS prod…Apr 7, 2022›
CVE-2021-30065HIGH
7.5
On Schneider Electric ConneXium Tofino Firewall TCSEFEA23F3F22 before 03.23, TCSEFEA23F3F20/21, and …Apr 3, 2022›
CVE-2021-30063HIGH
7.5
On Schneider Electric ConneXium Tofino OPCLSM TCSEFM0000 before 03.23 and Belden Tofino Xenon Securi…Apr 3, 2022›
CVE-2021-30062HIGH
7.5
On Schneider Electric ConneXium Tofino OPCLSM TCSEFM0000 before 03.23 and Belden Tofino Xenon Securi…Apr 3, 2022›
CVE-2021-32970HIGH
7.5
Data can be copied without validation in the built-in web server in Moxa NPort IAW5000A-I/O series f…Apr 1, 2022›
CVE-2021-32968HIGH
7.5
Two buffer overflows in the built-in web server in Moxa NPort IAW5000A-I/O Series firmware version 2…Apr 1, 2022›
CVE-2021-22277HIGH
7.5
Improper Input Validation vulnerability in ABB 800xA, Control Software for AC 800M, Control Builder …Apr 1, 2022›
CVE-2020-25178HIGH
7.5
ISaGRAF Workbench communicates with Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x using T…Mar 18, 2022›
CVE-2021-39364HIGH
7.5
Honeywell HDZP252DI 1.00.HW02.4 and HBW2PER1 1.000.HW01.3 devices allow command spoofing (for camera…Feb 24, 2022›
CVE-2021-46082HIGH
7.5
Moxa TN-5900 v3.1 series routers, MGate 5109 v2.2 series protocol gateways, and MGate 5101-PBM-MN v2…Feb 18, 2022›
CVE-2021-22288HIGH
7.5
Improper Input Validation vulnerability in the ABB SPIET800 and PNI800 module allows an attacker to …Feb 4, 2022›
CVE-2021-22286HIGH
7.5
Improper Input Validation vulnerability in the ABB SPIET800 and PNI800 module allows an attacker to …Feb 4, 2022›
CVE-2021-22285HIGH
7.5
Improper Handling of Exceptional Conditions, Improper Check for Unusual or Exceptional Conditions vu…Feb 4, 2022›
CVE-2022-22510HIGH
7.5
Codesys Profinet in version V4.2.0.0 is prone to null pointer dereference that allows a denial of se…Feb 2, 2022›
CVE-2021-46559HIGH
7.5
The firmware on Moxa TN-5900 devices through 3.1 has a weak algorithm that allows an attacker to def…Jan 26, 2022›
CVE-2021-20608HIGH
7.5
Improper Handling of Length Parameter Inconsistency vulnerability in Mitsubishi Electric GX Works2 v…Dec 17, 2021›
CVE-2021-20611HIGH
7.5
Improper Input Validation vulnerability in Mitsubishi Electric MELSEC iQ-R Series R00/01/02CPU, MELS…Dec 1, 2021›
CVE-2021-20610HIGH
7.5
Improper Handling of Length Parameter Inconsistency vulnerability in Mitsubishi Electric MELSEC iQ-R…Dec 1, 2021›
CVE-2021-20609HIGH
7.5
Uncontrolled Resource Consumption vulnerability in Mitsubishi Electric MELSEC iQ-R Series R00/01/02C…Dec 1, 2021›
CVE-2021-34598HIGH
7.5
In Phoenix Contact FL MGUARD 1102 and 1105 in Versions 1.4.0, 1.4.1 and 1.5.0 the remote logging fun…Nov 10, 2021›
CVE-2021-34593HIGH
7.5
In CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56 unauthenticated c…Oct 26, 2021›
CVE-2021-34586HIGH
7.5
In the CODESYS V2 web server prior to V1.1.9.22 crafted web server requests may cause a Null pointer…Oct 26, 2021›
CVE-2021-34585HIGH
7.5
In the CODESYS V2 web server prior to V1.1.9.22 crafted web server requests can trigger a parser err…Oct 26, 2021›
CVE-2021-34583HIGH
7.5
Crafted web server requests may cause a heap-based buffer overflow and could therefore trigger a den…Oct 26, 2021›
CVE-2018-16060HIGH
7.5
Mitsubishi Electric Europe B.V. SmartRTU devices allow remote attackers to obtain sensitive informat…Oct 15, 2021›
CVE-2021-38460HIGH
7.5
A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 …Oct 12, 2021›
CVE-2021-38452HIGH
7.5
A path traversal vulnerability in the Moxa MXview Network Management software Versions 3.x to 3.2.2 …Oct 12, 2021›
CVE-2021-34570HIGH
7.5
Multiple Phoenix Contact PLCnext control devices in versions prior to 2021.0.5 LTS are prone to a Do…Sep 27, 2021›
CVE-2021-34581HIGH
7.5
Missing Release of Resource after Effective Lifetime vulnerability in OpenSSL implementation of WAGO…Aug 31, 2021›
CVE-2021-20594HIGH
7.5
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Mitsubishi Electric MELS…Aug 6, 2021›
CVE-2021-36765HIGH
7.5
In CODESYS EtherNetIP before 4.1.0.0, specific EtherNet/IP requests may cause a null pointer derefer…Aug 4, 2021›
CVE-2021-36764HIGH
7.5
In CODESYS Gateway V3 before 3.5.17.10, there is a NULL Pointer Dereference. Crafted communication r…Aug 4, 2021›
CVE-2021-36763HIGH
7.5
In CODESYS V3 web server before 3.5.17.10, files or directories are accessible to External Parties.Aug 3, 2021›
CVE-2021-33486HIGH
7.5
All versions of the CODESYS V3 Runtime Toolkit for VxWorks from version V3.5.8.0 and before version …Aug 3, 2021›
CVE-2021-35527HIGH
7.5
Password autocomplete vulnerability in the web application password field of Hitachi ABB Power Grids…Jul 14, 2021›
CVE-2021-33541HIGH
7.5
Phoenix Contact Classic Line Controllers ILC1x0 and ILC1x1 in all versions/variants are affected by …Jun 25, 2021›
CVE-2021-21005HIGH
7.5
In Phoenix Contact FL SWITCH SMCS series products in multiple versions if an attacker sends a hand-c…Jun 25, 2021›
CVE-2021-21002HIGH
7.5
In Phoenix Contact FL COMSERVER UNI in versions < 2.40 a invalid Modbus exception response can lead …Jun 25, 2021›
CVE-2021-33824HIGH
7.5
An issue was discovered on MOXA Mgate MB3180 Version 2.1 Build 18113012. Attackers can use slowhttpt…Jun 18, 2021›
CVE-2021-33823HIGH
7.5
An issue was discovered on MOXA Mgate MB3180 Version 2.1 Build 18113012. Attacker could send a huge …Jun 18, 2021›
CVE-2021-27196HIGH
7.5
Improper Input Validation vulnerability in Hitachi ABB Power Grids Relion 670 Series, Relion 670/650…Jun 14, 2021›
CVE-2021-26845HIGH
7.5
Information Exposure vulnerability in Hitachi ABB Power Grids eSOMS allows unauthorized user to gain…Jun 14, 2021›
CVE-2021-20591HIGH
7.5
Uncontrolled Resource Consumption vulnerability in Mitsubishi Electric MELSEC iQ-R series CPU module…Jun 11, 2021›
CVE-2021-30195HIGH
7.5
CODESYS V2 runtime system before 2.4.7.55 has Improper Input Validation.May 25, 2021›
CVE-2021-30191HIGH
7.5
CODESYS V2 Web-Server before 1.1.9.20 has a a Buffer Copy without Checking the Size of the Input.May 25, 2021›
CVE-2021-30186HIGH
7.5
CODESYS V2 runtime system SP before 2.4.7.55 has a Heap-based Buffer Overflow.May 25, 2021›
CVE-2020-27185HIGH
7.5
Cleartext transmission of sensitive information via Moxa Service in NPort IA5000A series serial devi…May 14, 2021›
CVE-2021-20997HIGH
7.5
In multiple managed switches by WAGO in different versions it is possible to read out the password h…May 13, 2021›
CVE-2021-25849HIGH
7.5
An integer underflow was discovered in userdisk/vport_lldpd in Moxa Camera VPort 06EC-2V Series, ver…May 10, 2021›
CVE-2021-25846HIGH
7.5
Improper validation of the ChassisID TLV in userdisk/vport_lldpd in Moxa Camera VPort 06EC-2V Series…May 10, 2021›
CVE-2021-25845HIGH
7.5
Improper validation of the ChassisID TLV in userdisk/vport_lldpd in Moxa Camera VPort 06EC-2V Series…May 10, 2021›
CVE-2021-29241HIGH
7.5
CODESYS Gateway 3 before 3.5.16.70 has a NULL pointer dereference that may result in a denial of ser…May 3, 2021›
CVE-2019-18231HIGH
7.5
Advantech Spectre RT ERT351 Versions 5.1.3 and prior logins and passwords are transmitted in clear t…Mar 17, 2021›
CVE-2020-24686HIGH
7.5
The vulnerabilities can be exploited to cause the web visualization component of the PLC to stop and…Feb 26, 2021›
CVE-2021-20588HIGH
7.5
Improper Handling of Length Parameter Inconsistency vulnerability in Mitsubishi Electric FA Engineer…Feb 19, 2021›
CVE-2021-20587HIGH
7.5
Heap-based buffer overflow vulnerability in Mitsubishi Electric FA Engineering Software (CPU Module …Feb 19, 2021›
CVE-2021-22656HIGH
7.5
Advantech iView versions prior to v5.7.03.6112 are vulnerable to directory traversal, which may allo…Feb 11, 2021›
CVE-2021-22654HIGH
7.5
Advantech iView versions prior to v5.7.03.6112 are vulnerable to a SQL injection, which may allow an…Feb 11, 2021›
CVE-2020-13573HIGH
7.5
A denial-of-service vulnerability exists in the Ethernet/IP server functionality of Rockwell Automat…Jan 7, 2021›
CVE-2020-25190HIGH
7.5
The built-in WEB server for MOXA NPort IAW5000A-I/O firmware version 2.1 or lower stores and transmi…Dec 23, 2020›
CVE-2020-12516HIGH
7.5
Older firmware versions (FW1 up to FW10) of the WAGO PLC family 750-88x and 750-352 are vulnerable f…Dec 10, 2020›
CVE-2020-12524HIGH
7.5
Uncontrolled Resource Consumption can be exploited to cause the Phoenix Contact HMIs BTP 2043W, BTP …Dec 2, 2020›
CVE-2020-7524HIGH
7.5
Out-of-bounds Write vulnerability exists in Modicon M218 Logic Controller (V5.0.0.7 and prior) which…Aug 31, 2020›
CVE-2020-15806HIGH
7.5
CODESYS Control runtime system before 3.5.16.10 allows Uncontrolled Memory Allocation.Jul 22, 2020›
CVE-2020-12031HIGH
7.5
In all versions of FactoryTalk View SE, after bypassing memory corruption mechanisms found in the op…Jul 20, 2020›
CVE-2020-12015HIGH
7.5
A specially crafted communication packet sent to the affected systems could cause a denial-of-servic…Jul 16, 2020›
CVE-2020-12009HIGH
7.5
A specially crafted communication packet sent to the affected device could cause a denial-of-service…Jul 16, 2020›
CVE-2020-14499HIGH
7.5
Advantech iView, versions 5.6 and prior, has an improper access control vulnerability. Successful ex…Jul 15, 2020›
CVE-2020-5600HIGH
7.5
TCP/IP function included in the firmware of Mitsubishi Electric GOT2000 series (CoreOS with version …Jul 7, 2020›
CVE-2020-5598HIGH
7.5
TCP/IP function included in the firmware of Mitsubishi Electric GOT2000 series (CoreOS with version …Jul 7, 2020›
CVE-2020-5597HIGH
7.5
TCP/IP function included in the firmware of Mitsubishi Electric GOT2000 series (CoreOS with version …Jul 7, 2020›
CVE-2020-5596HIGH
7.5
TCP/IP function included in the firmware of Mitsubishi Electric GOT2000 series (CoreOS with version …Jul 7, 2020›
CVE-2020-12018HIGH
7.5
Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. An out-of-bounds vulnerability exi…May 8, 2020›
CVE-2020-12014HIGH
7.5
Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Input is not properly sanitized an…May 8, 2020›
CVE-2019-19100HIGH
7.5
A privilege escalation vulnerability in the upgrade service in B&R Automation Studio versions 4.0.x,…Apr 29, 2020›
CVE-2019-3942HIGH
7.5
Advantech WebAccess 8.3.4 does not properly restrict an RPC call that allows unauthenticated, remote…Apr 1, 2020›
CVE-2020-5527HIGH
7.5
When MELSOFT transmission port (UDP/IP) of Mitsubishi Electric MELSEC iQ-R series (all versions), ME…Mar 30, 2020›
CVE-2019-5105HIGH
7.5
An exploitable memory corruption vulnerability exists in the Name Service Client functionality of 3S…Mar 26, 2020›
CVE-2020-7001HIGH
7.5
In Moxa EDS-G516E Series firmware, Version 5.2 or lower, the affected products use a weak cryptograp…Mar 24, 2020›
CVE-2020-6997HIGH
7.5
In Moxa EDS-G516E Series firmware, Version 5.2 or lower, sensitive information is transmitted over s…Mar 24, 2020›
CVE-2020-6979HIGH
7.5
In Moxa EDS-G516E Series firmware, Version 5.2 or lower, the affected products use a hard-coded cryp…Mar 24, 2020›
CVE-2020-6993HIGH
7.5
In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or l…Mar 24, 2020›
CVE-2020-6987HIGH
7.5
In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or l…Mar 24, 2020›
CVE-2020-6983HIGH
7.5
In Moxa PT-7528 series firmware, Version 4.0 or lower, and PT-7828 series firmware, Version 3.9 or l…Mar 24, 2020›
CVE-2020-7003HIGH
7.5
In Moxa ioLogik 2500 series firmware, Version 3.0 or lower, and IOxpress configuration utility, Vers…Mar 24, 2020›
CVE-2019-18242HIGH
7.5
In Moxa ioLogik 2500 series firmware, Version 3.0 or lower, and IOxpress configuration utility, Vers…Mar 24, 2020›
CVE-2020-6988HIGH
7.5
Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, …Mar 16, 2020›
CVE-2020-6984HIGH
7.5
Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, …Mar 16, 2020›
CVE-2020-9464HIGH
7.5
A Denial-of-Service vulnerability exists in BECKHOFF Ethernet TCP/IP Bus Coupler BK9000. After an at…Mar 12, 2020›
CVE-2020-9435HIGH
7.5
PHOENIX CONTACT TC ROUTER 3002T-4G through 2.05.3, TC ROUTER 2002T-3G through 2.05.3, TC ROUTER 3002…Mar 12, 2020›
CVE-2019-5149HIGH
7.5
The WBM web application on firmwares prior to 03.02.02 and 03.01.07 on the WAGO PFC100 and PFC2000, …Mar 11, 2020›
CVE-2019-5134HIGH
7.5
An exploitable regular expression without anchors vulnerability exists in the Web-Based Management (…Mar 11, 2020›
CVE-2019-5107HIGH
7.5
A cleartext transmission vulnerability exists in the network communication functionality of WAGO e!C…Mar 11, 2020›
CVE-2019-9104HIGH
7.5
An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 device…Mar 11, 2020›
CVE-2019-9101HIGH
7.5
An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 device…Mar 11, 2020›
CVE-2019-9098HIGH
7.5
An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 device…Mar 11, 2020›
CVE-2019-19279HIGH
7.5
A vulnerability has been identified in SIPROTEC 4 and SIPROTEC Compact relays equipped with EN100 Et…Mar 10, 2020›
CVE-2020-6986HIGH
7.5
In all versions of Omron PLC CJ Series, an attacker can send a series of specific data packets withi…Mar 5, 2020›
CVE-2019-18238HIGH
7.5
In Moxa ioLogik 2500 series firmware, Version 3.0 or lower, and IOxpress configuration utility, Vers…Feb 26, 2020›
CVE-2019-5148HIGH
7.5
An exploitable denial-of-service vulnerability exists in ServiceAgent functionality of the Moxa AWK-…Feb 25, 2020›
CVE-2019-5137HIGH
7.5
The usage of hard-coded cryptographic keys within the ServiceAgent binary allows for the decryption …Feb 25, 2020›
CVE-2018-16994HIGH
7.5
An issue was discovered on PHOENIX CONTACT AXL F BK PN <=1.0.4, AXL F BK ETH <= 1.12, and AXL F BK E…Feb 18, 2020›
CVE-2019-13537HIGH
7.5
The IEC870IP driver for AVEVA’s Vijeo Citect and Citect SCADA and Schneider Electric’s Power SCADA O…Jan 14, 2020›
CVE-2019-19707HIGH
7.5
On Moxa EDS-G508E, EDS-G512E, and EDS-G516E devices (with firmware through 6.0), denial of service c…Dec 11, 2019›
CVE-2019-5637HIGH
7.5
When Beckhoff TwinCAT is configured to use the Profinet driver, a denial of service of the controlle…Nov 21, 2019›
CVE-2019-18230HIGH
7.5
Honeywell equIP and Performance series IP cameras, multiple versions, A vulnerability exists where t…Oct 31, 2019›
CVE-2019-18228HIGH
7.5
Honeywell equIP series IP cameras Multiple equIP Series Cameras, A vulnerability exists in the affec…Oct 31, 2019›
CVE-2019-18227HIGH
7.5
Advantech WISE-PaaS/RMM, Versions 3.3.29 and prior. XXE vulnerabilities exist that may allow disclos…Oct 31, 2019›
CVE-2019-14927HIGH
7.5
An issue was discovered on Mitsubishi Electric Europe B.V. ME-RTU devices through 2.02 and INEA ME-R…Oct 28, 2019›
CVE-2019-16901HIGH
7.5
Advantech WebAccess/HMI Designer 2.1.9.31 has Exception Handler Chain corruption starting at Unknown…Sep 26, 2019›
CVE-2019-16900HIGH
7.5
Advantech WebAccess/HMI Designer 2.1.9.31 has a User Mode Write AV starting at MSVCR90!memcpy+0x0000…Sep 26, 2019›
CVE-2019-16899HIGH
7.5
In Advantech WebAccess/HMI Designer 2.1.9.31, Data from a Faulting Address controls Code Flow starti…Sep 26, 2019›
CVE-2019-9009HIGH
7.5
An issue was discovered in 3S-Smart CODESYS before 3.5.15.0 . Crafted network packets cause the Cont…Sep 17, 2019›
CVE-2019-13532HIGH
7.5
CODESYS V3 web server, all versions prior to 3.5.14.10, allows an attacker to send specially crafted…Sep 13, 2019›
CVE-2019-9012HIGH
7.5
An issue was discovered in 3S-Smart CODESYS V3 products. A crafted communication request may cause u…Aug 15, 2019›
CVE-2018-11424HIGH
7.5
There is Memory corruption in the web interface of Moxa OnCell G3470A-LTE Series version 1.6 Build 1…Jul 3, 2019›
CVE-2018-11423HIGH
7.5
There is Memory corruption in the web interface Moxa OnCell G3100-HSPA Series version 1.6 Build 1710…Jul 3, 2019›
CVE-2019-6571HIGH
7.5
A vulnerability has been identified in SIEMENS LOGO!8 (6ED1052-xyyxx-0BA8 FS:01 to FS:06 / Firmware …Jun 12, 2019›
CVE-2018-10691HIGH
7.5
An issue was discovered on Moxa AWK-3121 1.14 devices. It is intended that an administrator can down…Jun 7, 2019›
CVE-2019-10977HIGH
7.5
In Mitsubishi Electric MELSEC-Q series Ethernet module QJ71E71-100 serial number 20121 and prior, an…May 23, 2019›
CVE-2018-13994HIGH
7.5
The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions 1.0 to 1.34 is vulnerable to a deni…May 7, 2019›
CVE-2019-10953HIGH
7.5
ABB, Phoenix Contact, Schneider Electric, Siemens, WAGO - Programmable Logic Controllers, multiple v…Apr 17, 2019›
CVE-2018-16561HIGH
7.5
A vulnerability has been identified in SIMATIC S7-300 CPUs (All versions < V3.X.16). The affected CP…Apr 17, 2019›
CVE-2019-3941HIGH
7.5
Advantech WebAccess 8.3.4 allows unauthenticated, remote attackers to delete arbitrary files via IOC…Apr 9, 2019›
CVE-2014-5436HIGH
7.5
A directory traversal vulnerability exists in the confd.exe module in Honeywell Experion PKS R40x be…Apr 8, 2019›
CVE-2019-6554HIGH
7.5
Advantech WebAccess/SCADA, Versions 8.3.5 and prior. An improper access control vulnerability may al…Apr 5, 2019›
CVE-2018-19016HIGH
7.5
Rockwell Automation EtherNet/IP Web Server Modules 1756-EWEB (includes 1756-EWEBK) Version 5.001 and…Mar 27, 2019›
CVE-2013-2805HIGH
7.5
Rockwell Automation RSLinx Enterprise Software (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3,…Mar 26, 2019›
CVE-2013-2807HIGH
7.5
Rockwell Automation RSLinx Enterprise Software (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3,…Mar 26, 2019›
CVE-2013-2806HIGH
7.5
Rockwell Automation RSLinx Enterprise Software (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3,…Mar 26, 2019›
CVE-2019-6520HIGH
7.5
Moxa IKS and EDS does not properly check authority on server side, which results in a read-only user…Mar 5, 2019›
CVE-2019-6518HIGH
7.5
Moxa IKS and EDS store plaintext passwords, which may allow sensitive information to be read by some…Mar 5, 2019›
CVE-2018-20026HIGH
7.5
Improper Communication Address Filtering exists in CODESYS V3 products versions prior V3.5.14.0.Feb 19, 2019›
CVE-2018-20025HIGH
7.5
Use of Insufficiently Random Values exists in CODESYS V3 products versions prior V3.5.14.0.Feb 19, 2019›
CVE-2019-6535HIGH
7.5
Mitsubishi Electric Q03/04/06/13/26UDVCPU: serial number 20081 and prior, Q04/06/13/26UDPVCPU: seria…Feb 5, 2019›
CVE-2018-18981HIGH
7.5
In Rockwell Automation FactoryTalk Services Platform 2.90 and earlier, a remote unauthenticated atta…Jan 24, 2019›
CVE-2018-20720HIGH
7.5
ABB Relion 630 devices 1.1 before 1.1.0.C0, 1.2 before 1.2.0.B3, and 1.3 before 1.3.0.A6 allow remot…Jan 16, 2019›
CVE-2018-16196HIGH
7.5
Multiple Yokogawa products that contain Vnet/IP Open Communication Driver (CENTUM CS 3000(R3.05.00 -…Jan 9, 2019›
CVE-2018-14820HIGH
7.5
Advantech WebAccess 8.3.1 and earlier has a .dll component that is susceptible to external control o…Oct 23, 2018›
CVE-2018-18390HIGH
7.5
User Enumeration in Moxa ThingsPro IIoT Gateway and Device Management Software Solutions version 2.1…Oct 19, 2018›
CVE-2018-17898HIGH
7.5
Yokogawa STARDOM Controllers FCJ,FCN-100, FCN-RTU, FCN-500, All versions R4.10 and prior, The contro…Oct 12, 2018›
CVE-2018-14827HIGH
7.5
Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. A remote, unauthenticated threat acto…Sep 20, 2018›
CVE-2018-14821HIGH
7.5
Rockwell Automation RSLinx Classic Versions 4.00.01 and prior. This vulnerability may allow a remote…Sep 20, 2018›
CVE-2018-7792HIGH
7.5
A Permissions, Privileges, and Access Control vulnerability exists in Schneider Electric's Modicon M…Aug 29, 2018›
CVE-2018-7789HIGH
7.5
An Improper Check for Unusual or Exceptional Conditions vulnerability exists in Schneider Electric's…Aug 29, 2018›
CVE-2018-10632HIGH
7.5
In Moxa NPort 5210, 5230, and 5232 versions 2.9 build 17030709 and prior, the amount of resources re…Jul 24, 2018›
CVE-2018-7783HIGH
7.5
Schneider Electric SoMachine Basic prior to v1.6 SP1 suffers from an XML External Entity (XXE) vulne…Jul 3, 2018›
CVE-2018-7779HIGH
7.5
