All the vulnerabilites related to Sielco - PolyEco1000
cve-2023-46661
Vulnerability from cvelistv5
Published
2023-10-26 19:57
Modified
2024-08-02 20:53
Severity ?
EPSS score ?
Summary
Improper Access Control in Sielco PolyEco1000
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Sielco | PolyEco1000 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:21.079Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PolyEco1000", "vendor": "Sielco ", "versions": [ { "status": "affected", "version": "CPU:2.0.6 FPGA:10.19" }, { "status": "affected", "version": "CPU:1.9.4 FPGA:10.19" }, { "status": "affected", "version": "CPU:1.9.3 FPGA:10.19" }, { "status": "affected", "version": "CPU:1.7.0 FPGA:10.16" }, { "status": "affected", "version": "CPU:2.0.2 FPGA:10.19" }, { "status": "affected", "version": "CPU:2.0.0 FPGA:10.19" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Gjoko Krstic" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cp\u003eSielco PolyEco1000 is vulnerable to an attacker escalating their privileges by modifying passwords in POST requests.\u003c/p\u003e\u003cbr\u003e\n\n" } ], "value": "\nSielco PolyEco1000 is vulnerable to an attacker escalating their privileges by modifying passwords in POST requests.\n\n\n\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-26T19:57:12.046Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07" } ], "source": { "discovery": "UNKNOWN" }, "title": "Improper Access Control in Sielco PolyEco1000", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2023-46661", "datePublished": "2023-10-26T19:57:12.046Z", "dateReserved": "2023-10-24T16:27:17.281Z", "dateUpdated": "2024-08-02T20:53:21.079Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0897
Vulnerability from cvelistv5
Published
2023-10-26 19:44
Modified
2024-08-02 05:24
Severity ?
EPSS score ?
Summary
Session FIxation in Sielco PolyEco1000
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Sielco | PolyEco1000 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:24:34.649Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PolyEco1000", "vendor": "Sielco ", "versions": [ { "status": "affected", "version": "CPU:2.0.6 FPGA:10.19" }, { "status": "affected", "version": "CPU:1.9.4 FPGA:10.19" }, { "status": "affected", "version": "CPU:1.9.3 FPGA:10.19" }, { "status": "affected", "version": "CPU:1.7.0 FPGA:10.16" }, { "status": "affected", "version": "CPU:2.0.2 FPGA:10.19" }, { "status": "affected", "version": "CPU:2.0.0 FPGA:10.19" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": " Gjoko Krstic" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cp\u003eSielco PolyEco1000 is vulnerable to a session hijack vulnerability due to the cookie being vulnerable to a brute force attack, lack of SSL, and the session being visible in requests.\u003c/p\u003e\u003cbr\u003e\n\n" } ], "value": "\nSielco PolyEco1000 is vulnerable to a session hijack vulnerability due to the cookie being vulnerable to a brute force attack, lack of SSL, and the session being visible in requests.\n\n\n\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-384", "description": "CWE-384 Session Fixation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-26T19:44:01.703Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07" } ], "source": { "discovery": "UNKNOWN" }, "title": "Session FIxation in Sielco PolyEco1000", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2023-0897", "datePublished": "2023-10-26T19:44:01.703Z", "dateReserved": "2023-02-17T21:23:31.932Z", "dateUpdated": "2024-08-02T05:24:34.649Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46663
Vulnerability from cvelistv5
Published
2023-10-26 20:02
Modified
2024-08-02 20:53
Severity ?
EPSS score ?
Summary
Improper Access Control in Sielco PolyEco1000
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Sielco | PolyEco1000 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:20.652Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PolyEco1000", "vendor": "Sielco ", "versions": [ { "status": "affected", "version": "CPU:2.0.6 FPGA:10.19" }, { "status": "affected", "version": "CPU:1.9.4 FPGA:10.19" }, { "status": "affected", "version": "CPU:1.9.3 FPGA:10.19" }, { "status": "affected", "version": "CPU:1.7.0 FPGA:10.16" }, { "status": "affected", "version": "CPU:2.0.2 FPGA:10.19" }, { "status": "affected", "version": "CPU:2.0.0 FPGA:10.19" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Gjoko Krstic" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cp\u003e\u003c/p\u003e\n\n\u003cp\u003e\u003c/p\u003e\n\n\u003cp\u003eSielco PolyEco1000 is vulnerable to an attacker bypassing authorization and accessing resources behind protected pages. The application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests.\u003c/p\u003e\n\n" } ], "value": "\n\n\n\n\n\n\n\n\nSielco PolyEco1000 is vulnerable to an attacker bypassing authorization and accessing resources behind protected pages. The application interface allows users to perform certain actions via HTTP requests without performing any validity checks to verify the requests.\n\n\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-26T20:02:24.004Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07" } ], "source": { "discovery": "UNKNOWN" }, "title": "Improper Access Control in Sielco PolyEco1000", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2023-46663", "datePublished": "2023-10-26T20:02:24.004Z", "dateReserved": "2023-10-24T16:27:17.282Z", "dateUpdated": "2024-08-02T20:53:20.652Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46664
Vulnerability from cvelistv5
Published
2023-10-26 20:04
Modified
2024-08-02 20:53
Severity ?
EPSS score ?
Summary
Improper Access Control in Sielco PolyEco1000
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Sielco | PolyEco1000 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:20.676Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PolyEco1000", "vendor": "Sielco ", "versions": [ { "status": "affected", "version": "CPU:2.0.6 FPGA:10.19" }, { "status": "affected", "version": "CPU:1.9.4 FPGA:10.19" }, { "status": "affected", "version": "CPU:1.9.3 FPGA:10.19" }, { "status": "affected", "version": "CPU:1.7.0 FPGA:10.16" }, { "status": "affected", "version": "CPU:2.0.2 FPGA:10.19" }, { "status": "affected", "version": "CPU:2.0.0 FPGA:10.19" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Gjoko Krstic" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cp\u003e\u003c/p\u003e\n\n\u003cp\u003e\u003c/p\u003e\n\n\u003cp\u003e\n\n\u003c/p\u003e\u003cp\u003eSielco PolyEco1000 is vulnerable to an improper access control vulnerability when the application provides direct access to objects based on user-supplied input. As a result of this vulnerability attackers can bypass authorization and access resources behind protected pages.\u003c/p\u003e\n\n\u003cp\u003e\u003c/p\u003e\n\n" } ], "value": "\n\n\n\n\n\n\n\n\n\n\n\n\nSielco PolyEco1000 is vulnerable to an improper access control vulnerability when the application provides direct access to objects based on user-supplied input. As a result of this vulnerability attackers can bypass authorization and access resources behind protected pages.\n\n\n\n\n\n\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-26T20:04:33.638Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07" } ], "source": { "discovery": "UNKNOWN" }, "title": "Improper Access Control in Sielco PolyEco1000", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2023-46664", "datePublished": "2023-10-26T20:04:33.638Z", "dateReserved": "2023-10-24T16:27:17.282Z", "dateUpdated": "2024-08-02T20:53:20.676Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46662
Vulnerability from cvelistv5
Published
2023-10-26 20:00
Modified
2024-08-02 20:53
Severity ?
EPSS score ?
Summary
Improper Access Control in Sielco PolyEco1000
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Sielco | PolyEco1000 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:20.677Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PolyEco1000", "vendor": "Sielco ", "versions": [ { "status": "affected", "version": "CPU:2.0.6 FPGA:10.19" }, { "status": "affected", "version": "CPU:1.9.4 FPGA:10.19" }, { "status": "affected", "version": "CPU:1.9.3 FPGA:10.19" }, { "status": "affected", "version": "CPU:1.7.0 FPGA:10.16" }, { "status": "affected", "version": "CPU:2.0.2 FPGA:10.19" }, { "status": "affected", "version": "CPU:2.0.0 FPGA:10.19" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Gjoko Krstic" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cp\u003e\u003c/p\u003e\n\n\u003cp\u003eSielco PolyEco1000 is vulnerable to an information disclosure vulnerability due to improper access control enforcement. An unauthenticated remote attacker can exploit this via a specially crafted request to gain access to sensitive information.\u003c/p\u003e\u003cbr\u003e\n\n\u003cbr\u003e\n\n" } ], "value": "\n\n\n\n\nSielco PolyEco1000 is vulnerable to an information disclosure vulnerability due to improper access control enforcement. An unauthenticated remote attacker can exploit this via a specially crafted request to gain access to sensitive information.\n\n\n\n\n\n\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-26T20:00:05.085Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07" } ], "source": { "discovery": "UNKNOWN" }, "title": "Improper Access Control in Sielco PolyEco1000", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2023-46662", "datePublished": "2023-10-26T20:00:05.085Z", "dateReserved": "2023-10-24T16:27:17.282Z", "dateUpdated": "2024-08-02T20:53:20.677Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-46665
Vulnerability from cvelistv5
Published
2023-10-26 20:08
Modified
2024-08-02 20:53
Severity ?