In Schneider Electric Wiser for KNX V2.1.0 and prior, homeLYnk V2.0.1 and prior; and spaceLYnk V2.1.…Jul 3, 2018›
CVE-2018-1000531HIGH
7.5
inversoft prime-jwt version prior to commit abb0d479389a2509f939452a6767dc424bb5e6ba contains a CWE-…Jun 26, 2018›
CVE-2018-7503HIGH
7.5
In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAcc…May 15, 2018›
CVE-2018-7501HIGH
7.5
In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAcc…May 15, 2018›
CVE-2018-7495HIGH
7.5
In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAcc…May 15, 2018›
CVE-2018-10590HIGH
7.5
In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAcc…May 15, 2018›
CVE-2017-14439HIGH
7.5
Exploitable denial of service vulnerabilities exists in the Service Agent functionality of Moxa EDR-…May 14, 2018›
CVE-2017-14438HIGH
7.5
Exploitable denial of service vulnerabilities exists in the Service Agent functionality of Moxa EDR-…May 14, 2018›
CVE-2017-14437HIGH
7.5
An exploitable denial of service vulnerability exists in the web server functionality of Moxa EDR-81…May 14, 2018›
CVE-2017-14436HIGH
7.5
An exploitable denial of service vulnerability exists in the web server functionality of Moxa EDR-81…May 14, 2018›
CVE-2017-14435HIGH
7.5
An exploitable denial of service vulnerability exists in the web server functionality of Moxa EDR-81…May 14, 2018›
CVE-2017-12128HIGH
7.5
An exploitable information disclosure vulnerability exists in the Server Agent functionality of Moxa…May 14, 2018›
CVE-2017-6021HIGH
7.5
In Schneider Electric ClearSCADA 2014 R1 (build 75.5210) and prior, 2014 R1.1 (build 75.5387) and pr…May 14, 2018›
CVE-2018-7762HIGH
7.5
A vulnerability exists in the web services to process SOAP requests in Schneider Electric's Modicon …Apr 18, 2018›
CVE-2018-7759HIGH
7.5
A buffer overflow vulnerability exists in Schneider Electric's Modicon M340, Modicon Premium, Modico…Apr 18, 2018›
CVE-2014-8421HIGH
7.5
Unify (former Siemens) OpenStage SIP and OpenScape Desk Phone IP V3 devices before R3.32.0 allow rem…Apr 12, 2018›
CVE-2018-7506HIGH
7.5
The private key of the web server in Moxa MXview versions 2.8 and prior is able to be read and acces…Apr 6, 2018›
CVE-2018-7235HIGH
7.5
A vulnerability exists in Schneider Electric's Pelco Sarix Professional in all firmware versions pri…Mar 9, 2018›
CVE-2018-7234HIGH
7.5
A vulnerability exists in Schneider Electric's Pelco Sarix Professional in all firmware versions pri…Mar 9, 2018›
CVE-2018-5453HIGH
7.5
An Improper Handling of Length Parameter Inconsistency issue was discovered in Moxa OnCell G3100-HSP…Mar 5, 2018›
CVE-2017-16736HIGH
7.5
An Unrestricted Upload Of File With Dangerous Type issue was discovered in Advantech WebAccess versi…Jan 12, 2018›
CVE-2017-16753HIGH
7.5
An Improper Input Validation issue was discovered in Advantech WebAccess versions prior to 8.3. WebA…Jan 5, 2018›
CVE-2017-16728HIGH
7.5
An Untrusted Pointer Dereference issue was discovered in Advantech WebAccess versions prior to 8.3. …Jan 5, 2018›
CVE-2017-14022HIGH
7.5
An Improper Input Validation issue was discovered in Rockwell Automation FactoryTalk Alarms and Even…Dec 23, 2017›
CVE-2017-13699HIGH
7.5
An issue was discovered on MOXA EDS-G512E 5.1 build 16072215 devices. The password encryption method…Nov 23, 2017›
CVE-2017-13698HIGH
7.5
An issue was discovered on MOXA EDS-G512E 5.1 build 16072215 devices. An attacker could extract publ…Nov 23, 2017›
CVE-2017-13703HIGH
7.5
An issue was discovered on MOXA EDS-G512E 5.1 build 16072215 devices. A denial of service may occur.Nov 17, 2017›
CVE-2017-16719HIGH
7.5
An Injection issue was discovered in Moxa NPort 5110 Version 2.2, NPort 5110 Version 2.4, NPort 5110…Nov 16, 2017›
CVE-2017-16715HIGH
7.5
An Information Exposure issue was discovered in Moxa NPort 5110 Version 2.2, NPort 5110 Version 2.4,…Nov 16, 2017›
CVE-2017-14028HIGH
7.5
A Resource Exhaustion issue was discovered in Moxa NPort 5110 Version 2.2, NPort 5110 Version 2.4, N…Nov 16, 2017›
CVE-2017-12719HIGH
7.5
An Untrusted Pointer Dereference issue was discovered in Advantech WebAccess versions prior to V8.2_…Nov 6, 2017›
CVE-2017-9946HIGH
7.5
A vulnerability has been identified in Siemens APOGEE PXC and TALON TC BACnet Automation Controllers…Oct 23, 2017›
CVE-2017-9962HIGH
7.5
Schneider Electric's ClearSCADA versions released prior to August 2017 are susceptible to a memory a…Sep 26, 2017›
CVE-2017-7924HIGH
7.5
An Improper Input Validation issue was discovered in Rockwell Automation MicroLogix 1100 controllers…Sep 20, 2017›
CVE-2017-12734HIGH
7.5
A vulnerability has been identified in LOGO! 8 BM (incl. SIPLUS variants) (All versions < V1.81.2). …Aug 30, 2017›
CVE-2017-12710HIGH
7.5
A SQL Injection issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. By subm…Aug 30, 2017›
CVE-2017-9938HIGH
7.5
A vulnerability was discovered in Siemens SIMATIC Logon (All versions before V1.6) that could allow …Aug 8, 2017›
CVE-2017-7920HIGH
7.5
An Improper Authentication issue was discovered in ABB VSN300 WiFi Logger Card versions 1.8.15 and p…Aug 7, 2017›
CVE-2017-9631HIGH
7.5
A Null Pointer Dereference issue was discovered in Schneider Electric Wonderware ArchestrA Logger, v…Jul 7, 2017›
CVE-2017-6017HIGH
7.5
A Resource Exhaustion issue was discovered in Schneider Electric Modicon M340 PLC BMXNOC0401, BMXNOE…Jun 30, 2017›
CVE-2017-7935HIGH
7.5
A Resource Exhaustion issue was discovered in Phoenix Contact GmbH mGuard firmware versions 8.3.0 to…May 19, 2017›
CVE-2017-7456HIGH
7.5
Moxa MXView 2.8 allows remote attackers to cause a Denial of Service by sending overly long junk pay…Apr 14, 2017›
CVE-2017-7455HIGH
7.5
Moxa MXView 2.8 allows remote attackers to read web server's private key file, no access control.Apr 14, 2017›
CVE-2016-8727HIGH
7.5
An exploitable information disclosure vulnerability exists in the Web Application functionality of M…Apr 13, 2017›
CVE-2016-8726HIGH
7.5
An exploitable null pointer dereference vulnerability exists in the Web Application /forms/web_runSc…Apr 13, 2017›
CVE-2016-8723HIGH
7.5
An exploitable null pointer dereference exists in the Web Application functionality of Moxa AWK-3131…Apr 13, 2017›
CVE-2016-8716HIGH
7.5
An exploitable Cleartext Transmission of Password vulnerability exists in the Web Application functi…Apr 12, 2017›
CVE-2017-6019HIGH
7.5
An issue was discovered in Schneider Electric Conext ComBox, model 865-1058, all firmware versions p…Apr 7, 2017›
CVE-2016-9367HIGH
7.5
An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions pr…Feb 13, 2017›
CVE-2016-9349HIGH
7.5
An issue was discovered in Advantech SUISAccess Server Version 3.0 and prior. An attacker could trav…Feb 13, 2017›
CVE-2016-9344HIGH
7.5
An issue was discovered in Moxa MiiNePort E1 versions prior to 1.8, E2 versions prior to 1.4, and E3…Feb 13, 2017›
CVE-2016-9332HIGH
7.5
An issue was discovered in Moxa SoftCMS versions prior to Version 1.6. Moxa SoftCMS Webserver does n…Feb 13, 2017›
CVE-2016-8374HIGH
7.5
An issue was discovered in Schneider Electric Magelis HMI Magelis GTO Advanced Optimum Panels, all v…Feb 13, 2017›
CVE-2016-8370HIGH
7.5
An issue was discovered in Mitsubishi Electric Automation MELSEC-Q series Ethernet interface modules…Feb 13, 2017›
CVE-2016-8346HIGH
7.5
An issue was discovered in Moxa EDR-810 Industrial Secure Router. By accessing a specific uniform re…Feb 13, 2017›
CVE-2016-7987HIGH
7.5
An issue was discovered in Siemens ETA4 firmware (all versions prior to Revision 08) of the SM-2558 …Feb 13, 2017›
CVE-2016-9154HIGH
7.5
Siemens Desigo PX Web modules PXA40-W0, PXA40-W1, PXA40-W2 for Desigo PX automation controllers PXC0…Dec 23, 2016›
CVE-2016-8563HIGH
7.5
Siemens Automation License Manager (ALM) before 5.3 SP3 Update 1 allows remote attackers to cause a …Oct 13, 2016›
CVE-2016-4526HIGH
7.5
ABB DataManagerPro 1.x before 1.7.1 allows local users to gain privileges by replacing a DLL file in…Sep 19, 2016›
CVE-2016-5874HIGH
7.5
Siemens SIMATIC NET PC-Software before 13 SP2 allows remote attackers to cause a denial of service (…Jul 22, 2016›
CVE-2016-5744HIGH
7.5
Siemens SIMATIC WinCC 7.0 through SP3 and 7.2 allows remote attackers to read arbitrary WinCC statio…Jul 22, 2016›
CVE-2016-3949HIGH
7.5
Siemens SIMATIC S7-300 Profinet-enabled CPU devices with firmware before 3.2.12 and SIMATIC S7-300 P…Jun 27, 2016›
CVE-2016-2295HIGH
7.5
Moxa MiiNePort_E1_4641 devices with firmware 1.1.10 Build 09120714, MiiNePort_E1_7080 devices with f…May 31, 2016›
CVE-2016-2286HIGH
7.5
Moxa MiiNePort_E1_4641 devices with firmware 1.1.10 Build 09120714, MiiNePort_E1_7080 devices with f…May 31, 2016›
CVE-2016-0879HIGH
7.5
Moxa Secure Router EDR-G903 devices before 3.4.12 do not delete copies of configuration and log file…May 31, 2016›
CVE-2016-0878HIGH
7.5
Moxa Secure Router EDR-G903 devices before 3.4.12 allow remote attackers to cause a denial of servic…May 31, 2016›
CVE-2016-0877HIGH
7.5
Memory leak on Moxa Secure Router EDR-G903 devices before 3.4.12 allows remote attackers to cause a …May 31, 2016›
CVE-2016-0876HIGH
7.5
Moxa Secure Router EDR-G903 devices before 3.4.12 allow remote attackers to discover cleartext passw…May 31, 2016›
CVE-2016-0875HIGH
7.5
Moxa Secure Router EDR-G903 devices before 3.4.12 allow remote attackers to read configuration and l…May 31, 2016›
CVE-2016-2280HIGH
7.5
Buffer overflow in RDISERVER in Honeywell Uniformance Process History Database (PHD) R310, R320, and…Apr 21, 2016›
CVE-2016-2200HIGH
7.5
Siemens SIMATIC S7-1500 CPU devices before 1.8.3 allow remote attackers to cause a denial of service…Feb 8, 2016›
CVE-2016-0860HIGH
7.5
Buffer overflow in the BwpAlarm subsystem in Advantech WebAccess before 8.1 allows remote attackers …Jan 15, 2016›
CVE-2016-0855HIGH
7.5
Directory traversal vulnerability in Advantech WebAccess before 8.1 allows remote attackers to list …Jan 15, 2016›
CVE-2016-0853HIGH
7.5
Advantech WebAccess before 8.1 allows remote attackers to obtain sensitive information via crafted i…Jan 15, 2016›
CVE-2016-0852HIGH
7.5
Advantech WebAccess before 8.1 allows remote attackers to bypass an intended administrative requirem…Jan 15, 2016›
CVE-2016-0851HIGH
7.5
Advantech WebAccess before 8.1 allows remote attackers to cause a denial of service (out-of-bounds m…Jan 15, 2016›
CVE-2015-7375HIGH
7.5
Schneider Electric InduSoft Web Studio before 8.0 allows remote attackers to execute arbitrary code …Sep 25, 2015›
CVE-2015-7374HIGH
7.5
The Remote Agent component in Schneider Electric InduSoft Web Studio before 8.0 allows remote attack…Sep 25, 2015›
CVE-2015-6460HIGH
7.5
Multiple heap-based buffer overflows in 3S-Smart CODESYS Gateway Server before 2.3.9.34 allow remote…Sep 18, 2015›
CVE-2015-5698HIGH
7.5
Cross-site request forgery (CSRF) vulnerability in the web server on Siemens SIMATIC S7-1200 CPU dev…Aug 30, 2015›
CVE-2015-0986HIGH
7.5
Multiple stack-based buffer overflows in Moxa VPort ActiveX SDK Plus before 2.8 allow remote attacke…May 26, 2015›
CVE-2015-0982HIGH
7.5
Buffer overflow in an unspecified DLL in Schneider Electric Pelco DS-NVs before 7.8.90 allows remote…Mar 14, 2015›
CVE-2014-9200HIGH
7.5
Stack-based buffer overflow in an unspecified DLL file in a DTM development kit in Schneider Electri…Feb 1, 2015›
CVE-2014-8386HIGH
7.5
Multiple stack-based buffer overflows in Advantech AdamView 4.3 and earlier allow remote attackers t…Jan 20, 2015›
CVE-2014-8514HIGH
7.5
Buffer overflow in an ActiveX control in MDraw30.ocx in Schneider Electric ProClima before 6.1.7 all…Dec 27, 2014›
CVE-2014-8513HIGH
7.5
Buffer overflow in an ActiveX control in MDraw30.ocx in Schneider Electric ProClima before 6.1.7 all…Dec 27, 2014›
CVE-2014-8512HIGH
7.5
Buffer overflow in an ActiveX control in Atx45.ocx in Schneider Electric ProClima before 6.1.7 allow…Dec 27, 2014›
CVE-2014-5208HIGH
7.5
BKBCopyD.exe in the Batch Management Packages in Yokogawa CENTUM CS 3000 through R3.09.50 and CENTUM…Dec 22, 2014›
CVE-2014-8269HIGH
7.5
Multiple stack-based buffer overflows in (1) HWOPOSScale.ocx and (2) HWOPOSSCANNER.ocx in Honeywell …Dec 13, 2014›
CVE-2014-5424HIGH
7.5
Rockwell Automation Connected Components Workbench (CCW) before 7.00.00 allows remote attackers to c…Nov 14, 2014›
CVE-2014-5399HIGH
7.5
SQL injection vulnerability in Schneider Electric Wonderware Information Server (WIS) Portal 4.0 SP1…Aug 28, 2014›
CVE-2014-5397HIGH
7.5
Cross-site scripting (XSS) vulnerability in Schneider Electric Wonderware Information Server (WIS) P…Aug 28, 2014›
CVE-2014-2368HIGH
7.5
The BrowseFolder method in the bwocxrun ActiveX control in Advantech WebAccess before 7.2 allows rem…Jul 19, 2014›
CVE-2014-2367HIGH
7.5
The ChkCookie subroutine in an ActiveX control in broadweb/include/gChkCook.asp in Advantech WebAcce…Jul 19, 2014›
CVE-2014-2364HIGH
7.5
Multiple stack-based buffer overflows in Advantech WebAccess before 7.2 allow remote attackers to ex…Jul 19, 2014›
CVE-2014-1697HIGH
7.5
The integrated web server in Siemens SIMATIC WinCC OA before 3.12 P002 January allows remote attacke…Feb 7, 2014›
CVE-2013-3958HIGH
7.5
The login implementation in the Web Navigator in Siemens WinCC before 7.2 Update 1, as used in SIMAT…Jun 14, 2013›
CVE-2013-3957HIGH
7.5
SQL injection vulnerability in the login screen in the Web Navigator in Siemens WinCC before 7.2 Upd…Jun 14, 2013›
CVE-2012-3032HIGH
7.5
SQL injection vulnerability in WebNavigator in Siemens WinCC 7.0 SP3 and earlier, as used in SIMATIC…Sep 18, 2012›
CVE-2012-0254HIGH
7.5
Stack-based buffer overflow in the HMIWeb Browser HSCDSPRenderDLL ActiveX control in Honeywell Proce…Sep 8, 2012›
CVE-2012-3020HIGH
7.5
The Siemens Synco OZW Web Server devices OZW672.*, OZW772.*, and OZW775 with firmware before 4 have …Aug 6, 2012›
CVE-2012-0244HIGH
7.5
Multiple SQL injection vulnerabilities in Advantech/BroadWin WebAccess before 7.0 allow remote attac…Feb 21, 2012›
CVE-2012-0234HIGH
7.5
SQL injection vulnerability in Advantech/BroadWin WebAccess before 7.0 allows remote attackers to ex…Feb 21, 2012›
CVE-2011-4521HIGH
7.5
SQL injection vulnerability in Advantech/BroadWin WebAccess before 7.0 allows remote attackers to ex…Feb 21, 2012›
CVE-2012-0929HIGH
7.5
Multiple buffer overflows in Schneider Electric Modicon Quantum PLC allow remote attackers to cause …Jan 28, 2012›
CVE-2011-4529HIGH
7.5
Multiple buffer overflows in Siemens Automation License Manager (ALM) 4.0 through 5.1+SP1+Upd1 allow…Jan 8, 2012›
CVE-2011-5008HIGH
7.5
Integer overflow in the GatewayService component in 3S CoDeSys 3.4 SP4 Patch 2 allows remote attacke…Dec 25, 2011›
CVE-2010-0985HIGH
7.5
Directory traversal vulnerability in the Abbreviations Manager (com_abbrev) component 1.1 for Joomla…Mar 16, 2010›
CVE-2006-3344HIGH
7.5
Siemens Speedstream Wireless Router 2624 allows local users to bypass authentication and access prot…Jul 3, 2006›
CVE-2005-2424HIGH
7.5
The management interface for Siemens SANTIS 50 running firmware 4.2.8.0, and possibly other products…Aug 3, 2005›
CVE-2025-9970HIGH
7.4
Cleartext Storage of Sensitive Information in Memory vulnerability in ABB MConfig.This issue affects…Oct 8, 2025›
CVE-2023-5396HIGH
7.4
Server receiving a malformed message creates connection for a hostname that may cause a stack overfl…Apr 17, 2024›
CVE-2023-5394HIGH
7.4
Server receiving a malformed message that where the GCL message hostname may be too large which may …Apr 11, 2024›
CVE-2023-5393HIGH
7.4
Server receiving a malformed message that causes a disconnect to a hostname may causing a stack over…Apr 11, 2024›
CVE-2023-35134HIGH
7.4
Weintek Weincloud v0.13.6 could allow an attacker to reset a password with the corresponding ac…Jul 19, 2023›
CVE-2022-27048HIGH
7.4
A vulnerability has been discovered in Moxa MGate which allows an attacker to perform a man-in-the-m…Apr 15, 2022›
CVE-2021-34599HIGH
7.4
Affected versions of CODESYS Git in Versions prior to V1.1.0.0 lack certificate validation in HTTPS …Dec 1, 2021›
CVE-2021-21004HIGH
7.4
In Phoenix Contact FL SWITCH SMCS series products in multiple versions an attacker may insert malici…Jun 25, 2021›
CVE-2018-4849HIGH
7.4
A vulnerability has been identified in Siveillance VMS Video for Android (All versions < V12.1a (201…May 3, 2018›
CVE-2017-9941HIGH
7.4
A vulnerability was discovered in Siemens SiPass integrated (All versions before V2.70) that could a…Aug 8, 2017›
CVE-2017-6873HIGH
7.4
A vulnerability was discovered in Siemens OZW672 (all versions) and OZW772 (all versions) that could…Aug 8, 2017›
CVE-2017-6870HIGH
7.4
A vulnerability was discovered in Siemens SIMATIC WinCC Sm@rtClient for Android (All versions before…Aug 8, 2017›
CVE-2017-2685HIGH
7.4
Siemens SINUMERIK Integrate Operate Clients between 2.0.3.00.016 (including) and 2.0.6 (excluding) a…Mar 1, 2017›
CVE-2026-2364HIGH
7.3
If a legitimate user confirms a self-update prompt or initiate an installation of a CODESYS Developm…Mar 10, 2026›
CVE-2025-11918HIGH
7.3
Rockwell Automation Arena® suffers from a stack-based buffer overflow vulnerability. The specific fl…Nov 14, 2025›
CVE-2025-58320HIGH
7.3
Delta Electronics DIALink has an Directory Traversal Authentication Bypass Vulnerability.Sep 11, 2025›
CVE-2025-7405HIGH
7.3
Missing Authentication for Critical Function vulnerability in Mitsubishi Electric Corporation MELSEC…Sep 1, 2025›
CVE-2025-47728HIGH
7.3
Delta Electronics CNCSoft-G2 lacks proper validation of the user-supplied file. If a user opens a ma…Jun 4, 2025›
CVE-2025-47727HIGH
7.3
Delta Electronics CNCSoft lacks proper validation of the user-supplied file. If a user opens a malic…Jun 4, 2025›
CVE-2025-47726HIGH
7.3
Delta Electronics CNCSoft lacks proper validation of the user-supplied file. If a user opens a malic…Jun 4, 2025›
CVE-2025-47725HIGH
7.3
Delta Electronics CNCSoft lacks proper validation of the user-supplied file. If a user opens a malic…Jun 4, 2025›
CVE-2025-47724HIGH
7.3
Delta Electronics CNCSoft lacks proper validation of the user-supplied file. If a user opens a malic…Jun 4, 2025›
CVE-2024-9876HIGH
7.3
: Modification of Assumed-Immutable Data (MAID) vulnerability in ABB ANC, ABB ANC-L, ABB ANC-mini.Th…Apr 30, 2025›
CVE-2024-12672HIGH
7.3
A third-party vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor…Dec 19, 2024›
CVE-2024-11364HIGH
7.3
Another “uninitialized variable” code execution vulnerability exists in the Rockwell Automation Aren…Dec 19, 2024›
CVE-2024-11157HIGH
7.3
A third-party vulnerability exists in the Rockwell Automation Arena® that could allow a threat actor…Dec 19, 2024›
CVE-2024-50376HIGH
7.3
A CWE-79 "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" was …Nov 26, 2024›
CVE-2023-3662HIGH
7.3
In CODESYS Development System versions from 3.5.17.0 and prior to 3.5.19.20 a vulnerability allows f…Aug 3, 2023›
CVE-2023-3670HIGH
7.3
In CODESYS Development System 3.5.9.0 to 3.5.17.0 and CODESYS Scripting 4.0.0.0 to 4.1.0.0 unsafe di…Jul 28, 2023›
CVE-2023-2637HIGH
7.3
Rockwell Automation's FactoryTalk System Services uses a hard-coded cryptographic key to generate a…Jun 13, 2023›
CVE-2023-2866HIGH
7.3
If an attacker can trick an authenticated user into loading a maliciously crafted .zip file onto Ad…Jun 7, 2023›
CVE-2019-6834HIGH
7.3
A CWE-502: Deserialization of Untrusted Data vulnerability exists which could allow an attacker to e…Apr 13, 2022›
CVE-2021-33540HIGH
7.3
In certain devices of the Phoenix Contact AXL F BK and IL BK product families an undocumented passwo…Jun 25, 2021›
CVE-2021-29242HIGH
7.3
CODESYS Control Runtime system before 3.5.17.0 has improper input validation. Attackers can send cra…May 3, 2021›
CVE-2020-12510HIGH
7.3
The default installation path of the TwinCAT XAR 3.1 software in all versions is underneath C:\TwinC…Nov 19, 2020›
CVE-2020-12028HIGH
7.3
In all versions of FactoryTalk View SEA remote, an authenticated attacker may be able to utilize cer…Jul 20, 2020›
CVE-2020-8473HIGH
7.3
Insufficient folder permissions used by system functions in ABB System 800xA Base (version 6.1 and e…Apr 29, 2020›
CVE-2019-7227HIGH
7.3
In the ABB IDAL FTP server, an authenticated attacker can traverse to arbitrary directories on the h…Jun 27, 2019›
CVE-2015-1014HIGH
7.3
A successful exploit of these vulnerabilities requires the local user to load a crafted DLL file in …Mar 25, 2019›
CVE-2016-8380HIGH
7.3
The web server in Phoenix Contact ILC PLCs allows access to read and write PLC variables without aut…Apr 5, 2018›
CVE-2016-8371HIGH
7.3
The web server in Phoenix Contact ILC PLCs can be accessed without authenticating even if the authen…Apr 5, 2018›
CVE-2016-8366HIGH
7.3
Webvisit in Phoenix Contact ILC PLCs offers a password macro to protect HMI pages on the PLC against…Apr 5, 2018›
CVE-2017-9956HIGH
7.3
An authentication bypass vulnerability exists in Schneider Electric's U.motion Builder software vers…Sep 26, 2017›
CVE-2017-7965HIGH
7.3
A buffer overflow vulnerability exists in Programming Software executable AlTracePrint.exe, in Schne…Jun 7, 2017›
CVE-2017-5155HIGH
7.3
An issue was discovered in Schneider Electric Wonderware Historian 2014 R2 SP1 P01 and earlier. Wond…Feb 13, 2017›
CVE-2016-9363HIGH
7.3
An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions pr…Feb 13, 2017›
CVE-2016-9334HIGH
7.3
An issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 controller 1763-L16AWA,…Feb 13, 2017›
CVE-2016-9156HIGH
7.3
A vulnerability in Siemens SICAM PAS (all versions before V8.09) could allow a remote attacker to up…Dec 5, 2016›
CVE-2016-4860HIGH
7.3
Yokogawa STARDOM FCN/FCJ controller R1.01 through R4.01 does not require authentication for Logic De…Sep 19, 2016›
CVE-2016-5645HIGH
7.3
Rockwell Automation MicroLogix 1400 PLC 1766-L32BWA, 1766-L32AWA, 1766-L32BXB, 1766-L32BWAA, 1766-L3…Aug 24, 2016›
CVE-2016-4531HIGH
7.3
Rockwell Automation FactoryTalk EnergyMetrix before 2.20.00 does not invalidate credentials upon a l…Jul 28, 2016›
CVE-2016-4529HIGH
7.3
An unspecified ActiveX control in Schneider Electric SoMachine HVAC Programming Software for M171/M1…Jul 15, 2016›
CVE-2009-1152HIGH
7.3
Siemens Gigaset SE461 WiMAX router 1.5-BL024.9.6401, and possibly other versions, allows remote atta…Mar 26, 2009›
CVE-2026-2670HIGH
7.2
A vulnerability was identified in Advantech WISE-6610 1.2.1_20251110. Affected is an unknown functio…Feb 18, 2026›
CVE-2025-34239HIGH
7.2
Advantech WebAccess/VPN versions prior to 1.1.5 contain a command injection vulnerability in AppMana…Nov 6, 2025›
CVE-2022-50595HIGH
7.2
Advantech iView versions prior to v5.7.04 build 6425 contain a vulnerability within the SNMP managem…Nov 6, 2025›
CVE-2022-50592HIGH
7.2
Advantech iView versions prior to v5.7.04 build 6425 contain a vulnerability within the SNMP managem…Nov 6, 2025›
CVE-2025-10207HIGH
7.2
Improper Validation of Specified Type of Input vulnerability in ABB FLXEON.This issue affects FLXEON…Sep 18, 2025›
CVE-2024-48851HIGH
7.2
Improper Validation of Specified Type of Input vulnerability in ABB FLXEON.A remote code execution i…Sep 18, 2025›
CVE-2024-9138HIGH
7.2
Moxa’s cellular routers, secure routers, and network security appliances are affected by a high-seve…Jan 3, 2025›
CVE-2024-50369HIGH
7.2
A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')…Nov 26, 2024›
CVE-2024-50368HIGH
7.2
A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')…Nov 26, 2024›
CVE-2024-50367HIGH
7.2
A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')…Nov 26, 2024›
CVE-2024-50366HIGH
7.2
A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')…Nov 26, 2024›
CVE-2024-50365HIGH
7.2
A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')…Nov 26, 2024›
CVE-2024-50364HIGH
7.2
A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')…Nov 26, 2024›
CVE-2024-50363HIGH
7.2
A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')…Nov 26, 2024›
CVE-2024-50362HIGH
7.2
A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')…Nov 26, 2024›
CVE-2024-50361HIGH
7.2
A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')…Nov 26, 2024›
CVE-2024-50360HIGH
7.2
A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')…Nov 26, 2024›
CVE-2024-50359HIGH
7.2
A CWE-78 "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')…Nov 26, 2024›
CVE-2024-50358HIGH
7.2
A CWE-15 "External Control of System or Configuration Setting" was discovered affecting the followin…Nov 26, 2024›
CVE-2021-22280HIGH
7.2
Improper DLL loading algorithms in B&R Automation Studio versions >=4.0 and <4.12 may allow an authe…May 14, 2024›
CVE-2023-37864HIGH
7.2
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with SNM…Aug 9, 2023›
CVE-2023-37863HIGH
7.2
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with SNM…Aug 9, 2023›
CVE-2023-37859HIGH
7.2
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 the SNMP daemon is running…Aug 9, 2023›
CVE-2023-37362HIGH
7.2
Weintek Weincloud v0.13.6 could allow an attacker to abuse the registration functionality to log…Jul 19, 2023›
CVE-2023-32628HIGH
7.2
In Advantech WebAccss/SCADA v9.1.3 and prior, there is an arbitrary file upload vulnerability t…Jun 6, 2023›
CVE-2023-32540HIGH
7.2
In Advantech WebAccss/SCADA v9.1.3 and prior, there is an arbitrary file overwrite vulnerability, w…Jun 6, 2023›
CVE-2023-22450HIGH
7.2
In Advantech WebAccss/SCADA v9.1.3 and prior, there is an arbitrary file upload vulnerability tha…Jun 6, 2023›
CVE-2023-0636HIGH
7.2
Improper Input Validation vulnerability in ABB Ltd. ASPECT®-Enterprise on ASPECT®-Enterprise, Linux …Jun 5, 2023›
CVE-2022-42140HIGH
7.2
Delta Electronics DX-2100-L1-CN 2.42 is vulnerable to Command Injection via lform/net_diagnose.Dec 14, 2022›
CVE-2020-16244HIGH
7.2
GE Digital APM Classic, Versions 4.4 and prior. Salt is not used for hash calculation of passwords, …Sep 23, 2020›
CVE-2020-6090HIGH
7.2
An exploitable code execution vulnerability exists in the Web-Based Management (WBM) functionality o…Jun 11, 2020›
CVE-2020-6978HIGH
7.2
In Honeywell WIN-PAK 4.7.2, Web and prior versions, the affected product is vulnerable due to the us…Mar 24, 2020›
CVE-2019-5157HIGH
7.2
An exploitable command injection vulnerability exists in the Cloud Connectivity functionality of WAG…Mar 11, 2020›
CVE-2019-5156HIGH
7.2
An exploitable command injection vulnerability exists in the cloud connectivity functionality of WAG…Mar 11, 2020›
CVE-2019-5155HIGH
7.2
An exploitable command injection vulnerability exists in the cloud connectivity feature of WAGO PFC2…Mar 11, 2020›
CVE-2019-5165HIGH
7.2
An exploitable authentication bypass vulnerability exists in the hostname processing of the Moxa AWK…Feb 25, 2020›
CVE-2019-5142HIGH
7.2
An exploitable command injection vulnerability exists in the hostname functionality of the Moxa AWK-…Feb 25, 2020›
CVE-2019-10969HIGH
7.2
Moxa EDR 810, all versions 5.1 and prior, allows an authenticated attacker to abuse the ping feature…Oct 8, 2019›
CVE-2017-9970HIGH
7.2
A remote code execution vulnerability exists in Schneider Electric's StruxureOn Gateway versions 1.1…Feb 12, 2018›
CVE-2017-5170HIGH
7.2
An Uncontrolled Search Path Element issue was discovered in Moxa SoftNVR-IA Live Viewer, Version 3.3…Jan 18, 2018›
CVE-2016-2281HIGH
7.2
Untrusted search path vulnerability in ABB Panel Builder 800 5.1 allows local users to gain privileg…Mar 18, 2016›
CVE-2016-2278HIGH
7.2
Schneider Electric Struxureware Building Operations Automation Server AS 1.7 and earlier and AS-P 1.…Mar 2, 2016›
CVE-2014-8388HIGH
7.2
Stack-based buffer overflow in Advantech WebAccess, formerly BroadWin WebAccess, before 8.0 allows r…Nov 21, 2014›
CVE-2013-4943HIGH
7.2
The client application in Siemens COMOS before 9.1 Update 458, 9.2 before 9.2.0.6.37, and 10.0 befor…Aug 9, 2013›
CVE-2011-3330HIGH
7.2
Buffer overflow in the UnitelWay Windows Device Driver, as used in Schneider Electric Unity Pro 6 an…Nov 4, 2011›
CVE-2003-1528HIGH
7.2
nsr_shutdown in Fujitsu Siemens NetWorker 6.0 allows local users to overwrite arbitrary files via a …Dec 31, 2003›
CVE-2025-3465HIGH
7.1
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in ABB …Oct 20, 2025›
CVE-2025-5023HIGH
7.1
Use of Hard-coded Credentials vulnerability in Mitsubishi Electric Corporation photovoltaic system m…Jul 10, 2025›
CVE-2025-3395HIGH
7.1
Incorrect Permission Assignment for Critical Resource, Cleartext Storage of Sensitive Information vu…Apr 30, 2025›
CVE-2024-48846HIGH
7.1
Cross Site Request Forgery vulnerabilities where found providing a potiential for exposing sensitive…Dec 5, 2024›
CVE-2023-43815HIGH
7.1
A buffer overflow vulnerability exists in Delta Electronics Delta Industrial Automation DOPSoft vers…Jan 18, 2024›
CVE-2023-0864HIGH
7.1
Cleartext Transmission of Sensitive Information vulnerability in ABB Terra AC wallbox (UL40/80A), AB…May 17, 2023›
CVE-2023-2444HIGH
7.1
A cross site request forgery vulnerability exists in Rockwell Automation's FactoryTalk Vantagepoint…May 11, 2023›
CVE-2023-1134HIGH
7.1
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 are affected by a path traversal …Mar 27, 2023›
CVE-2022-46670HIGH
7.1
Rockwell Automation was made aware of a vulnerability by a security researcher from Georgia Institu…Dec 16, 2022›
CVE-2022-0988HIGH
7.1
Delta Electronics DIAEnergie (Version 1.7.5 and prior) is vulnerable to cleartext transmission as th…Mar 25, 2022›
CVE-2021-20593HIGH
7.1
Incorrect Implementation of Authentication Algorithm in Mitsubishi Electric Air Conditioning System/…Jul 13, 2021›
CVE-2020-12010HIGH
7.1
Advantech WebAccess Node, Version 8.4.4 and prior, Version 9.0.0. Multiple relative path traversal v…May 8, 2020›
CVE-2019-5139HIGH
7.1
An exploitable use of hard-coded credentials vulnerability exists in multiple iw_* utilities of the …Feb 25, 2020›
CVE-2019-18998HIGH
7.1
Insufficient access control in the web interface of ABB Asset Suite versions 9.0 to 9.3, 9.4 prior t…Feb 17, 2020›
CVE-2019-18996HIGH
7.1
Path settings in HMIStudio component of ABB PB610 Panel Builder 600 versions 2.8.0.424 and earlier a…Dec 18, 2019›
CVE-2017-9966HIGH
7.1
A privilege escalation vulnerability exists in Schneider Electric's Pelco VideoXpert Enterprise vers…Jan 2, 2018›
CVE-2017-7929HIGH
7.1
An Absolute Path Traversal issue was discovered in Advantech WebAccess Version 8.1 and prior. The ab…May 6, 2017›
CVE-2014-5410HIGH
7.1
The DNP3 feature on Rockwell Automation Allen-Bradley MicroLogix 1400 1766-Lxxxxx A FRN controllers …Oct 3, 2014›
CVE-2014-5074HIGH
7.1
Siemens SIMATIC S7-1500 CPU devices with firmware before 1.6 allow remote attackers to cause a denia…Aug 17, 2014›
CVE-2014-0757HIGH
7.1
Smart Software Solutions (3S) CoDeSys Runtime Toolkit before 2.4.7.44 allows remote attackers to cau…Jan 31, 2014›
CVE-2012-3039HIGH
7.1
Moxa OnCell Gateway G3111, G3151, G3211, and G3251 devices with firmware before 1.4 do not use a suf…Aug 9, 2013›
CVE-2012-4695HIGH
7.1
LogReceiver.exe in Rockwell Automation RSLinx Enterprise CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR…Apr 18, 2013›
CVE-2012-4690HIGH
7.1
Rockwell Automation Allen-Bradley MicroLogix controller 1100, 1200, 1400, and 1500; SLC 500 controll…Dec 8, 2012›
CVE-2011-4877HIGH
7.1
HmiLoad in the runtime loader in Siemens WinCC flexible 2004, 2005, 2007, and 2008; WinCC V11 (aka T…Feb 3, 2012›
CVE-2024-48842HIGH
7.0
Use of Hard-coded Credentials vulnerability in ABB FLXEON.This issue affects FLXEON: through 9.3.5 a…Sep 17, 2025›
CVE-2024-8300HIGH
7.0
Dead Code vulnerability in Mitsubishi Electric GENESIS64 Version 10.97.2, 10.97.2 CFR1, 10.97.2 CRF2…Nov 28, 2024›
CVE-2024-1182HIGH
7.0
Uncontrolled Search Path Element vulnerability in Mitsubishi Electric Iconics Digital Solutions GENE…Jul 4, 2024›
CVE-2023-3322HIGH
7.0
A vulnerability exists by allowing low-privileged users to read and update the data in various dire…Jul 24, 2023›
CVE-2023-3321HIGH
7.0
A vulnerability exists by allowing low-privileged users to read and update the data in various dire…Jul 24, 2023›
CVE-2023-29031HIGH
7.0
A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product …May 11, 2023›
CVE-2023-29030HIGH
7.0
A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product …May 11, 2023›
CVE-2023-29023HIGH
7.0
A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product …May 11, 2023›
CVE-2019-5186HIGH
7.0
An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service "I/O…Mar 23, 2020›
CVE-2019-5185HIGH
7.0
An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service "I/O…Mar 23, 2020›
CVE-2019-11486HIGH
7.0
The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel before 5.0.8 h…Apr 23, 2019›
CVE-2017-5176HIGH
7.0
A DLL Hijack issue was discovered in Rockwell Automation Connected Components Workbench (CCW). The f…May 19, 2017›
CVE-2016-9351HIGH
7.0
An issue was discovered in Advantech SUISAccess Server Version 3.0 and prior. The directory traversa…Feb 13, 2017›
CVE-2016-8354HIGH
7.0
An issue was discovered in Schneider Electric Unity PRO prior to V11.1. Unity projects can be compil…Feb 13, 2017›
CVE-2017-9964MEDIUM
6.9
A Path Traversal issue was discovered in Schneider Electric Pelco VideoXpert Enterprise all versions…Jan 2, 2018›
CVE-2014-9202MEDIUM
6.9
Multiple stack-based buffer overflows in an unspecified DLL file in Advantech WebAccess before 8.0_2…Sep 28, 2015›
CVE-2015-3940MEDIUM
6.9
Untrusted search path vulnerability in Schneider Electric Wonderware System Platform before 2014 R2 …Aug 4, 2015›
CVE-2014-9204MEDIUM
6.9
Stack-based buffer overflow in OPCTest.exe in Rockwell Automation RSLinx Classic before 3.73.00 allo…May 17, 2015›
CVE-2014-9209MEDIUM
6.9
Untrusted search path vulnerability in the Clean Utility application in Rockwell Automation FactoryT…Mar 31, 2015›
CVE-2014-9206MEDIUM
6.9
Stack-based buffer overflow in Device Type Manager (DTM) 3.1.6 and earlier for Schneider Electric In…Mar 14, 2015›
CVE-2015-1594MEDIUM
6.9
Untrusted search path vulnerability in Siemens SIMATIC ProSave before 13 SP1; SIMATIC CFC before 8.0…Mar 7, 2015›
CVE-2014-5430MEDIUM
6.9
Untrusted search path vulnerability in ABB RobotStudio 5.6x before 5.61.02 and Test Signal Viewer 1.…Nov 7, 2014›
CVE-2014-0759MEDIUM
6.9
Unquoted Windows search path vulnerability in Schneider Electric Floating License Manager 1.0.0 thro…Feb 28, 2014›
CVE-2013-6840MEDIUM
6.9
Siemens COMOS before 9.2.0.8.1, 10.0 before 10.0.3.1.40, and 10.1 before 10.1.0.0.2 allows local use…Dec 10, 2013›
CVE-2013-2796MEDIUM
6.9
Schneider Electric Vijeo Citect 7.20 and earlier, CitectSCADA 7.20 and earlier, and PowerLogic SCADA…Aug 9, 2013›
CVE-2012-3015MEDIUM
6.9
Untrusted search path vulnerability in Siemens SIMATIC STEP7 before 5.5 SP1, as used in SIMATIC PCS7…Jul 26, 2012›
CVE-2011-2957MEDIUM
6.9
Unspecified vulnerability in Rockwell Automation FactoryTalk Diagnostics Viewer before V2.30.00 (CPR…Jul 28, 2011›
CVE-2026-0715MEDIUM
6.8
Moxa Arm-based industrial computers running Moxa Industrial Linux Secure use a device-unique bootloa…Feb 5, 2026›
CVE-2026-0714MEDIUM
6.8
A physical attack vulnerability exists in certain Moxa industrial computers using TPM-backed LUKS fu…Feb 5, 2026›
CVE-2025-11044MEDIUM
6.8
An Allocation of Resources Without Limits or Throttling vulnerability in the ANSL-Server component o…Jan 19, 2026›
CVE-2025-63701MEDIUM
6.8
A heap corruption vulnerability exists in the Advantech TP-3250 printer driver's DrvUI_x64_ADVANTECH…Nov 14, 2025›
CVE-2025-12351MEDIUM
6.8
Honeywell S35 Series Cameras contains an authorization bypass Vulnerability through User controller …Oct 27, 2025›
CVE-2025-5517MEDIUM
6.8
Heap-based Buffer Overflow vulnerability in ABB Terra AC wallbox (UL40/80A), ABB Terra AC wallbox (U…Oct 20, 2025›
CVE-2025-8531MEDIUM
6.8
Improper Handling of Length Parameter Inconsistency vulnerability in Mitsubishi Electric Corporation…Sep 19, 2025›
CVE-2025-7705MEDIUM
6.8
: Active Debug Code vulnerability in ABB Switch Actuator 4 DU-83330, ABB Switch actuator, door/light…Jul 22, 2025›
CVE-2022-40269MEDIUM
6.8
Authentication Bypass by Spoofing vulnerability in Mitsubishi Electric Corporation GOT2000 Series GT…Feb 2, 2023›
CVE-2022-29833MEDIUM
6.8
Insufficiently Protected Credentials vulnerability in Mitsubishi Electric Corporation GX Works3 vers…Nov 25, 2022›
CVE-2022-29829MEDIUM
6.8
Use of Hard-coded Cryptographic Key vulnerability in Mitsubishi Electric GX Works3 versions from 1.0…Nov 25, 2022›
CVE-2022-29828MEDIUM
6.8
Use of Hard-coded Cryptographic Key vulnerability in Mitsubishi Electric GX Works3 versions from 1.0…Nov 25, 2022›
CVE-2022-29827MEDIUM
6.8
Use of Hard-coded Cryptographic Key vulnerability in Mitsubishi Electric GX Works3 versions from 1.0…Nov 25, 2022›
CVE-2022-29826MEDIUM
6.8
Cleartext Storage of Sensitive Information vulnerability in Mitsubishi Electric GX Works3 versions f…Nov 25, 2022›
CVE-2022-30316MEDIUM
6.8
Honeywell Experion PKS Safety Manager 5.02 has Insufficient Verification of Data Authenticity. Accor…Jul 28, 2022›
CVE-2022-30242MEDIUM
6.8
Honeywell Alerton Ascent Control Module (ACM) through 2022-05-04 allows unauthenticated configuratio…Jul 15, 2022›
CVE-2022-1797MEDIUM
6.8
A malformed Class 3 common industrial protocol message with a cached connection can cause a denial-o…Jun 2, 2022›
CVE-2021-30066MEDIUM
6.8
On Schneider Electric ConneXium Tofino Firewall TCSEFEA23F3F22 before 03.23, TCSEFEA23F3F20/21, and …Apr 3, 2022›
CVE-2021-30061MEDIUM
6.8
On Schneider Electric ConneXium Tofino Firewall TCSEFEA23F3F22 before 03.23, TCSEFEA23F3F20/21, and …Apr 3, 2022›
CVE-2019-10998MEDIUM
6.8
An issue was discovered on Phoenix Contact AXC F 2152 (No.2404267) before 2019.0 LTS and AXC F 2152 …Jun 18, 2019›
CVE-2017-8371MEDIUM
6.8
Schneider Electric StruxureWare Data Center Expert before 7.4.0 uses cleartext RAM storage for passw…Apr 30, 2017›
CVE-2015-8561MEDIUM
6.8
The F1BookView ActiveX control in F1 Bookview in Schneider Electric ProClima before 6.2 allows remot…Dec 15, 2015›
CVE-2015-7918MEDIUM
6.8
Multiple buffer overflows in the F1BookView ActiveX control in F1 Bookview in Schneider Electric Pro…Dec 15, 2015›
CVE-2015-6465MEDIUM
6.8
The GoAhead web server on Moxa EDS-405A and EDS-408A switches with firmware before 3.6 allows remote…Sep 11, 2015›
CVE-2015-2848MEDIUM
6.8
Cross-site request forgery (CSRF) vulnerability in Honeywell Tuxedo Touch before 5.2.19.0_VA allows …Jul 26, 2015›
CVE-2015-1000MEDIUM
6.8
Stack-based buffer overflow in the OpenForIPCamTest method in the RTSPVIDEO.rtspvideoCtrl.1 (aka SSt…Jun 5, 2015›
CVE-2015-2823MEDIUM
6.8
Siemens SIMATIC HMI Basic Panels 2nd Generation before WinCC (TIA Portal) 13 SP1 Upd2, SIMATIC HMI C…Apr 8, 2015›
CVE-2015-1601MEDIUM
6.8
Siemens SIMATIC STEP 7 (TIA Portal) 12 and 13 before 13 SP1 Upd1 allows man-in-the-middle attackers …Apr 6, 2015›
CVE-2015-1597MEDIUM
6.8
The Siemens SPCanywhere application for Android does not use encryption during the loading of code, …Mar 7, 2015›
CVE-2015-1049MEDIUM
6.8
The web server on Siemens SCALANCE X-200IRT switches with firmware before 5.2.0 allows remote attack…Feb 2, 2015›
CVE-2014-8479MEDIUM
6.8
The FTP server on Siemens SCALANCE X-300 switches with firmware before 4.0 and SCALANCE X 408 switch…Jan 21, 2015›
CVE-2014-0992MEDIUM
6.8
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote a…Sep 20, 2014›
CVE-2014-0991MEDIUM
6.8
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote a…Sep 20, 2014›
CVE-2014-0990MEDIUM
6.8
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote a…Sep 20, 2014›
CVE-2014-0989MEDIUM
6.8
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote a…Sep 20, 2014›
CVE-2014-0988MEDIUM
6.8
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote a…Sep 20, 2014›
CVE-2014-0987MEDIUM
6.8
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote a…Sep 20, 2014›
CVE-2014-0986MEDIUM
6.8
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote a…Sep 20, 2014›
CVE-2014-0985MEDIUM
6.8
Stack-based buffer overflow in Advantech WebAccess (formerly BroadWin WebAccess) 7.2 allows remote a…Sep 20, 2014›
CVE-2014-4686MEDIUM
6.8
The Project administration application in Siemens SIMATIC WinCC before 7.3, as used in PCS7 and othe…Jul 24, 2014›
CVE-2014-0779MEDIUM
6.8
The PLC driver in ServerMain.exe in the Kepware KepServerEX 4 component in Schneider Electric Struxu…Mar 14, 2014›
CVE-2014-0774MEDIUM
6.8
Stack-based buffer overflow in the C++ sample client in Schneider Electric OPC Factory Server (OFS) …Feb 28, 2014›
CVE-2013-4911MEDIUM
6.8
Cross-site request forgery (CSRF) vulnerability in Siemens WinCC (TIA Portal) 11 and 12 before 12 SP…Aug 1, 2013›
CVE-2013-0663MEDIUM
6.8
Cross-site request forgery (CSRF) vulnerability on the Schneider Electric Quantum 140NOE77111, 140NO…Apr 4, 2013›
CVE-2013-0674MEDIUM
6.8
Buffer overflow in the RegReader ActiveX control in Siemens WinCC before 7.2, as used in SIMATIC PCS…Mar 21, 2013›
CVE-2013-0108MEDIUM
6.8
An ActiveX control in HscRemoteDeploy.dll in Honeywell Enterprise Buildings Integrator (EBI) R310, R…Feb 24, 2013›
CVE-2013-0656MEDIUM
6.8
Buffer overflow in a third-party ActiveX component in Siemens SIMATIC RF-MANAGER 2008, and RF-MANAGE…Jan 21, 2013›
CVE-2012-3028MEDIUM
6.8
Cross-site request forgery (CSRF) vulnerability in WebNavigator in Siemens WinCC 7.0 SP3 and earlier…Sep 18, 2012›
CVE-2011-4535MEDIUM
6.8
Buffer overflow in TurboPower Abbrevia before 4.0, as used in ScadaTEC ScadaPhone 5.3.11.1230 and ea…Apr 3, 2012›
CVE-2009-0473MEDIUM
6.8
Open redirect vulnerability in the web interface in the Rockwell Automation ControlLogix 1756-ENBT/A…Feb 6, 2009›
CVE-2006-2405MEDIUM
6.8
Directory traversal vulnerability in unb_lib/abbc.conf.php in Unclassified NewsBoard (UNB) 1.6.1 pat…May 16, 2006›
CVE-2025-9818MEDIUM
6.7
A vulnerability (CWE-428) has been identified in the Uninterruptible Power Supply (UPS) management a…Sep 17, 2025›
CVE-2025-4407MEDIUM
6.7
Insufficient Session Expiration vulnerability in ABB Lite Panel Pro.This issue affects Lite Panel Pr…Jun 30, 2025›
CVE-2025-30000MEDIUM
6.7
A vulnerability has been identified in Siemens License Server (SLS) (All versions < V4.3). The affec…Apr 8, 2025›
CVE-2025-29999MEDIUM
6.7
A vulnerability has been identified in Siemens License Server (SLS) (All versions < V4.3). The affec…Apr 8, 2025›
CVE-2024-11158MEDIUM
6.7
An “uninitialized variable” code execution vulnerability exists in the Rockwell Automation Arena® …Dec 5, 2024›
CVE-2024-1574MEDIUM
6.7
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') vulnerability in …Jul 4, 2024›
CVE-2020-25182MEDIUM
6.7
Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x searches for and loads DLLs as dynamic libr…Mar 18, 2022›
CVE-2020-6992MEDIUM
6.7
A local privilege escalation vulnerability has been identified in the GE Digital CIMPLICITY HMI/SCAD…Apr 15, 2020›
CVE-2018-7522MEDIUM
6.7
In Schneider Electric Triconex Tricon MP model 3008 firmware versions 10.0-10.4, when a system call …May 4, 2018›
CVE-2018-4844MEDIUM
6.7
A vulnerability has been identified in SIMATIC WinCC OA UI for Android (All versions < V3.15.10), SI…Mar 20, 2018›
CVE-2017-9969MEDIUM
6.7
An information disclosure vulnerability exists in Schneider Electric's IGSS Mobile application versi…Feb 12, 2018›
CVE-2016-5848MEDIUM
6.7
Siemens SICAM PAS before 8.07 does not properly restrict password data in the database, which makes …Jul 4, 2016›
CVE-2025-0694MEDIUM
6.6
Insufficient path validation in CODESYS Control allows low privileged attackers with physical access…Mar 18, 2025›
CVE-2023-3712MEDIUM
6.6
Files or Directories Accessible to External Parties vulnerability in Honeywell PM43 on 32 bit, ARM (…Sep 12, 2023›
CVE-2023-3463MEDIUM
6.6
All versions of GE Digital CIMPLICITY that are not adhering to SDG guidance and accepting documents…Jul 19, 2023›
CVE-2022-2792MEDIUM
6.6
Emerson Electric's Proficy Machine Edition Version 9.00 and prior is vulenrable to CWE-284 Improper …Aug 19, 2022›
CVE-2020-8487MEDIUM
6.6
Insufficient protection of the inter-process communication functions in ABB System 800xA Base (all p…Apr 29, 2020›
CVE-2020-8486MEDIUM
6.6
Insufficient protection of the inter-process communication functions in ABB System 800xA RNRP (all p…Apr 29, 2020›
CVE-2017-7907MEDIUM
6.6
An Improper XML Parser Configuration issue was discovered in Schneider Electric Wonderware Historian…May 19, 2017›
CVE-2016-4525MEDIUM
6.6
Unspecified ActiveX controls in Advantech WebAccess before 8.1_20160519 allow remote authenticated u…Jun 25, 2016›
CVE-2013-4651MEDIUM
6.6
Siemens Scalance W7xx devices with firmware before 4.5.4 use the same hardcoded X.509 certificate ac…Aug 1, 2013›
CVE-2013-0687MEDIUM
6.6
The installer routine in Schneider Electric MiCOM S1 Studio uses world-writable permissions for exec…Apr 18, 2013›
CVE-2025-13778MEDIUM
6.5
Missing authentication for critical function vulnerability in ABB AWIN GW100 rev.2, ABB AWIN GW120.T…Mar 13, 2026›
CVE-2024-55025MEDIUM
6.5
Incorrect access control in the VNC component of Weintek cMT-3072XH2 easyweb v2.1.53, OS v20231011 a…Mar 3, 2026›
CVE-2025-48023MEDIUM
6.5
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporatio…Feb 13, 2026›
CVE-2025-48022MEDIUM
6.5
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporatio…Feb 13, 2026›
CVE-2025-48021MEDIUM
6.5
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporatio…Feb 13, 2026›
CVE-2025-48020MEDIUM
6.5
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporatio…Feb 13, 2026›
CVE-2025-48019MEDIUM
6.5
A vulnerability has been found in Vnet/IP Interface Package provided by Yokogawa Electric Corporatio…Feb 13, 2026›
CVE-2025-4677MEDIUM
6.5
Insufficient Session Expiration vulnerability in ABB WebPro SNMP Card PowerValue, ABB WebPro SNMP Ca…Jan 7, 2026›
CVE-2025-4675MEDIUM
6.5
Improper Check for Unusual or Exceptional Conditions vulnerability in ABB WebPro SNMP Card PowerValu…Jan 7, 2026›
CVE-2025-34247MEDIUM
6.5
Advantech WebAccess/VPN versions prior to 1.1.5 contain a SQL injection vulnerability in NetworksCon…Nov 6, 2025›
CVE-2025-34246MEDIUM
6.5
Advantech WebAccess/VPN versions prior to 1.1.5 contain a SQL injection vulnerability in AjaxPrevali…Nov 6, 2025›
CVE-2025-34245MEDIUM
6.5
Advantech WebAccess/VPN versions prior to 1.1.5 contain a SQL injection vulnerability in AjaxStandal…Nov 6, 2025›
CVE-2025-34244MEDIUM
6.5
Advantech WebAccess/VPN versions prior to 1.1.5 contain a SQL injection vulnerability in AjaxFwRules…Nov 6, 2025›
CVE-2025-34243MEDIUM
6.5
Advantech WebAccess/VPN versions prior to 1.1.5 contain a SQL injection vulnerability in AjaxFwRules…Nov 6, 2025›
CVE-2025-34242MEDIUM
6.5
Advantech WebAccess/VPN versions prior to 1.1.5 contain a SQL injection vulnerability in AjaxNetwork…Nov 6, 2025›
CVE-2025-34241MEDIUM
6.5
Advantech WebAccess/VPN versions prior to 1.1.5 contain a SQL injection vulnerability in AjaxDeviceC…Nov 6, 2025›
CVE-2025-34240MEDIUM
6.5
Advantech WebAccess/VPN versions prior to 1.1.5 contain a SQL injection vulnerability in AppManageme…Nov 6, 2025›
CVE-2025-34238MEDIUM
6.5
Advantech WebAccess/VPN versions prior to 1.1.5 contain an absolute path traversal via AjaxStandalon…Nov 6, 2025›
CVE-2025-53509MEDIUM
6.5
A vulnerability exists in Advantech iView that allows for argument injection in the NetworkServlet.…Jul 11, 2025›
CVE-2025-52459MEDIUM
6.5
A vulnerability exists in Advantech iView that allows for argument injection in NetworkServlet.back…Jul 11, 2025›
CVE-2025-2522MEDIUM
6.5
The Honeywell Experion PKS and OneWireless WDM contains Sensitive Information in Resource vulnera…Jul 10, 2025›
CVE-2025-5022MEDIUM
6.5
Weak Password Requirements vulnerability in Mitsubishi Electric Corporation photovoltaic system moni…Jul 10, 2025›
CVE-2025-6074MEDIUM
6.5
Use of Hard-coded Cryptographic Key vulnerability in ABB RMC-100, ABB RMC-100 LITE. When the REST…Jul 3, 2025›
CVE-2025-49427MEDIUM
6.5
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability i…Jun 6, 2025›
CVE-2025-0921MEDIUM
6.5
Execution with Unnecessary Privileges vulnerability in multiple services of Mitsubishi Electric GENE…May 15, 2025›
CVE-2024-50377MEDIUM
6.5
A CWE-798 "Use of Hard-coded Credentials" was discovered affecting the following devices manufacture…Nov 26, 2024›
CVE-2024-6436MEDIUM
6.5
An input validation vulnerability exists in the Rockwell Automation Sequence Manager™ which could al…Sep 27, 2024›
CVE-2024-6325MEDIUM
6.5
The v6.40 release of Rockwell Automation FactoryTalk® Policy Manager CVE-2021-22681 https://www.rock…Jul 16, 2024›
CVE-2024-5659MEDIUM
6.5
Rockwell Automation was made aware of a vulnerability that causes all affected controllers on the sa…Jun 14, 2024›
CVE-2023-51605MEDIUM
6.5
Honeywell Saia PG5 Controls Suite XML External Entity Processing Information Disclosure Vulnerabilit…May 3, 2024›
CVE-2023-51604MEDIUM
6.5
Honeywell Saia PG5 Controls Suite XML External Entity Processing Information Disclosure Vulnerabilit…May 3, 2024›
CVE-2023-51602MEDIUM
6.5
Honeywell Saia PG5 Controls Suite XML External Entity Processing Information Disclosure Vulnerabilit…May 3, 2024›
CVE-2023-51601MEDIUM
6.5
Honeywell Saia PG5 Controls Suite XML External Entity Processing Information Disclosure Vulnerabilit…May 3, 2024›
CVE-2023-51600MEDIUM
6.5
Honeywell Saia PG5 Controls Suite XML External Entity Processing Information Disclosure Vulnerabilit…May 3, 2024›
CVE-2024-1309MEDIUM
6.5
Uncontrolled Resource Consumption vulnerability in Honeywell Niagara Framework on Windows, Linux, QN…Feb 13, 2024›
CVE-2023-6815MEDIUM
6.5
Incorrect Privilege Assignment vulnerability in Mitsubishi Electric Corporation MELSEC iQ-R Series S…Feb 13, 2024›
CVE-2023-4215MEDIUM
6.5
Advantech WebAccess version 9.1.3 contains an exposure of sensitive information to an unauthorized a…Oct 17, 2023›
CVE-2023-5459MEDIUM
6.5
A vulnerability has been found in Delta Electronics DVP32ES2 PLC 1.48 and classified as critical. Th…Oct 9, 2023›
CVE-2023-37559MEDIUM
6.5
After successful authentication as a user in multiple Codesys products in multiple versions, specifi…Aug 3, 2023›
CVE-2023-37558MEDIUM
6.5
After successful authentication as a user in multiple Codesys products in multiple versions, specifi…Aug 3, 2023›
CVE-2023-37557MEDIUM
6.5
After successful authentication as a user in multiple Codesys products in multiple versions, specifi…Aug 3, 2023›
CVE-2023-37556MEDIUM
6.5
In multiple versions of multiple Codesys products, after successful authentication as a user, specif…Aug 3, 2023›
CVE-2023-37555MEDIUM
6.5
In multiple versions of multiple Codesys products, after successful authentication as a user, specif…Aug 3, 2023›
CVE-2023-37554MEDIUM
6.5
In multiple versions of multiple Codesys products, after successful authentication as a user, specif…Aug 3, 2023›
CVE-2023-37553MEDIUM
6.5
In multiple versions of multiple Codesys products, after successful authentication as a user, specif…Aug 3, 2023›
CVE-2023-37552MEDIUM
6.5
In multiple versions of multiple Codesys products, after successful authentication as a user, specif…Aug 3, 2023›
CVE-2023-37551MEDIUM
6.5
In multiple Codesys products in multiple versions, after successful authentication as a user, specia…Aug 3, 2023›
CVE-2023-37550MEDIUM
6.5
In multiple Codesys products in multiple versions, after successful authentication as a user, specif…Aug 3, 2023›
CVE-2023-37549MEDIUM
6.5
In multiple Codesys products in multiple versions, after successful authentication as a user, specif…Aug 3, 2023›
CVE-2023-37548MEDIUM
6.5
In multiple Codesys products in multiple versions, after successful authentication as a user, specif…Aug 3, 2023›
CVE-2023-37547MEDIUM
6.5
In multiple Codesys products in multiple versions, after successful authentication as a user, specif…Aug 3, 2023›
CVE-2023-37546MEDIUM
6.5
In multiple Codesys products in multiple versions, after successful authentication as a user, specif…Aug 3, 2023›
CVE-2023-37545MEDIUM
6.5
In multiple Codesys products in multiple versions, after successful authentication as a user, specif…Aug 3, 2023›
CVE-2023-34316MEDIUM
6.5
​An attacker could bypass the latest Delta Electronics InfraSuite Device Master (versions prior to 1…Jul 10, 2023›
CVE-2022-4240MEDIUM
6.5
Missing Authentication for Critical Function vulnerability in Honeywell OneWireless allows Authentic…May 30, 2023›
CVE-2022-47393MEDIUM
6.5
An authenticated, remote attacker may use a Improper Restriction of Operations within the Bounds of …May 15, 2023›
CVE-2022-47392MEDIUM
6.5
An authenticated, remote attacker may use a improper input validation vulnerability in the CmpApp/Cm…May 15, 2023›
CVE-2022-47378MEDIUM
6.5
Multiple CODESYS products in multiple versions are prone to a improper input validation vulnerabilit…May 15, 2023›
CVE-2023-1137MEDIUM
6.5
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contain a vulnerability in which …Mar 27, 2023›
CVE-2022-3387MEDIUM
6.5
Advantech R-SeeNet Versions 2.4.19 and prior are vulnerable to path traversal attacks. An unauthori…Oct 27, 2022›
CVE-2022-2179MEDIUM
6.5
The X-Frame-Options header in Rockwell Automation MicroLogix 1100/1400 Versions 21.007 and prior is …Jul 20, 2022›
CVE-2022-30245MEDIUM
6.5
Honeywell Alerton Compass Software 1.6.5 allows unauthenticated configuration changes from remote us…Jul 15, 2022›
CVE-2022-32141MEDIUM
6.5
Multiple CODESYS Products are prone to a buffer over read. A low privileged remote attacker may craf…Jun 24, 2022›
CVE-2022-32140MEDIUM
6.5
Multiple CODESYS products are affected to a buffer overflow.A low privileged remote attacker may cra…Jun 24, 2022›
CVE-2022-32139MEDIUM
6.5
In multiple CODESYS products, a low privileged remote attacker may craft a request, which cause an o…Jun 24, 2022›
CVE-2022-32136MEDIUM
6.5
In multiple CODESYS products, a low privileged remote attacker may craft a request that cause a read…Jun 24, 2022›
CVE-2022-1596MEDIUM
6.5
Incorrect Permission Assignment for Critical Resource vulnerability in ABB REX640 PCL1, REX640 PCL2,…Jun 21, 2022›
CVE-2022-22513MEDIUM
6.5
An authenticated remote attacker can cause a null pointer dereference in the CmpSettings component o…Apr 7, 2022›
CVE-2021-34596MEDIUM
6.5
A crafted request may cause a read access to an uninitialized pointer in CODESYS V2 Runtime Toolkit …Oct 26, 2021›
CVE-2021-22272MEDIUM
6.5
The vulnerability origins in the commissioning process where an attacker of the ControlTouch can ent…Sep 27, 2021›
CVE-2021-32954MEDIUM
6.5
Advantech WebAccess/SCADA Versions 9.0.1 and prior is vulnerable to a directory traversal, which may…Jun 18, 2021›
CVE-2020-12521MEDIUM
6.5
On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS a specially crafted LLDP packe…Dec 17, 2020›
CVE-2020-12068MEDIUM
6.5
An issue was discovered in CODESYS Development System before 3.5.16.0. CODESYS WebVisu and CODESYS R…May 14, 2020›
CVE-2019-19101MEDIUM
6.5
A missing secure communication definition and an incomplete TLS validation in the upgrade service in…Apr 29, 2020›
CVE-2019-19001MEDIUM
6.5
For ABB eSOMS versions 4.0 to 6.0.2, the X-Frame-Options header is not configured in HTTP response. …Apr 2, 2020›
CVE-2019-19000MEDIUM
6.5
For ABB eSOMS 4.0 to 6.0.3, the Cache-Control and Pragma HTTP header(s) have not been properly confi…Apr 2, 2020›
CVE-2020-6999MEDIUM
6.5
In Moxa EDS-G516E Series firmware, Version 5.2 or lower, some of the parameters in the setting pages…Mar 26, 2020›
CVE-2020-7052MEDIUM
6.5
CODESYS Control V3, Gateway V3, and HMI V3 before 3.5.15.30 allow uncontrolled memory allocation whi…Jan 24, 2020›
CVE-2019-19789MEDIUM
6.5
3S-Smart CODESYS SP Realtime NT before V2.3.7.28, CODESYS Runtime Toolkit 32 bit full before V2.4.7.…Dec 20, 2019›
CVE-2019-18229MEDIUM
6.5
Advantech WISE-PaaS/RMM, Versions 3.3.29 and prior. Lack of sanitization of user-supplied input caus…Oct 31, 2019›
CVE-2019-14925MEDIUM
6.5
An issue was discovered on Mitsubishi Electric Europe B.V. ME-RTU devices through 2.02 and INEA ME-R…Oct 28, 2019›
CVE-2019-13542MEDIUM
6.5
3S-Smart Software Solutions GmbH CODESYS V3 OPC UA Server, all versions 3.5.11.0 to 3.5.15.0, allows…Sep 17, 2019›
CVE-2019-6559MEDIUM
6.5
Moxa IKS and EDS allow remote authenticated users to cause a denial of service via a specially craft…Mar 5, 2019›
CVE-2018-15706MEDIUM
6.5
WADashboard API in Advantech WebAccess 8.3.1 and 8.3.2 allows remote authenticated attackers to read…Oct 31, 2018›
CVE-2018-15705MEDIUM
6.5
WADashboard API in Advantech WebAccess 8.3.1 and 8.3.2 allows remote authenticated attackers to writ…Oct 31, 2018›
CVE-2018-14824MEDIUM
6.5
Delta Electronics Delta Industrial Automation PMSoft v2.11 or prior has an out-of-bounds read vulner…Sep 27, 2018›
CVE-2018-12979MEDIUM
6.5
An issue was discovered on WAGO e!DISPLAY 762-3000 through 762-3003 devices with firmware before FW …Jul 12, 2018›
CVE-2018-7770MEDIUM
6.5
The vulnerability exists within processing of sendmail.php in Schneider Electric U.motion Builder so…Jul 3, 2018›
CVE-2017-12124MEDIUM
6.5
An exploitable denial of service vulnerability exists in the web server functionality of Moxa EDR-81…May 14, 2018›
CVE-2017-12716MEDIUM
6.5
Abbott Laboratories Accent and Anthem pacemakers manufactured prior to Aug 28, 2017 transmit unencry…Apr 25, 2018›
CVE-2017-12714MEDIUM
6.5
Abbott Laboratories pacemakers manufactured prior to Aug 28, 2017 do not restrict or limit the numbe…Apr 25, 2018›
CVE-2018-7758MEDIUM
6.5
A denial of service vulnerability exists in Schneider Electric's MiCOM Px4x (P540 range excluded) wi…Apr 18, 2018›
CVE-2018-5449MEDIUM
6.5
A NULL Pointer Dereference issue was discovered in Moxa OnCell G3100-HSPA Series version 1.4 Build 1…Mar 5, 2018›
CVE-2017-16732MEDIUM
6.5
A use-after-free issue was discovered in Advantech WebAccess versions prior to 8.3. WebAccess allows…Jan 12, 2018›
CVE-2017-15583MEDIUM
6.5
The embedded web server on ABB Fox515T 1.0 devices is vulnerable to Local File Inclusion. It accepts…Oct 18, 2017›
CVE-2017-7971MEDIUM
6.5
A vulnerability exists in Schneider Electric's PowerSCADA Anywhere v1.0 redistributed with PowerSCAD…Sep 26, 2017›
CVE-2017-7970MEDIUM
6.5
A vulnerability exists in Schneider Electric's PowerSCADA Anywhere v1.0 redistributed with PowerSCAD…Sep 26, 2017›
CVE-2017-9945MEDIUM
6.5
In the Siemens 7KM PAC Switched Ethernet PROFINET expansion module (All versions < V2.1.3), a Denial…Aug 30, 2017›
CVE-2017-6872MEDIUM
6.5
A vulnerability was discovered in Siemens OZW672 (all versions) and OZW772 (all versions) that could…Aug 8, 2017›
CVE-2017-6866MEDIUM
6.5
A vulnerability was discovered in Siemens XHQ server 4 and 5 (4 before V4.7.1.3 and 5 before V5.0.0.…Aug 7, 2017›
CVE-2017-7916MEDIUM
6.5
A Permissions, Privileges, and Access Controls issue was discovered in ABB VSN300 WiFi Logger Card v…Aug 7, 2017›
CVE-2017-6030MEDIUM
6.5
A Predictable Value Range from Previous Values issue was discovered in Schneider Electric Modicon PL…Jun 30, 2017›
CVE-2017-2686MEDIUM
6.5
Siemens RUGGEDCOM ROX I (all versions) contain a vulnerability that could allow an authenticated use…Mar 29, 2017›
CVE-2016-8362MEDIUM
6.5
An issue was discovered in Moxa OnCell OnCellG3470A-LTE, AWK-1131A/3131A/4131A Series, AWK-3191 Seri…Feb 13, 2017›
CVE-2016-8564MEDIUM
6.5
SQL injection vulnerability in Siemens Automation License Manager (ALM) before 5.3 SP3 Update 1 allo…Oct 13, 2016›
CVE-2016-4524MEDIUM
6.5
ABB PCM600 before 2.7 improperly stores OPC Server IEC61850 passwords in unspecified temporary circu…Jun 10, 2016›
CVE-2016-2846MEDIUM
6.5
Siemens SIMATIC S7-1200 CPU devices before 4.0 allow remote attackers to bypass a "user program bloc…Mar 16, 2016›
CVE-2014-2365MEDIUM
6.5
Unspecified vulnerability in Advantech WebAccess before 7.2 allows remote authenticated users to cre…Jul 19, 2014›
CVE-2012-1234MEDIUM
6.5
SQL injection vulnerability in Advantech/BroadWin WebAccess 7.0 allows remote authenticated users to…Feb 21, 2012›
CVE-2008-3126MEDIUM
6.5
Multiple stack-based buffer overflows in the ServerView web interface (SnmpGetMibValues.exe) in Fuji…Jul 10, 2008›
CVE-2024-2453MEDIUM
6.4
There is an SQL injection vulnerability in Advantech WebAccess/SCADA software that allows an authen…Mar 21, 2024›
CVE-2023-3711MEDIUM
6.4
Session Fixation vulnerability in Honeywell PM43 on 32 bit, ARM (Printer web page modules) allows Se…Sep 12, 2023›
CVE-2014-5409MEDIUM
6.4
The 17046 Ethernet card before 94450214LFMT100SEM-L.R3-CL for the GE Digital Energy Hydran M2 does n…Mar 14, 2015›
CVE-2014-5413MEDIUM
6.4
Schneider Electric StruxureWare SCADA Expert ClearSCADA 2010 R3 through 2014 R1 uses the MD5 algorit…Sep 18, 2014›
CVE-2014-5412MEDIUM
6.4
Schneider Electric StruxureWare SCADA Expert ClearSCADA 2010 R3 through 2014 R1 allows remote attack…Sep 18, 2014›
CVE-2012-0237MEDIUM
6.4
Advantech/BroadWin WebAccess before 7.0 allows remote attackers to (1) enable date and time syncing …Feb 21, 2012›
CVE-2011-5058MEDIUM
6.4
The CmbWebserver.dll module of the Control service in 3S CoDeSys 3.4 SP4 Patch 2 allows remote attac…Jan 10, 2012›
CVE-2025-46268MEDIUM
6.3
Advantech WebAccess/SCADA  is vulnerable to SQL injection, which may allow an attacker to execute ar…Dec 18, 2025›
CVE-2024-39364MEDIUM
6.3
Advantech ADAM-5630 has built-in commands that can be executed without authenticating the user. Th…Sep 27, 2024›
CVE-2023-43816MEDIUM
6.3
A buffer overflow vulnerability exists in Delta Electronics Delta Industrial Automation DOPSoft vers…Jan 18, 2024›
CVE-2023-3324MEDIUM
6.3
A vulnerability exists by allowing low-privileged users to read and update the data in various dire…Jul 24, 2023›
CVE-2023-2063MEDIUM
6.3
Unrestricted Upload of File with Dangerous Type vulnerability in FTP function on Mitsubishi Electric…Jun 2, 2023›
CVE-2022-26080MEDIUM
6.3
Use of Insufficiently Random Values vulnerability in ABB Pulsar Plus System Controller NE843_S, ABB …Mar 16, 2023›
CVE-2021-35526MEDIUM
6.3
Backup file without encryption vulnerability is found in Hitachi ABB Power Grids System Data Manager…Sep 8, 2021›
CVE-2021-27887MEDIUM
6.3
Cross-site Scripting (XSS) vulnerability in the main dashboard of Ellipse APM versions allows an aut…Jun 14, 2021›
CVE-2019-19002MEDIUM
6.3
For ABB eSOMS versions 4.0 to 6.0.2, the X-XSS-Protection HTTP response header is not set in respons…Apr 2, 2020›
CVE-2017-14016MEDIUM
6.3
A Stack-based Buffer Overflow issue was discovered in Advantech WebAccess versions prior to V8.2_201…Nov 6, 2017›
CVE-2016-8350MEDIUM
6.3
An issue was discovered in Moxa ioLogik E1210, firmware Version V2.4 and prior, ioLogik E1211, firmw…Feb 13, 2017›
CVE-2016-2277MEDIUM
6.3
IAB.exe in Rockwell Automation Integrated Architecture Builder (IAB) before 9.6.0.8 and 9.7.x before…Apr 6, 2016›
CVE-2014-0755MEDIUM
6.3
Rockwell Automation RSLogix 5000 7 through 20.01, and 21.0, does not properly implement password pro…Feb 5, 2014›
CVE-2025-69652MEDIUM
6.2
GNU Binutils thru 2.46 readelf contains a vulnerability that leads to an abort (SIGABRT) when proces…Mar 6, 2026›
CVE-2023-2062MEDIUM
6.2
Missing Password Field Masking vulnerability in Mitsubishi Electric Corporation EtherNet/IP configur…Jun 2, 2023›
CVE-2023-2061MEDIUM
6.2
Use of Hard-coded Password vulnerability in FTP function on Mitsubishi Electric Corporation MELSEC i…Jun 2, 2023›
CVE-2022-43485MEDIUM
6.2
Use of Insufficiently Random Values in Honeywell OneWireless. This vulnerability may allow attacker…May 30, 2023›
CVE-2021-22283MEDIUM
6.2
Improper Initialization vulnerability in ABB Relion protection relays - 611 series, ABB Relion prote…Feb 28, 2023›
CVE-2022-2332MEDIUM
6.2
A local unprivileged attacker may escalate to administrator privileges in Honeywell SoftMaster versi…Sep 16, 2022›
CVE-2022-34837MEDIUM
6.2
Storing Passwords in a Recoverable Format vulnerability in ABB Zenon 8.20 allows an attacker who suc…Aug 24, 2022›
CVE-2019-19107MEDIUM
6.2
The Configuration pages in ABB Telephone Gateway TG/S 3.2 and Busch-Jaeger 6186/11 Telefon-Gateway f…Apr 22, 2020›
CVE-2019-19105MEDIUM
6.2
The backup function in ABB Telephone Gateway TG/S 3.2 and Busch-Jaeger 6186/11 Telefon-Gateway saves…Apr 22, 2020›
CVE-2025-66596MEDIUM
6.1
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This prod…Feb 9, 2026›
CVE-2025-66601MEDIUM
6.1
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This prod…Feb 9, 2026›
CVE-2025-12143MEDIUM
6.1
Stack-based Buffer Overflow vulnerability in ABB Terra AC wallbox.This issue affects Terra AC wallbo…Nov 28, 2025›
CVE-2025-12142MEDIUM
6.1
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in ABB Terra AC…Oct 29, 2025›
CVE-2025-11498MEDIUM
6.1
An Improper Neutralization of Formula Elements in a CSV File vulnerability exists in System Diagnost…Oct 14, 2025›
CVE-2025-3448MEDIUM
6.1
Reflected cross-site scripting (XSS) vulnerabilities exist in System Diagnostics Manager (SDM) of B&…Oct 7, 2025›
CVE-2025-10504MEDIUM
6.1
Heap-based Buffer Overflow vulnerability in ABB Terra AC wallbox.This issue affects Terra AC wallbox…Sep 29, 2025›
CVE-2023-6028MEDIUM
6.1
A reflected cross-site scripting (XSS) vulnerability exists in the SVG version of System Diagnostics…Feb 5, 2024›
CVE-2024-21732MEDIUM
6.1
FlyCms through abbaa5a allows XSS via the permission management feature.Jan 1, 2024›
CVE-2022-4286MEDIUM
6.1
A reflected cross-site scripting (XSS) vulnerability exists in System Diagnostics Manager of B&R Au…Feb 14, 2023›
CVE-2022-40268MEDIUM
6.1
Improper Restriction of Rendered UI Layers or Frames vulnerability in Mitsubishi Electric Corporatio…Feb 2, 2023›
CVE-2022-33322MEDIUM
6.1
Cross-site scripting vulnerability in Mitsubishi Electric consumer electronics products (Air Conditi…Nov 8, 2022›
CVE-2022-2463MEDIUM
6.1
Rockwell Automation ISaGRAF Workbench software versions 6.0 through 6.6.9 are affected by a Path Tra…Aug 25, 2022›
CVE-2022-33005MEDIUM
6.1
A cross-site scripting (XSS) vulnerability in the System Settings/IOT Settings module of Delta Elect…Jun 27, 2022›
CVE-2022-28702MEDIUM
6.1
Incorrect Default Permissions vulnerability in ABB e-Design allows attacker to install malicious sof…Jun 2, 2022›
CVE-2021-44768MEDIUM
6.1
Delta Electronics CNCSoft (Version 1.01.30) and prior) is vulnerable to an out-of-bounds read while …Mar 25, 2022›
CVE-2021-27473MEDIUM
6.1
Rockwell Automation Connected Components Workbench v12.00.00 and prior does not sanitize paths speci…Mar 23, 2022›
CVE-2022-23127MEDIUM
6.1
Cross-site Scripting vulnerability in Mitsubishi Electric MC Works64 versions 4.04E (10.95.210.01) a…Jan 21, 2022›
CVE-2018-16061MEDIUM
6.1
Mitsubishi Electric Europe B.V. SmartRTU devices allow XSS via the username parameter or PATH_INFO t…Oct 15, 2021›
CVE-2021-39278MEDIUM
6.1
Certain MOXA devices allow reflected XSS via the Config Import menu. This affects WAC-2004 1.7, WAC-…Sep 7, 2021›
CVE-2021-21803MEDIUM
6.1
This vulnerability is present in device_graph_page.php script, which is a part of the Advantech R-Se…Jul 16, 2021›
CVE-2021-21802MEDIUM
6.1
This vulnerability is present in device_graph_page.php script, which is a part of the Advantech R-Se…Jul 16, 2021›
CVE-2021-21801MEDIUM
6.1
This vulnerability is present in device_graph_page.php script, which is a part of the Advantech R-Se…Jul 16, 2021›
CVE-2021-21800MEDIUM
6.1
Cross-site scripting vulnerabilities exist in the ssh_form.php script functionality of Advantech R-S…Jul 16, 2021›
CVE-2021-21799MEDIUM
6.1
Cross-site scripting vulnerabilities exist in the telnet_form.php script functionality of Advantech …Jul 16, 2021›
CVE-2021-32956MEDIUM
6.1
Advantech WebAccess/SCADA Versions 9.0.1 and prior is vulnerable to redirection, which may allow an …Jun 18, 2021›
CVE-2021-34540MEDIUM
6.1
Advantech WebAccess 8.4.2 and 8.4.4 allows XSS via the username column of the bwRoot.asp page of WAD…Jun 11, 2021›
CVE-2019-18233MEDIUM
6.1
In Advantech Spectre RT Industrial Routers ERT351 5.1.3 and prior, the affected product does not neu…Mar 17, 2021›
CVE-2019-19096MEDIUM
6.1
The Redis data structure component used in ABB eSOMS versions 6.0 to 6.0.2 stores credentials in cle…Apr 2, 2020›
CVE-2019-19089MEDIUM
6.1
For ABB eSOMS versions 4.0 to 6.0.3, the X-Content-Type-Options Header is missing in the HTTP respon…Apr 2, 2020›
CVE-2020-7579MEDIUM
6.1
A vulnerability has been identified in Spectrum Power™ 5 (All versions < v5.50 HF02). The web server…Mar 10, 2020›
CVE-2019-14653MEDIUM
6.1
pandao Editor.md 1.5.0 allows XSS via an attribute of an ABBR or SUP element.Aug 3, 2019›
CVE-2018-10700MEDIUM
6.1
An issue was discovered on Moxa AWK-3121 1.19 devices. It provides functionality so that an administ…Jun 7, 2019›
CVE-2018-10692MEDIUM
6.1
An issue was discovered on Moxa AWK-3121 1.14 devices. The session cookie "Password508" does not hav…Jun 7, 2019›
CVE-2019-10955MEDIUM
6.1
In Rockwell Automation MicroLogix 1400 Controllers Series A, All Versions Series B, v15.002 and earl…Apr 25, 2019›
CVE-2016-5819MEDIUM
6.1
Moxa G3100V2 Series, editions prior to Version 2.8, and OnCell G3111/G3151/G3211/G3251 Series, editi…Mar 21, 2019›
CVE-2019-6565MEDIUM
6.1
Moxa IKS and EDS fails to properly validate user input, giving unauthenticated and authenticated att…Mar 5, 2019›
CVE-2018-18997MEDIUM
6.1
Pluto Safety PLC Gateway Ethernet devices in ABB GATE-E1 and GATE-E2 all versions allows an unauthen…Jan 3, 2019›
CVE-2018-19615MEDIUM
6.1
Rockwell Automation Allen-Bradley PowerMonitor 1000 all versions. A remote attacker could inject arb…Dec 26, 2018›
CVE-2018-15703MEDIUM
6.1
Advantech WebAccess 8.3.2 and below is vulnerable to multiple reflected cross site scripting vulnera…Oct 22, 2018›
CVE-2018-16210MEDIUM
6.1
WAGO 750-88X and WAGO 750-89X Ethernet Controller devices, versions 01.09.18(13) and before, have XS…Oct 12, 2018›
CVE-2018-7795MEDIUM
6.1
A Cross Protocol Injection vulnerability exists in Schneider Electric's PowerLogic (PM5560 prior to …Aug 29, 2018›
CVE-2018-11450MEDIUM
6.1
A reflected Cross-Site-Scripting (XSS) vulnerability has been identified in Siemens PLM Software TEA…Jul 9, 2018›
CVE-2018-7786MEDIUM
6.1
In Schneider Electric U.motion Builder software versions prior to v1.3.4, a cross site scripting (XS…Jul 3, 2018›
CVE-2018-8714MEDIUM
6.1
Honeywell MatrikonOPC OPC Controller before 5.1.0.0 allows local users to transfer arbitrary files f…May 17, 2018›
CVE-2018-10591MEDIUM
6.1
In Advantech WebAccess versions V8.2_20170817 and prior, WebAccess versions V8.3.0 and prior, WebAcc…May 15, 2018›
CVE-2017-16723MEDIUM
6.1
A Cross-site Scripting issue was discovered in PHOENIX CONTACT FL COMSERVER BASIC 232/422/485, FL CO…Dec 11, 2017›
CVE-2017-12738MEDIUM
6.1
An issue was discovered on Siemens SICAM RTUs SM-2556 COM Modules with the firmware variants ENOS00,…Nov 15, 2017›
CVE-2016-8719MEDIUM
6.1
An exploitable reflected Cross-Site Scripting vulnerability exists in the Web Application functional…Apr 12, 2017›
CVE-2017-2687MEDIUM
6.1
Siemens RUGGEDCOM ROX I (all versions) contain a vulnerability in the integrated web server at port …Mar 29, 2017›
CVE-2017-5157MEDIUM
6.1
An issue was discovered in Schneider Electric homeLYnk Controller, LSS100100, all versions prior to …Feb 13, 2017›
CVE-2016-9371MEDIUM
6.1
An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions pr…Feb 13, 2017›
CVE-2016-8359MEDIUM
6.1
An issue was discovered in Moxa ioLogik E1210, firmware Version V2.4 and prior, ioLogik E1211, firmw…Feb 13, 2017›
CVE-2016-6204MEDIUM
6.1
Cross-site scripting (XSS) vulnerability in the integrated web server in Siemens SINEMA Remote Conne…Jul 22, 2016›
CVE-2016-4513MEDIUM
6.1
Cross-site scripting (XSS) vulnerability in the Schneider Electric PowerLogic PM8ECC module before 2…Jun 26, 2016›
CVE-2016-2279MEDIUM
6.1
Cross-site scripting (XSS) vulnerability in the web server in Rockwell Automation Allen-Bradley Comp…Mar 2, 2016›
CVE-2016-1488MEDIUM
6.1
Cross-site scripting (XSS) vulnerability in the login form in the integrated web server on Siemens O…Jan 30, 2016›
CVE-2014-2252MEDIUM
6.1
Siemens SIMATIC S7-1200 CPU PLC devices with firmware before 4.0 allow remote attackers to cause a d…Mar 24, 2014›
CVE-2014-2253MEDIUM
6.1
Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allow remote attackers to cause a…Mar 16, 2014›
CVE-2013-0675MEDIUM
6.1
Buffer overflow in CCEServer (aka the central communications component) in Siemens WinCC before 7.2,…Mar 21, 2013›
CVE-2012-1800MEDIUM
6.1
Stack-based buffer overflow in the Profinet DCP protocol implementation on the Siemens Scalance S Se…Apr 18, 2012›
CVE-2012-0930MEDIUM
6.1
Cross-site scripting (XSS) vulnerability in Schneider Electric Modicon Quantum PLC allows remote att…Jan 28, 2012›
CVE-2017-5141MEDIUM
6.0
An issue was discovered in Honeywell XL Web II controller XL1000C500 XLWebExe-2-01-00 and prior, and…Feb 13, 2017›
CVE-2014-4684MEDIUM
6.0
The database server in Siemens SIMATIC WinCC before 7.3, as used in PCS7 and other products, allows …Jul 24, 2014›
CVE-2012-1235MEDIUM
6.0
Cross-site request forgery (CSRF) vulnerability in Advantech/BroadWin WebAccess 7.0 allows remote au…Feb 21, 2012›
CVE-2012-0235MEDIUM
6.0
Cross-site request forgery (CSRF) vulnerability in Advantech/BroadWin WebAccess before 7.0 allows re…Feb 21, 2012›
CVE-2025-2399MEDIUM
5.9
Improper Validation of Specified Index, Position, or Offset in Input vulnerability in Mitsubishi Ele…Mar 10, 2026›
CVE-2025-41739MEDIUM
5.9
An unauthenticated remote attacker, who beats a race condition, can exploit a flaw in the communicat…Dec 1, 2025›
CVE-2025-7376MEDIUM
5.9
Windows Shortcut Following (.LNK) vulnerability in multiple processes of Mitsubishi Electric Iconics…Aug 6, 2025›
CVE-2024-8036MEDIUM
5.9
ABB is aware of privately reported vulnerabilities in the product versions referenced in this CVE. A…Oct 25, 2024›
CVE-2024-7316MEDIUM
5.9
Improper Validation of Specified Quantity in Input vulnerability in Mitsubishi Electric CNC Series a…Oct 17, 2024›
CVE-2024-1573MEDIUM
5.9
Missing Authentication for Critical Function vulnerability in the mobile monitoring feature of Mitsu…Jul 4, 2024›
CVE-2023-5407MEDIUM
5.9
Controller denial of service due to improper handling of a specially crafted message received by the…Apr 17, 2024›
CVE-2023-5406MEDIUM
5.9
Server communication with a controller can lead to remote code execution using a specially crafted m…Apr 17, 2024›
CVE-2023-5405MEDIUM
5.9
Server information leak for the CDA Server process memory can occur when an error is generated in re…Apr 17, 2024›
CVE-2023-5398MEDIUM
5.9
Server receiving a malformed message based on a list of IPs resulting in heap corruption causing a d…Apr 17, 2024›
CVE-2023-6374MEDIUM
5.9
Authentication Bypass by Capture-replay vulnerability in Mitsubishi Electric Corporation MELSEC WS S…Jan 30, 2024›
CVE-2023-3373MEDIUM
5.9
Predictable Exact Value from Previous Values vulnerability in Mitsubishi Electric Corporation GOT200…Aug 4, 2023›
CVE-2023-3323MEDIUM
5.9
A vulnerability exists by allowing low-privileged users to read and update the data in various dire…Jul 24, 2023›
CVE-2023-2638MEDIUM
5.9
Rockwell Automation's FactoryTalk System Services does not verify that a backup configuration archi…Jun 13, 2023›
CVE-2022-40267MEDIUM
5.9
Predictable Seed in Pseudo-Random Number Generator (PRNG) vulnerability in Mitsubishi Electric Corpo…Jan 20, 2023›
CVE-2022-2791MEDIUM
5.9
Emerson Electric's Proficy Machine Edition Version 9.00 and prior is vulnerable to CWE-434 Unrestric…Nov 22, 2022›
CVE-2022-34836MEDIUM
5.9
Relative Path Traversal vulnerability in ABB Zenon 8.20 allows the user to access files on the Zenon…Aug 24, 2022›
CVE-2022-2793MEDIUM
5.9
Emerson Electric's Proficy Machine Edition Version 9.00 and prior is vulenrable to CWE-353 Missing S…Aug 19, 2022›
CVE-2022-2790MEDIUM
5.9
Emerson Electric's Proficy Machine Edition Version 9.00 and prior is vulenrable to CWE-347 Improper …Aug 19, 2022›
CVE-2022-25160MEDIUM
5.9
Cleartext Storage of Sensitive Information vulnerability in Mitsubishi Electric MELSEC iQ-F series F…Apr 1, 2022›
CVE-2022-23130MEDIUM
5.9
Buffer Over-read vulnerability in Mitsubishi Electric MC Works64 versions 4.00A to 4.04E, Mitsubishi…Jan 21, 2022›
CVE-2021-38424MEDIUM
5.9
The tag interface of Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to an attack…Nov 3, 2021›
CVE-2021-20600MEDIUM
5.9
Uncontrolled resource consumption in Mitsubishi Electric MELSEC iQ-R series C Controller Module R12C…Oct 8, 2021›
CVE-2019-19097MEDIUM
5.9
ABB eSOMS versions 4.0 to 6.0.3 accept connections using medium strength ciphers. If a connection is…Apr 2, 2020›
CVE-2019-13555MEDIUM
5.9
In Mitsubishi Electric MELSEC-Q Series Q03/04/06/13/26UDVCPU: serial number 21081 and prior, Q04/06/…Nov 13, 2019›
CVE-2019-10997MEDIUM
5.9
An issue was discovered on Phoenix Contact AXC F 2152 (No.2404267) before 2019.0 LTS and AXC F 2152 …Jun 17, 2019›
CVE-2017-16718MEDIUM
5.9
Beckhoff TwinCAT 3 supports communication over ADS. ADS is a protocol for industrial automation in p…Jun 27, 2018›
CVE-2017-9968MEDIUM
5.9
A security misconfiguration vulnerability exists in Schneider Electric's IGSS Mobile application ver…Feb 12, 2018›
CVE-2017-12740MEDIUM
5.9
Siemens LOGO! Soft Comfort (All versions before V8.2) lacks integrity verification of software packa…Dec 26, 2017›
CVE-2017-6141MEDIUM
5.9
In F5 BIG-IP LTM, AAM, AFM, APM, ASM, Link Controller, PEM, and WebSafe 12.1.0 through 12.1.2, certa…Oct 20, 2017›
CVE-2017-6024MEDIUM
5.9
A Resource Exhaustion issue was discovered in Rockwell Automation ControlLogix 5580 controllers V28.…May 6, 2017›
CVE-2025-7745MEDIUM
5.8
Buffer Over-read vulnerability in ABB AC500 V2.This issue affects AC500 V2: through 2.5.2.Jul 24, 2025›
CVE-2020-6998MEDIUM
5.8
The connection establishment algorithm found in Rockwell Automation CompactLogix 5370 and ControlLog…Jul 27, 2022›
CVE-2022-1261MEDIUM
5.8
Matrikon, a subsidary of Honeywell Matrikon OPC Server (all versions) is vulnerable to a condition w…May 26, 2022›
CVE-2020-11637MEDIUM
5.8
A memory leak in the TFTP service in B&R Automation Runtime versions <N4.26, <N4.34, <F4.45, <E4.53,…Oct 15, 2020›
CVE-2018-14825MEDIUM
5.8
On Honeywell Mobile Computers (CT60 running Android OS 7.1, CN80 running Android OS 7.1, CT40 runnin…Sep 24, 2018›
CVE-2018-5477MEDIUM
5.8
An Information Exposure issue was discovered in ABB netCADOPS Web Application Version 3.4 and prior,…Feb 20, 2018›
CVE-2017-9965MEDIUM
5.8
An exposure of sensitive information vulnerability exists in Schneider Electric's Pelco VideoXpert E…Jan 2, 2018›
CVE-2016-4500MEDIUM
5.8
Moxa UC-7408 LX-Plus devices allow remote authenticated users to write to the firmware, and conseque…Jun 1, 2016›
CVE-2015-5717MEDIUM
5.8
The Siemens COMPAS Mobile application before 1.6 for Android does not properly verify X.509 certific…Aug 31, 2015›
CVE-2015-3963MEDIUM
5.8
Wind River VxWorks before 5.5.1, 6.5.x through 6.7.x before 6.7.1.1, 6.8.x before 6.8.3, 6.9.x befor…Aug 4, 2015›
CVE-2015-1596MEDIUM
5.8
The Siemens SPCanywhere application for Android and iOS does not properly verify X.509 certificates …Mar 7, 2015›
CVE-2014-2909MEDIUM
5.8
CRLF injection vulnerability in the integrated web server on Siemens SIMATIC S7-1200 CPU devices 2.x…Apr 25, 2014›
CVE-2014-2249MEDIUM
5.8
Cross-site request forgery (CSRF) vulnerability on Siemens SIMATIC S7-1500 CPU PLC devices with firm…Mar 16, 2014›
CVE-2014-2247MEDIUM
5.8
The integrated web server on Siemens SIMATIC S7-1500 CPU PLC devices with firmware before 1.5.0 allo…Mar 16, 2014›
CVE-2013-4912MEDIUM
5.8
Open redirect vulnerability in Siemens WinCC (TIA Portal) 11 and 12 before 12 SP1 allows remote atta…Aug 1, 2013›
CVE-2013-0253MEDIUM
5.8
The default configuration of Apache Maven 3.0.4, when using Maven Wagon 2.1, disables SSL certificat…Apr 9, 2013›
CVE-2013-0677MEDIUM
5.8
The web server in Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other product…Mar 21, 2013›
CVE-2012-3003MEDIUM
5.8
Open redirect vulnerability in an unspecified web application in Siemens WinCC 7.0 SP3 before Update…Jun 8, 2012›
CVE-2011-4056MEDIUM
5.8
An unspecified ActiveX control in ActBar.ocx in Siemens Tecnomatix FactoryLink 6.6.1 (aka 6.6 SP1), …Jan 8, 2012›
CVE-2024-49501MEDIUM
5.7
Sysmac Studio provided by OMRON Corporation contains an incorrect authorization vulnerability. If th…Nov 1, 2024›
CVE-2024-37187MEDIUM
5.7
Advantech ADAM-5550 share user credentials with a low level of encryption, consisting of base 64 enc…Sep 27, 2024›
CVE-2024-34542MEDIUM
5.7
Advantech ADAM-5630 shares user credentials plain text between the device and the user source device…Sep 27, 2024›
CVE-2024-3036MEDIUM
5.7
Improper Input Validation vulnerability in ABB 800xA Base. An attacker who successfully exploited th…Jun 21, 2024›
CVE-2019-7231MEDIUM
5.7
The ABB IDAL FTP server is vulnerable to a buffer overflow when a long string is sent by an authenti…Jun 24, 2019›
CVE-2022-29825MEDIUM
5.6
Use of Hard-coded Password vulnerability in Mitsubishi Electric GX Works3 versions from 1.000A to 1.…Nov 25, 2022›
CVE-2022-50549MEDIUM
5.5
In the Linux kernel, the following vulnerability has been resolved: dm thin: Fix ABBA deadlock betw…Oct 7, 2025›
CVE-2023-53591MEDIUM
5.5
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix deadlock in tc r…Oct 4, 2025›
CVE-2022-50268MEDIUM
5.5
In the Linux kernel, the following vulnerability has been resolved: mmc: moxart: fix return value c…Sep 15, 2025›
CVE-2025-57704MEDIUM
5.5
Delta Electronics EIP Builder version 1.11 is vulnerable to a File Parsing XML External Entity Proce…Aug 26, 2025›
CVE-2025-41658MEDIUM
5.5
CODESYS Runtime Toolkit-based products may expose sensitive files to local low-privileged operating …Aug 4, 2025›
CVE-2022-49943MEDIUM
5.5
In the Linux kernel, the following vulnerability has been resolved: USB: gadget: Fix obscure lockde…Jun 18, 2025›
CVE-2022-49931MEDIUM
5.5
In the Linux kernel, the following vulnerability has been resolved: IB/hfi1: Correctly move list in…May 1, 2025›
CVE-2025-22030MEDIUM
5.5
In the Linux kernel, the following vulnerability has been resolved: mm: zswap: fix crypto_free_acom…Apr 16, 2025›
CVE-2025-3618MEDIUM
5.5
A denial-of-service vulnerability exists in the Rockwell Automation ThinManager. The software fails …Apr 15, 2025›
CVE-2025-21807MEDIUM
5.5
In the Linux kernel, the following vulnerability has been resolved: block: fix queue freeze vs limi…Feb 27, 2025›
CVE-2024-54683MEDIUM
5.5
In the Linux kernel, the following vulnerability has been resolved: netfilter: IDLETIMER: Fix for p…Jan 11, 2025›
CVE-2024-49976MEDIUM
5.5
In the Linux kernel, the following vulnerability has been resolved: tracing/timerlat: Drop interfac…Oct 21, 2024›
CVE-2024-42294MEDIUM
5.5
In the Linux kernel, the following vulnerability has been resolved: block: fix deadlock between sd_…Aug 17, 2024›
CVE-2024-6326MEDIUM
5.5
An exposure of sensitive information vulnerability exists in the Rockwell Automation FactoryTalk® Sy…Jul 16, 2024›
CVE-2024-27435MEDIUM
5.5
In the Linux kernel, the following vulnerability has been resolved: nvme: fix reconnection fail due…May 17, 2024›
CVE-2024-27004MEDIUM
5.5
In the Linux kernel, the following vulnerability has been resolved: clk: Get runtime PM before walk…May 1, 2024›
CVE-2024-26725MEDIUM
5.5
In the Linux kernel, the following vulnerability has been resolved: dpll: fix possible deadlock dur…Apr 3, 2024›
CVE-2023-29024MEDIUM
5.5
A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product …May 11, 2023›
CVE-2023-22322MEDIUM
5.5
Improper restriction of XML external entity reference (XXE) vulnerability exists in OMRON CX-Motion …Jan 30, 2023›
CVE-2022-2759MEDIUM
5.5
Delta Electronics Delta Robot Automation Studio (DRAS) versions prior to 1.13.20 are affected by imp…Aug 31, 2022›
CVE-2022-1794MEDIUM
5.5
The CODESYS OPC DA Server prior V3.5.18.20 stores PLC passwords as plain text in its configuration f…Jul 11, 2022›
CVE-2021-27416MEDIUM
5.5
An attacker could exploit this vulnerability in Hitachi ABB Power Grids Ellipse Enterprise Asset Man…Mar 11, 2022›
CVE-2021-27414MEDIUM
5.5
An attacker could trick a user of Hitachi ABB Power Grids Ellipse Enterprise Asset Management (EAM) …Mar 11, 2022›
CVE-2021-22809MEDIUM
5.5
A CWE-125:Out-of-Bounds Read vulnerability exists that could cause unintended data disclosure when a…Jan 28, 2022›
CVE-2022-23129MEDIUM
5.5
Plaintext Storage of a Password vulnerability in Mitsubishi Electric MC Works64 versions 4.04E (10.9…Jan 21, 2022›
CVE-2021-20607MEDIUM
5.5
Integer Underflow vulnerability in Mitsubishi Electric GX Works2 versions 1.606G and prior, Mitsubis…Dec 17, 2021›
CVE-2021-20606MEDIUM
5.5
Out-of-bounds Read vulnerability in Mitsubishi Electric GX Works2 versions 1.606G and prior, Mitsubi…Dec 17, 2021›
CVE-2021-38488MEDIUM
5.5
Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to cross-site scripting because a…Nov 3, 2021›
CVE-2021-38428MEDIUM
5.5
Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to cross-site scripting because a…Nov 3, 2021›
CVE-2021-38411MEDIUM
5.5
Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to cross-site scripting because a…Nov 3, 2021›
CVE-2021-38407MEDIUM
5.5
Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to cross-site scripting because a…Nov 3, 2021›
CVE-2021-38403MEDIUM
5.5
Delta Electronics DIALink versions 1.2.4.0 and prior is vulnerable to cross-site scripting because a…Nov 3, 2021›
CVE-2021-33003MEDIUM
5.5
Delta Electronics DIAEnergie Version 1.7.5 and prior may allow an attacker to retrieve passwords in …Aug 30, 2021›
CVE-2021-27455MEDIUM
5.5
Delta Electronics DOPSoft Versions 4.0.10.17 and prior are vulnerable to an out-of-bounds read while…Jul 2, 2021›
CVE-2020-12518MEDIUM
5.5
On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS an attacker can use the knowle…Dec 17, 2020›
CVE-2020-16211MEDIUM
5.5
Advantech WebAccess HMI Designer, Versions 2.1.9.31 and prior. An out-of-bounds read vulnerability m…Aug 6, 2020›
CVE-2019-19102MEDIUM
5.5
A directory traversal vulnerability in SharpZipLib used in the upgrade service in B&R Automation Stu…Apr 29, 2020›
CVE-2020-8472MEDIUM
5.5
Insufficient folder permissions used by system functions in ABB System 800xA products OPCServer for …Apr 29, 2020›
CVE-2019-5177MEDIUM
5.5
An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service ‘I/O…Mar 12, 2020›
CVE-2019-5176MEDIUM
5.5
An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service ‘I/O…Mar 12, 2020›
CVE-2019-5182MEDIUM
5.5
An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service ‘I/O…Mar 11, 2020›
CVE-2019-5106MEDIUM
5.5
A hard-coded encryption key vulnerability exists in the authentication functionality of WAGO e!Cockp…Mar 11, 2020›
CVE-2019-10976MEDIUM
5.5
Mitsubishi Electric FR Configurator2, Version 1.16S and prior. This vulnerability is triggered when …Jul 26, 2019›
CVE-2019-10972MEDIUM
5.5
Mitsubishi Electric FR Configurator2, Version 1.16S and prior. This vulnerability can be triggered w…Jul 26, 2019›
CVE-2019-10992MEDIUM
5.5
Delta Electronics CNCSoft ScreenEditor, Versions 1.00.89 and prior. Multiple out-of-bounds read vuln…Jul 24, 2019›
CVE-2018-8843MEDIUM
5.5
Rockwell Automation Arena versions 15.10.00 and prior contains a use after free vulnerability caused…May 14, 2018›
CVE-2017-14025MEDIUM
5.5
An Improper Input Validation issue was discovered in ABB FOX515T release 1.0. An improper input vali…Nov 6, 2017›
CVE-2017-9959MEDIUM
5.5
A vulnerability exists in Schneider Electric's U.motion Builder software versions 1.2.1 and prior in…Sep 26, 2017›
CVE-2017-7972MEDIUM
5.5
A vulnerability exists in Schneider Electric's PowerSCADA Anywhere v1.0 redistributed with PowerSCAD…Sep 26, 2017›
CVE-2017-7967MEDIUM
5.5
All versions of VAMPSET software produced by Schneider Electric, prior to V2.2.189, are susceptible …May 9, 2017›
CVE-2016-9354MEDIUM
5.5
An issue was discovered in Moxa DACenter Versions 1.4 and older. A specially crafted project file ma…Feb 13, 2017›
CVE-2012-2596MEDIUM
5.5
The XPath functionality in unspecified web applications in Siemens WinCC 7.0 SP3 before Update 2 doe…Jun 8, 2012›
CVE-2025-66595MEDIUM
5.4
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This prod…Feb 9, 2026›
CVE-2025-34266MEDIUM
5.4
Advantech WISE-DeviceOn Server versions prior to 5.4 contain a stored cross-site scripting (XSS) vul…Dec 5, 2025›
CVE-2025-34265MEDIUM
5.4
Advantech WISE-DeviceOn Server versions prior to 5.4 contain a stored cross-site scripting (XSS) vul…Dec 5, 2025›
CVE-2025-34264MEDIUM
5.4
Advantech WISE-DeviceOn Server versions prior to 5.4 contain a stored cross-site scripting (XSS) vul…Dec 5, 2025›
CVE-2025-34263MEDIUM
5.4
Advantech WISE-DeviceOn Server versions prior to 5.4 contain a stored cross-site scripting (XSS) vul…Dec 5, 2025›
CVE-2025-34262MEDIUM
5.4
Advantech WISE-DeviceOn Server versions prior to 5.4 contain a stored cross-site scripting (XSS) vul…Dec 5, 2025›
CVE-2025-34261MEDIUM
5.4
Advantech WISE-DeviceOn Server versions prior to 5.4 contain a stored cross-site scripting (XSS) vul…Dec 5, 2025›
CVE-2025-34260MEDIUM
5.4
Advantech WISE-DeviceOn Server versions prior to 5.4 contain a stored cross-site scripting (XSS) vul…Dec 5, 2025›
CVE-2025-34259MEDIUM
5.4
Advantech WISE-DeviceOn Server versions prior to 5.4 contain a stored cross-site scripting (XSS) vul…Dec 5, 2025›
CVE-2025-34258MEDIUM
5.4
Advantech WISE-DeviceOn Server versions prior to 5.4 contain a stored cross-site scripting (XSS) vul…Dec 5, 2025›
CVE-2025-34257MEDIUM
5.4
Advantech WISE-DeviceOn Server versions prior to 5.4 contain a stored cross-site scripting (XSS) vul…Dec 5, 2025›
CVE-2025-34237MEDIUM
5.4
Advantech WebAccess/VPN versions prior to 1.1.5 contain a stored cross-site scripting (XSS) vulnerab…Nov 6, 2025›
CVE-2025-34236MEDIUM
5.4
Advantech WebAccess/VPN versions prior to 1.1.5 contain a stored cross-site scripting (XSS) vulnerab…Nov 6, 2025›
CVE-2025-53519MEDIUM
5.4
A vulnerability exists in Advantech iView versions prior to 5.7.05 build 7057, which could allow a …Jul 11, 2025›
CVE-2025-53397MEDIUM
5.4
A vulnerability exists in Advantech iView versions prior to 5.7.05 build 7057, which could allow a …Jul 11, 2025›
CVE-2025-41442MEDIUM
5.4
A vulnerability exists in Advantech iView versions prior to 5.7.05 build 7057, which could allow a …Jul 11, 2025›
CVE-2023-0580MEDIUM
5.4
Insecure Storage of Sensitive Information vulnerability in ABB My Control System (on-premise) allows…Apr 6, 2023›
CVE-2022-41313MEDIUM
5.4
A stored cross-site scripting vulnerability exists in the web application functionality of Moxa SDS-…Feb 7, 2023›
CVE-2022-41312MEDIUM
5.4
A stored cross-site scripting vulnerability exists in the web application functionality of Moxa SDS-…Feb 7, 2023›
CVE-2022-41311MEDIUM
5.4
A stored cross-site scripting vulnerability exists in the web application functionality of Moxa SDS-…Feb 7, 2023›
CVE-2022-42141MEDIUM
5.4
Delta Electronics DX-2100-L1-CN 2.42 is vulnerable to Cross Site Scripting (XSS) via lform/urlfilter…Dec 14, 2022›
CVE-2022-1658MEDIUM
5.4
Vulnerable versions of the Jupiter Theme (<= 6.10.1) allow arbitrary plugin deletion by any authenti…Jun 13, 2022›
CVE-2020-12523MEDIUM
5.4
On Phoenix Contact mGuard Devices versions before 8.8.3 LAN ports get functional after reboot even i…Dec 17, 2020›
CVE-2019-19095MEDIUM
5.4
Lack of adequate input/output validation for ABB eSOMS versions 4.0 to 6.0.2 might allow an attacker…Apr 2, 2020›
CVE-2019-14928MEDIUM
5.4
An issue was discovered on Mitsubishi Electric Europe B.V. ME-RTU devices through 2.02 and INEA ME-R…Oct 28, 2019›
CVE-2015-6462MEDIUM
5.4
Reflected Cross-Site Scripting (nonpersistent) allows an attacker to craft a specific URL, which con…Mar 21, 2019›
CVE-2015-6461MEDIUM
5.4
Remote file inclusion allows an attacker to craft a specific URL referencing the Schneider Electric …Mar 21, 2019›
CVE-2018-15707MEDIUM
5.4
Advantech WebAccess 8.3.1 and 8.3.2 are vulnerable to cross-site scripting in the Bwmainleft.asp pag…Oct 31, 2018›
CVE-2018-12981MEDIUM
5.4
An issue was discovered on WAGO e!DISPLAY 762-3000 through 762-3003 devices with firmware before FW …Jul 12, 2018›
CVE-2017-6871MEDIUM
5.4
A vulnerability was discovered in Siemens SIMATIC WinCC Sm@rtClient for Android (All versions before…Aug 8, 2017›
CVE-2017-6864MEDIUM
5.4
The integrated web server in Siemens RUGGEDCOM ROX I (all versions) at port 10000/TCP could allow an…Mar 29, 2017›
CVE-2015-3948MEDIUM
5.4
Cross-site scripting (XSS) vulnerability in Advantech WebAccess before 8.1 allows remote authenticat…Jan 15, 2016›
CVE-2015-3610MEDIUM
5.4
The Siemens HomeControl for Room Automation application before 2.0.1 for Android does not verify X.5…May 7, 2015›
CVE-2014-6759MEDIUM
5.4
The Downton Abbey Fan Portal (aka com.downton.abbey.fan.portal) application 1.0 for Android does not…Sep 28, 2014›
CVE-2024-55023MEDIUM
5.3
Weintek cMT-3072XH2 easyweb v2.1.53, OS v20231011 was discovered to contain a hardcoded encryption k…Mar 3, 2026›
CVE-2025-66594MEDIUM
5.3
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. Detailed me…Feb 9, 2026›
CVE-2025-66607MEDIUM
5.3
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. The respo…Feb 9, 2026›
CVE-2025-66605MEDIUM
5.3
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. Since the…Feb 9, 2026›
CVE-2025-66604MEDIUM
5.3
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. The libra…Feb 9, 2026›
CVE-2025-10259MEDIUM
5.3
Improper Validation of Specified Quantity in Input vulnerability in TCP Communication Function on Mi…Nov 6, 2025›
CVE-2025-5514MEDIUM
5.3
Improper Handling of Length Parameter Inconsistency vulnerability in web server function on Mitsubis…Aug 25, 2025›
CVE-2025-5241MEDIUM
5.3
Overly Restrictive Account Lockout Mechanism vulnerability in Mitsubishi Electric Corporation MELSEC…Jul 11, 2025›
CVE-2025-6071MEDIUM
5.3
Use of Hard-coded Cryptographic Key vulnerability in ABB RMC-100, ABB RMC-100 LITE. An attacker ca…Jul 3, 2025›
CVE-2025-2595MEDIUM
5.3
An unauthenticated remote attacker can bypass the user management in CODESYS Visualization and read …Apr 23, 2025›
CVE-2023-52891MEDIUM
5.3
A vulnerability has been identified in SIMATIC Energy Manager Basic (All versions < V7.5), SIMATIC E…Jul 9, 2024›
CVE-2024-21914MEDIUM
5.3
A vulnerability exists in the affected product that allows a malicious user to restart the Rockwell…Mar 25, 2024›
CVE-2023-7033MEDIUM
5.3
Insufficient Resource Pool vulnerability in Ethernet function of Mitsubishi Electric Corporation MEL…Feb 27, 2024›
CVE-2023-5390MEDIUM
5.3
An attacker could potentially exploit this vulnerability, leading to files being read from the Honey…Jan 31, 2024›
CVE-2023-5915MEDIUM
5.3
A vulnerability of Uncontrolled Resource Consumption has been identified in STARDOM provided by Yoko…Dec 1, 2023›
CVE-2023-3379MEDIUM
5.3
Wago web-based management of multiple products has a vulnerability which allows an local authenticat…Nov 20, 2023›
CVE-2023-4625MEDIUM
5.3
Improper Restriction of Excessive Authentication Attempts vulnerability in Mitsubishi Electric Corpo…Nov 6, 2023›
CVE-2023-32657MEDIUM
5.3
Weintek Weincloud v0.13.6 could allow an attacker to efficiently develop a brute force attack…Jul 19, 2023›
CVE-2023-2673MEDIUM
5.3
Improper Input Validation vulnerability in PHOENIX CONTACT FL/TC MGUARD Family in multiple versions …Jun 13, 2023›
CVE-2022-3192MEDIUM
5.3
Improper Input Validation vulnerability in ABB AC500 V2 PM5xx allows Client-Server Protocol Manipula…Mar 31, 2023›
CVE-2023-1258MEDIUM
5.3
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in ABB Flow-X firmware on F…Mar 31, 2023›
CVE-2023-0027MEDIUM
5.3
Rockwell Automation Modbus TCP Server AOI prior to 2.04.00 is vulnerable to an unauthorized user sen…Mar 17, 2023›
CVE-2022-40691MEDIUM
5.3
An information disclosure vulnerability exists in the web application functionality of Moxa SDS-3008…Feb 7, 2023›
CVE-2019-9011MEDIUM
5.3
In Pilz PMC programming tool 3.x before 3.5.17 (based on CODESYS Development System), an attacker ca…Dec 26, 2022›
CVE-2022-40266MEDIUM
5.3
Improper Input Validation vulnerability in Mitsubishi Electric GOT2000 Series GT27 model FTP server …Nov 24, 2022›
CVE-2022-1989MEDIUM
5.3
All CODESYS Visualization versions before V4.2.0.0 generate a login dialog vulnerable to information…Aug 23, 2022›
CVE-2022-31803MEDIUM
5.3
In CODESYS Gateway Server V2 an insufficient check for the activity of TCP client connections allows…Jun 24, 2022›
CVE-2022-25162MEDIUM
5.3
Improper Input Validation vulnerability in Mitsubishi Electric MELSEC iQ-F series FX5U-xMy/z(x=32,64…May 18, 2022›
CVE-2020-25180MEDIUM
5.3
Rockwell Automation ISaGRAF Runtime Versions 4.x and 5.x includes the functionality of setting a pas…Mar 18, 2022›
CVE-2021-20598MEDIUM
5.3
Overly Restrictive Account Lockout Mechanism vulnerability in Mitsubishi Electric MELSEC iQ-R series…Aug 6, 2021›
CVE-2021-21003MEDIUM
5.3
In Phoenix Contact FL SWITCH SMCS series products in multiple versions fragmented TCP-Packets may ca…Jun 25, 2021›
CVE-2021-30187MEDIUM
5.3
CODESYS V2 runtime system SP before 2.4.7.55 has Improper Neutralization of Special Elements used in…May 25, 2021›
CVE-2021-21000MEDIUM
5.3
On WAGO PFC200 devices in different firmware versions with special crafted packets an attacker with …May 24, 2021›
CVE-2021-20996MEDIUM
5.3
In multiple managed switches by WAGO in different versions special crafted requests can lead to cook…May 13, 2021›
CVE-2021-20995MEDIUM
5.3
In multiple managed switches by WAGO in different versions the webserver cookies of the web based UI…May 13, 2021›
CVE-2021-20993MEDIUM
5.3
In multiple managed switches by WAGO in different versions the activated directory listing provides …May 13, 2021›
CVE-2020-12526MEDIUM
5.3
TwinCAT OPC UA Server in versions up to 2.3.0.12 and IPC Diagnostics UA Server in versions up to 3.1…May 13, 2021›
CVE-2020-25192MEDIUM
5.3
The built-in WEB server for MOXA NPort IAW5000A-I/O firmware version 2.1 or lower allows sensitive i…Dec 23, 2020›
CVE-2020-16240MEDIUM
5.3
GE Digital APM Classic, Versions 4.4 and prior. An insecure direct object reference (IDOR) vulnerabi…Sep 23, 2020›
CVE-2020-12494MEDIUM
5.3
Beckhoff's TwinCAT RT network driver for Intel 8254x and 8255x is providing EtherCAT functionality. …Jun 16, 2020›
CVE-2020-12117MEDIUM
5.3
Moxa Service in Moxa NPort 5150A firmware version 1.5 and earlier allows attackers to obtain sensiti…May 1, 2020›
CVE-2020-8478MEDIUM
5.3
Insufficient protection of the inter-process communication functions in ABB System 800xA products OP…Apr 29, 2020›
CVE-2020-8476MEDIUM
5.3
For the Central Licensing Server component used in ABB products ABB Ability™ System 800xA and relate…Apr 29, 2020›
CVE-2020-8475MEDIUM
5.3
For the Central Licensing Server component used in ABB products ABB Ability™ System 800xA and relate…Apr 29, 2020›
CVE-2019-19003MEDIUM
5.3
For ABB eSOMS versions 4.0 to 6.0.2, the HTTPOnly flag is not set. This can allow Javascript to acce…Apr 2, 2020›
CVE-2019-5135MEDIUM
5.3
An exploitable timing discrepancy vulnerability exists in the authentication functionality of the We…Mar 11, 2020›
CVE-2019-9103MEDIUM
5.3
An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 device…Mar 11, 2020›
CVE-2019-9097MEDIUM
5.3
An issue was discovered on Moxa MGate MB3170 and MB3270 devices before 4.1, MB3280 and MB3480 device…Mar 11, 2020›
CVE-2019-5073MEDIUM
5.3
An exploitable information exposure vulnerability exists in the iocheckd service "I/O-Check" functio…Dec 18, 2019›
CVE-2019-5636MEDIUM
5.3
When a Beckhoff TwinCAT Runtime receives a malformed UDP packet, the ADS Discovery Service shuts dow…Nov 21, 2019›
CVE-2019-18202MEDIUM
5.3
Information Disclosure is possible on WAGO Series PFC100 and PFC200 devices before FW12 due to impro…Oct 19, 2019›
CVE-2019-13523MEDIUM
5.3
In Honeywell Performance IP Cameras and Performance NVRs, the integrated web server of the affected …Sep 26, 2019›
CVE-2018-13991MEDIUM
5.3
The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions 1.0 to 1.34 leaks private informati…May 7, 2019›
CVE-2018-17902MEDIUM
5.3
Yokogawa STARDOM Controllers FCJ, FCN-100, FCN-RTU, FCN-500, All versions R4.10 and prior, The appli…Oct 12, 2018›
CVE-2018-7787MEDIUM
5.3
In Schneider Electric U.motion Builder software versions prior to v1.3.4, this vulnerability is due …Jul 3, 2018›
CVE-2018-10729MEDIUM
5.3
All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33…May 17, 2018›
CVE-2018-7244MEDIUM
5.3
An information disclosure vulnerability exists In Schneider Electric's 66074 MGE Network Management …Apr 18, 2018›
CVE-2018-8836MEDIUM
5.3
Wago 750 Series PLCs with firmware version 10 and prior include a remote attack may take advantage o…Apr 3, 2018›
CVE-2018-7525MEDIUM
5.3
In Omron CX-Supervisor Versions 3.30 and prior, processing a malformed packet by a certain executabl…Mar 21, 2018›
CVE-2018-7523MEDIUM
5.3
In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause a double f…Mar 21, 2018›
CVE-2018-7521MEDIUM
5.3
In Omron CX-Supervisor Versions 3.30 and prior, use after free vulnerabilities can be exploited when…Mar 21, 2018›
CVE-2018-7519MEDIUM
5.3
In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause a heap-bas…Mar 21, 2018›
CVE-2018-7517MEDIUM
5.3
In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause an out of …Mar 21, 2018›
CVE-2018-7515MEDIUM
5.3
In Omron CX-Supervisor Versions 3.30 and prior, access of uninitialized pointer vulnerabilities can …Mar 21, 2018›
CVE-2018-7513MEDIUM
5.3
In Omron CX-Supervisor Versions 3.30 and prior, parsing malformed project files may cause a stack-ba…Mar 21, 2018›
CVE-2018-7227MEDIUM
5.3
A vulnerability exists in Schneider Electric's Pelco Sarix Professional in all firmware versions pri…Mar 9, 2018›
CVE-2018-5445MEDIUM
5.3
A Path Traversal issue was discovered in Advantech WebAccess/SCADA versions prior to V8.2_20170817. …Jan 25, 2018›
CVE-2018-5443MEDIUM
5.3
A SQL Injection issue was discovered in Advantech WebAccess/SCADA versions prior to V8.2_20170817. W…Jan 25, 2018›
CVE-2017-16741MEDIUM
5.3
An Information Exposure issue was discovered in PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, and 48xxx Seri…Jan 12, 2018›
CVE-2017-13702MEDIUM
5.3
An issue was discovered on MOXA EDS-G512E 5.1 build 16072215 devices. Cookies can be stolen, manipul…Nov 17, 2017›
CVE-2017-12737MEDIUM
5.3
An issue was discovered on Siemens SICAM RTUs SM-2556 COM Modules with the firmware variants ENOS00,…Nov 15, 2017›
CVE-2017-9947MEDIUM
5.3
A vulnerability has been identified in Siemens APOGEE PXC and TALON TC BACnet Automation Controllers…Oct 23, 2017›
CVE-2017-9960MEDIUM
5.3
An information disclosure vulnerability exists in Schneider Electric's U.motion Builder software ver…Sep 26, 2017›
CVE-2017-6032MEDIUM
5.3
A Violation of Secure Design Principles issue was discovered in Schneider Electric Modicon Modbus Pr…Jun 30, 2017›
CVE-2017-5160MEDIUM
5.3
An Inadequate Encryption Strength issue was discovered in Schneider Electric Wonderware InTouch Acce…Apr 20, 2017›
CVE-2016-8725MEDIUM
5.3
An exploitable information disclosure vulnerability exists in the Web Application functionality of t…Apr 13, 2017›
CVE-2016-8724MEDIUM
5.3
An exploitable information disclosure vulnerability exists in the serviceAgent functionality of Moxa…Apr 13, 2017›
CVE-2016-8722MEDIUM
5.3
An exploitable Information Disclosure vulnerability exists in the Web Application functionality of M…Apr 13, 2017›
CVE-2016-9346MEDIUM
5.3
An issue was discovered in Moxa MiiNePort E1 versions prior to 1.8, E2 versions prior to 1.4, and E3…Feb 13, 2017›
CVE-2016-8367MEDIUM
5.3
An issue was discovered in Schneider Electric Magelis HMI Magelis GTO Advanced Optimum Panels, all v…Feb 13, 2017›
CVE-2016-3963MEDIUM
5.3
Siemens SCALANCE S613 allows remote attackers to cause a denial of service (web-server outage) via t…Apr 8, 2016›
CVE-2015-6485MEDIUM
5.3
Schneider Electric Telvent Sage 2300 RTUs with firmware before C3413-500-S01, and LANDAC II-2, Sage …Mar 12, 2016›
CVE-2016-2283MEDIUM
5.3
Moxa ioLogik E2200 devices before 3.12 and ioAdmin Configuration Utility before 3.18 do not properly…Mar 4, 2016›
CVE-2016-2282MEDIUM
5.3
Moxa ioLogik E2200 devices before 3.12 and ioAdmin Configuration Utility before 3.18 do not properly…Mar 4, 2016›
CVE-2016-2201MEDIUM
5.3
Siemens SIMATIC S7-1500 CPU devices before 1.8.3 allow remote attackers to bypass a replay protectio…Feb 8, 2016›
CVE-2015-3943MEDIUM
5.3
Advantech WebAccess before 8.1 allows remote attackers to read sensitive cleartext information about…Jan 15, 2016›
CVE-2015-4941MEDIUM
5.3
IBM WebSphere MQ Light 1.x before 1.0.2 mishandles abbreviated TLS handshakes, which allows remote a…Jan 1, 2016›
CVE-2023-47262MEDIUM
5.2
The startup process and device configurations of the Abbott ID NOW device, before v7.1, can be inter…Nov 14, 2023›
CVE-2025-11009MEDIUM
5.1
Cleartext Storage of Sensitive Information vulnerability in Mitsubishi Electric GT Designer3 Version…Dec 17, 2025›
CVE-2017-7457MEDIUM
5.0
XML External Entity via ".AOP" files used by Moxa MX-AOPC Server 1.5 result in remote file disclosur…Apr 14, 2017›
CVE-2016-4528MEDIUM
5.0
Buffer overflow in Advantech WebAccess before 8.1_20160519 allows local users to cause a denial of s…Jun 25, 2016›
CVE-2015-6484MEDIUM
5.0
3S-Smart CODESYS Gateway Server before 2.3.9.48 allows remote attackers to cause a denial of service…Oct 25, 2015›
CVE-2015-6482MEDIUM
5.0
Runtime Toolkit before 2.4.7.48 in 3S-Smart CODESYS before 2.3.9.48 allows remote attackers to cause…Oct 18, 2015›
CVE-2015-0987MEDIUM
5.0
Omron CX-One CX-Programmer before 9.6, CJ2M PLC devices before 2.1, and CJ2H PLC devices before 1.5 …Oct 6, 2015›
CVE-2015-3962MEDIUM
5.0
Schneider Electric StruxureWare Building Expert MPM before 2.15 does not use encryption for the clie…Sep 18, 2015›
CVE-2015-2847MEDIUM
5.0
Honeywell Tuxedo Touch before 5.2.19.0_VA relies on client-side authentication involving JavaScript,…Jul 26, 2015›
CVE-2015-0997MEDIUM
5.0
Schneider Electric InduSoft Web Studio before 7.1.3.4 SP3 Patch 4 and InTouch Machine Edition 2014 b…Mar 29, 2015›
CVE-2015-1358MEDIUM
5.0
The remote-management module in the (1) Multi Panels, (2) Comfort Panels, and (3) RT Advanced functi…Feb 18, 2015›
CVE-2015-1357MEDIUM
5.0
Siemens Ruggedcom WIN51xx devices with firmware before SS4.4.4624.35, WIN52xx devices with firmware …Feb 2, 2015›
CVE-2014-8552MEDIUM
5.0
The WinCC server in Siemens SIMATIC WinCC 7.0 through SP3, 7.2 before Update 9, and 7.3 before Updat…Nov 26, 2014›
CVE-2014-4682MEDIUM
5.0
The WebNavigator server in Siemens SIMATIC WinCC before 7.3, as used in PCS7 and other products, all…Jul 24, 2014›
CVE-2014-2733MEDIUM
5.0
Siemens SINEMA Server before 12 SP1 allows remote attackers to cause a denial of service (web-interf…Apr 19, 2014›
CVE-2014-2732MEDIUM
5.0
Multiple directory traversal vulnerabilities in the integrated web server in Siemens SINEMA Server b…Apr 19, 2014›
CVE-2014-0789MEDIUM
5.0
Multiple buffer overflows in the OPC Automation 2.0 Server Object ActiveX control in Schneider Elect…Apr 4, 2014›
CVE-2014-2590MEDIUM
5.0
The web management interface in Siemens RuggedCom ROS before 3.11, ROS 3.11 before 3.11.5 for RS950G…Apr 1, 2014›
CVE-2014-1699MEDIUM
5.0
Siemens SIMATIC WinCC OA before 3.12 P002 January allows remote attackers to cause a denial of servi…Feb 7, 2014›
CVE-2014-1698MEDIUM
5.0
Directory traversal vulnerability in Siemens SIMATIC WinCC OA before 3.12 P002 January allows remote…Feb 7, 2014›
CVE-2014-1696MEDIUM
5.0
Siemens SIMATIC WinCC OA before 3.12 P002 January uses a weak hash algorithm for passwords, which ma…Feb 7, 2014›
CVE-2013-6143MEDIUM
5.0
The Schneider Electric Telvent SAGE 3030 RTU with firmware C3413-500-001D3_P4 and C3413-500-001F0_PB…Jan 31, 2014›
CVE-2013-2763MEDIUM
5.0
The Schneider Electric M340 PLC modules allow remote attackers to cause a denial of service (resourc…Apr 4, 2013›
CVE-2012-4712MEDIUM
5.0
Moxa EDR-G903 series routers with firmware before 2.11 have a hardcoded account, which allows remote…Feb 15, 2013›
CVE-2012-6441MEDIUM
5.0
An information exposure of confidential information results when the device receives a specially cra…Jan 24, 2013›
CVE-2012-3030MEDIUM
5.0
WebNavigator in Siemens WinCC 7.0 SP3 and earlier, as used in SIMATIC PCS7 and other products, store…Sep 18, 2012›
CVE-2012-0222MEDIUM
5.0
The FactoryTalk (FT) RNADiagReceiver service in Rockwell Automation Allen-Bradley FactoryTalk CPR9 t…Apr 2, 2012›
CVE-2012-0221MEDIUM
5.0
The FactoryTalk (FT) RNADiagReceiver service in Rockwell Automation Allen-Bradley FactoryTalk CPR9 t…Apr 2, 2012›
CVE-2012-0241MEDIUM
5.0
Advantech/BroadWin WebAccess before 7.0 allows remote attackers to cause a denial of service (memory…Feb 21, 2012›
CVE-2012-0239MEDIUM
5.0
uaddUpAdmin.asp in Advantech/BroadWin WebAccess before 7.0 does not properly perform authentication,…Feb 21, 2012›
CVE-2012-0236MEDIUM
5.0
Advantech/BroadWin WebAccess 7.0 and earlier allows remote attackers to obtain sensitive information…Feb 21, 2012›
CVE-2011-4512MEDIUM
5.0
CRLF injection vulnerability in the HMI web server in Siemens WinCC flexible 2004, 2005, 2007, and 2…Feb 3, 2012›
CVE-2011-4532MEDIUM
5.0
Absolute path traversal vulnerability in the ALMListView.ALMListCtrl ActiveX control in almaxcx.dll …Jan 8, 2012›
CVE-2011-4531MEDIUM
5.0
Siemens Automation License Manager (ALM) 4.0 through 5.1+SP1+Upd1 allows remote attackers to cause a…Jan 8, 2012›
CVE-2011-4530MEDIUM
5.0
Siemens Automation License Manager (ALM) 4.0 through 5.1+SP1+Upd1 does not properly copy fields obta…Jan 8, 2012›
CVE-2011-5009MEDIUM
5.0
The CmpWebServer.dll module in the Control service in 3S CoDeSys 3.4 SP4 Patch 2 allows remote attac…Dec 25, 2011›
CVE-2011-4036MEDIUM
5.0
Directory traversal vulnerability in Schneider Electric Vijeo Historian 4.30 and earlier, CitectHist…Dec 2, 2011›
CVE-2011-3486MEDIUM
5.0
Beckhoff TwinCAT 2.11.0.2004 and earlier allows remote attackers to cause a denial of service via a …Sep 16, 2011›
CVE-2010-0939MEDIUM
5.0
Visialis ABB Forum 1.1 stores sensitive information under the web root with insufficient access cont…Mar 8, 2010›
CVE-2009-4007MEDIUM
5.0
Unspecified vulnerability in the NormaliseTrainConsist function in src/train_cmd.cpp in OpenTTD befo…Dec 28, 2009›
CVE-2008-7199MEDIUM
5.0
Phoenix Contact FL IL 24 BK-PAC allows remote attackers to cause a denial of service (hang) via (1) …Sep 10, 2009›
CVE-2009-0474MEDIUM
5.0
The web interface in the Rockwell Automation ControlLogix 1756-ENBT/A EtherNet/IP Bridge Module allo…Feb 6, 2009›
CVE-2006-3907MEDIUM
5.0
Siemens SpeedStream 2624 allows remote attackers to cause a denial of service (device hang) by sendi…Jul 27, 2006›
CVE-2002-0122MEDIUM
5.0
Siemens 3568i WAP mobile phones allows remote attackers to cause a denial of service (crash) via an …Mar 25, 2002›
CVE-2023-37858MEDIUM
4.9
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 an authenticated, remote a…Aug 9, 2023›
CVE-2023-3569MEDIUM
4.9
In PHOENIX CONTACTs TC ROUTER and TC CLOUD CLIENT in versions prior to 2.07.2 as well as CLOUD CLIE…Aug 8, 2023›
CVE-2023-1620MEDIUM
4.9
Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high priv…Jun 26, 2023›
CVE-2023-1619MEDIUM
4.9
Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high priv…Jun 26, 2023›
CVE-2018-7824MEDIUM
4.9
An Externally Controlled Reference to a Resource (CWE-610) vulnerability exists in Schneider Electri…May 22, 2019›
CVE-2014-9563MEDIUM
4.9
CRLF injection vulnerability in the web-based management (WBM) interface in Unify (former Siemens) O…Apr 12, 2018›
CVE-2017-14023MEDIUM
4.9
An Improper Input Validation issue was discovered in Siemens SIMATIC PCS 7 V8.1 prior to V8.1 SP1 wi…Nov 6, 2017›
CVE-2017-6867MEDIUM
4.9
A vulnerability was discovered in Siemens SIMATIC WinCC (V7.3 before Upd 11 and V7.4 before SP1), SI…May 11, 2017›
CVE-2016-5810MEDIUM
4.9
upAdminPg.asp in Advantech WebAccess before 8.1_20160519 allows remote authenticated administrators …May 2, 2017›
CVE-2015-1010MEDIUM
4.9
Rockwell Automation RSView32 7.60.00 (aka CPR9 SR4) and earlier does not properly encrypt credential…May 31, 2015›
CVE-2014-5411MEDIUM
4.9
Multiple cross-site scripting (XSS) vulnerabilities in Schneider Electric StruxureWare SCADA Expert …Sep 18, 2014›
CVE-2014-4683MEDIUM
4.9
The WebNavigator server in Siemens SIMATIC WinCC before 7.3, as used in PCS7 and other products, all…Jul 24, 2014›
CVE-2008-2235MEDIUM
4.9
OpenSC before 0.11.5 uses weak permissions (ADMIN file control information of 00) for the 5015 direc…Aug 1, 2008›
CVE-2021-34582MEDIUM
4.8
In Phoenix Contact FL MGUARD 1102 and 1105 in Versions 1.4.0, 1.4.1 and 1.5.0 a user with high privi…Nov 10, 2021›
CVE-2017-13700MEDIUM
4.8
An issue was discovered on MOXA EDS-G512E 5.1 build 16072215 devices. There is XSS in the administra…Nov 17, 2017›
CVE-2024-45003MEDIUM
4.7
In the Linux kernel, the following vulnerability has been resolved: vfs: Don't evict inode under th…Sep 4, 2024›
CVE-2023-6545MEDIUM
4.7
The package authelia-bhf included in Beckhoffs TwinCAT/BSD is prone to an open redirect that allows …Dec 14, 2023›
CVE-2023-29029MEDIUM
4.7
A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product …May 11, 2023›
CVE-2023-29028MEDIUM
4.7
A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product …May 11, 2023›
CVE-2023-29027MEDIUM
4.7
A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product …May 11, 2023›
CVE-2023-29026MEDIUM
4.7
A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product …May 11, 2023›
CVE-2023-29025MEDIUM
4.7
A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product …May 11, 2023›
CVE-2023-29022MEDIUM
4.7
A cross site scripting vulnerability was discovered in Rockwell Automation's ArmorStart ST product …May 11, 2023›
CVE-2022-2789MEDIUM
4.7
Emerson Electric's Proficy Machine Edition Version 9.00 and prior is vulnerable to CWE-345 Insuffici…Aug 19, 2022›
CVE-2020-7520MEDIUM
4.7
A CWE-601: URL Redirection to Untrusted Site ('Open Redirect') vulnerability exists in Schneider Ele…Jul 23, 2020›
CVE-2016-7959MEDIUM
4.7
Siemens SIMATIC STEP 7 (TIA Portal) before 14 improperly stores pre-shared key data in TIA project f…Oct 13, 2016›
CVE-2022-1607MEDIUM
4.6
Cross-Site Request Forgery (CSRF) vulnerability in ABB Pulsar Plus System Controller NE843_S, ABB In…Feb 24, 2023›
CVE-2022-30314MEDIUM
4.6
Honeywell Experion PKS Safety Manager 5.02 uses Hard-coded Credentials. According to FSCT-2022-0052,…Jul 28, 2022›
CVE-2018-4847MEDIUM
4.6
A vulnerability has been identified in SIMATIC WinCC OA Operator iOS App (All versions < V1.4). Insu…Apr 23, 2018›
CVE-2014-4685MEDIUM
4.6
Siemens SIMATIC WinCC before 7.3, as used in PCS7 and other products, allows local users to gain pri…Jul 24, 2014›
CVE-2014-2369MEDIUM
4.6
Cross-site request forgery (CSRF) vulnerability in the web application on Omron NS5, NS8, NS10, NS12…Jul 24, 2014›
CVE-2013-3927MEDIUM
4.6
Unspecified vulnerability in the client library in Siemens COMOS 9.2 before 9.2.0.6.10 and 10.0 befo…Jun 18, 2013›
CVE-2011-4515MEDIUM
4.6
Siemens WinCC (TIA Portal) 11 uses a reversible algorithm for storing HMI web-application passwords …Mar 21, 2013›
CVE-2011-5163MEDIUM
4.6
Buffer overflow in an unspecified third-party component in the Batch module for Schneider Electric C…Sep 15, 2012›
CVE-2005-0504MEDIUM
4.6
Buffer overflow in the MoxaDriverIoctl function for the moxa serial driver (moxa.c) in Linux 2.2.x, …Mar 14, 2005›
CVE-2024-21920MEDIUM
4.4
A memory buffer vulnerability in Rockwell Automation Arena Simulation could potentially let a thr…Mar 26, 2024›
CVE-2017-12127MEDIUM
4.4
A password storage vulnerability exists in the operating system functionality of Moxa EDR-810 V4.1 b…May 14, 2018›
CVE-2014-8390MEDIUM
4.4
Multiple buffer overflows in Schneider Electric VAMPSET before 2.2.168 allow local users to gain pri…Apr 3, 2015›
CVE-2015-1356MEDIUM
4.4
Siemens SIMATIC STEP 7 (TIA Portal) before 13 SP1 determines a user's privileges on the basis of pro…Feb 18, 2015›
CVE-2025-15094MEDIUM
4.3
A weakness has been identified in sunkaifei FlyCMS up to abbaa5a8daefb146ad4d61027035026b052cb414. T…Dec 26, 2025›
CVE-2025-15093MEDIUM
4.3
A security flaw has been discovered in sunkaifei FlyCMS up to abbaa5a8daefb146ad4d61027035026b052cb4…Dec 26, 2025›
CVE-2025-67653MEDIUM
4.3
Advantech WebAccess/SCADA is vulnerable to directory traversal, which may allow an attacker to deter…Dec 18, 2025›
CVE-2025-14848MEDIUM
4.3
Advantech WebAccess/SCADA is vulnerable to absolute directory traversal, which may allow an attacker…Dec 18, 2025›
CVE-2025-46704MEDIUM
4.3
A vulnerability exists in Advantech iView in NetworkServlet.processImportRequest() that could allow…Jul 11, 2025›
CVE-2024-9877MEDIUM
4.3
: Use of GET Request Method With Sensitive Query Strings vulnerability in ABB ANC, ABB ANC-L, ABB AN…Apr 30, 2025›
CVE-2023-37856MEDIUM
4.3
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with low…Aug 9, 2023›
CVE-2023-37855MEDIUM
4.3
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with low…Aug 9, 2023›
CVE-2022-22508MEDIUM
4.3
Improper Input Validation vulnerability in multiple CODESYS V3 products allows an authenticated remo…May 15, 2023›
CVE-2021-38431MEDIUM
4.3
An authenticated user using Advantech WebAccess SCADA in versions 9.0.3 and prior can use API functi…Oct 15, 2021›
CVE-2021-32991MEDIUM
4.3
Delta Electronics DIAEnergie Version 1.7.5 and prior is vulnerable to cross-site request forgery, wh…Aug 30, 2021›
CVE-2020-12027MEDIUM
4.3
All versions of FactoryTalk View SE disclose the hostnames and file paths for certain files within t…Jul 20, 2020›
CVE-2019-19091MEDIUM
4.3
For ABB eSOMS versions 4.0 to 6.0.3, HTTPS responses contain comments with sensitive information abo…Apr 2, 2020›
CVE-2019-18997MEDIUM
4.3
The HMISimulator component of ABB PB610 Panel Builder 600 uses the readFile/writeFile interface to m…Dec 18, 2019›
CVE-2019-18995MEDIUM
4.3
The HMISimulator component of ABB PB610 Panel Builder 600 versions 2.8.0.424 and earlier fails to va…Dec 18, 2019›
CVE-2019-10963MEDIUM
4.3
Moxa EDR 810, all versions 5.1 and prior, allows an unauthenticated attacker to be able to retrieve …Oct 8, 2019›
CVE-2018-7776MEDIUM
4.3
The vulnerability exists within error.php in Schneider Electric U.motion Builder software versions p…Jul 3, 2018›
CVE-2018-7764MEDIUM
4.3
The vulnerability exists within runscript.php applet in Schneider Electric U.motion Builder software…Jul 3, 2018›
CVE-2018-7763MEDIUM
4.3
The vulnerability exists within css.inc.php in Schneider Electric U.motion Builder software versions…Jul 3, 2018›
CVE-2016-8720MEDIUM
4.3
An exploitable HTTP Header Injection vulnerability exists in the Web Application functionality of th…Apr 13, 2017›
CVE-2015-6929MEDIUM
4.3
Multiple cross-site scripting (XSS) vulnerabilities in Nokia Networks (formerly Nokia Solutions and …Sep 16, 2015›
CVE-2015-6675MEDIUM
4.3
Siemens RUGGEDCOM ROS 3.8.0 through 4.1.x permanently enables the IP forwarding feature, which allow…Sep 11, 2015›
CVE-2015-6466MEDIUM
4.3
Cross-site scripting (XSS) vulnerability in the Diagnosis Ping feature in the administrative web int…Sep 11, 2015›
CVE-2015-5537MEDIUM
4.3
The SSL layer of the HTTPS service in Siemens RuggedCom ROS before 4.2.0 and ROX II does not properl…Aug 3, 2015›
CVE-2015-4174MEDIUM
4.3
Cross-site scripting (XSS) vulnerability in the integrated web server on the Siemens Climatix BACnet…Jun 28, 2015›
CVE-2015-2822MEDIUM
4.3
Siemens SIMATIC HMI Comfort Panels before WinCC (TIA Portal) 13 SP1 Upd2 and SIMATIC WinCC Runtime A…Apr 8, 2015›
CVE-2015-1595MEDIUM
4.3
The Siemens SPCanywhere application for Android and iOS does not use encryption during lookups of sy…Mar 7, 2015›
CVE-2015-1048MEDIUM
4.3
Open redirect vulnerability in the integrated web server on Siemens SIMATIC S7-1200 CPU devices with…Jan 21, 2015›
CVE-2014-3110MEDIUM
4.3
Multiple cross-site scripting (XSS) vulnerabilities on Honeywell FALCON XLWeb Linux controller devic…Jul 24, 2014›
CVE-2014-2908MEDIUM
4.3
Cross-site scripting (XSS) vulnerability in the integrated web server on Siemens SIMATIC S7-1200 CPU…Apr 25, 2014›
CVE-2014-2248MEDIUM
4.3
Open redirect vulnerability in the integrated web server on Siemens SIMATIC S7-1500 CPU PLC devices …Mar 16, 2014›
CVE-2014-2246MEDIUM
4.3
Cross-site scripting (XSS) vulnerability in the integrated web server on Siemens SIMATIC S7-1500 CPU…Mar 16, 2014›
CVE-2013-6142MEDIUM
4.3
DNP3Driver.exe in the DNP3 driver in Schneider Electric ClearSCADA 2010 R2 through 2010 R3.1 and SCA…Jan 15, 2014›
CVE-2013-4779MEDIUM
4.3
Cross-site scripting (XSS) vulnerability in core/handleTw.php on the Siemens Enterprise OpenScape Br…Jul 18, 2013›
CVE-2013-2301MEDIUM
4.3
The OMRON OpenWnn application before 1.3.6 for Android uses weak permissions for unspecified files, …Mar 29, 2013›
CVE-2013-0670MEDIUM
4.3
CRLF injection vulnerability in the HMI web application in Siemens WinCC (TIA Portal) 11 allows remo…Mar 21, 2013›
CVE-2013-0668MEDIUM
4.3
Multiple cross-site scripting (XSS) vulnerabilities in the HMI web application in Siemens WinCC (TIA…Mar 21, 2013›
CVE-2013-0667MEDIUM
4.3
Cross-site scripting (XSS) vulnerability in the HMI web application in Siemens WinCC (TIA Portal) 11…Mar 21, 2013›
CVE-2012-4698MEDIUM
4.3
Siemens RuggedCom Rugged Operating System (ROS) before 3.12, ROX I OS through 1.14.5, ROX II OS thro…Dec 23, 2012›
CVE-2012-3040MEDIUM
4.3
Cross-site scripting (XSS) vulnerability in the web server on Siemens SIMATIC S7-1200 PLCs 2.x throu…Oct 10, 2012›
CVE-2012-3037MEDIUM
4.3
The Siemens SIMATIC S7-1200 2.x PLC does not properly protect the private key of the SIMATIC CONTROL…Sep 25, 2012›
CVE-2012-3034MEDIUM
4.3
WebNavigator in Siemens WinCC 7.0 SP3 and earlier, as used in SIMATIC PCS7 and other products, allow…Sep 18, 2012›
CVE-2012-3031MEDIUM
4.3
Multiple cross-site scripting (XSS) vulnerabilities in WebNavigator in Siemens WinCC 7.0 SP3 and ear…Sep 18, 2012›
CVE-2012-2598MEDIUM
4.3
Buffer overflow in the DiagAgent web server in Siemens WinCC 7.0 SP3 through Update 2 allows remote …Jun 8, 2012›
CVE-2012-2595MEDIUM
4.3
Multiple cross-site scripting (XSS) vulnerabilities in unspecified web applications in Siemens WinCC…Jun 8, 2012›
CVE-2012-1990MEDIUM
4.3
Multiple cross-site scripting (XSS) vulnerabilities in Schneider Electric Kerweb before 3.0.1 and Ke…May 22, 2012›
CVE-2012-0233MEDIUM
4.3
Cross-site scripting (XSS) vulnerability in Advantech/BroadWin WebAccess before 7.0 allows remote at…Feb 21, 2012›
CVE-2011-4523MEDIUM
4.3
Cross-site scripting (XSS) vulnerability in bwview.asp in Advantech/BroadWin WebAccess before 7.0 al…Feb 21, 2012›
CVE-2011-4522MEDIUM
4.3
Cross-site scripting (XSS) vulnerability in bwerrdn.asp in Advantech/BroadWin WebAccess before 7.0 a…Feb 21, 2012›
CVE-2011-4511MEDIUM
4.3
Cross-site scripting (XSS) vulnerability in the HMI web server in Siemens WinCC flexible 2004, 2005,…Feb 3, 2012›
CVE-2011-4510MEDIUM
4.3
Cross-site scripting (XSS) vulnerability in the HMI web server in Siemens WinCC flexible 2004, 2005,…Feb 3, 2012›
CVE-2011-4263MEDIUM
4.3
Cross-site scripting (XSS) vulnerability in Schneider Electric PowerChute Business Edition before 8.…Dec 7, 2011›
CVE-2011-4035MEDIUM
4.3
Cross-site scripting (XSS) vulnerability in Schneider Electric Vijeo Historian 4.30 and earlier, Cit…Dec 2, 2011›
CVE-2011-4033MEDIUM
4.3
Buffer overflow in the Steema TeeChart ActiveX control, as used in Schneider Electric Vijeo Historia…Dec 2, 2011›
CVE-2009-0472MEDIUM
4.3
Multiple cross-site scripting (XSS) vulnerabilities in the web interface in the Rockwell Automation …Feb 6, 2009›
CVE-2007-4488MEDIUM
4.3
Multiple cross-site scripting (XSS) vulnerabilities in the Siemens Gigaset SE361 WLAN router with fi…Aug 22, 2007›
CVE-2025-3449MEDIUM
4.2
A Generation of Predictable Numbers or Identifiers vulnerability in the SDM component of B&R Automat…Oct 7, 2025›
CVE-2023-2639MEDIUM
4.1
The underlying feedback mechanism of Rockwell Automation's FactoryTalk System Services that transf…Jun 13, 2023›
CVE-2017-9637MEDIUM
4.1
Schneider Electric Ampla MES 6.4 provides capability to interact with data from third party database…May 18, 2018›
CVE-2014-5407MEDIUM
4.1
Multiple stack-based buffer overflows in Schneider Electric VAMPSET 2.2.136 and earlier allow local …Sep 15, 2014›
CVE-2025-59301MEDIUM
4.0
Delta Electronics DVP15MC11T lacks proper validation of the modbus/tcp packets and can lead to denia…Dec 22, 2025›
CVE-2017-7937MEDIUM
4.0
An Improper Authentication issue was discovered in Phoenix Contact GmbH mGuard firmware versions 8.3…May 19, 2017›
CVE-2016-7090MEDIUM
4.0
The integrated web server on Siemens SCALANCE M-800 and S615 modules with firmware before 4.02 does …Sep 29, 2016›
CVE-2014-2370MEDIUM
4.0
Cross-site scripting (XSS) vulnerability in the web application on Omron NS5, NS8, NS10, NS12, and N…Jul 24, 2014›
CVE-2013-3959MEDIUM
4.0
The Web Navigator in Siemens WinCC before 7.2 Update 1, as used in SIMATIC PCS7 8.0 SP1 and earlier …Jun 14, 2013›
CVE-2013-2761MEDIUM
4.0
The Schneider Electric M340 BMXNOE01xx and BMXP3420xx PLC modules allow remote authenticated users t…Apr 4, 2013›
CVE-2013-0679MEDIUM
4.0
Directory traversal vulnerability in the web server in Siemens WinCC before 7.2, as used in SIMATIC …Mar 21, 2013›
CVE-2013-0678MEDIUM
4.0
Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, does not proper…Mar 21, 2013›
CVE-2013-0676MEDIUM
4.0
Siemens WinCC before 7.2, as used in SIMATIC PCS7 before 8.0 SP1 and other products, does not proper…Mar 21, 2013›
CVE-2013-0671MEDIUM
4.0
Directory traversal vulnerability in Siemens WinCC (TIA Portal) 11 allows remote authenticated users…Mar 21, 2013›
CVE-2013-0669MEDIUM
4.0
The HMI web application in Siemens WinCC (TIA Portal) 11 allows remote authenticated users to cause …Mar 21, 2013›
CVE-2012-2597MEDIUM
4.0
Multiple directory traversal vulnerabilities in Siemens WinCC 7.0 SP3 before Update 2 allow remote a…Jun 8, 2012›
CVE-2022-2788LOW
3.9
Emerson Electric's Proficy Machine Edition Version 9.80 and prior is vulnerable to CWE-29 Path Trave…Aug 19, 2022›
CVE-2019-18994LOW
3.9
Due to a lack of file length check, the HMIStudio component of ABB PB610 Panel Builder 600 versions …Dec 18, 2019›
CVE-2017-9635LOW
3.9
Schneider Electric Ampla MES 6.4 provides capability to configure users and their privileges. When A…May 18, 2018›
CVE-2023-37857LOW
3.8
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 an authenticated, remote a…Aug 9, 2023›
CVE-2021-22799LOW
3.8
A CWE-331: Insufficient Entropy vulnerability exists that could cause unintended connection from an …Jan 28, 2022›
CVE-2023-5461LOW
3.7
A vulnerability was found in Delta Electronics WPLSoft 2.51. It has been classified as problematic. …Oct 9, 2023›
CVE-2022-29832LOW
3.7
Cleartext Storage of Sensitive Information in Memory vulnerability in Mitsubishi Electric Corporatio…Nov 25, 2022›
CVE-2016-8344LOW
3.7
An issue was discovered in Honeywell Experion Process Knowledge System (PKS) platform: Experion PKS,…Feb 13, 2017›
CVE-2004-2626LOW
3.7
GUI overlay vulnerability in the Java API in Siemens S55 cellular phones allows remote attackers to …Dec 31, 2004›
CVE-2024-6620LOW
3.5
Honeywell PC42t, PC42tp, and PC42d Printers, T10.19.020016 to T10.20.060398, contain a cross-site sc…Jul 29, 2024›
CVE-2023-5460LOW
3.5
A vulnerability was found in Delta Electronics WPLSoft up to 2.51 and classified as problematic. Thi…Oct 9, 2023›
CVE-2019-19092LOW
3.5
ABB eSOMS versions 4.0 to 6.0.3 use ASP.NET Viewstate without Message Authentication Code (MAC). Alt…Apr 2, 2020›
CVE-2019-19090LOW
3.5
For ABB eSOMS versions 4.0 to 6.0.2, the Secure Flag is not set in the HTTP response header. Unencry…Apr 2, 2020›
CVE-2019-13936LOW
3.5
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability i…Nov 27, 2019›
CVE-2019-13935LOW
3.5
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability i…Nov 27, 2019›
CVE-2019-13934LOW
3.5
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability i…Nov 27, 2019›
CVE-2013-2299LOW
3.5
Cross-site scripting (XSS) vulnerability in Advantech WebAccess (formerly BroadWin WebAccess) before…Aug 22, 2013›
CVE-2013-0672LOW
3.5
Cross-site scripting (XSS) vulnerability in the HMI web application in Siemens WinCC (TIA Portal) 11…Mar 21, 2013›
CVE-2016-3155LOW
3.4
Siemens APOGEE Insight uses weak permissions for the application folder, which allows local users to…Mar 18, 2016›
CVE-2023-3669LOW
3.3
A missing Brute-Force protection in CODESYS Development System prior to 3.5.19.20 allows a local att…Aug 3, 2023›
CVE-2022-2966LOW
3.3
Out-of-bounds Read vulnerability in Delta Electronics DOPSoft.This issue affects DOPSoft: All Versio…Dec 16, 2022›
CVE-2022-1404LOW
3.3
Delta Electronics CNCSoft (All versions prior to 1.01.32) does not properly sanitize input while pro…Aug 31, 2022›
CVE-2020-12025LOW
3.3
Rockwell Automation Logix Designer Studio 5000 Versions 32.00, 32.01, and 32.02 vulnerable to an xml…Jul 14, 2020›
CVE-2020-6980LOW
3.3
Rockwell Automation MicroLogix 1400 Controllers Series B v21.001 and prior, Series A, all versions, …Mar 16, 2020›
CVE-2019-13511LOW
3.3
Rockwell Automation Arena Simulation Software versions 16.00.00 and earlier contain an INFORMATION E…Aug 15, 2019›
CVE-2018-17907LOW
3.3
When processing project files in Omron CX-Supervisor Versions 3.4.1.0 and prior and tampering with t…Nov 5, 2018›
CVE-2016-9348LOW
3.3
An issue was discovered in Moxa NPort 5110 versions prior to 2.6, NPort 5130/5150 Series versions pr…Feb 13, 2017›
CVE-2016-5812LOW
3.3
Moxa OnCell G3100V2 devices before 2.8 and G3111, G3151, G3211, and G3251 devices before 1.7 use cle…Aug 24, 2016›
CVE-2016-4527LOW
3.3
ABB PCM600 before 2.7 improperly stores PCM600 authentication credentials, which allows local users …Jun 10, 2016›
CVE-2016-4516LOW
3.3
ABB PCM600 before 2.7 improperly stores the main application password after a password change, which…Jun 10, 2016›
CVE-2015-7836LOW
3.3
Siemens RUGGEDCOM ROS before 4.2.1 allows remote attackers to obtain sensitive information by sniffi…Oct 28, 2015›
CVE-2015-0998LOW
3.3
Schneider Electric InduSoft Web Studio before 7.1.3.4 SP3 Patch 4 and InTouch Machine Edition 2014 b…Mar 29, 2015›
CVE-2012-4691LOW
3.3
Memory leak in Siemens Automation License Manager (ALM) 4.x and 5.x before 5.2 allows remote attacke…Dec 18, 2012›
CVE-2014-7251LOW
3.2
XML external entity (XXE) vulnerability in the WebHMI server in Yokogawa Electric Corporation FAST/T…Dec 6, 2014›
CVE-2023-2876LOW
3.1
Sensitive Cookie Without 'HttpOnly' Flag vulnerability in ABB REX640 PCL1 (firmware modules), ABB RE…Jun 13, 2023›
CVE-2020-16232LOW
2.8
In Yokogawa WideField3 R1.01 - R4.03, a buffer overflow could be caused when a user loads a maliciou…Mar 18, 2022›
CVE-2016-4511LOW
2.8
ABB PCM600 before 2.7 uses an improper hash algorithm for the main application password, which makes…Jun 10, 2016›
CVE-2023-4089LOW
2.7
On affected Wago products an remote attacker with administrative privileges can access files to whic…Oct 17, 2023›
CVE-2016-9338LOW
2.7
An issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 controller 1763-L16AWA,…Feb 13, 2017›
CVE-2006-2406LOW
2.6
Directory traversal vulnerability in bb_lib/abbc.css.php in Unclassified NewsBoard (UNB) 1.5.3-d and…May 16, 2006›
CVE-2016-7960LOW
2.5
Siemens SIMATIC STEP 7 (TIA Portal) before 14 uses an improper format for managing TIA project files…Oct 13, 2016›
CVE-2016-5849LOW
2.5
Siemens SICAM PAS through 8.07 allows local users to obtain sensitive configuration information by l…Jul 4, 2016›
CVE-2015-1015LOW
2.1
Omron CX-One CX-Programmer before 9.6, CJ2M PLC devices before 2.1, and CJ2H PLC devices before 1.5 …Oct 6, 2015›
CVE-2015-0988LOW
2.1
Omron CX-One CX-Programmer before 9.6 uses a reversible format for password storage in project sourc…Oct 6, 2015›
CVE-2015-5084LOW
2.1
The Siemens SIMATIC WinCC Sm@rtClient and Sm@rtClient Lite applications before 01.00.01.00 for Andro…Aug 3, 2015›
CVE-2015-1602LOW
2.1
Siemens SIMATIC STEP 7 (TIA Portal) 12 and 13 before 13 SP1 Upd1 improperly stores password data wit…Apr 6, 2015›
CVE-2015-0999LOW
2.1
Schneider Electric InduSoft Web Studio before 7.1.3.4 SP3 Patch 4 and InTouch Machine Edition 2014 b…Mar 29, 2015›
CVE-2015-0996LOW
2.1
Schneider Electric InduSoft Web Studio before 7.1.3.4 SP3 Patch 4 and InTouch Machine Edition 2014 b…Mar 29, 2015›
CVE-2015-1599LOW
2.1
The Siemens SPCanywhere application for iOS allows physically proximate attackers to bypass intended…Mar 7, 2015›
CVE-2015-1598LOW
2.1
The Siemens SPCanywhere application for Android does not properly store application passwords, which…Mar 7, 2015›
CVE-2015-1355LOW
2.1
Siemens SIMATIC STEP 7 (TIA Portal) before 13 SP1 uses a weak password-hash algorithm, which makes i…Feb 18, 2015›
CVE-2014-5231LOW
2.1
The Siemens SIMATIC WinCC Sm@rtClient app before 1.0.2 for iOS allows physically proximate attackers…Jan 14, 2015›
CVE-2014-5398LOW
2.1
Schneider Electric Wonderware Information Server (WIS) Portal 4.0 SP1 through 5.5 allows remote atta…Aug 28, 2014›
CVE-2014-2381LOW
2.1
Schneider Electric Wonderware Information Server (WIS) Portal 4.0 SP1 through 5.5 uses weak encrypti…Aug 28, 2014›
CVE-2014-5233LOW
1.9
The Siemens SIMATIC WinCC Sm@rtClient app before 1.0.2 for iOS allows physically proximate attackers…Jan 14, 2015›
CVE-2014-5232LOW
1.9
The Siemens SIMATIC WinCC Sm@rtClient app before 1.0.2 for iOS allows local users to bypass an inten…Jan 14, 2015›
CVE-2012-4693LOW
1.9
Invensys Wonderware InTouch 2012 R2 and earlier and Siemens ProcessSuite use a weak encryption algor…Dec 18, 2012›
CVE-2015-1009LOW
1.7
Schneider Electric InduSoft Web Studio before 7.1.3.5 Patch 5 and Wonderware InTouch Machine Edition…Aug 1, 2015›
CVE-2026-1876Awaiting Analysis
0.0
Improper Resource Shutdown or Release vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F S…Mar 3, 2026›
CVE-2026-1875Awaiting Analysis
0.0
Improper Resource Shutdown or Release vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F S…Mar 3, 2026›
CVE-2026-1874Awaiting Analysis
0.0
Always-Incorrect Control Flow Implementation vulnerability in Mitsubishi Electric Corporation MELSEC…Mar 3, 2026›
CVE-2025-66600Awaiting Analysis
0.0
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. This prod…Feb 9, 2026›
CVE-2025-66599Awaiting Analysis
0.0
A vulnerability has been found in FAST/TOOLS provided by Yokogawa Electric Corporation. Physical …Feb 9, 2026›
CVE-2025-15080Awaiting Analysis
0.0
Improper Validation of Specified Quantity in Input vulnerability in Mitsubishi Electric MELSEC iQ-R …Feb 5, 2026›
CVE-2026-23036Awaiting Analysis
0.0
In the Linux kernel, the following vulnerability has been resolved: btrfs: release path before iget…Jan 31, 2026›
CVE-2025-71079Awaiting Analysis
0.0
In the Linux kernel, the following vulnerability has been resolved: net: nfc: fix deadlock between …Jan 13, 2026›
CVE-2023-54224Awaiting Analysis
0.0
In the Linux kernel, the following vulnerability has been resolved: btrfs: fix lockdep splat and po…Dec 30, 2025›
CVE-2025-1680Awaiting Analysis
0.0
An acceptance of extraneous untrusted data with trusted data vulnerability has been identified in Mo…Oct 23, 2025›
CVE-2025-1679Awaiting Analysis
0.0
Cross-site Scripting has been identified in Moxa’s Ethernet switches, which allows an authenticated …Oct 23, 2025›
CVE-2025-6950Awaiting Analysis
0.0
An Use of Hard-coded Credentials vulnerability has been identified in Moxa’s network security applia…Oct 17, 2025›
CVE-2025-6949Awaiting Analysis
0.0
An Execution with Unnecessary Privileges vulnerability has been identified in Moxa’s network securit…Oct 17, 2025›
CVE-2025-6894Awaiting Analysis
0.0
An Execution with Unnecessary Privileges vulnerability has been identified in Moxa’s network securit…Oct 17, 2025›
CVE-2025-6893Awaiting Analysis
0.0
An Execution with Unnecessary Privileges vulnerability has been identified in Moxa’s network securit…Oct 17, 2025›
CVE-2025-6892Awaiting Analysis
0.0
An Incorrect Authorization vulnerability has been identified in Moxa’s network security appliances a…Oct 17, 2025›
CVE-2025-58318Awaiting Analysis
0.0
Delta Electronics DIAView has an authentication bypass vulnerability.Sep 1, 2025›
CVE-2025-5191Awaiting Analysis
0.0
An Unquoted Search Path vulnerability has been identified in the utility for Moxa’s industrial compu…Aug 25, 2025›
CVE-2025-7353Awaiting Analysis
0.0
A security issue exists due to the web-based debugger agent enabled on Rockwell Automation ControlLo…Aug 14, 2025›
CVE-2025-0676Awaiting Analysis
0.0
This vulnerability involves command injection in tcpdump within Moxa products, enabling an authentic…Apr 2, 2025›
CVE-2025-1449Awaiting Analysis
0.0
A vulnerability exists in the Rockwell Automation Verve Asset Manager due to insufficient variable s…Mar 31, 2025›
CVE-2023-5878Awaiting Analysis
0.0
Honeywell OneWireless Wireless Device Manager (WDM) for the following versions R310.x, R320.x, R32…Feb 6, 2025›
CVE-2025-0659Awaiting Analysis
0.0
A path traversal vulnerability exists in the Rockwell Automation DataEdge Platform DataMosaix Privat…Jan 28, 2025›
CVE-2024-12297Awaiting Analysis
0.0
Moxa’s Ethernet switch is vulnerable to an authentication bypass because of flaws in its authorizati…Jan 15, 2025›
CVE-2024-12373Awaiting Analysis
0.0
A denial-of-service vulnerability exists in the Rockwell Automation Power Monitor 1000. The vulnerab…Dec 18, 2024›
CVE-2024-12372Awaiting Analysis
0.0
A denial-of-service and possible remote code execution vulnerability exists in the Rockwell Automati…Dec 18, 2024›
CVE-2024-12371Awaiting Analysis
0.0
A device takeover vulnerability exists in the Rockwell Automation Power Monitor 1000. This vulnerabi…Dec 18, 2024›
CVE-2024-9412Awaiting Analysis
0.0
An improper authorization vulnerability exists in the Rockwell Automation affected products that cou…Oct 8, 2024›
CVE-2024-7567Awaiting Analysis
0.0
A denial-of-service vulnerability exists via the CIP/Modbus port in the Rockwell Automation Micro850…Aug 13, 2024›
CVE-2024-6079Awaiting Analysis
0.0
A vulnerability exists in the Rockwell Automation Emulate3D™, which could be leveraged to execute a …Aug 13, 2024›
CVE-2024-5801Awaiting Analysis
0.0
Enabled IP Forwarding feature in B&R Automation Runtime versions before 6.0.2 may allow remote attac…Aug 12, 2024›
CVE-2024-6242Awaiting Analysis
0.0
A vulnerability exists in Rockwell Automation affected products that allows a threat actor to bypass…Aug 1, 2024›
CVE-2024-3640Awaiting Analysis
0.0
An unquoted executable path exists in the Rockwell Automation FactoryTalk® Remote Access™ possibly r…May 16, 2024›