EPSS score ?
Summary
Improper Access Control in Sielco PolyEco1000
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Sielco | PolyEco1000 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T20:53:20.790Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PolyEco1000", "vendor": "Sielco ", "versions": [ { "status": "affected", "version": "CPU:2.0.6 FPGA:10.19" }, { "status": "affected", "version": "CPU:1.9.4 FPGA:10.19" }, { "status": "affected", "version": "CPU:1.9.3 FPGA:10.19" }, { "status": "affected", "version": "CPU:1.7.0 FPGA:10.16" }, { "status": "affected", "version": "CPU:2.0.2 FPGA:10.19" }, { "status": "affected", "version": "CPU:2.0.0 FPGA:10.19" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Gjoko Krstic" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cp\u003e\u003c/p\u003e\n\n\u003cp\u003e\u003c/p\u003e\n\n\u003cp\u003e\n\n\u003c/p\u003e\u003cp\u003e\n\n\u003c/p\u003e\u003cp\u003eSielco PolyEco1000 is vulnerable to an authentication bypass vulnerability due to an attacker modifying passwords in a POST request and gain unauthorized access to the affected device with administrative privileges.\u003c/p\u003e\u003cbr\u003e\n\n\u003cp\u003e\u003c/p\u003e\n\n\u003cp\u003e\u003c/p\u003e\n\n" } ], "value": "\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nSielco PolyEco1000 is vulnerable to an authentication bypass vulnerability due to an attacker modifying passwords in a POST request and gain unauthorized access to the affected device with administrative privileges.\n\n\n\n\n\n\n\n\n\n\n\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-26T20:08:22.908Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07" } ], "source": { "discovery": "UNKNOWN" }, "title": "Improper Access Control in Sielco PolyEco1000", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2023-46665", "datePublished": "2023-10-26T20:08:22.908Z", "dateReserved": "2023-10-24T16:27:17.282Z", "dateUpdated": "2024-08-02T20:53:20.790Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-5754
Vulnerability from cvelistv5
Published
2023-10-26 19:47
Modified
2024-08-02 08:07
Severity ?
EPSS score ?
Summary
Improper Restriction of Excessive Authentication Attempts in Sielco PolyEco1000
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Sielco | PolyEco1000 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:07:32.658Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PolyEco1000", "vendor": "Sielco ", "versions": [ { "status": "affected", "version": "CPU:2.0.6 FPGA:10.19" }, { "status": "affected", "version": "CPU:1.9.4 FPGA:10.19" }, { "status": "affected", "version": "CPU:1.9.3 FPGA:10.19" }, { "status": "affected", "version": "CPU:1.7.0 FPGA:10.16" }, { "status": "affected", "version": "CPU:2.0.2 FPGA:10.19" }, { "status": "affected", "version": "CPU:2.0.0 FPGA:10.19" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": " Gjoko Krstic" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cp\u003e\u003c/p\u003e\n\n\u003cp\u003eSielco PolyEco1000 uses a weak set of default administrative credentials that can be easily guessed in remote password attacks and gain full control of the system.\u003c/p\u003e\u003cbr\u003e\n\n\u003cbr\u003e\n\n" } ], "value": "\n\n\n\n\nSielco PolyEco1000 uses a weak set of default administrative credentials that can be easily guessed in remote password attacks and gain full control of the system.\n\n\n\n\n\n\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-307", "description": "CWE-307 Improper Restriction of Excessive Authentication Attempts", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-26T19:47:06.226Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-299-07" } ], "source": { "discovery": "UNKNOWN" }, "title": "Improper Restriction of Excessive Authentication Attempts in Sielco PolyEco1000", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2023-5754", "datePublished": "2023-10-26T19:47:06.226Z", "dateReserved": "2023-10-24T16:24:16.565Z", "dateUpdated": "2024-08-02T08:07:32.658Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }