BioThreat Corporation Advisory Feed

BioThreat Corporation

Public BioThreat Corporation advisories.

Archive date
Available snapshots
Index Live · Archive
Advisory Fetched: 2026-02-06 23:00:53 UTC Total items: 30
What this page does

BioThreat Corporation threat monitoring workflows.

Machine-readable feed: JSON

CISA Cybersecurity Advisory , Thu, 05 Feb 26 12:00:00 +0000

View CSAF

Summary

Successful exploitation of this vulnerability could result in unauthorized users gaining administrative access to affected closed circuit television cameras.

The following versions of TP-Link Systems Inc. VIGI Series IP Camera are affected:

  • VIGI Cx45 Series Models C345, C445 <=3.1.0_Build_250820_Rel.57668n (CVE-2026-0629)
  • VIGI Cx55 Series Models C355, C455 <=3.1.0_Build_250820_Rel.58873n (CVE-2026-0629)
  • VIGI Cx85 Series Models C385, C485 <=3.0.2_Build_250630_Rel.71279n (CVE-2026-0629)
  • VIGI C340S Series <=3.1.0_Build_250625_Rel.65381n (CVE-2026-0629)
  • VIGI C540S Series Models C540S, EasyCam C540S <=3.1.0_Build_250625_Rel.66601n (CVE-2026-0629)
  • VIGI C540V Series <=2.1.0_Build_250702_Rel.54300n (CVE-2026-0629)
  • VIGI C250 Series <=2.1.0_Build_250702_Rel.54301n (CVE-2026-0629)
  • VIGI Cx50 Series Models C350, C450 <=2.1.0_Build_250702_Rel.54294n (CVE-2026-0629)
  • VIGI Cx20I (1.0) Series Models C220I 1.0, C320I 1.0, C420I 1.0 <=2.1.0_Build_251014_Rel.58331n (CVE-2026-0629)
  • VIGI Cx20I (1.20) Series Models C220I 1.20, C320I 1.20, C420I 1.20 <=2.1.0_Build_250701_Rel.44071n (CVE-2026-0629)
  • VIGI Cx30I (1.0) Series Models C230I 1.0, C330I 1.0, C430I 1.0 <=2.1.0_Build_250701_Rel.45506n (CVE-2026-0629)
  • VIGI Cx30I (1.20) Series Models C230I 1.20, C330I 1.20, C430I 1.20 <=2.1.0_Build_250701_Rel.44555n (CVE-2026-0629)
  • VIGI Cx30 (1.0) Series Models C230 1.0, C330 1.0, C430 1.0 <=2.1.0_Build_250701_Rel.46796n (CVE-2026-0629)
  • VIGI Cx30 (1.20) Series Models C230 1.20, C330 1.20, C430 1.20 <=2.1.0_Build_250701_Rel.46796n (CVE-2026-0629)
  • VIGI Cx40I (1.0) Series Models C240I 1.0, C340I 1.0, C440I 1.0 <=2.1.0_Build_250701_Rel.46003n (CVE-2026-0629)
  • VIGI Cx40I (1.20) Series Models C240I 1.20, C340I 1.20, C440I 1.20 <=2.1.0_Build_250701_Rel.45041n (CVE-2026-0629)
  • VIGI C230I Mini Series <=2.1.0_Build_250701_Rel.47570n (CVE-2026-0629)
  • VIGI C240 1.0 Series <=2.1.0_Build_250701_Rel.48425n (CVE-2026-0629)
  • VIGI C340 2.0 Series <=2.1.0_Build_250701_Rel.49304n (CVE-2026-0629)
  • VIGI C440 2.0 Series <=2.1.0_Build_250701_Rel.49778n (CVE-2026-0629)
  • VIGI C540 2.0 Series <=2.1.0_Build_250701_Rel.50397n (CVE-2026-0629)
  • VIGI C540‑4G Series <=2.2.0_Build_250826_Rel.56808n (CVE-2026-0629)
  • VIGI Cx40‑W Series Models C340‑W 2.0/2.20, C440‑W 2.0, C540‑W 2.0 <=2.1.1_Build_250717 (CVE-2026-0629)
  • VIGI Cx20 Series Models C320, C420 <=2.1.0_Build_250701_Rel.39597n (CVE-2026-0629)
  • VIGI InSight Sx45 Series Models S245, S345, S445 <=3.1.0_Build_250820_Rel.57668n (CVE-2026-0629)
  • VIGI InSight Sx55 Series Models S355, S455 <=3.1.0_Build_250820_Rel.58873n (CVE-2026-0629)
  • VIGI InSight Sx85 Series Models S285, S385 <=3.0.2_Build_250630_Rel.71279n (CVE-2026-0629)
  • VIGI InSight Sx45ZI Series Models S245ZI, S345ZI, S445ZI <=1.2.0_Build_250820_Rel.60930n (CVE-2026-0629)
  • VIGI InSight Sx85PI Series Models S385PI, S485PI <=1.2.0_Build_250827_Rel.66817n (CVE-2026-0629)
  • VIGI InSight S655I Series <=1.1.1_Build_250625_Rel.64224n (CVE-2026-0629)
  • VIGI InSight S345‑4G Series <=2.1.0_Build_250725_Rel.36867n (CVE-2026-0629)
  • VIGI InSight Sx25 Series Models S225, S325, S425 <=1.1.0_Build_250630_Rel.39597n (CVE-2026-0629)
CVSS Vendor Equipment Vulnerabilities
v3 8.8 TP-Link Systems Inc. TP-Link Systems Inc. VIGI Series IP Camera Improper Authentication

Background

  • Critical Infrastructure Sectors: Commercial Facilities
  • Countries/Areas Deployed: Worldwide
  • Company Headquarters Location: China

Vulnerabilities

Expand All +

CVE-2026-0629

An authentication bypass in the password recovery feature of the local web interface across multiple VIGI camera models allows an attacker on the LAN to reset the admin password without verification by manipulating client-side state. Attackers can gain full administrative access to the device, compromising configuration and network security.

View CVE Details


Affected Products

TP-Link Systems Inc. VIGI Series IP Camera
Vendor:
TP-Link Systems Inc.
Product Version:
TP-Link Systems Inc. VIGI Cx45 Series Models C345, C445: <=3.1.0_Build_250820_Rel.57668n, TP-Link Systems Inc. VIGI Cx55 Series Models C355, C455: <=3.1.0_Build_250820_Rel.58873n, TP-Link Systems Inc. VIGI Cx85 Series Models C385, C485: <=3.0.2_Build_250630_Rel.71279n, TP-Link Systems Inc. VIGI C340S Series: <=3.1.0_Build_250625_Rel.65381n, TP-Link Systems Inc. VIGI C540S Series Models C540S, EasyCam C540S: <=3.1.0_Build_250625_Rel.66601n, TP-Link Systems Inc. VIGI C540V Series: <=2.1.0_Build_250702_Rel.54300n, TP-Link Systems Inc. VIGI C250 Series: <=2.1.0_Build_250702_Rel.54301n, TP-Link Systems Inc. VIGI Cx50 Series Models C350, C450: <=2.1.0_Build_250702_Rel.54294n, TP-Link Systems Inc. VIGI Cx20I (1.0) Series Models C220I 1.0, C320I 1.0, C420I 1.0: <=2.1.0_Build_251014_Rel.58331n, TP-Link Systems Inc. VIGI Cx20I (1.20) Series Models C220I 1.20, C320I 1.20, C420I 1.20: <=2.1.0_Build_250701_Rel.44071n, TP-Link Systems Inc. VIGI Cx30I (1.0) Series Models C230I 1.0, C330I 1.0, C430I 1.0: <=2.1.0_Build_250701_Rel.45506n, TP-Link Systems Inc. VIGI Cx30I (1.20) Series Models C230I 1.20, C330I 1.20, C430I 1.20: <=2.1.0_Build_250701_Rel.44555n, TP-Link Systems Inc. VIGI Cx30 (1.0) Series Models C230 1.0, C330 1.0, C430 1.0: <=2.1.0_Build_250701_Rel.46796n, TP-Link Systems Inc. VIGI Cx30 (1.20) Series Models C230 1.20, C330 1.20, C430 1.20: <=2.1.0_Build_250701_Rel.46796n, TP-Link Systems Inc. VIGI Cx40I (1.0) Series Models C240I 1.0, C340I 1.0, C440I 1.0: <=2.1.0_Build_250701_Rel.46003n, TP-Link Systems Inc. VIGI Cx40I (1.20) Series Models C240I 1.20, C340I 1.20, C440I 1.20: <=2.1.0_Build_250701_Rel.45041n, TP-Link Systems Inc. VIGI C230I Mini Series: <=2.1.0_Build_250701_Rel.47570n, TP-Link Systems Inc. VIGI C240 1.0 Series: <=2.1.0_Build_250701_Rel.48425n, TP-Link Systems Inc. VIGI C340 2.0 Series: <=2.1.0_Build_250701_Rel.49304n, TP-Link Systems Inc. VIGI C440 2.0 Series: <=2.1.0_Build_250701_Rel.49778n, TP-Link Systems Inc. VIGI C540 2.0 Series: <=2.1.0_Build_250701_Rel.50397n, TP-Link Systems Inc. VIGI C540‑4G Series: <=2.2.0_Build_250826_Rel.56808n, TP-Link Systems Inc. VIGI Cx40‑W Series Models C340‑W 2.0/2.20, C440‑W 2.0, C540‑W 2.0: <=2.1.1_Build_250717, TP-Link Systems Inc. VIGI Cx20 Series Models C320, C420: <=2.1.0_Build_250701_Rel.39597n, TP-Link Systems Inc. VIGI InSight Sx45 Series Models S245, S345, S445: <=3.1.0_Build_250820_Rel.57668n, TP-Link Systems Inc. VIGI InSight Sx55 Series Models S355, S455: <=3.1.0_Build_250820_Rel.58873n, TP-Link Systems Inc. VIGI InSight Sx85 Series Models S285, S385: <=3.0.2_Build_250630_Rel.71279n, TP-Link Systems Inc. VIGI InSight Sx45ZI Series Models S245ZI, S345ZI, S445ZI: <=1.2.0_Build_250820_Rel.60930n, TP-Link Systems Inc. VIGI InSight Sx85PI Series Models S385PI, S485PI: <=1.2.0_Build_250827_Rel.66817n, TP-Link Systems Inc. VIGI InSight S655I Series: <=1.1.1_Build_250625_Rel.64224n, TP-Link Systems Inc. VIGI InSight S345‑4G Series: <=2.1.0_Build_250725_Rel.36867n, TP-Link Systems Inc. VIGI InSight Sx25 Series Models S225, S325, S425: <=1.1.0_Build_250630_Rel.39597n
Product Status:
known_affected
Remediations

Mitigation
TP-Link Communications strongly recommends that users with affected devices take the following actions:

Mitigation
Download and update to the latest firmware version to fix the vulnerability from the following links.

Mitigation
United States users should visit the TP-Link US Download Center here: https://www.vigi.com/us/support/download/.

Mitigation
Global English users should visit the TP-Link EN Download Center:https://www.vigi.com/es/support/download/.

Mitigation
India users should visit the TP-Link India Download Center:https://www.vigi.com/in/support/download/.

Mitigation
Please visit https://www.tp-link.com/us/support/faq/4906/ for the TP-Link advisory.

Relevant CWE: CWE-287 Improper Authentication


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 8.8 HIGH CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Acknowledgments

  • Arko Dhar of Redinent Innovations reported this vulnerability to CISA

Legal Notice and Terms of Use

This product is provided subject to this Notification (https://www.cisa.gov/notification) and this Privacy & Use policy (https://www.cisa.gov/privacy-policy).


Recommended Practices

CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability, such as:

Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the Internet.

Locate control system networks and remote devices behind firewalls and isolating them from business networks.

When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.

CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.

No known public exploitation specifically targeting this vulnerability has been reported to CISA at this time. This vulnerability is not exploitable remotely.


Revision History

  • Initial Release Date: 2026-02-05
Date Revision Summary
2026-02-05 1 Initial Publication

Legal Notice and Terms of Use

CISA Cybersecurity Advisory , Thu, 05 Feb 26 12:00:00 +0000

View CSAF

Summary

Successful exploitation of this vulnerability may allow an attacker to read device data or part of a control program from the affected product, write device data in the affected product, or cause a denial-of-service condition on the affected product.

The following versions of Mitsubishi Electric MELSEC iQ-R Series are affected:

  • MELSEC iQ-R Series R08/16/32/120PCPU firmware <=48 (CVE-2025-15080)
CVSS Vendor Equipment Vulnerabilities
v3 9.4 Mitsubishi Electric Mitsubishi Electric MELSEC iQ-R Series Improper Validation of Specified Quantity in Input

Background

  • Critical Infrastructure Sectors: Critical Manufacturing
  • Countries/Areas Deployed: Worldwide
  • Company Headquarters Location: Japan

Vulnerabilities

Expand All +

CVE-2025-15080

An information disclosure, information tampering, and denial-of-service vulnerability exists in Mitsubishi Electric proprietary protocol communication and SLMP communication used in FA products. An attacker may be able to read device data or part of a control program from the affected product, write device data in the affected product, or cause a denial-of-service condition on the affected product by sending a specially crafted packet containing a specific command to the affected product.

View CVE Details


Affected Products

Mitsubishi Electric MELSEC iQ-R Series
Vendor:
Mitsubishi Electric
Product Version:
Mitsubishi Electric MELSEC iQ-R Series R08/16/32/120PCPU firmware: <=48
Product Status:
known_affected
Remediations

Mitigation
Mitsubishi Electric recommends users of the affected products follow the procedure below to update firmware version 49 or later. Download the update file for the fixed version, the engineering software for firmware upgrade, and the manual from the download website at https://www.mitsubishielectric.com/fa/download/index.html . For details on updating the firmware, see MELSEC iQ-R Module Configuration Manual "Appendix 2 Firmware Update Function".

Mitigation
Mitsubishi Electric recommends the following mitigations to reduce the risk of exploiting this vulnerability: Use a firewall or virtual private network (VPN) block access from untrusted networks and hosts using a firewall. Use the product within a LAN and block access from untrusted networks and hosts through a firewall. Use firewalls, IP filters, and similar controls to minimize connections to the product and prevent access from untrusted networks and hosts. For details on the IP filter function, refer to "IP Filter" in section 1.13, Security, of the MELSEC iQ-R Ethernet User's Manual (Application). Restrict physical access to the affected product and its connected LAN.

Mitigation
For specific update instructions and additional details see the Mitsubishi Electric advisory at https://www.mitsubishielectric.com/psirt/vulnerability/pdf/2025-020_en.pdf .

Mitigation
For further information, contact your local Mitsubishi Electric representative at https://www.mitsubishielectric.com/fa/service-support/index.html .

Relevant CWE: CWE-1284 Improper Validation of Specified Quantity in Input


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 9.4 CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H

Acknowledgments

  • Mitsubishi Electric reported this vulnerability to CISA

Legal Notice and Terms of Use

This product is provided subject to this Notification (https://www.cisa.gov/notification) and this Privacy & Use policy (https://www.cisa.gov/privacy-policy).


Recommended Practices

CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.

No known public exploitation specifically targeting this vulnerability has been reported to CISA at this time.


Revision History

  • Initial Release Date: 2026-02-05
Date Revision Summary
2026-02-05 1 Initial Republication of Mitsubishi Electric 2025-020

Legal Notice and Terms of Use

CISA Cybersecurity Advisory , Thu, 05 Feb 26 12:00:00 +0000

View CSAF

Summary

Hitachi Energy is aware of a vulnerability that affects FOX61x product versions listed in this document. Successful exploitation of this vulnerability can lead to forgery attacks potentially causing impact on confidentiality, integrity and availability for the product. Please refer to the Recommended Immediate Actions for information about the mitigation/remediation. Note: This is applicable only if FOX61x devices are configured to use remote RADIUS authentication.

The following versions of Hitachi Energy FOX61x are affected:

  • FOX61x R18, vers:FOX61x/<=R17A (CVE-2024-3596, CVE-2024-3596)
CVSS Vendor Equipment Vulnerabilities
v3 9 Hitachi Energy Hitachi Energy FOX61x Improper Enforcement of Message Integrity During Transmission in a Communication Channel

Background

  • Critical Infrastructure Sectors: Critical Manufacturing
  • Countries/Areas Deployed: Worldwide
  • Company Headquarters Location: Switzerland

Vulnerabilities

Expand All +

CVE-2024-3596

The RADIUS protocol under RFC 2865 is vulnerable to forgery attacks that allow a local attacker to modify any valid response (Access-Accept, Access-Reject, or Access-Challenge) into another response by exploiting a chosen-prefix collision attack on the MD5 Response Authenticator signature..

View CVE Details


Affected Products

Hitachi Energy FOX61x
Vendor:
Hitachi Energy
Product Version:
FOX61x version R18, FOX61x version R17A and earlier
Product Status:
known_affected
Remediations

Mitigation
Enable the RADIUS Message-Authenticator option in both the FOX61x and RADIUS Server configurations. Refer to the Technical User Documentation at https://publisher.hitachienergy.com/preview?DocumentID=1KHW029042&LanguageCode=en&DocumentPartId=R18&Action=launch.

Vendor fix
Update to FOX61x R18, then enable the RADIUS Message-Authenticator option in both the FOX61x and RADIUS Server configurations. Refer to the Technical User Documentation at https://publisher.hitachienergy.com/preview?DocumentID=1KHW029042&LanguageCode=en&DocumentPartId=R18&Action=launch.

Mitigation
If the upgrade is not possible, apply general mitigation factors with segmentation of FOX management traffic to minimize the risk.

Mitigation
For more information, see the associated Hitachi Energy cybersecurity advisory 8DBD000225 Radius MD5 Vulnerability in Hitachi Energy FOX61x product at https://publisher.hitachienergy.com/preview?DocumentID=8DBD000225&LanguageCode=en or https://publisher.hitachienergy.com/preview?DocumentID=8DBD000225-CSAF&LanguageCode=en&DocumentPartId=&Action=Launch .

Mitigation
Hitachi Energy recommends implementing security practices and firewall configurations to help protect process control networks from external attacks. Such practices include ensuring that process control systems are physically protected from unauthorized access, have no direct Internet connections, and are separated from other networks by a firewall system that minimizes exposed ports, and any additional ports should be evaluated on a case-by-case basis. Process control systems should not be used for web browsing, instant messaging, or email. Portable computers and removable storage media should be thoroughly scanned for malware before being connected to a control system. Organizations should enforce proper password policies and procedures.

Relevant CWE: CWE-924 Improper Enforcement of Message Integrity During Transmission in a Communication Channel


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 9 CRITICAL CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

Acknowledgments

  • Hitachi Energy reported this vulnerability to CISA.

Notice

The information in this document is subject to change without notice and should not be construed as a commitment by Hitachi Energy. Hitachi Energy provides no warranty, express or implied, including warranties of merchantability and fitness for a particular purpose, for the information contained in this document, and assumes no responsibility for any errors that may appear in this document. In no event shall Hitachi Energy or any of its suppliers be liable for direct, indirect, special, incidental or consequential damages of any nature or kind arising from the use of this document, or from the use of any hardware or software described in this document, even if Hitachi Energy or its suppliers have been advised of the possibility of such damages. This document and parts hereof must not be reproduced or copied without written permission from Hitachi Energy and the contents hereof must not be imparted to a third party nor used for any unauthorized purpose. All rights to registrations and trademarks reside with their respective owners.


Support

For additional information and support please contact your product provider or Hitachi Energy service organization. For contact information, see https://www.hitachienergy.com/contact-us/ for Hitachi Energy contact-centers.


General Mitigation Factors

Recommended security practices and firewall configurations can help protect a process control network from attacks that originate from outside the network. Such practices include that process control systems are physically protected from direct access by unauthorized personnel, have no direct connections to the Internet, and are separated from other networks by means of a firewall system that has a minimal number of ports exposed, and others that have to be evaluated case by case. Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails. Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system. Proper password policies and processes should be followed.


Legal Notice and Terms of Use

This product is provided subject to this Notification (https://www.cisa.gov/notification) and this Privacy & Use policy (https://www.cisa.gov/privacy-policy).


Recommended Practices

CISA recommends users take defensive measures to minimize the exploitation risk of these vulnerabilities.

Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.

Locate control system networks and remote devices behind firewalls and isolate them from business networks.

When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.

CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.


Advisory Conversion Disclaimer

This ICSA is a verbatim republication of Hitachi Energy PSIRT 8DBD000225 from a direct conversion of the vendor's Common Security Advisory Framework (CSAF) advisory. This is republished to CISA's website as a means of increasing visibility and is provided "as-is" for informational purposes only. CISA is not responsible for the editorial or technical accuracy of republished advisories and provides no warranties of any kind regarding any information contained within this advisory. Further, CISA does not endorse any commercial product or service. Please contact Hitachi Energy PSIRT directly for any questions regarding this advisory.

Revision History

  • Initial Release Date: 2026-01-27
Date Revision Summary
2026-01-27 1 Initial public release
2026-02-05 2 Initial CISA Republication of Hitachi Energy PSIRT 8DBD000225 advisory

Legal Notice and Terms of Use

CISA Cybersecurity Advisory , Thu, 05 Feb 26 12:00:00 +0000

View CSAF

Summary

Successful exploitation of this vulnerability could allow an attacker to cause a denial-of-service condition and memory corruption.

The following versions of o6 Automation GmbH Open62541 are affected:

  • Open62541 >=1.5-rc1|<1.5-rc2 (CVE-2026-1301)
CVSS Vendor Equipment Vulnerabilities
v3 5.7 o6 Automation GmbH o6 Automation GmbH Open62541 Out-of-bounds Write

Background

  • Critical Infrastructure Sectors: Critical Manufacturing
  • Countries/Areas Deployed: Worldwide
  • Company Headquarters Location: Germany

Vulnerabilities

Expand All +

CVE-2026-1301

In builds with PubSub and JSON enabled, a crafted JSON message can cause the decoder to write beyond a heap-allocated array before authentication, reliably crashing the process and corrupting memory.

View CVE Details


Affected Products

o6 Automation GmbH Open62541
Vendor:
o6 Automation GmbH
Product Version:
o6 Automation GmbH Open62541: >=1.5-rc1|<1.5-rc2
Product Status:
known_affected
Remediations

Mitigation
o6 Automation GmbH recommends users upgrade to the stable release of v1.5.0.

Relevant CWE: CWE-787 Out-of-bounds Write


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 5.7 MEDIUM CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H

Acknowledgments

  • Andrew Fasano of NIST CAISI reported this vulnerability to CISA

Legal Notice and Terms of Use

This product is provided subject to this Notification (https://www.cisa.gov/notification) and this Privacy & Use policy (https://www.cisa.gov/privacy-policy).


Recommended Practices

CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability, such as:

Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the Internet.

Locate control system networks and remote devices behind firewalls and isolating them from business networks.

When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.

CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.

CISA also recommends users take the following measures to protect themselves from social engineering attacks:

Do not click web links or open attachments in unsolicited email messages.

Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams.

Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.

No known public exploitation specifically targeting this vulnerability has been reported to CISA at this time.


Revision History

  • Initial Release Date: 2026-02-05
Date Revision Summary
2026-02-05 1 Initial Publication

Legal Notice and Terms of Use

CISA Cybersecurity Advisory , Thu, 05 Feb 26 12:00:00 +0000

CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. 

  • CVE-2025-11953 React Native Community CLI OS Command Injection Vulnerability
  • CVE-2026-24423 SmarterTools SmarterMail Missing Authentication for Critical Function Vulnerability

These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise. 

Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information. 

Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.

CISA Cybersecurity Advisory , Thu, 05 Feb 26 12:00:00 +0000

View CSAF

Summary

Hitachi Energy is aware of a vulnerability that affects XMC20 product versions listed in this document. Successful exploitation of this vulnerability can lead to forgery attacks potentially causing impact on confidentiality, integrity and availability for the product. Please refer to the Recommended Immediate Actions for information about the mitigation/remediation. Note: This is applicable only if XMC20 devices are configured to use remote RADIUS authentication.

The following versions of Hitachi Energy XMC20 are affected:

  • XMC20 R18, vers:XMC20/<=R17A (CVE-2024-3596, CVE-2024-3596)
CVSS Vendor Equipment Vulnerabilities
v3 9 Hitachi Energy Hitachi Energy XMC20 Improper Enforcement of Message Integrity During Transmission in a Communication Channel

Background

  • Critical Infrastructure Sectors: Critical Manufacturing
  • Countries/Areas Deployed: Worldwide
  • Company Headquarters Location: Switzerland

Vulnerabilities

Expand All +

CVE-2024-3596

The RADIUS protocol under RFC 2865 is susceptible to forgery attacks by a local attacker. An attacker can modify any valid response (Access-Accept, Access-Reject, or Access-Challenge) into another response using a chosen-prefix collision attack targeting the MD5 Response Authenticator signature.

View CVE Details


Affected Products

Hitachi Energy XMC20
Vendor:
Hitachi Energy
Product Version:
XMC20 version R18, XMC20 version R17A and earlier
Product Status:
known_affected
Remediations

Mitigation
Enable the RADIUS Message-Authenticator option in both the XMC20 and RADIUS server configurations. Refer to the Technical User Documentation at https://publisher.hitachienergy.com/preview?DocumentID=1KHW029001&LanguageCode=en&DocumentPartId=R18&Action=launch.

Vendor fix
Update to XMC20 R18 and then enable the RADIUS Message-Authenticator option in both the XMC20 and RADIUS server configurations. Refer to the Technical User Documentation at https://publisher.hitachienergy.com/preview?DocumentID=1KHW029001&LanguageCode=en&DocumentPartId=R18&Action=launch.

Mitigation
If the upgrade is not possible, apply general mitigation factors with segmentation of FOX management traffic to minimize the risk.

Mitigation
For more information, see the associated Hitachi Energy cybersecurity advisory 8DBD000233 RADIUS MD5 Vulnerability in Hitachi Energy XMC20 product available in PDF format here https://publisher.hitachienergy.com/preview?DocumentID=8DBD000233&LanguageCode=en&DocumentPartId=&Action=launch or JSON format here https://publisher.hitachienergy.com/preview?DocumentID=8DBD000233-CSAF&LanguageCode=en&DocumentPartId=&Action=Launch.

Mitigation
Hitachi Energy recommends implementing security practices and firewall configurations to help protect process control networks from external attacks. Such practices include ensuring that process control systems are physically protected from unauthorized access, have no direct Internet connections, and are separated from other networks by a firewall system that minimizes exposed ports, and any additional ports should be evaluated on a case-by-case basis. Process control systems should not be used for web browsing, instant messaging, or email. Portable computers and removable storage media should be thoroughly scanned for malware before being connected to a control system. Organizations should enforce proper password policies and procedures.

Relevant CWE: CWE-924 Improper Enforcement of Message Integrity During Transmission in a Communication Channel


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 9 CRITICAL CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

Acknowledgments

  • Hitachi Energy reported this vulnerability to CISA.

Notice

The information in this document is subject to change without notice and should not be construed as a commitment by Hitachi Energy. Hitachi Energy provides no warranty, express or implied, including warranties of merchantability and fitness for a particular purpose, for the information contained in this document, and assumes no responsibility for any errors that may appear in this document. In no event shall Hitachi Energy or any of its suppliers be liable for direct, indirect, special, incidental or consequential damages of any nature or kind arising from the use of this document, or from the use of any hardware or software described in this document, even if Hitachi Energy or its suppliers have been advised of the possibility of such damages. This document and parts hereof must not be reproduced or copied without written permission from Hitachi Energy and the contents hereof must not be imparted to a third party nor used for any unauthorized purpose. All rights to registrations and trademarks reside with their respective owners.


Support

For additional information and support please contact your product provider or Hitachi Energy service organization. For contact information, see https://www.hitachienergy.com/contact-us/ for Hitachi Energy contact-centers.


General Mitigation Factors

Recommended security practices and firewall configurations can help protect a process control network from attacks that originate from outside the network. Such practices include that process control systems are physically protected from direct access by unauthorized personnel, have no direct connections to the Internet, and are separated from other networks by means of a firewall system that has a minimal number of ports exposed, and others that have to be evaluated case by case. Process control systems should not be used for Internet surfing, instant messaging, or receiving e-mails. Portable computers and removable storage media should be carefully scanned for viruses before they are connected to a control system. Proper password policies and processes should be followed.


Legal Notice and Terms of Use

This product is provided subject to this Notification (https://www.cisa.gov/notification) and this Privacy & Use policy (https://www.cisa.gov/privacy-policy).


Recommended Practices

CISA recommends users take defensive measures to minimize the exploitation risk of these vulnerabilities.

Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.

Locate control system networks and remote devices behind firewalls and isolate them from business networks.

When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.

CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.


Advisory Conversion Disclaimer

This ICSA is a verbatim republication of Hitachi Energy PSIRT 8DBD000233 from a direct conversion of the vendor's Common Security Advisory Framework (CSAF) advisory. This is republished to CISA's website as a means of increasing visibility and is provided "as-is" for informational purposes only. CISA is not responsible for the editorial or technical accuracy of republished advisories and provides no warranties of any kind regarding any information contained within this advisory. Further, CISA does not endorse any commercial product or service. Please contact Hitachi Energy PSIRT directly for any questions regarding this advisory.

Revision History

  • Initial Release Date: 2026-01-27
Date Revision Summary
2026-01-27 1 Initial public release
2026-02-05 2 Initial CISA Republication of Hitachi Energy PSIRT 8DBD000233 advisory

Legal Notice and Terms of Use

CISA Cybersecurity Advisory , Thu, 05 Feb 26 12:00:00 +0000

View CSAF

Summary

Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary shell commands and the disclosure of sensitive system information.

The following versions of Ilevia EVE X1 Server are affected:

  • EVE X1 <=4.7.18.0 (CVE-2025-34185, CVE-2025-34184, CVE-2025-34183, CVE-2025-34186, CVE-2025-34187, CVE-2025-34517, CVE-2025-34518, CVE-2025-34512, CVE-2025-34513)
CVSS Vendor Equipment Vulnerabilities
v3 9.8 Ilevia Ilevia EVE X1 Server Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection'), Insertion of Sensitive Information into Log File, Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Background

  • Critical Infrastructure Sectors: Critical Manufacturing
  • Countries/Areas Deployed: Worldwide
  • Company Headquarters Location: Italy

Vulnerabilities

Expand All +

CVE-2025-34185

Ilevia EVE X1 Server contains a pre-authentication file disclosure vulnerability via the 'db_log' POST parameter. Remote attackers can retrieve arbitrary files from the server, exposing sensitive system information and credentials.

View CVE Details


Affected Products

Ilevia EVE X1 Server
Vendor:
Ilevia
Product Version:
Ilevia EVE X1: <=4.7.18.0
Product Status:
known_affected
Remediations

Mitigation
Ilevia recommends that users perform the following mitigation steps: Update to the newest version of Ilevia Manager at https://www.ilevia.com/downloads/. Verify port 8080 is closed on all devices and routers and enable access only through the secure option provided in the updated Ilevia Manager. Change all default passwords on active systems to strong, unique credentials to prevent unauthorized access and automated attacks. Review firewall configurations to confirm that internal protections are functioning as intended and external exposure is minimized. Monitor for unauthorized access attempts and apply network segmentation where possible to reduce attack surfaces.

Relevant CWE: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVE-2025-34184

Ilevia EVE X1 Server contains an unauthenticated OS command injection vulnerability in the /ajax/php/login.php script. Remote attackers can execute arbitrary system commands by injecting payloads into the 'passwd' HTTP POST parameter, leading to full system compromise or denial of service.

View CVE Details


Affected Products

Ilevia EVE X1 Server
Vendor:
Ilevia
Product Version:
Ilevia EVE X1: <=4.7.18.0
Product Status:
known_affected
Remediations

Mitigation
Ilevia recommends that users perform the following mitigation steps: Update to the newest version of Ilevia Manager at https://www.ilevia.com/downloads/. Verify port 8080 is closed on all devices and routers and enable access only through the secure option provided in the updated Ilevia Manager. Change all default passwords on active systems to strong, unique credentials to prevent unauthorized access and automated attacks. Review firewall configurations to confirm that internal protections are functioning as intended and external exposure is minimized. Monitor for unauthorized access attempts and apply network segmentation where possible to reduce attack surfaces.

Relevant CWE: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 9.8 CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2025-34183

Ilevia EVE X1 Server contains a vulnerability in its server-side logging mechanism that allows unauthenticated remote attackers to retrieve plaintext credentials from exposed .log files. This flaw enables full authentication bypass and system compromise through credential reuse.

View CVE Details


Affected Products

Ilevia EVE X1 Server
Vendor:
Ilevia
Product Version:
Ilevia EVE X1: <=4.7.18.0
Product Status:
known_affected
Remediations

Mitigation
Ilevia recommends that users perform the following mitigation steps: Update to the newest version of Ilevia Manager at https://www.ilevia.com/downloads/. Verify port 8080 is closed on all devices and routers and enable access only through the secure option provided in the updated Ilevia Manager. Change all default passwords on active systems to strong, unique credentials to prevent unauthorized access and automated attacks. Review firewall configurations to confirm that internal protections are functioning as intended and external exposure is minimized. Monitor for unauthorized access attempts and apply network segmentation where possible to reduce attack surfaces.

Relevant CWE: CWE-532 Insertion of Sensitive Information into Log File


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 9.8 CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2025-34186

Ilevia EVE X1/X5 Server contains a vulnerability in its authentication mechanism. Unsanitized input is passed to a system() call for authentication, allowing attackers to inject special characters and manipulate command parsing. Due to the binary's interpretation of non-zero exit codes as successful authentication, remote attackers can bypass authentication and gain full access to the system.

View CVE Details


Affected Products

Ilevia EVE X1 Server
Vendor:
Ilevia
Product Version:
Ilevia EVE X1: <=4.7.18.0
Product Status:
known_affected
Remediations

Mitigation
Ilevia recommends that users perform the following mitigation steps: Update to the newest version of Ilevia Manager at https://www.ilevia.com/downloads/. Verify port 8080 is closed on all devices and routers and enable access only through the secure option provided in the updated Ilevia Manager. Change all default passwords on active systems to strong, unique credentials to prevent unauthorized access and automated attacks. Review firewall configurations to confirm that internal protections are functioning as intended and external exposure is minimized. Monitor for unauthorized access attempts and apply network segmentation where possible to reduce attack surfaces.

Relevant CWE: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 9.8 CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2025-34187

Ilevia EVE X1/X5 Server contains a misconfiguration in the sudoers file that allows passwordless execution of certain Bash scripts. If these scripts are writable by web-facing users or accessible via command injection, attackers can replace them with malicious payloads. Execution with sudo grants full root access, resulting in remote privilege escalation and potential system compromise.

View CVE Details


Affected Products

Ilevia EVE X1 Server
Vendor:
Ilevia
Product Version:
Ilevia EVE X1: <=4.7.18.0
Product Status:
known_affected
Remediations

Mitigation
Ilevia recommends that users perform the following mitigation steps: Update to the newest version of Ilevia Manager at https://www.ilevia.com/downloads/. Verify port 8080 is closed on all devices and routers and enable access only through the secure option provided in the updated Ilevia Manager. Change all default passwords on active systems to strong, unique credentials to prevent unauthorized access and automated attacks. Review firewall configurations to confirm that internal protections are functioning as intended and external exposure is minimized. Monitor for unauthorized access attempts and apply network segmentation where possible to reduce attack surfaces.

Relevant CWE: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 9.8 CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2025-34517

Ilevia EVE X1 Server firmware contains an absolute path traversal vulnerability in get_file_content.php that allows an attacker to read arbitrary files. Ilevia has declined to service this vulnerability, and recommends that customers not expose port 8080 to the internet.

View CVE Details


Affected Products

Ilevia EVE X1 Server
Vendor:
Ilevia
Product Version:
Ilevia EVE X1: <=4.7.18.0
Product Status:
known_affected
Remediations

Mitigation
Ilevia recommends that users perform the following mitigation steps: Update to the newest version of Ilevia Manager at https://www.ilevia.com/downloads/. Verify port 8080 is closed on all devices and routers and enable access only through the secure option provided in the updated Ilevia Manager. Change all default passwords on active systems to strong, unique credentials to prevent unauthorized access and automated attacks. Review firewall configurations to confirm that internal protections are functioning as intended and external exposure is minimized. Monitor for unauthorized access attempts and apply network segmentation where possible to reduce attack surfaces.

Relevant CWE: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVE-2025-34518

Ilevia EVE X1 Server firmware contains a relative path traversal vulnerability in get_file_content.php that allows an attacker to read arbitrary files. Ilevia has declined to service this vulnerability, and recommends that customers not expose port 8080 to the internet.

View CVE Details


Affected Products

Ilevia EVE X1 Server
Vendor:
Ilevia
Product Version:
Ilevia EVE X1: <=4.7.18.0
Product Status:
known_affected
Remediations

Mitigation
Ilevia recommends that users perform the following mitigation steps: Update to the newest version of Ilevia Manager at https://www.ilevia.com/downloads/. Verify port 8080 is closed on all devices and routers and enable access only through the secure option provided in the updated Ilevia Manager. Change all default passwords on active systems to strong, unique credentials to prevent unauthorized access and automated attacks. Review firewall configurations to confirm that internal protections are functioning as intended and external exposure is minimized. Monitor for unauthorized access attempts and apply network segmentation where possible to reduce attack surfaces.

Relevant CWE: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVE-2025-34512

Ilevia EVE X1 Server firmware contains a reflected cross-site scripting (XSS) vulnerability in index.php that allows an unauthenticated attacker to execute arbitrary code. Ilevia has declined to service this vulnerability, and recommends that customers not expose port 8080 to the internet.

View CVE Details


Affected Products

Ilevia EVE X1 Server
Vendor:
Ilevia
Product Version:
Ilevia EVE X1: <=4.7.18.0
Product Status:
known_affected
Remediations

Mitigation
Ilevia recommends that users perform the following mitigation steps: Update to the newest version of Ilevia Manager at https://www.ilevia.com/downloads/. Verify port 8080 is closed on all devices and routers and enable access only through the secure option provided in the updated Ilevia Manager. Change all default passwords on active systems to strong, unique credentials to prevent unauthorized access and automated attacks. Review firewall configurations to confirm that internal protections are functioning as intended and external exposure is minimized. Monitor for unauthorized access attempts and apply network segmentation where possible to reduce attack surfaces.

Relevant CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 5.4 MEDIUM CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N

CVE-2025-34513

Ilevia EVE X1 Server firmware contains an OS command injection vulnerability in mbus_build_from_csv.php that allows an unauthenticated attacker to execute arbitrary code. Ilevia has declined to service this vulnerability, and recommends that customers not expose port 8080 to the internet.

View CVE Details


Affected Products

Ilevia EVE X1 Server
Vendor:
Ilevia
Product Version:
Ilevia EVE X1: <=4.7.18.0
Product Status:
known_affected
Remediations

Mitigation
Ilevia recommends that users perform the following mitigation steps: Update to the newest version of Ilevia Manager at https://www.ilevia.com/downloads/. Verify port 8080 is closed on all devices and routers and enable access only through the secure option provided in the updated Ilevia Manager. Change all default passwords on active systems to strong, unique credentials to prevent unauthorized access and automated attacks. Review firewall configurations to confirm that internal protections are functioning as intended and external exposure is minimized. Monitor for unauthorized access attempts and apply network segmentation where possible to reduce attack surfaces.

Relevant CWE: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 9.8 CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Acknowledgments

  • Gjoko Krstic of Zero Science Lab reported these vulnerabilities to CISA

Legal Notice and Terms of Use

This product is provided subject to this Notification (https://www.cisa.gov/notification) and this Privacy & Use policy (https://www.cisa.gov/privacy-policy).


Recommended Practices

CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities, such as:

Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.

Locate control system networks and remote devices behind firewalls and isolating them from business networks.

When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.

CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.

CISA also recommends users take the following measures to protect themselves from social engineering attacks:

Do not click web links or open attachments in unsolicited email messages.

Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams.

Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.

No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time.


Revision History

  • Initial Release Date: 2026-02-05
Date Revision Summary
2026-02-05 1 Initial Publication

Legal Notice and Terms of Use

CISA Cybersecurity Advisory , Tue, 03 Feb 26 12:00:00 +0000

View CSAF

Summary

Successful exploitation of this vulnerability could result in an unauthenticated attacker modifying critical device settings or factory resetting the device.

The following versions of Synectix LAN 232 TRIO are affected:

  • LAN 232 TRIO vers:all/* (CVE-2026-1633)
CVSS Vendor Equipment Vulnerabilities
v3 10 Synectix Synectix LAN 232 TRIO Missing Authentication for Critical Function

Background

  • Critical Infrastructure Sectors: Critical Manufacturing, Emergency Services, Energy, Information Technology, Transportation Systems, Water and Wastewater
  • Countries/Areas Deployed: Worldwide
  • Company Headquarters Location: United States

Vulnerabilities

Expand All +

CVE-2026-1633

The Synectix LAN 232 TRIO 3-Port serial to ethernet adapter exposes its web management interface without requiring authentication, allowing unauthenticated users to modify critical device settings or factory reset the device.

View CVE Details


Affected Products

Synectix LAN 232 TRIO
Vendor:
Synectix
Product Version:
Synectix LAN 232 TRIO: vers:all/*
Product Status:
known_affected
Remediations

Mitigation
The affected products should be considered end-of-life, as Synectix is no longer in business and therefore firmware fixes, mitigations and updates will be unavailable.

Relevant CWE: CWE-306 Missing Authentication for Critical Function


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 10 CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Acknowledgments

  • Souvik Kandar of MicroSec (microsec.io) reported this vulnerability to CISA

Legal Notice and Terms of Use

This product is provided subject to this Notification (https://www.cisa.gov/notification) and this Privacy & Use policy (https://www.cisa.gov/privacy-policy).


Recommended Practices

CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability, such as:

Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.

Locate control system networks and remote devices behind firewalls and isolating them from business networks.

When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.

CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.

No known public exploitation specifically targeting this vulnerability has been reported to CISA at this time.


Revision History

  • Initial Release Date: 2026-02-03
Date Revision Summary
2026-02-03 1 Initial Publication

Legal Notice and Terms of Use

CISA Cybersecurity Advisory , Tue, 03 Feb 26 12:00:00 +0000

View CSAF

Summary

Successful exploitation of this vulnerability could result in an unauthenticated attacker creating a denial-of-service condition.

The following versions of RISS SRL MOMA Seismic Station are affected:

  • MOMA Seismic Station <=v2.4.2520 (CVE-2026-1632)
CVSS Vendor Equipment Vulnerabilities
v3 9.1 RISS SRL RISS SRL MOMA Seismic Station Missing Authentication for Critical Function

Background

  • Critical Infrastructure Sectors: Critical Manufacturing, Dams, Energy, Water and Wastewater, Transportation Systems
  • Countries/Areas Deployed: Worldwide
  • Company Headquarters Location: Italy

Vulnerabilities

Expand All +

CVE-2026-1632

MOMA Seismic Station Version v2.4.2520 and prior exposes its web management interface without requiring authentication, which could allow an unauthenticated attacker to modify configuration settings, acquire device data or remotely reset the device.

View CVE Details


Affected Products

RISS SRL MOMA Seismic Station
Vendor:
RISS SRL
Product Version:
RISS SRL MOMA Seismic Station: <=v2.4.2520
Product Status:
known_affected
Remediations

Vendor fix
RISS SRL did not respond to CISA's request for coordination. Users of RISS MOMA Seismic Station are encouraged to contact RISS SRL (info@riss-srl.com) for more information.

Relevant CWE: CWE-306 Missing Authentication for Critical Function


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 9.1 CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Acknowledgments

  • Souvik Kandar reported this vulnerability to CISA

Legal Notice and Terms of Use

This product is provided subject to this Notification (https://www.cisa.gov/notification) and this Privacy & Use policy (https://www.cisa.gov/privacy-policy).


Recommended Practices

CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability, such as:

Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.

Locate control system networks and remote devices behind firewalls and isolating them from business networks.

When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.

CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.

No known public exploitation specifically targeting this vulnerability has been reported to CISA at this time.


Revision History

  • Initial Release Date: 2026-02-03
Date Revision Summary
2026-02-03 1 Initial Publication

Legal Notice and Terms of Use

CISA Cybersecurity Advisory , Tue, 03 Feb 26 12:00:00 +0000

View CSAF

Summary

Successful exploitation of this vulnerability could allow an attacker to gain unauthorized access to, modify, delete, or destroy information stored on the system where the affected product is installed, or cause a denial-of-service condition on the affected system.

The following versions of Mitsubishi Electric FREQSHIP-mini for Windows are affected:

  • FREQSHIP-mini for Windows >=8.0.0|<=8.0.2 (CVE-2025-10314)
CVSS Vendor Equipment Vulnerabilities
v3 8.8 Mitsubishi Electric Mitsubishi Electric FREQSHIP-mini for Windows Incorrect Default Permissions

Background

  • Critical Infrastructure Sectors: Critical Manufacturing, Energy, Information Technology, Healthcare and Public Health, Government Services and Facilities
  • Countries/Areas Deployed: Japan
  • Company Headquarters Location: Japan

Vulnerabilities

Expand All +

CVE-2025-10314

A malicious code execution vulnerability exists in Mitsubishi's small-capacity UPS shutdown software, FREQSHIP-mini for Windows, due to incorrect default permissions. A local attacker may be able to execute arbitrary code with system privileges by replacing service executable or DLL files in the installation directory with specially crafted files.

View CVE Details


Affected Products

Mitsubishi Electric FREQSHIP-mini for Windows
Vendor:
Mitsubishi Electric
Product Version:
Mitsubishi Electric FREQSHIP-mini for Windows: >=8.0.0|<=8.0.2
Product Status:
known_affected
Remediations

Vendor fix
The vulnerability has been addressed in FREQSHIP-mini for Windows version 8.1.0 or later. Download and install the updated version from the Mitsubishi Electric download site at https://www.mitsubishielectric.co.jp/fa/download/index.html .

Mitigation
Mitsubishi Electric recommends that customers take the following mitigation measures to minimize the risk of this vulnerability being exploited: Use the PCs with the affected product installed only within a LAN, and block remote logins from untrusted networks, hosts, and non-administrator users. Block unauthorized access by using a firewall or virtual private network (VPN), etc., and allow remote login only for administrators when connecting the PCs with the affected product installed to the internet. Restrict physical access to the PC and its connected network to prevent unauthorized access. Do not click on links or open attachments in emails from untrusted sources. Install and regularly update antivirus software.

Mitigation
Mitsubishi Electric Corporation recommends users contact their local Mitsubishi Electric representative at https://www.mitsubishielectric.co.jp/fa/support/purchase/index.html with questions.

Mitigation
For additional details, refer to Mitsubishi Electric's security advisory at https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2025-019_en.pdf .

Relevant CWE: CWE-276 Incorrect Default Permissions


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 8.8 HIGH CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Acknowledgments

  • Kazuma Matsumoto of GMO Cybersecurity by IERAE, Inc. reported this vulnerability to Mitsubishi Electric

Legal Notice and Terms of Use

This product is provided subject to this Notification (https://www.cisa.gov/notification) and this Privacy & Use policy (https://www.cisa.gov/privacy-policy).


Recommended Practices

CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.

CISA also recommends users take the following measures to protect themselves from social engineering attacks:

Do not click web links or open attachments in unsolicited email messages.

Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams.

Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.

No known public exploitation specifically targeting this vulnerability has been reported to CISA at this time. This vulnerability is not exploitable remotely.


Revision History

  • Initial Release Date: 2026-02-03
Date Revision Summary
2026-02-03 1 Initial Republication of Mitsubishi Electric 2025-019.

Legal Notice and Terms of Use

CISA Cybersecurity Advisory , Tue, 03 Feb 26 12:00:00 +0000

View CSAF

Summary

Successful exploitation of this vulnerability could allow an attacker to take full control of the device.

The following versions of Avation Light Engine Pro are affected:

  • Light Engine Pro vers:all/* (CVE-2026-1341)
CVSS Vendor Equipment Vulnerabilities
v3 9.8 Avation Avation Light Engine Pro Missing Authentication for Critical Function

Background

  • Critical Infrastructure Sectors: Commercial Facilities
  • Countries/Areas Deployed: Worldwide
  • Company Headquarters Location: Australia

Vulnerabilities

Expand All +

CVE-2026-1341

Avation Light Engine Pro exposes its configuration and control interface without any authentication or access control.

View CVE Details


Affected Products

Avation Light Engine Pro
Vendor:
Avation
Product Version:
Avation Light Engine Pro: vers:all/*
Product Status:
known_affected
Remediations

Vendor fix
Avation has not responded to CISA's request to coordinate. Users of Avation Light Engine Pro are encouraged to contact Avation for more information.

Relevant CWE: CWE-306 Missing Authentication for Critical Function


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 9.8 CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Acknowledgments

  • Souvik Kandar reported this vulnerability to CISA

Legal Notice and Terms of Use

This product is provided subject to this Notification (https://www.cisa.gov/notification) and this Privacy & Use policy (https://www.cisa.gov/privacy-policy).


Recommended Practices

CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability, such as:

Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.

Locate control system networks and remote devices behind firewalls and isolating them from business networks.

When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.

CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.

No known public exploitation specifically targeting this vulnerability has been reported to CISA at this time.


Revision History

  • Initial Release Date: 2026-02-03
Date Revision Summary
2026-02-03 1 Initial Publication

Legal Notice and Terms of Use

CISA Cybersecurity Advisory , Tue, 03 Feb 26 12:00:00 +0000

CISA has added four new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. 

  • CVE-2019-19006 Sangoma FreePBX Improper Authentication Vulnerability
  • CVE-2021-39935 GitLab Community and Enterprise Editions Server-Side Request Forgery (SSRF) Vulnerability
  • CVE-2025-40551 SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability
  • CVE-2025-64328 Sangoma FreePBX OS Command Injection Vulnerability 

These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise. 

Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information. 

Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria

CISA Cybersecurity Advisory , Thu, 29 Jan 26 12:00:00 +0000

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

  • CVE-2026-1281 Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability

This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise.

Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.

Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.

CISA Cybersecurity Advisory , Thu, 29 Jan 26 12:00:00 +0000

View CSAF

Summary

Successful exploitation of this vulnerability could allow an attacker to cause a denial-of-service condition.

The following versions of Rockwell Automation ControlLogix are affected:

  • ControlLogix Redundancy Enhanced Module Catalog 1756-RM2 Firmware vers:all/* (CVE-2025-14027)
  • ControlLogix Redundancy Enhanced Module Catalog 1756-RM2XT Firmware vers:all/* (CVE-2025-14027)
CVSS Vendor Equipment Vulnerabilities
v3 7.5 Rockwell Automation Rockwell Automation ControlLogix Missing Release of Memory after Effective Lifetime

Background

  • Critical Infrastructure Sectors: Chemical, Energy, Critical Manufacturing, Food and Agriculture, Transportation Systems, Water and Wastewater
  • Countries/Areas Deployed: Worldwide
  • Company Headquarters Location: United States

Vulnerabilities

Expand All +

CVE-2025-14027

Multiple denial-of-service issues exist in 1756-RM2 and 1756-RM2XT firmware (ControlLogix Redundancy Enhanced Modules). These issues can be triggered through various crafted inputs, including malformed Class 3 messages, memory leak conditions, and other resource exhaustion scenarios. Exploitation may cause the device to become unresponsive and, in some cases, result in a major nonrecoverable fault. Recovery may require a restart.

View CVE Details


Affected Products

Rockwell Automation ControlLogix
Vendor:
Rockwell Automation
Product Version:
Rockwell Automation ControlLogix Redundancy Enhanced Module Catalog 1756-RM2 Firmware: vers:all/*, Rockwell Automation ControlLogix Redundancy Enhanced Module Catalog 1756-RM2XT Firmware: vers:all/*
Product Status:
known_affected
Remediations

Mitigation
Rockwell Automation recommends that users upgrade from the 1756-RM2 to 1756-RM3.

Mitigation
If users are unable to upgrade to the 1756-RM3, security best practices should be applied.

Mitigation
See Rockwell Automation's SD1769 advisory for more information.

Relevant CWE: CWE-401 Missing Release of Memory after Effective Lifetime


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Acknowledgments

  • Rockwell Automation reported this vulnerability to CISA

Legal Notice and Terms of Use

This product is provided subject to this Notification (https://www.cisa.gov/notification) and this Privacy & Use policy (https://www.cisa.gov/privacy-policy).


Recommended Practices

CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability, such as:

Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.

Locate control system networks and remote devices behind firewalls and isolating them from business networks.

When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.

CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.

No known public exploitation specifically targeting this vulnerability has been reported to CISA at this time.


Revision History

  • Initial Release Date: 2026-01-29
Date Revision Summary
2026-01-29 1 Initial Republication of Rockwell Automation advisory SD1769

Legal Notice and Terms of Use

CISA Cybersecurity Advisory , Thu, 29 Jan 26 12:00:00 +0000

View CSAF

Summary

Successful exploitation of these vulnerabilities could allow an attacker to cause a denial-of-service condition.

The following versions of Rockwell Automation ArmorStart LT are affected:

  • ArmorStart LT 290D <=V2.002 (CVE-2025-9464, CVE-2025-9465, CVE-2025-9466, CVE-2025-9278, CVE-2025-9279, CVE-2025-9280, CVE-2025-9281, CVE-2025-9282, CVE-2025-9283)
  • ArmorStart LT 291D <=V2.002 (CVE-2025-9464, CVE-2025-9465, CVE-2025-9466, CVE-2025-9278, CVE-2025-9279, CVE-2025-9280, CVE-2025-9281, CVE-2025-9282, CVE-2025-9283)
  • ArmorStart LT 294D <=V2.002 (CVE-2025-9464, CVE-2025-9465, CVE-2025-9466, CVE-2025-9278, CVE-2025-9279, CVE-2025-9280, CVE-2025-9281, CVE-2025-9282, CVE-2025-9283)
CVSS Vendor Equipment Vulnerabilities
v3 7.5 Rockwell Automation Rockwell Automation ArmorStart LT Uncontrolled Resource Consumption

Background

  • Critical Infrastructure Sectors: Critical Manufacturing
  • Countries/Areas Deployed: Worldwide
  • Company Headquarters Location: United States

Vulnerabilities

Expand All +

CVE-2025-9464

A security issue exists within ArmorStart® LT that can result in a denial-of-service condition. This vulnerability is triggered during fuzzing of multiple CIP classes, which causes the CIP port to become unresponsive.

View CVE Details


Affected Products

Rockwell Automation ArmorStart LT
Vendor:
Rockwell Automation
Product Version:
Rockwell Automation ArmorStart LT 290D: <=V2.002, Rockwell Automation ArmorStart LT 291D: <=V2.002, Rockwell Automation ArmorStart LT 294D: <=V2.002
Product Status:
known_affected
Remediations

Mitigation
There is no patch or upgrade at this time. Rockwell Automation recommends users apply security best practices to mitigate the risk of these vulnerabilities.

Mitigation
See Rockwell Automation's SD1768 advisory for more information.

Relevant CWE: CWE-400 Uncontrolled Resource Consumption


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2025-9465

A security issue exists within ArmorStart® LT that can result in a denial-of-service condition. During execution of the Achilles Comprehensive grammar tests, the device reboots unexpectedly, causing the Link State Monitor to go down for several seconds.

View CVE Details


Affected Products

Rockwell Automation ArmorStart LT
Vendor:
Rockwell Automation
Product Version:
Rockwell Automation ArmorStart LT 290D: <=V2.002, Rockwell Automation ArmorStart LT 291D: <=V2.002, Rockwell Automation ArmorStart LT 294D: <=V2.002
Product Status:
known_affected
Remediations

Mitigation
There is no patch or upgrade at this time. Rockwell Automation recommends users apply security best practices to mitigate the risk of these vulnerabilities.

Mitigation
See Rockwell Automation's SD1768 advisory for more information.

Relevant CWE: CWE-400 Uncontrolled Resource Consumption


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2025-9466

A security issue exists within ArmorStart® LT that can result in a denial-of-service condition. During execution of the Achilles EtherNet/IP and CIP grammar tests, the device reboots unexpectedly, causing the Link State Monitor to go down for several seconds.

View CVE Details


Affected Products

Rockwell Automation ArmorStart LT
Vendor:
Rockwell Automation
Product Version:
Rockwell Automation ArmorStart LT 290D: <=V2.002, Rockwell Automation ArmorStart LT 291D: <=V2.002, Rockwell Automation ArmorStart LT 294D: <=V2.002
Product Status:
known_affected
Remediations

Mitigation
There is no patch or upgrade at this time. Rockwell Automation recommends users apply security best practices to mitigate the risk of these vulnerabilities.

Mitigation
See Rockwell Automation's SD1768 advisory for more information.

Relevant CWE: CWE-400 Uncontrolled Resource Consumption


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2025-9278

A security issue exists within ArmorStart® LT that can result in a denial-of-service condition. After running a Burp Suite active scan, the device loses ICMP connectivity, causing the web application to become inaccessible.

View CVE Details


Affected Products

Rockwell Automation ArmorStart LT
Vendor:
Rockwell Automation
Product Version:
Rockwell Automation ArmorStart LT 290D: <=V2.002, Rockwell Automation ArmorStart LT 291D: <=V2.002, Rockwell Automation ArmorStart LT 294D: <=V2.002
Product Status:
known_affected
Remediations

Mitigation
There is no patch or upgrade at this time. Rockwell Automation recommends users apply security best practices to mitigate the risk of these vulnerabilities.

Mitigation
See Rockwell Automation's SD1768 advisory for more information.

Relevant CWE: CWE-400 Uncontrolled Resource Consumption


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2025-9279

A security issue exists within ArmorStart® LT that can result in a denial-of-service condition. During execution of the Achilles EtherNet/IP Step Limit Storm tests, the device reboots unexpectedly, causing the Link State Monitor to go down for several seconds.

View CVE Details


Affected Products

Rockwell Automation ArmorStart LT
Vendor:
Rockwell Automation
Product Version:
Rockwell Automation ArmorStart LT 290D: <=V2.002, Rockwell Automation ArmorStart LT 291D: <=V2.002, Rockwell Automation ArmorStart LT 294D: <=V2.002
Product Status:
known_affected
Remediations

Mitigation
There is no patch or upgrade at this time. Rockwell Automation recommends users apply security best practices to mitigate the risk of these vulnerabilities.

Mitigation
See Rockwell Automation's SD1768 advisory for more information.

Relevant CWE: CWE-400 Uncontrolled Resource Consumption


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2025-9280

A security issue exists within ArmorStart® LT that can result in a denial-of-service condition. Fuzzing performed using Defensics causes the device to become unresponsive, requiring a reboot.

View CVE Details


Affected Products

Rockwell Automation ArmorStart LT
Vendor:
Rockwell Automation
Product Version:
Rockwell Automation ArmorStart LT 290D: <=V2.002, Rockwell Automation ArmorStart LT 291D: <=V2.002, Rockwell Automation ArmorStart LT 294D: <=V2.002
Product Status:
known_affected
Remediations

Mitigation
There is no patch or upgrade at this time. Rockwell Automation recommends users apply security best practices to mitigate the risk of these vulnerabilities.

Mitigation
See Rockwell Automation's SD1768 advisory for more information.

Relevant CWE: CWE-400 Uncontrolled Resource Consumption


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2025-9281

A security issue exists within ArmorStart® LT that can result in a denial-of-service condition. During execution of the Achilles Comprehensive step limit storm tests, the device reboots unexpectedly, causing the Link State Monitor to go down for several seconds.

View CVE Details


Affected Products

Rockwell Automation ArmorStart LT
Vendor:
Rockwell Automation
Product Version:
Rockwell Automation ArmorStart LT 290D: <=V2.002, Rockwell Automation ArmorStart LT 291D: <=V2.002, Rockwell Automation ArmorStart LT 294D: <=V2.002
Product Status:
known_affected
Remediations

Mitigation
There is no patch or upgrade at this time. Rockwell Automation recommends users apply security best practices to mitigate the risk of these vulnerabilities.

Mitigation
See Rockwell Automation's SD1768 advisory for more information.

Relevant CWE: CWE-400 Uncontrolled Resource Consumption


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2025-9282

A security issue exists within ArmorStart® LT that can result in a denial-of-service condition. During execution of the Achilles Comprehensive limited storm tests, the device reboots unexpectedly, causing the Link State Monitor to go down for several seconds.

View CVE Details


Affected Products

Rockwell Automation ArmorStart LT
Vendor:
Rockwell Automation
Product Version:
Rockwell Automation ArmorStart LT 290D: <=V2.002, Rockwell Automation ArmorStart LT 291D: <=V2.002, Rockwell Automation ArmorStart LT 294D: <=V2.002
Product Status:
known_affected
Remediations

Mitigation
There is no patch or upgrade at this time. Rockwell Automation recommends users apply security best practices to mitigate the risk of these vulnerabilities.

Mitigation
See Rockwell Automation's SD1768 advisory for more information.

Relevant CWE: CWE-400 Uncontrolled Resource Consumption


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2025-9283

A security issue exists within ArmorStart® LT that can result in a denial-of-service condition. During execution of the Achilles EtherNet/IP Step Limits Storms tests, the device reboots unexpectedly, causing the Link State Monitor to go down for several seconds.

View CVE Details


Affected Products

Rockwell Automation ArmorStart LT
Vendor:
Rockwell Automation
Product Version:
Rockwell Automation ArmorStart LT 290D: <=V2.002, Rockwell Automation ArmorStart LT 291D: <=V2.002, Rockwell Automation ArmorStart LT 294D: <=V2.002
Product Status:
known_affected
Remediations

Mitigation
There is no patch or upgrade at this time. Rockwell Automation recommends users apply security best practices to mitigate the risk of these vulnerabilities.

Mitigation
See Rockwell Automation's SD1768 advisory for more information.

Relevant CWE: CWE-400 Uncontrolled Resource Consumption


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Acknowledgments

  • Rockwell Automation reported these vulnerabilties to CISA

Legal Notice and Terms of Use

This product is provided subject to this Notification (https://www.cisa.gov/notification) and this Privacy & Use policy (https://www.cisa.gov/privacy-policy).


Recommended Practices

CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities, such as:

Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.

Locate control system networks and remote devices behind firewalls and isolating them from business networks.

When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.

CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.

No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time.


Revision History

  • Initial Release Date: 2026-01-29
Date Revision Summary
2026-01-29 1 Initial Republication of Rockwell Automation advisory SD1768

Legal Notice and Terms of Use

CISA Cybersecurity Advisory , Thu, 29 Jan 26 12:00:00 +0000

View CSAF

Summary

Successful exploitation of this vulnerability could allow an unauthenticated attacker to create or delete administrator accounts, granting full administrative control.

The following versions of KiloView Encoder Series are affected:

  • Encoder Series E1 hardware Version 1.4 4.7.2516 (CVE-2026-1453)
  • Encoder Series E1 hardware Version 1.6.20 4.7.2511|4.8.2523|4.8.2611|4.6.2400|4.7.2512|4.8.2561|4.8.2554|4.3.2029|4.8.2555|4.6.2408 (CVE-2026-1453)
  • Encoder Series E1-s hardware Version 1.4 4.7.2516|4.8.2519|4.8.2525|4.8.2611|4.8.2561|4.8.2554|4.8.2523 (CVE-2026-1453)
  • Encoder Series E2 hardware Version 1.7.20 4.8.2611|4.8.2561 (CVE-2026-1453)
  • Encoder Series E2 hardware Version 1.8.20 4.8.2523|4.8.2611|4.8.2554 (CVE-2026-1453)
  • Encoder Series G1 hardware Version 1.6.20 4.8.2561 (CVE-2026-1453)
  • Encoder Series P1 hardware Version 1.3.20 4.8.2633|4.8.2608 (CVE-2026-1453)
  • Encoder Series P2 hardware Version 1.8.20 4.8.2633 (CVE-2026-1453)
  • Encoder Series RE1 hardware Version 2.0.00 4.7.2513 (CVE-2026-1453)
  • Encoder Series RE1 hardware Version 3.0.00 4.8.2519|4.8.2561|4.8.2611|4.8.2525 (CVE-2026-1453)
CVSS Vendor Equipment Vulnerabilities
v3 9.8 KiloView KiloView Encoder Series Missing Authentication for Critical Function

Background

  • Critical Infrastructure Sectors: Communications, Information Technology
  • Countries/Areas Deployed: Worldwide
  • Company Headquarters Location: China

Vulnerabilities

Expand All +

CVE-2026-1453

A missing authentication for critical function vulnerability in KiloView Encoder Series could allow an unauthenticated attacker to create or delete administrator accounts. This vulnerability can grant the attacker full administrative control over the product.

View CVE Details


Affected Products

KiloView Encoder Series
Vendor:
KiloView
Product Version:
KiloView Encoder Series E1 hardware Version 1.4: 4.7.2516, KiloView Encoder Series E1 hardware Version 1.6.20: 4.7.2511|4.8.2523|4.8.2611|4.6.2400|4.7.2512|4.8.2561|4.8.2554|4.3.2029|4.8.2555|4.6.2408, KiloView Encoder Series E1-s hardware Version 1.4: 4.7.2516|4.8.2519|4.8.2525|4.8.2611|4.8.2561|4.8.2554|4.8.2523, KiloView Encoder Series E2 hardware Version 1.7.20: 4.8.2611|4.8.2561, KiloView Encoder Series E2 hardware Version 1.8.20: 4.8.2523|4.8.2611|4.8.2554, KiloView Encoder Series G1 hardware Version 1.6.20: 4.8.2561, KiloView Encoder Series P1 hardware Version 1.3.20: 4.8.2633|4.8.2608, KiloView Encoder Series P2 hardware Version 1.8.20: 4.8.2633, KiloView Encoder Series RE1 hardware Version 2.0.00: 4.7.2513, KiloView Encoder Series RE1 hardware Version 3.0.00: 4.8.2519|4.8.2561|4.8.2611|4.8.2525
Product Status:
known_affected
Remediations

Mitigation
KiloView states that these specific hardware versions are end-of-life; therefore, no patches will be released due to hardware limitations. KiloView recommends that users implement mitigation measures such as network isolation or upgrade to newer hardware generations.

Mitigation
Users of affected versions of KiloView Encoder Series are invited to contact KiloView customer support at https://www.kiloview.com/contact/ for additional information.

Relevant CWE: CWE-306 Missing Authentication for Critical Function


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 9.8 CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Acknowledgments

  • Muhammad Ammar (0xam225) reported this vulnerability to CISA

Legal Notice and Terms of Use

This product is provided subject to this Notification (https://www.cisa.gov/notification) and this Privacy & Use policy (https://www.cisa.gov/privacy-policy).


Recommended Practices

CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability, such as:

Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the Internet.

Locate control system networks and remote devices behind firewalls and isolating them from business networks.

When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.

CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.

CISA also recommends users take the following measures to protect themselves from social engineering attacks:

Do not click web links or open attachments in unsolicited email messages.

Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams.

Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.

No known public exploitation specifically targeting this vulnerability has been reported to CISA at this time.


Revision History

  • Initial Release Date: 2026-01-29
Date Revision Summary
2026-01-29 1 Initial Publication
2026-02-05 2 Update A - Affected products are end-of-life

Legal Notice and Terms of Use

CISA Cybersecurity Advisory , Wed, 28 Jan 26 12:00:00 +0000

Newly disclosed vulnerability Common Vulnerabilities and Exposures (CVE)-2026-24858 [Common Weakness Enumeration (CWE)-288: Authentication Bypass Using an Alternate Path or Channel] allows malicious actors with a FortiCloud account and a registered device to log in to separate devices registered to other users in FortiOS, FortiManager, FortiWeb, FortiProxy, and FortiAnalyzer, if FortiCloud single sign on (SSO) is enabled on devices.1

Users are vulnerable to CVE-2026-24858 even if they updated Fortinet devices to address previously disclosed FortiCloud SSO bypass vulnerabilities CVE-2025-59718 and CVE-2025-59719 [CWE-347: Improper Verification of Cryptographic Signature].2 CVE-2025-59718 and CVE-2025-59719 affect FortiOS, FortiWeb, FortiProxy, and FortiSwitch Manager, and allow malicious actors to bypass the SSO login authentication via a crafted Security Assertion Markup Language (SAML) message. On Fortinet devices that had been fully upgraded to the latest release addressing CVE-2025-59718 and CVE-2025-59719 at the time of CVE-2026-24858 exploitation, Fortinet observed the following malicious activity:

  • Unauthorized firewall configuration changes on FortiGate devices.
  • Unauthorized creation of accounts.
  • Unauthorized configuration changes of virtual private networks (VPNs) to grant access to new accounts.4 

According to Fortinet, on Jan. 26, 2026, Fortinet disabled all FortiCloud SSO authentication to mitigate CVE-2026-24858, then reinstated the service on Jan. 27, 2026, with changes to prevent exploitation of vulnerable devices.  

CISA added CVE-2026-24858 to its Known Exploited Vulnerabilities (KEV) Catalog on Jan. 27, 2026.

CISA urges users to check for indicators of compromise on all internet-accessible Fortinet products affected by this vulnerability and immediately apply updates as soon as they are available using Fortinet’s instructions:

Disclaimer

The information in this report is being provided “as is” for informational purposes only. CISA does not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by CISA. 

Notes

  1. Fortinet, “Administrative FortiCloud SSO Authentication Bypass,” FortiGuard Labs, last modified January 27, 2026, https://fortiguard.fortinet.com/psirt/FG-IR-26-060.
  2. Fortinet, “Multiple Fortinet Products’ FortiCloud SSO Login Authentication Bypass,” FortiGuard Labs, last modified December 9, 2025, https://fortiguard.fortinet.com/psirt/FG-IR-25-647.
  3. Carl Windsor, “Analysis of Single Sign-On Abuse on FortiOS,” PSIRT Blogs (blog), Fortinet, last modified January 22, 2026, https://www.fortinet.com/blog/psirt-blogs/analysis-of-sso-abuse-on-fortios.
  4. Arctic Wolf Labs, “Arctic Wolf Observes Malicious Configuration Changes on Fortinet FortiGate Devices via SSO Accounts,” Arctic Wolf Blog (blog), Arctic Wolf, last modified January 21, 2026https://arcticwolf.com/resources/blog/arctic-wolf-observes-malicious-configuration-changes-fortinet-fortigate-devices-via-sso-accounts/.
CISA Cybersecurity Advisory , Tue, 27 Jan 26 12:00:00 +0000

View CSAF

Summary

MES PCs shipped with Windows 10 come pre-installed with XAMPP. XAMPP is a bundle of third-party open-source applications including the Apache HTTP Server, the MariaDB database and more. From time to time, vulnerabilities in these applications are discovered. These are fixed in newer versions of XAMPP by updating the bundled applications. MES PCs shipped with Windows 10 include a copy of XAMPP which contains around 140 such vulnerabilities listed in this advisory. They can be fixed by replacing XAMPP with Festo Didactic's Factory Control Panel application.

The following versions of Festo Didactic SE MES PC are affected:

  • MES PC (CVE-2019-11036, CVE-2023-25727, CVE-2021-2011, CVE-2022-32083, CVE-2021-46668, CVE-2018-19518, CVE-2021-2194, CVE-2019-11049, CVE-2022-31626, CVE-2022-32084, CVE-2022-32088, CVE-2022-27377, CVE-2020-2922, CVE-2019-9638, CVE-2019-11044, CVE-2020-7068, CVE-2020-7069, CVE-2015-2301, CVE-2023-0568, CVE-2022-27458, CVE-2021-21706, CVE-2022-27452, CVE-2020-7071, CVE-2022-27387, CVE-2022-27376, CVE-2019-11043, CVE-2021-2032, CVE-2021-2007, CVE-2019-11045, CVE-2022-27445, CVE-2022-27457, CVE-2022-27384, CVE-2022-23808, CVE-2023-0567, CVE-2019-9025, CVE-2022-27379, CVE-2019-9637, CVE-2021-27928, CVE-2021-21703, CVE-2020-2760, CVE-2021-2166, CVE-2015-2787, CVE-2022-23807, CVE-2020-2752, CVE-2021-46666, CVE-2020-2814, CVE-2020-7065, CVE-2021-21705, CVE-2020-7062, CVE-2019-11039, CVE-2019-11035, CVE-2022-27447, CVE-2019-11046, CVE-2022-27446, CVE-2022-27386, CVE-2019-9639, CVE-2019-11042, CVE-2022-27385, CVE-2020-7059, CVE-2020-7070, CVE-2022-32091, CVE-2015-2348, CVE-2019-9020, CVE-2021-35604, CVE-2022-27444, CVE-2018-14883, CVE-2014-9705, CVE-2020-7064, CVE-2022-27382, CVE-2020-7063, CVE-2021-2372, CVE-2019-9021, CVE-2018-14851, CVE-2022-27448, CVE-2021-46663, CVE-2021-2180, CVE-2014-9709, CVE-2023-25690, CVE-2022-32082, CVE-2022-31629, CVE-2019-9022, CVE-2016-3078, CVE-2023-0662, CVE-2021-2022, CVE-2022-32089, CVE-2019-11048, CVE-2021-46669, CVE-2019-11047, CVE-2022-27383, CVE-2021-46667, CVE-2022-32087, CVE-2022-36760, CVE-2020-7060, CVE-2018-17082, CVE-2019-9640, CVE-2021-46661, CVE-2019-11034, CVE-2022-27456, CVE-2020-7061, CVE-2022-27455, CVE-2021-2144, CVE-2021-2154, CVE-2022-21595, CVE-2019-11040, CVE-2021-2389, CVE-2023-27522, CVE-2020-2812, CVE-2021-46665, CVE-2022-32086, CVE-2022-32085, CVE-2021-21704, CVE-2020-7066, CVE-2022-31628, CVE-2021-46662, CVE-2016-5385, CVE-2022-37436, CVE-2013-6501, CVE-2021-21702, CVE-2019-9024, CVE-2019-9023, CVE-2022-27449, CVE-2021-46664, CVE-2019-11050, CVE-2021-21708, CVE-2022-31625, CVE-2022-32081, CVE-2022-27378, CVE-2006-20001, CVE-2018-19935, CVE-2022-4900, CVE-2018-12882, CVE-2019-9641, CVE-2022-27380, CVE-2022-27381, CVE-2021-21707, CVE-2022-27451, CVE-2020-2780, CVE-2019-11041, CVE-2021-2174)
CVSS Vendor Equipment Vulnerabilities
v3 9.8 Festo Didactic SE Festo Didactic SE MES PC Buffer Over-read, Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'), Improper Input Validation, Improper Handling of Values, Uncontrolled Resource Consumption, Improper Neutralization of Argument Delimiters in a Command ('Argument Injection'), Double Free, Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'), Use After Free, Exposure of Sensitive Information to an Unauthorized Actor, Out-of-bounds Read, Improper Null Termination, Incorrect Calculation of Buffer Size, Path Traversal: '../filedir', Reachable Assertion, Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection'), Use of Password Hash With Insufficient Computational Effort, Out-of-bounds Write, Incorrect Privilege Assignment, Improper Control of Generation of Code ('Code Injection'), Improper Authentication, Stack-based Buffer Overflow, NULL Pointer Dereference, Missing Initialization of Resource, Null Byte Interaction Error (Poison Null Byte), Improper Restriction of Operations within the Bounds of a Memory Buffer, Improper Preservation of Permissions, Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling'), Integer Overflow or Wraparound, Uncontrolled Recursion, URL Redirection to Untrusted Site ('Open Redirect'), Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting'), Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection'), Free of Memory not on the Heap, Use of Uninitialized Resource, Improper Handling of Invalid Use of Special Elements, Improper Use of Validation Framework

Background

  • Critical Infrastructure Sectors: Commercial Facilities, Communications, Critical Manufacturing, Energy
  • Countries/Areas Deployed: Worldwide
  • Company Headquarters Location: Germany

Vulnerabilities

Expand All +

CVE-2019-11036

When processing certain files, PHP EXIF extension in versions 7.1.x below 7.1.29, 7.2.x below 7.2.18 and 7.3.x below 7.3.5 can be caused to read past allocated buffer in exif_process_IFD_TAG function. This may lead to information disclosure or crash.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-126 Buffer Over-read


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 9.1 CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

CVE-2023-25727

In phpMyAdmin before 4.9.11 and 5.x before 5.2.1, an authenticated user can trigger XSS by uploading a crafted .sql file through the drag-and-drop interface.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 5.4 MEDIUM CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

CVE-2021-2011

Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.7.32 and prior and 8.0.22 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-20 Improper Input Validation


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 5.9 MEDIUM CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2022-32083

MariaDB v10.2 to v10.6.1 was discovered to contain a segmentation fault via the component Item_subselect::init_expr_cache_tracker.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-229 Improper Handling of Values


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2021-46668

MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements that improperly interact with storage-engine resource limitations for temporary data structures.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-400 Uncontrolled Resource Consumption


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 5.5 MEDIUM CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2018-19518

University of Washington IMAP Toolkit 2007f on UNIX, as used in imap_open() in PHP and other products, launches an rsh command (by means of the imap_rimap function in c-client/imap4r1.c and the tcp_aopen function in osdep/unix/tcp_unix.c) without preventing argument injection, which might allow remote attackers to execute arbitrary OS commands if the IMAP server name is untrusted input (e.g., entered by a user of a web application) and if rsh has been replaced by a program with different argument semantics. For example, if rsh is a link to ssh (as seen on Debian and Ubuntu systems), then the attack can use an IMAP server name containing a "-oProxyCommand" argument.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-88 Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

CVE-2021-2194

Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-20 Improper Input Validation


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 4.9 MEDIUM CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

CVE-2019-11049

In PHP versions 7.3.x below 7.3.13 and 7.4.0 on Windows, when supplying custom headers to mail() function, due to mistake introduced in commit 78f4b4a2dcf92ddbccea1bb95f8390a18ac3342e, if the header is supplied in lowercase, this can result in double-freeing certain memory locations.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-415 Double Free


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 9.8 CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2022-31626

In PHP versions 7.4.x below 7.4.30, 8.0.x below 8.0.20, and 8.1.x below 8.1.7, when pdo_mysql extension with mysqlnd driver, if the third party is allowed to supply host to connect to and the password for the connection, password of excessive length can trigger a buffer overflow in PHP, which can lead to a remote code execution vulnerability.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 8.8 HIGH CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVE-2022-32084

MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component sub_select.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-229 Improper Handling of Values


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2022-32088

MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-229 Improper Handling of Values


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2022-27377

MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component Item_func_in::cleanup(), which is exploited via specially crafted SQL statements.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-416 Use After Free


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2020-2922

Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.47 and prior, 5.7.29 and prior and 8.0.18 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Client accessible data.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 3.7 LOW CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

CVE-2019-9638

An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_MAKERNOTE because of mishandling the maker_note->offset relationship to value_len.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-125 Out-of-bounds Read


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVE-2019-11044

In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 on Windows, PHP link() function accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-170 Improper Null Termination


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVE-2020-7068

In PHP versions 7.2.x below 7.2.33, 7.3.x below 7.3.21 and 7.4.x below 7.4.9, while processing PHAR files using phar extension, phar_parse_zipfile could be tricked into accessing freed memory, which could lead to a crash or information disclosure.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-416 Use After Free


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 3.6 LOW CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L

CVE-2020-7069

In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when AES-CCM mode is used with openssl_encrypt() function with 12 bytes IV, only first 7 bytes of the IV is actually used. This can lead to both decreased security and incorrect encryption data.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-20 Improper Input Validation


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 6.5 MEDIUM CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

CVE-2015-2301

Use-after-free vulnerability in the phar_rename_archive function in phar_object.c in PHP before 5.5.22 and 5.6.x before 5.6.6 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an attempted renaming of a Phar archive to the name of an existing file.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-416 Use After Free


Metrics

CVSS Version Base Score Base Severity Vector String
3.0 9.8 CRITICAL CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2023-0568

In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, core path resolution function allocate buffer one byte too small. When resolving paths with lengths close to system MAXPATHLEN setting, this may lead to the byte after the allocated buffer being overwritten with NUL value, which might lead to unauthorized data access or modification.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-131 Incorrect Calculation of Buffer Size


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 8.1 HIGH CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2022-27458

MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component Binary_string::free_buffer() at /sql/sql_string.h.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-416 Use After Free


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2021-21706

In PHP versions 7.3.x below 7.3.31, 7.4.x below 7.4.24 and 8.0.x below 8.0.11, in Microsoft Windows environment, ZipArchive::extractTo may be tricked into writing a file outside target directory when extracting a ZIP file, thus potentially causing files to be created or overwritten, subject to OS permissions.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-24 Path Traversal: '../filedir'


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 6.5 MEDIUM CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

CVE-2022-27452

MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_cmpfunc.cc.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-617 Reachable Assertion


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2020-7071

In PHP versions 7.3.x below 7.3.26, 7.4.x below 7.4.14 and 8.0.0, when validating URL with functions like filter_var($url, FILTER_VALIDATE_URL), PHP will accept an URL with invalid password as valid URL. This may lead to functions that rely on URL being valid to mis-parse the URL and produce wrong data as components of the URL.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-20 Improper Input Validation


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 5.3 MEDIUM CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

CVE-2022-27387

MariaDB Server v10.7 and below was discovered to contain a global buffer overflow in the component decimal_bin_size, which is exploited via specially crafted SQL statements.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2022-27376

MariaDB Server v10.6.5 and below was discovered to contain an use-after-free in the component Item_args::walk_arg, which is exploited via specially crafted SQL statements.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-416 Use After Free


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2019-11043

In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in certain configurations of FPM setup it is possible to cause FPM module to write past allocated buffers into the space reserved for FCGI protocol data, thus opening the possibility of remote code execution.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 9.8 CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2021-2032

Vulnerability in the MySQL Server product of Oracle MySQL (component: Information Schema). Supported versions that are affected are 5.7.32 and prior and 8.0.22 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-20 Improper Input Validation


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 4.3 MEDIUM CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

CVE-2021-2007

Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.47 and prior, 5.7.29 and prior and 8.0.19 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Client accessible data.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-20 Improper Input Validation


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 3.7 LOW CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

CVE-2019-11045

In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP DirectoryIterator class accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-170 Improper Null Termination


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 5.9 MEDIUM CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

CVE-2022-27445

MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/sql_window.cc.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-20 Improper Input Validation


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2022-27457

MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component my_mb_wc_latin1 at /strings/ctype-latin1.c.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-416 Use After Free


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2022-27384

An issue in the component Item_subselect::init_expr_cache_tracker of MariaDB Server v10.6 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2022-23808

An issue was discovered in phpMyAdmin 5.1 before 5.1.2. An attacker can inject malicious code into aspects of the setup script, which can allow XSS or HTML injection.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 6.1 MEDIUM CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

CVE-2023-0567

In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, password_verify() function may accept some invalid Blowfish hashes as valid. If such invalid hash ever ends up in the password database, it may lead to an application allowing any password for this entry as valid.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-916 Use of Password Hash With Insufficient Computational Effort


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 6.2 MEDIUM CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

CVE-2019-9025

An issue was discovered in PHP 7.3.x before 7.3.1. An invalid multibyte string supplied as an argument to the mb_split() function in ext/mbstring/php_mbregex.c can cause PHP to execute memcpy() with a negative argument, which could read and write past buffers allocated for the data.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-787 Out-of-bounds Write


Metrics

CVSS Version Base Score Base Severity Vector String
3.0 9.8 CRITICAL CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2022-27379

An issue in the component Arg_comparator::compare_real_fixed of MariaDB Server v10.6.2 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2019-9637

An issue was discovered in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. Due to the way rename() across filesystems is implemented, it is possible that file being renamed is briefly available with wrong permissions while the rename is ongoing, thus enabling unauthorized users to access the data.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-266 Incorrect Privilege Assignment


Metrics

CVSS Version Base Score Base Severity Vector String
3.0 7.5 HIGH CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVE-2021-27928

A remote code execution issue was discovered in MariaDB 10.2 before 10.2.37, 10.3 before 10.3.28, 10.4 before 10.4.18, and 10.5 before 10.5.9; Percona Server through 2021-03-03; and the wsrep patch through 2021-03-03 for MySQL. An untrusted search path leads to eval injection, in which a database SUPER user can execute OS commands after modifying wsrep_provider and wsrep_notify_cmd. NOTE: this does not affect an Oracle product.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-94 Improper Control of Generation of Code ('Code Injection')


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.2 HIGH CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

CVE-2021-21703

In PHP versions 7.3.x up to and including 7.3.31, 7.4.x below 7.4.25 and 8.0.x below 8.0.12, when running PHP FPM SAPI with main FPM daemon process running as root and child worker processes running as lower-privileged users, it is possible for the child processes to access memory shared with the main process and write to it, modifying it in a way that would cause the root process to conduct invalid memory reads and writes, which can be used to escalate privileges from local unprivileged user to the root user.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-787 Out-of-bounds Write


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7 HIGH CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

CVE-2020-2760

Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.29 and prior and 8.0.19 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-20 Improper Input Validation


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 5.5 MEDIUM CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H

CVE-2021-2166

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-20 Improper Input Validation


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 4.9 MEDIUM CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

CVE-2015-2787

Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages use of the unset function within an __wakeup function, a related issue to CVE-2015-0231.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-416 Use After Free


Metrics

CVSS Version Base Score Base Severity Vector String
3.0 9.8 CRITICAL CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2022-23807

An issue was discovered in phpMyAdmin 4.9 before 4.9.8 and 5.1 before 5.1.2. A valid user who is already authenticated to phpMyAdmin can manipulate their account to bypass two-factor authentication for future login instances.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-287 Improper Authentication


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 4.3 MEDIUM CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

CVE-2020-2752

Vulnerability in the MySQL Client product of Oracle MySQL (component: C API). Supported versions that are affected are 5.6.47 and prior, 5.7.27 and prior and 8.0.17 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-20 Improper Input Validation


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 5.3 MEDIUM CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2021-46666

MariaDB before 10.6.2 allows an application crash because of mishandling of a pushdown from a HAVING clause to a WHERE clause.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-617 Reachable Assertion


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 5.5 MEDIUM CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2020-2814

Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.6.47 and prior, 5.7.28 and prior and 8.0.18 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-20 Improper Input Validation


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 4.9 MEDIUM CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

CVE-2020-7065

In PHP versions 7.3.x below 7.3.16 and 7.4.x below 7.4.4, while using mb_strtolower() function with UTF-32LE encoding, certain invalid strings could cause PHP to overwrite stack-allocated buffer. This could lead to memory corruption, crashes and potentially code execution.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-121 Stack-based Buffer Overflow


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 8.8 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

CVE-2021-21705

In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-20 Improper Input Validation


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 5.3 MEDIUM CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

CVE-2020-7062

In PHP versions 7.2.x below 7.2.28, 7.3.x below 7.3.15 and 7.4.x below 7.4.3, when using file upload functionality, if upload progress tracking is enabled, but session.upload_progress.cleanup is set to 0 (disabled), and the file upload fails, the upload procedure would try to clean up data that does not exist and encounter null pointer dereference, which would likely lead to a crash.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-476 NULL Pointer Dereference


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2019-11039

Function iconv_mime_decode_headers() in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6 may perform out-of-buffer read due to integer overflow when parsing MIME headers. This may lead to information disclosure or crash.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-125 Out-of-bounds Read


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 9.1 CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

CVE-2019-11035

When processing certain files, PHP EXIF extension in versions 7.1.x below 7.1.28, 7.2.x below 7.2.17 and 7.3.x below 7.3.4 can be caused to read past allocated buffer in exif_iif_add_value function. This may lead to information disclosure or crash.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-125 Out-of-bounds Read


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 9.1 CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

CVE-2022-27447

MariaDB Server v10.9 and below was discovered to contain a use-after-free via the component Binary_string::free_buffer() at /sql/sql_string.h.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-416 Use After Free


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2019-11046

In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP bcmath extension functions on some systems, including Windows, can be tricked into reading beyond the allocated space by supplying it with string containing characters that are identified as numeric by the OS but aren't ASCII numbers. This can read to disclosure of the content of some memory locations.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-125 Out-of-bounds Read


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 5.3 MEDIUM CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

CVE-2022-27446

MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_cmpfunc.h.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-617 Reachable Assertion


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2022-27386

MariaDB Server v10.7 and below was discovered to contain a segmentation fault via the component sql/sql_class.cc.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2019-9639

An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_MAKERNOTE because of mishandling the data_len variable.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-909 Missing Initialization of Resource


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVE-2019-11042

When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.1.x below 7.1.31, 7.2.x below 7.2.21 and 7.3.x below 7.3.8 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-125 Out-of-bounds Read


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.1 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H

CVE-2022-27385

An issue in the component Used_tables_and_const_cache::used_tables_and_const_cache_join of MariaDB Server v10.7 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2020-7059

When using fgetss() function to read data with stripping tags, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause this function to read past the allocated buffer. This may lead to information disclosure or crash.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-125 Out-of-bounds Read


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 9.1 CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

CVE-2020-7070

In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when PHP is processing incoming HTTP cookie values, the cookie names are url-decoded. This may lead to cookies with prefixes like __Host confused with cookies that decode to such prefix, thus leading to an attacker being able to forge cookie which is supposed to be secure. See also CVE-2020-8184 for more information.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-20 Improper Input Validation


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 5.3 MEDIUM CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

CVE-2022-32091

MariaDB v10.7 was discovered to contain an use-after-poison in in __interceptor_memset at /libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-416 Use After Free


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2015-2348

The move_uploaded_file implementation in ext/standard/basic_functions.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 truncates a pathname upon encountering a \x00 character, which allows remote attackers to bypass intended extension restrictions and create files with unexpected names via a crafted second argument. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-626 Null Byte Interaction Error (Poison Null Byte)


Metrics

CVSS Version Base Score Base Severity Vector String
3.0 9.8 CRITICAL CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2019-9020

An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. Invalid input to the function xmlrpc_decode() can lead to an invalid memory access (heap out of bounds read or read after free). This is related to xml_elem_parse_buf in ext/xmlrpc/libxmlrpc/xml_element.c.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-125 Out-of-bounds Read


Metrics

CVSS Version Base Score Base Severity Vector String
3.0 9.8 CRITICAL CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2021-35604

Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.35 and prior and 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-20 Improper Input Validation


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 5.5 MEDIUM CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H

CVE-2022-27444

MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_subselect.cc.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2018-14883

An issue was discovered in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8. An Integer Overflow leads to a heap-based buffer over-read in exif_thumbnail_extract of exif.c.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-125 Out-of-bounds Read


Metrics

CVSS Version Base Score Base Severity Vector String
3.0 7.5 HIGH CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2014-9705

Heap-based buffer overflow in the enchant_broker_request_dict function in ext/enchant/enchant.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allows remote attackers to execute arbitrary code via vectors that trigger creation of multiple dictionaries.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer


Metrics

CVSS Version Base Score Base Severity Vector String
3.0 9.8 CRITICAL CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2020-7064

In PHP versions 7.2.x below 7.2.9, 7.3.x below 7.3.16 and 7.4.x below 7.4.4, while parsing EXIF data with exif_read_data() function, it is possible for malicious data to cause PHP to read one byte of uninitialized memory. This could potentially lead to information disclosure or crash.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-125 Out-of-bounds Read


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 5.4 MEDIUM CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L

CVE-2022-27382

MariaDB Server v10.7 and below was discovered to contain a segmentation fault via the component Item_field::used_tables/update_depend_map_for_order.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-617 Reachable Assertion


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2020-7063

In PHP versions 7.2.x below 7.2.28, 7.3.x below 7.3.15 and 7.4.x below 7.4.3, when creating PHAR archive using PharData::buildFromIterator() function, the files are added with default permissions (0666, or all access) even if the original files on the filesystem were with more restrictive permissions. This may result in files having more lax permissions than intended when such archive is extracted.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-281 Improper Preservation of Permissions


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 5.3 MEDIUM CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

CVE-2021-2372

Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.34 and prior and 8.0.25 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-20 Improper Input Validation


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 4.4 MEDIUM CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H

CVE-2019-9021

An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. A heap-based buffer over-read in PHAR reading functions in the PHAR extension may allow an attacker to read allocated or unallocated memory past the actual data when trying to parse the file name, a different vulnerability than CVE-2018-20783. This is related to phar_detect_phar_fname_ext in ext/phar/phar.c.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-125 Out-of-bounds Read


Metrics

CVSS Version Base Score Base Severity Vector String
3.0 9.8 CRITICAL CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2018-14851

exif_process_IFD_in_MAKERNOTE in ext/exif/exif.c in PHP before 5.6.37, 7.0.x before 7.0.31, 7.1.x before 7.1.20, and 7.2.x before 7.2.8 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG file.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-125 Out-of-bounds Read


Metrics

CVSS Version Base Score Base Severity Vector String
3.0 5.5 MEDIUM CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

CVE-2022-27448

There is an Assertion failure in MariaDB Server v10.9 and below via 'node->pcur->rel_pos == BTR_PCUR_ON' at /row/row0mysql.cc.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-617 Reachable Assertion


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2021-46663

MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-20 Improper Input Validation


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 5.5 MEDIUM CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2021-2180

Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-20 Improper Input Validation


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 4.9 MEDIUM CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

CVE-2014-9709

The GetCode_ function in gd_gif_in.c in GD 2.1.1 and earlier, as used in PHP before 5.5.21 and 5.6.x before 5.6.5, allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted GIF image that is improperly handled by the gdImageCreateFromGif function.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer


Metrics

CVSS Version Base Score Base Severity Vector String
3.0 9.1 CRITICAL CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

CVE-2023-25690

Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack. Configurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-inserted into the proxied request-target using variable substitution. For example, something like: RewriteEngine on RewriteRule "^/here/(.*)" "http://example.com:8080/elsewhere?$1"; [P] ProxyPassReverse /here/ http://example.com:8080/Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-444 Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 9.8 CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2022-32082

MariaDB v10.5 to v10.7 was discovered to contain an assertion failure at table->get_ref_count() == 0 in dict0dict.cc.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-617 Reachable Assertion


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2022-31629

In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the vulnerability enables network and same-site attackers to set a standard insecure cookie in the victim's browser which is treated as a `__Host-` or `__Secure-` cookie by PHP applications.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-20 Improper Input Validation


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 6.5 MEDIUM CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

CVE-2019-9022

An issue was discovered in PHP 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.2. dns_get_record misparses a DNS response, which can allow a hostile DNS server to cause PHP to misuse memcpy, leading to read operations going past the buffer allocated for DNS data. This affects php_parserr in ext/standard/dns.c for DNS_CAA and DNS_ANY queries.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-125 Out-of-bounds Read


Metrics

CVSS Version Base Score Base Severity Vector String
3.0 7.5 HIGH CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVE-2016-3078

Multiple integer overflows in php_zip.c in the zip extension in PHP before 7.0.6 allow remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted call to (1) getFromIndex or (2) getFromName in the ZipArchive class.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-190 Integer Overflow or Wraparound


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 9.8 CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2023-0662

In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, excessive number of parts in HTTP form upload can cause high resource consumption and excessive number of log entries. This can cause denial of service on the affected server by exhausting CPU resources or disk space.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-400 Uncontrolled Resource Consumption


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2021-2022

Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.6.50 and prior, 5.7.32 and prior and 8.0.22 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-20 Improper Input Validation


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 4.4 MEDIUM CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H

CVE-2022-32089

MariaDB v10.5 to v10.7 was discovered to contain a segmentation fault via the component st_select_lex_unit::exclude_level.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-229 Improper Handling of Values


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2019-11048

In PHP versions 7.2.x below 7.2.31, 7.3.x below 7.3.18 and 7.4.x below 7.4.6, when HTTP file uploads are allowed, supplying overly long filenames or field names could lead PHP engine to try to allocate oversized memory storage, hit the memory limit and stop processing the request, without cleaning up temporary files created by upload request. This potentially could lead to accumulation of uncleaned temporary files exhausting the disk space on the target server.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-400 Uncontrolled Resource Consumption


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 5.3 MEDIUM CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

CVE-2021-46669

MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-416 Use After Free


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2019-11047

When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-125 Out-of-bounds Read


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 6.5 MEDIUM CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L

CVE-2022-27383

MariaDB Server v10.6 and below was discovered to contain an use-after-free in the component my_strcasecmp_8bit, which is exploited via specially crafted SQL statements.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-416 Use After Free


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2021-46667

MariaDB before 10.6.5 has a sql_lex.cc integer overflow, leading to an application crash.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-190 Integer Overflow or Wraparound


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 5.5 MEDIUM CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2022-32087

MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component Item_args::walk_args.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-229 Improper Handling of Values


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2022-36760

Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.54 and prior versions.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-444 Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 9 CRITICAL CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

CVE-2020-7060

When using certain mbstring functions to convert multibyte encodings, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause function mbfl_filt_conv_big5_wchar to read past the allocated buffer. This may lead to information disclosure or crash.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-125 Out-of-bounds Read


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 9.1 CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

CVE-2018-17082

The Apache2 component in PHP before 5.6.38, 7.0.x before 7.0.32, 7.1.x before 7.1.22, and 7.2.x before 7.2.10 allows XSS via the body of a "Transfer-Encoding: chunked" request, because the bucket brigade is mishandled in the php_handler function in sapi/apache2handler/sapi_apache2.c.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')


Metrics

CVSS Version Base Score Base Severity Vector String
3.0 6.1 MEDIUM CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

CVE-2019-9640

An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an Invalid Read in exif_process_SOFn.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-125 Out-of-bounds Read


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVE-2021-46661

MariaDB through 10.5.9 allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE).

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-20 Improper Input Validation


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 5.5 MEDIUM CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2019-11034

When processing certain files, PHP EXIF extension in versions 7.1.x below 7.1.28, 7.2.x below 7.2.17 and 7.3.x below 7.3.4 can be caused to read past allocated buffer in exif_process_IFD_TAG function. This may lead to information disclosure or crash.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-125 Out-of-bounds Read


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 9.1 CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

CVE-2022-27456

MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component VDec::VDec at /sql/sql_type.cc.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-416 Use After Free


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2020-7061

In PHP versions 7.3.x below 7.3.15 and 7.4.x below 7.4.3, while extracting PHAR files on Windows using phar extension, certain content inside PHAR file could lead to one-byte read past the allocated buffer. This could potentially lead to information disclosure or crash.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-125 Out-of-bounds Read


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 9.1 CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

CVE-2022-27455

MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component my_wildcmp_8bit_impl at /strings/ctype-simple.c.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-416 Use After Free


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2021-2144

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Parser). Supported versions that are affected are 5.7.29 and prior and 8.0.19 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in takeover of MySQL Server.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-20 Improper Input Validation


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.2 HIGH CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

CVE-2021-2154

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 5.7.33 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-20 Improper Input Validation


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 4.9 MEDIUM CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

CVE-2022-21595

Vulnerability in the MySQL Server product of Oracle MySQL (component: C API). Supported versions that are affected are 5.7.36 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-20 Improper Input Validation


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 4.4 MEDIUM CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H

CVE-2019-11040

When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.1.x below 7.1.30, 7.2.x below 7.2.19 and 7.3.x below 7.3.6 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-125 Out-of-bounds Read


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 9.1 CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

CVE-2021-2389

Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.34 and prior and 8.0.25 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-20 Improper Input Validation


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 5.9 MEDIUM CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2023-27522

HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55. Special characters in the origin response header can truncate/split the response forwarded to the client.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-444 Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

CVE-2020-2812

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 5.6.47 and prior, 5.7.29 and prior and 8.0.19 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-20 Improper Input Validation


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 4.9 MEDIUM CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

CVE-2021-46665

MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-20 Improper Input Validation


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 5.5 MEDIUM CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2022-32086

MariaDB v10.4 to v10.8 was discovered to contain a segmentation fault via the component Item_field::fix_outer_field.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-229 Improper Handling of Values


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2022-32085

MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component Item_func_in::cleanup/Item::cleanup_processor.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-229 Improper Handling of Values


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2021-21704

In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using Firebird PDO driver extension, a malicious database server could cause crashes in various database functions, such as getAttribute(), execute(), fetch() and others by returning invalid response data that is not parsed correctly by the driver. This can result in crashes, denial of service or potentially memory corruption.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-125 Out-of-bounds Read


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 5.9 MEDIUM CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2020-7066

In PHP versions 7.2.x below 7.2.29, 7.3.x below 7.3.16 and 7.4.x below 7.4.4, while using get_headers() with user-supplied URL, if the URL contains zero (\0) character, the URL will be silently truncated at it. This may cause some software to make incorrect assumptions about the target of the get_headers() and possibly send some information to a wrong server.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-170 Improper Null Termination


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 4.3 MEDIUM CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N

CVE-2022-31628

In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the phar uncompressor code would recursively uncompress "quines" gzip files, resulting in an infinite loop.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-674 Uncontrolled Recursion


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 5.5 MEDIUM CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2021-46662

MariaDB through 10.5.9 allows a set_var.cc application crash via certain uses of an UPDATE statement in conjunction with a nested subquery.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-20 Improper Input Validation


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 5.5 MEDIUM CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2016-5385

PHP through 7.0.8 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, as demonstrated by (1) an application that makes a getenv('HTTP_PROXY') call or (2) a CGI configuration of PHP, aka an "httpoxy" issue.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-601 URL Redirection to Untrusted Site ('Open Redirect')


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 8.1 HIGH CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2022-37436

Prior to Apache HTTP Server 2.4.55, a malicious backend can cause the response headers to be truncated early, resulting in some headers being incorporated into the response body. If the later headers have any security purpose, they will not be interpreted by the client.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-113 Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 5.3 MEDIUM CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

CVE-2013-6501

The default soap.wsdl_cache_dir setting in (1) php.ini-production and (2) php.ini-development in PHP through 5.6.7 specifies the /tmp directory, which makes it easier for local users to conduct WSDL injection attacks by creating a file under /tmp with a predictable filename that is used by the get_sdl function in ext/soap/php_sdl.c.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')


Metrics

CVSS Version Base Score Base Severity Vector String
3.0 8.8 HIGH CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVE-2021-21702

In PHP versions 7.3.x below 7.3.27, 7.4.x below 7.4.15 and 8.0.x below 8.0.2, when using SOAP extension to connect to a SOAP server, a malicious SOAP server could return malformed XML data as a response that would cause PHP to access a null pointer and thus cause a crash.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-476 NULL Pointer Dereference


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2019-9024

An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. xmlrpc_decode() can allow a hostile XMLRPC server to cause PHP to read memory outside of allocated areas in base64_decode_xmlrpc in ext/xmlrpc/libxmlrpc/base64.c.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-125 Out-of-bounds Read


Metrics

CVSS Version Base Score Base Severity Vector String
3.0 7.5 HIGH CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVE-2019-9023

An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. A number of heap-based buffer over-read instances are present in mbstring regular expression functions when supplied with invalid multibyte data. These occur in ext/mbstring/oniguruma/regcomp.c, ext/mbstring/oniguruma/regexec.c, ext/mbstring/oniguruma/regparse.c, ext/mbstring/oniguruma/enc/unicode.c, and ext/mbstring/oniguruma/src/utf32_be.c when a multibyte regular expression pattern contains invalid multibyte sequences.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-125 Out-of-bounds Read


Metrics

CVSS Version Base Score Base Severity Vector String
3.0 9.8 CRITICAL CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2022-27449

MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_func.cc:148.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-617 Reachable Assertion


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2021-46664

MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-476 NULL Pointer Dereference


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 5.5 MEDIUM CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2019-11050

When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-125 Out-of-bounds Read


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 6.5 MEDIUM CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L

CVE-2021-21708

In PHP versions 7.4.x below 7.4.28, 8.0.x below 8.0.16, and 8.1.x below 8.1.3, when using filter functions with FILTER_VALIDATE_FLOAT filter and min/max limits, if the filter fails, there is a possibility to trigger use of allocated memory after free, which can result it crashes, and potentially in overwrite of other memory chunks and RCE. This issue affects: code that uses FILTER_VALIDATE_FLOAT with min/max limits.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-416 Use After Free


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 9.8 CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2022-31625

In PHP versions 7.4.x below 7.4.30, 8.0.x below 8.0.20, and 8.1.x below 8.1.7, when using Postgres database extension, supplying invalid parameters to the parametrized query may lead to PHP attempting to free memory using uninitialized data as pointers. This could lead to RCE vulnerability or denial of service.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-590 Free of Memory not on the Heap


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 8.1 HIGH CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2022-32081

MariaDB v10.4 to v10.7 was discovered to contain an use-after-poison in prepare_inplace_add_virtual at /storage/innobase/handler/handler0alter.cc.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-416 Use After Free


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2022-27378

An issue in the component Create_tmp_table::finalize of MariaDB Server v10.7 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2006-20001

A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash. This issue affects Apache HTTP Server 2.4.54 and earlier.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-787 Out-of-bounds Write


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2018-19935

ext/imap/php_imap.c in PHP 5.x and 7.x before 7.3.0 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty string in the message argument to the imap_mail function.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-476 NULL Pointer Dereference


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2022-4900

A vulnerability was found in PHP where setting the environment variable PHP_CLI_SERVER_WORKERS to a large value leads to a heap buffer overflow.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 5.5 MEDIUM CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2018-12882

exif_read_from_impl in ext/exif/exif.c in PHP 7.2.x through 7.2.7 allows attackers to trigger a use-after-free (in exif_read_from_file) because it closes a stream that it is not responsible for closing. The vulnerable code is reachable through the PHP exif_read_data function.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-416 Use After Free


Metrics

CVSS Version Base Score Base Severity Vector String
3.0 9.8 CRITICAL CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2019-9641

An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_TIFF.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-908 Use of Uninitialized Resource


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 9.8 CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2022-27380

An issue in the component my_decimal::operator= of MariaDB Server v10.6.3 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2022-27381

An issue in the component Field::set_default of MariaDB Server v10.6 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2021-21707

In PHP versions 7.3.x below 7.3.33, 7.4.x below 7.4.26 and 8.0.x below 8.0.13, certain XML parsing functions, like simplexml_load_file(), URL-decode the filename passed to them. If that filename contains URL-encoded NUL character, this may cause the function to interpret this as the end of the filename, thus interpreting the filename differently from what the user intended, which may lead it to reading a different file than intended.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-159 Improper Handling of Invalid Use of Special Elements


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 5.3 MEDIUM CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

CVE-2022-27451

MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/field_conv.cc.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-1173 Improper Use of Validation Framework


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2020-2780

Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: DML). Supported versions that are affected are 5.6.47 and prior, 5.7.29 and prior and 8.0.19 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-400 Uncontrolled Resource Consumption


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 6.5 MEDIUM CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

CVE-2019-11041

When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.1.x below 7.1.31, 7.2.x below 7.2.21 and 7.3.x below 7.3.8 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-125 Out-of-bounds Read


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.1 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H

CVE-2021-2174

Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.

View CVE Details


Affected Products

Festo Didactic SE MES PC
Vendor:
Festo Didactic SE
Product Version:
Festo Didactic SE MES PC shipped with Windows 10
Product Status:
known_affected
Remediations

Vendor fix
Festo Didactic has released Factory Control Panel as a replacement for XAMPP on its MES PCs. Contact technical support at services.didactic@festo.com to obtain the current version of Factory Control Panel which includes fixes for these vulnerabilities.

Relevant CWE: CWE-20 Improper Input Validation


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 4.4 MEDIUM CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H

Acknowledgments

  • CERT@VDE helped coordinate and support this publication

General recommendation

Festo Didactic offers products with security functions that aid the safe operation of plants, systems, machines and networks. In order to protect plants, systems, machines and networks from cyber threats, a comprehensive security concept must be implemented and continuously updated. Festo products and services only constitute one part of such a concept. The customer is responsible for preventing unauthorized access to their plants, systems, machines and networks. Systems, machines and components should only be connected to a company's network or the Internet if and as necessary, and only when the suitable security measures (e.g., firewalls and network segmentation, defense-in-depth) are in place. Failure to ensure adequate security measures when connecting the product to the network can result in vulnerabilities which allow unauthorized, remote access to the network - even beyond the product boundaries. This access could be abused to incur a loss of data or manipulate or sabotage systems. Typical forms of attack include but are not limited to: Denial-of-Service (rendering the system temporarily non-functional), remote execution of malicious code, privilege escalation (executing malicious code with higher system privileges than expected), ransomware (encryption of data and demanding payment for decryption). In the context of industrial systems and machines this can also lead to unsafe states, posing a danger to people and equipment. Furthermore, Festo guidelines on suitable security measures should be observed. Festo products and solutions are constantly being developed further in order to make them more secure. Festo strongly recommends that customers install product updates as soon as they become available and always use the latest versions of its products. Any use of product versions that are no longer supported or any failure to install the latest updates may render the customer vulnerable to cyber-attacks.


Disclaimer

Festo assumes no liability whatsoever for indirect, collateral, accidental or consequential losses that occur by the distribution and/or use of this document or any losses in connection with the distribution and/or use of this document. All information published in this document is provided free of charge and on good faith by Festo. Insofar as permissible by law, however, none of this information shall establish any warranty, guarantee, commitment, or liability on the part of Festo.\n\nNote: In no case does this information release the operator or responsible person from the obligation to check the effect on his system or installation before using the information and, in the event of negative consequences, not to use the information.\n\nIn addition, the actual general terms, and conditions for delivery, payment and software use of Festo, available under http://www.festo.com and the special provisions for the use of Festo Security Advisory available at https://www.festo.com/psirt shall apply.


Impact

The vulnerabilities covered by this advisory have a broad range of impacts ranging from denial-of-service to disclosure or manipulation/deletion of information. Given the intended usage of MES PCs for didactic purposes in controlled lab environments, separate from productive systems, it never comes into contact with sensitive information. Therefore the impact is reduced to limited availability of the system.


Legal Notice and Terms of Use

This product is provided subject to this Notification (https://www.cisa.gov/notification) and this Privacy & Use policy (https://www.cisa.gov/privacy-policy).


Recommended Practices

CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.

Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.

Locate control system networks and remote devices behind firewalls and isolate them from business networks.

When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.

CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.


Advisory Conversion Disclaimer

This ICSA is a verbatim republication of Festo SE & Co. KG FSA-202402 from a direct conversion of the vendor's Common Security Advisory Framework (CSAF) advisory. This is republished to CISA's website as a means of increasing visibility and is provided "as-is" for informational purposes only. CISA is not responsible for the editorial or technical accuracy of republished advisories and provides no warranties of any kind regarding any information contained within this advisory. Further, CISA does not endorse any commercial product or service. Please contact Festo SE & Co. KG directly for any questions regarding this advisory.

Revision History

  • Initial Release Date: 2024-02-27
Date Revision Summary
2024-02-27 1 Initial version
2025-11-04 2 Adjust to VDE template. Add missing CWE-IDs if available. Updated legal disclaimer to add references to special provisions.
2025-12-08 3 Add all missing CWE identifier and CVSS 3.x scores.
2026-01-27 4 Initial Republication of Festo SE & Co. KG FSA-202402 advisory

Legal Notice and Terms of Use

CISA Cybersecurity Advisory , Tue, 27 Jan 26 12:00:00 +0000

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

  • CVE-2026-24858 Fortinet Multiple Products Authentication Bypass Using an Alternate Path or Channel Vulnerability

This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise.

Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.

Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.

CISA Cybersecurity Advisory , Tue, 27 Jan 26 12:00:00 +0000

View CSAF

Summary

Successful exploitation of this vulnerability could result in remote SQL execution, leading to alteration or loss of data.

The following versions of Johnson Controls Metasys Products are affected:

  • Metasys Application and Data Server (ADS) (CVE-2025-26385)
  • Metasys Extended Application and Data Server (ADX) (CVE-2025-26385)
  • Metasys LCS8500 (CVE-2025-26385)
  • Metasys NAE8500 (CVE-2025-26385)
  • Metasys System Configuration Tool (SCT) (CVE-2025-26385)
  • Metasys Controller Configuration Tool (CCT) (CVE-2025-26385)
CVSS Vendor Equipment Vulnerabilities
v3 10 Johnson Controls Johnson Controls Metasys Products Improper Neutralization of Special Elements used in a Command ('Command Injection')

Background

  • Critical Infrastructure Sectors: Commercial Facilities, Critical Manufacturing, Energy, Government Services and Facilities, Transportation Systems
  • Countries/Areas Deployed: Worldwide
  • Company Headquarters Location: Ireland

Vulnerabilities

Expand All +

CVE-2025-26385

Under certain circumstances a successful exploitation of this vulnerability could allow remote SQL execution.

View CVE Details


Affected Products

Johnson Controls Metasys Products
Vendor:
Johnson Controls
Product Version:
Johnson Controls Metasys Application and Data Server (ADS): <=14.1, Johnson Controls Metasys Extended Application and Data Server (ADX):14.1, Johnson Controls Metasys LCS8500: >=12.0|<=14.1, Johnson Controls Metasys NAE8500: >=12.0|<=14.1, Johnson Controls Metasys System Configuration Tool (SCT): <=17.1, Johnson Controls Metasys Controller Configuration Tool (CCT): <=17.0
Product Status:
known_affected
Remediations

Mitigation
Johnson Controls recommends downloading and executing the Metasys patch for GIV-165989 from the License Portal. Login credentials are required.

Mitigation
Johnson Controls advises following the Metasys Release 14 Hardening Guide to ensure each Metasys installation is on a segmented network and not exposed to untrusted networks such as the internet.

Mitigation
Additionally, closing incoming TCP port 1433 can protect against exploitation of this vulnerability.

Mitigation
For more detailed mitigation instructions, visit Johnson Controls Product Security Advisory JCI-PSA-2026-02.

Relevant CWE: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 10 CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Acknowledgments

  • Johnson Controls reported this vulnerability to CISA

Legal Notice and Terms of Use

This product is provided subject to this Notification (https://www.cisa.gov/notification) and this Privacy & Use policy (https://www.cisa.gov/privacy-policy).


Recommended Practices

CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability, such as:

Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.

Locate control system networks and remote devices behind firewalls and isolating them from business networks.

When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.

CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.

No known public exploitation specifically targeting this vulnerability has been reported to CISA at this time.


Revision History

  • Initial Release Date: 2026-01-27
Date Revision Summary
2026-01-27 1 Initial Republication of Johnson Controls advisory JCI-PSA-2026-02

Legal Notice and Terms of Use

CISA Cybersecurity Advisory , Tue, 27 Jan 26 12:00:00 +0000

View CSAF

Summary

Schneider Electric is aware of multiple vulnerabilities with EmberZNet disclosed by Silicon Labs. Many vendors, including Schneider Electric, use Silicon Labs’ Zigbee processors in their offers. The following have denial of service vulnerabilities: Wiser iTRV, Wiser RTR, Wiser UFH, Wiser Heat Switch, Wiser Boiler Relay, cFMT (Exaact, Elko, Odace, Merten), Wiser Micromodule, Iconic Wiser Connected Smart Dimmer, Iconic Zigbee devices, Wiser Application Modules, Wiser Connected Pushbutton Switch/Dimmer/Shutter controller, Rotary Dimmer, Motion Sensor Dimmer/Switch, Smart socket outlets, and EV socket outlet. See the following table. Failure to apply the mitigations provided below may risk denial of service, which could result in products being unavailable.

The following versions of Schneider Electric Zigbee Products are affected:

  • Wiser iTRV2 (CVE-2024-6350, CVE-2024-6351, CVE-2024-6352, CVE-2024-10106, CVE-2024-7322)
  • Wiser iTRV3 (CVE-2024-6350, CVE-2024-6351, CVE-2024-6352, CVE-2024-10106, CVE-2024-7322)
  • Wiser RTR2 (CVE-2024-6350, CVE-2024-6351, CVE-2024-6352, CVE-2024-10106, CVE-2024-7322)
  • Wiser UFH (CVE-2024-6350, CVE-2024-6351, CVE-2024-6352, CVE-2024-10106, CVE-2024-7322)
  • Wiser 16A Electrical Heat Switch (CVE-2024-6350, CVE-2024-6351, CVE-2024-6352, CVE-2024-10106, CVE-2024-7322)
  • Wiser Boiler Relay (CVE-2024-6350, CVE-2024-6351, CVE-2024-6352, CVE-2024-10106, CVE-2024-7322)
  • Exxact cFMT 16a (CVE-2024-6350, CVE-2024-6351, CVE-2024-6352, CVE-2024-10106, CVE-2024-7322)
  • Elko cFMT 16a (CVE-2024-6350, CVE-2024-6351, CVE-2024-6352, CVE-2024-10106, CVE-2024-7322)
  • Odace cFMT 2a (CVE-2024-6350, CVE-2024-6351, CVE-2024-6352, CVE-2024-10106, CVE-2024-7322)
  • Merten cFMT 16a (CVE-2024-6350, CVE-2024-6351, CVE-2024-6352, CVE-2024-10106, CVE-2024-7322)
  • Merten cFMT 2a (CVE-2024-6350, CVE-2024-6351, CVE-2024-6352, CVE-2024-10106, CVE-2024-7322)
  • Wiser Power Micromodule (CVE-2024-6350, CVE-2024-6351, CVE-2024-6352, CVE-2024-10106, CVE-2024-7322)
  • Wiser FIP Micromodule (CVE-2024-6350, CVE-2024-6351, CVE-2024-6352, CVE-2024-10106, CVE-2024-7322)
  • Iconic, Wiser Connected Smart Dimmer (CVE-2024-6350, CVE-2024-6351, CVE-2024-6352, CVE-2024-10106, CVE-2024-7322)
  • Iconic, Wiser Connected Smart Switch, 2AX (CVE-2024-6350, CVE-2024-6351, CVE-2024-6352, CVE-2024-10106, CVE-2024-7322)
  • Iconic, Wiser Connected Smart Switch, 10AX (CVE-2024-6350, CVE-2024-6351, CVE-2024-6352, CVE-2024-10106, CVE-2024-7322)
  • Iconic, Connected AC Fan Controller (CVE-2024-6350, CVE-2024-6351, CVE-2024-6352, CVE-2024-10106, CVE-2024-7322)
  • Iconic, Connected Smart Socket (CVE-2024-6350, CVE-2024-6351, CVE-2024-6352, CVE-2024-10106, CVE-2024-7322)
  • Wiser Connected Application Module 1-Gang (CVE-2024-6350, CVE-2024-6351, CVE-2024-6352, CVE-2024-10106, CVE-2024-7322)
  • Wiser Connected Application Module 2-Gang (CVE-2024-6350, CVE-2024-6351, CVE-2024-6352, CVE-2024-10106, CVE-2024-7322)
  • Wiser Connected Push Button Dimmer (CVE-2024-6350, CVE-2024-6351, CVE-2024-6352, CVE-2024-10106, CVE-2024-7322)
  • Wiser Connected Push Button Switch (CVE-2024-6350, CVE-2024-6351, CVE-2024-6352, CVE-2024-10106, CVE-2024-7322)
  • Wiser Connected Push Button Shutter (CVE-2024-6350, CVE-2024-6351, CVE-2024-6352, CVE-2024-10106, CVE-2024-7322)
  • Wiser Connected Motion Dimmer (CVE-2024-6350, CVE-2024-6351, CVE-2024-6352, CVE-2024-10106, CVE-2024-7322)
  • Wiser Connected Motion Switch (CVE-2024-6350, CVE-2024-6351, CVE-2024-6352, CVE-2024-10106, CVE-2024-7322)
  • Wiser Connected Rotary Dimmer (CVE-2024-6350, CVE-2024-6351, CVE-2024-6352, CVE-2024-10106, CVE-2024-7322)
  • Connected Wireless Switch (CVE-2024-6350, CVE-2024-6351, CVE-2024-6352, CVE-2024-10106, CVE-2024-7322)
  • Micromodule Switch (CVE-2024-6350, CVE-2024-6351, CVE-2024-6352, CVE-2024-10106, CVE-2024-7322)
  • Micromodule Dimmer (CVE-2024-6350, CVE-2024-6351, CVE-2024-6352, CVE-2024-10106, CVE-2024-7322)
  • Micromodule Shutter (CVE-2024-6350, CVE-2024-6351, CVE-2024-6352, CVE-2024-10106, CVE-2024-7322)
  • Connected Single Socket Outlet (CVE-2024-6350, CVE-2024-6351, CVE-2024-6352, CVE-2024-10106, CVE-2024-7322)
  • Connected Double Socket Outlet (CVE-2024-6350, CVE-2024-6351, CVE-2024-6352, CVE-2024-10106, CVE-2024-7322)
  • Fuga Connected Socket Outlet (CVE-2024-6350, CVE-2024-6351, CVE-2024-6352, CVE-2024-10106, CVE-2024-7322)
  • Mureva EV Link (CVE-2024-6350, CVE-2024-6351, CVE-2024-6352, CVE-2024-10106, CVE-2024-7322)
CVSS Vendor Equipment Vulnerabilities
v3 6.5 Schneider Electric Schneider Electric Zigbee Products Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'), Uncontrolled Resource Consumption

Background

  • Critical Infrastructure Sectors: Commercial Facilities, Critical Manufacturing, Energy, Information Technology, Transportation Systems
  • Countries/Areas Deployed: Worldwide
  • Company Headquarters Location: France

Vulnerabilities

Expand All +

CVE-2024-6350

A CWE-120: A buffer overflow vulnerability exists that could cause a denial of service when a malicious device joins the network.

View CVE Details


Affected Products

Schneider Electric Zigbee Products
Vendor:
Schneider Electric
Product Version:
Wiser iTRV2 All Versions, Wiser iTRV3 All Versions, Wiser RTR2 All Versions, Wiser UFH All Versions, Wiser 16A Electrical Heat Switch All Versions, Wiser Boiler Relay All Versions, Exxact cFMT 16a All Versions, Elko cFMT 16a All Versions, Odace cFMT 2a All Versions, Merten cFMT 16a All Versions, Merten cFMT 2a All Versions, Wiser Power Micromodule All Versions, Wiser FIP Micromodule All Versions, Iconic, Wiser Connected Smart Dimmer All Versions, Iconic, Wiser Connected Smart Switch, 2AX All Versions, Iconic, Wiser Connected Smart Switch, 10AX All Versions, Iconic, Connected AC Fan Controller All Versions, Iconic, Connected Smart Socket All Versions, Wiser Connected Application Module 1-Gang All Versions, Wiser Connected Application Module 2-Gang All Versions, Wiser Connected Push Button Dimmer All Versions, Wiser Connected Push Button Switch All Versions, Wiser Connected Push Button Shutter All Versions, Wiser Connected Motion Dimmer All Versions, Wiser Connected Motion Switch All Versions, Wiser Connected Rotary Dimmer All Versions, Connected Wireless Switch All Versions, Micromodule Switch All Versions, Micromodule Dimmer All Versions, Micromodule Shutter All Versions, Connected Single Socket Outlet All Versions, Connected Double Socket Outlet All Versions, Fuga Connected Socket Outlet All Versions, Mureva EV Link All Versions
Product Status:
known_affected
Remediations

Mitigation
Customers should immediately apply the following mitigations to reduce the risk of exploit: To keep your Zigbee network safe and prevent unauthorized access: • Restrict device access: Do not allow unknown devices to join your network. • Review hub settings: Check how your Zigbee hub manages device pairing. • Control network availability: Only open the network when adding new devices and close it immediately after. • Use install codes and avoid the well-known key: Whenever possible, use unique install codes for added security. Replace default keys with secure, unique keys.

Relevant CWE: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 6.5 MEDIUM CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2024-6351

A CWE-120: A buffer overflow vulnerability exists that could cause a denial of service when a malicious device joins the network.

View CVE Details


Affected Products

Schneider Electric Zigbee Products
Vendor:
Schneider Electric
Product Version:
Wiser iTRV2 All Versions, Wiser iTRV3 All Versions, Wiser RTR2 All Versions, Wiser UFH All Versions, Wiser 16A Electrical Heat Switch All Versions, Wiser Boiler Relay All Versions, Exxact cFMT 16a All Versions, Elko cFMT 16a All Versions, Odace cFMT 2a All Versions, Merten cFMT 16a All Versions, Merten cFMT 2a All Versions, Wiser Power Micromodule All Versions, Wiser FIP Micromodule All Versions, Iconic, Wiser Connected Smart Dimmer All Versions, Iconic, Wiser Connected Smart Switch, 2AX All Versions, Iconic, Wiser Connected Smart Switch, 10AX All Versions, Iconic, Connected AC Fan Controller All Versions, Iconic, Connected Smart Socket All Versions, Wiser Connected Application Module 1-Gang All Versions, Wiser Connected Application Module 2-Gang All Versions, Wiser Connected Push Button Dimmer All Versions, Wiser Connected Push Button Switch All Versions, Wiser Connected Push Button Shutter All Versions, Wiser Connected Motion Dimmer All Versions, Wiser Connected Motion Switch All Versions, Wiser Connected Rotary Dimmer All Versions, Connected Wireless Switch All Versions, Micromodule Switch All Versions, Micromodule Dimmer All Versions, Micromodule Shutter All Versions, Connected Single Socket Outlet All Versions, Connected Double Socket Outlet All Versions, Fuga Connected Socket Outlet All Versions, Mureva EV Link All Versions
Product Status:
known_affected
Remediations

Mitigation
Customers should immediately apply the following mitigations to reduce the risk of exploit: To keep your Zigbee network safe and prevent unauthorized access: • Restrict device access: Do not allow unknown devices to join your network. • Review hub settings: Check how your Zigbee hub manages device pairing. • Control network availability: Only open the network when adding new devices and close it immediately after. • Use install codes and avoid the well-known key: Whenever possible, use unique install codes for added security. Replace default keys with secure, unique keys.

Relevant CWE: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 4.3 MEDIUM CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

CVE-2024-6352

A CWE-120: A buffer overflow vulnerability exists that could cause a denial of service when a malicious device joins the network.

View CVE Details


Affected Products

Schneider Electric Zigbee Products
Vendor:
Schneider Electric
Product Version:
Wiser iTRV2 All Versions, Wiser iTRV3 All Versions, Wiser RTR2 All Versions, Wiser UFH All Versions, Wiser 16A Electrical Heat Switch All Versions, Wiser Boiler Relay All Versions, Exxact cFMT 16a All Versions, Elko cFMT 16a All Versions, Odace cFMT 2a All Versions, Merten cFMT 16a All Versions, Merten cFMT 2a All Versions, Wiser Power Micromodule All Versions, Wiser FIP Micromodule All Versions, Iconic, Wiser Connected Smart Dimmer All Versions, Iconic, Wiser Connected Smart Switch, 2AX All Versions, Iconic, Wiser Connected Smart Switch, 10AX All Versions, Iconic, Connected AC Fan Controller All Versions, Iconic, Connected Smart Socket All Versions, Wiser Connected Application Module 1-Gang All Versions, Wiser Connected Application Module 2-Gang All Versions, Wiser Connected Push Button Dimmer All Versions, Wiser Connected Push Button Switch All Versions, Wiser Connected Push Button Shutter All Versions, Wiser Connected Motion Dimmer All Versions, Wiser Connected Motion Switch All Versions, Wiser Connected Rotary Dimmer All Versions, Connected Wireless Switch All Versions, Micromodule Switch All Versions, Micromodule Dimmer All Versions, Micromodule Shutter All Versions, Connected Single Socket Outlet All Versions, Connected Double Socket Outlet All Versions, Fuga Connected Socket Outlet All Versions, Mureva EV Link All Versions
Product Status:
known_affected
Remediations

Mitigation
Customers should immediately apply the following mitigations to reduce the risk of exploit: To keep your Zigbee network safe and prevent unauthorized access: • Restrict device access: Do not allow unknown devices to join your network. • Review hub settings: Check how your Zigbee hub manages device pairing. • Control network availability: Only open the network when adding new devices and close it immediately after. • Use install codes and avoid the well-known key: Whenever possible, use unique install codes for added security. Replace default keys with secure, unique keys.

Relevant CWE: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 4.3 MEDIUM CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

CVE-2024-10106

A CWE-120: A buffer overflow vulnerability exists that could cause a denial of service when a malicious device joins the network.

View CVE Details


Affected Products

Schneider Electric Zigbee Products
Vendor:
Schneider Electric
Product Version:
Wiser iTRV2 All Versions, Wiser iTRV3 All Versions, Wiser RTR2 All Versions, Wiser UFH All Versions, Wiser 16A Electrical Heat Switch All Versions, Wiser Boiler Relay All Versions, Exxact cFMT 16a All Versions, Elko cFMT 16a All Versions, Odace cFMT 2a All Versions, Merten cFMT 16a All Versions, Merten cFMT 2a All Versions, Wiser Power Micromodule All Versions, Wiser FIP Micromodule All Versions, Iconic, Wiser Connected Smart Dimmer All Versions, Iconic, Wiser Connected Smart Switch, 2AX All Versions, Iconic, Wiser Connected Smart Switch, 10AX All Versions, Iconic, Connected AC Fan Controller All Versions, Iconic, Connected Smart Socket All Versions, Wiser Connected Application Module 1-Gang All Versions, Wiser Connected Application Module 2-Gang All Versions, Wiser Connected Push Button Dimmer All Versions, Wiser Connected Push Button Switch All Versions, Wiser Connected Push Button Shutter All Versions, Wiser Connected Motion Dimmer All Versions, Wiser Connected Motion Switch All Versions, Wiser Connected Rotary Dimmer All Versions, Connected Wireless Switch All Versions, Micromodule Switch All Versions, Micromodule Dimmer All Versions, Micromodule Shutter All Versions, Connected Single Socket Outlet All Versions, Connected Double Socket Outlet All Versions, Fuga Connected Socket Outlet All Versions, Mureva EV Link All Versions
Product Status:
known_affected
Remediations

Mitigation
Customers should immediately apply the following mitigations to reduce the risk of exploit: To keep your Zigbee network safe and prevent unauthorized access: • Restrict device access: Do not allow unknown devices to join your network. • Review hub settings: Check how your Zigbee hub manages device pairing. • Control network availability: Only open the network when adding new devices and close it immediately after. • Use install codes and avoid the well-known key: Whenever possible, use unique install codes for added security. Replace default keys with secure, unique keys.

Relevant CWE: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 3.7 LOW CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L

CVE-2024-7322

A CWE-400: Uncontrolled Resource Consumption vulnerability exists that could cause a denial of service when a malicious device joins the network.

View CVE Details


Affected Products

Schneider Electric Zigbee Products
Vendor:
Schneider Electric
Product Version:
Wiser iTRV2 All Versions, Wiser iTRV3 All Versions, Wiser RTR2 All Versions, Wiser UFH All Versions, Wiser 16A Electrical Heat Switch All Versions, Wiser Boiler Relay All Versions, Exxact cFMT 16a All Versions, Elko cFMT 16a All Versions, Odace cFMT 2a All Versions, Merten cFMT 16a All Versions, Merten cFMT 2a All Versions, Wiser Power Micromodule All Versions, Wiser FIP Micromodule All Versions, Iconic, Wiser Connected Smart Dimmer All Versions, Iconic, Wiser Connected Smart Switch, 2AX All Versions, Iconic, Wiser Connected Smart Switch, 10AX All Versions, Iconic, Connected AC Fan Controller All Versions, Iconic, Connected Smart Socket All Versions, Wiser Connected Application Module 1-Gang All Versions, Wiser Connected Application Module 2-Gang All Versions, Wiser Connected Push Button Dimmer All Versions, Wiser Connected Push Button Switch All Versions, Wiser Connected Push Button Shutter All Versions, Wiser Connected Motion Dimmer All Versions, Wiser Connected Motion Switch All Versions, Wiser Connected Rotary Dimmer All Versions, Connected Wireless Switch All Versions, Micromodule Switch All Versions, Micromodule Dimmer All Versions, Micromodule Shutter All Versions, Connected Single Socket Outlet All Versions, Connected Double Socket Outlet All Versions, Fuga Connected Socket Outlet All Versions, Mureva EV Link All Versions
Product Status:
known_affected
Remediations

Mitigation
Customers should immediately apply the following mitigations to reduce the risk of exploit: To keep your Zigbee network safe and prevent unauthorized access: • Restrict device access: Do not allow unknown devices to join your network. • Review hub settings: Check how your Zigbee hub manages device pairing. • Control network availability: Only open the network when adding new devices and close it immediately after. • Use install codes and avoid the well-known key: Whenever possible, use unique install codes for added security. Replace default keys with secure, unique keys.

Relevant CWE: CWE-400 Uncontrolled Resource Consumption


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 5.8 MEDIUM CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H

Acknowledgments

  • Schneider Electric CPCERT reported these vulnerabilities to CISA.
  • Silicon Labs reported these vulnerabilities to Schneider Electric

General Security Recommendations

We strongly recommend the following industry cybersecurity best practices. https://www.se.com/us/en/download/document/7EN52-0390/ * Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network. * Install physical controls so no unauthorized personnel can access your industrial control and safety systems, components, peripheral equipment, and networks. * Place all controllers in locked cabinets and never leave them in the “Program” mode. * Never connect programming software to any network other than the network intended for that device. * Scan all methods of mobile data exchange with the isolated network such as CDs, USB drives, etc. before use in the terminals or any node connected to these networks. * Never allow mobile devices that have connected to any other network besides the intended network to connect to the safety or control networks without proper sanitation. * Minimize network exposure for all control system devices and systems and ensure that they are not accessible from the Internet. * When remote access is required, use secure methods, such as Virtual Private Networks (VPNs). Recognize that VPNs may have vulnerabilities and should be updated to the most current version available. Also, understand that VPNs are only as secure as the connected devices. For more information refer to the Schneider Electric Recommended Cybersecurity Best Practices document.


For More Information

This document provides an overview of the identified vulnerability or vulnerabilities and actions required to mitigate. For more details and assistance on how to protect your installation, contact your local Schneider Electric representative or Schneider Electric Industrial Cybersecurity Services: https://www.se.com/ww/en/work/solutions/cybersecurity/. These organizations will be fully aware of this situation and can support you through the process. For further information related to cybersecurity in Schneider Electric’s products, visit the company’s cybersecurity support portal page: https://www.se.com/ww/en/work/support/cybersecurity/overview.jsp


LEGAL DISCLAIMER

THIS NOTIFICATION DOCUMENT, THE INFORMATION CONTAINED HEREIN, AND ANY MATERIALS LINKED FROM IT (COLLECTIVELY, THIS “NOTIFICATION”) ARE INTENDED TO HELP PROVIDE AN OVERVIEW OF THE IDENTIFIED SITUATION AND SUGGESTED MITIGATION ACTIONS, REMEDIATION, FIX, AND/OR GENERAL SECURITY RECOMMENDATIONS AND IS PROVIDED ON AN “AS-IS” BASIS WITHOUT WARRANTY OR GUARANTEE OF ANY KIND. SCHNEIDER ELECTRIC DISCLAIMS ALL WARRANTIES RELATING TO THIS NOTIFICATION, EITHER EXPRESS OR IMPLIED, INCLUDING WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. SCHNEIDER ELECTRIC MAKES NO WARRANTY THAT THE NOTIFICATION WILL RESOLVE THE IDENTIFIED SITUATION. IN NO EVENT SHALL SCHNEIDER ELECTRIC BE LIABLE FOR ANY DAMAGES OR LOSSES WHATSOEVER IN CONNECTION WITH THIS NOTIFICATION, INCLUDING DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF SCHNEIDER ELECTRIC HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. YOUR USE OF THIS NOTIFICATION IS AT YOUR OWN RISK, AND YOU ARE SOLELY LIABLE FOR ANY DAMAGES TO YOUR SYSTEMS OR ASSETS OR OTHER LOSSES THAT MAY RESULT FROM YOUR USE OF THIS NOTIFICATION. SCHNEIDER ELECTRIC RESERVES THE RIGHT TO UPDATE OR CHANGE THIS NOTIFICATION AT ANY TIME AND IN ITS SOLE DISCRETION


About Schneider Electric

At Schneider, we believe access to energy and digital is a basic human right. We empower all to do more with less, ensuring Life Is On everywhere, for everyone, at every moment. We provide energy and automation digital solutions for efficiency and sustainability. We combine world-leading energy technologies, real-time automation, software and services into integrated solutions for Homes, Buildings, Data Centers, Infrastructure and Industries. We are committed to unleash the infinite possibilities of an open, global, innovative community that is passionate with our Meaningful Purpose, Inclusive and Empowered values. www.se.com


Vulnerability Details

These vulnerabilities disclosed by Silicon Labs affect their Zigbee processors, which are used in multiple Schneider Electric's products.


Legal Notice and Terms of Use

This product is provided subject to this Notification (https://www.cisa.gov/notification) and this Privacy & Use policy (https://www.cisa.gov/privacy-policy).


Recommended Practices

CISA recommends users take defensive measures to minimize the exploitation risk of this vulnerability.

Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet.

Locate control system networks and remote devices behind firewalls and isolate them from business networks.

When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most recent version available. Also recognize VPN is only as secure as its connected devices.

CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets. Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.


Advisory Conversion Disclaimer

This ICSA is a verbatim republication of Schneider Electric CPCERT SEVD-2026-013-03 from a direct conversion of the vendor's Common Security Advisory Framework (CSAF) advisory. This is republished to CISA's website as a means of increasing visibility and is provided "as-is" for informational purposes only. CISA is not responsible for the editorial or technical accuracy of republished advisories and provides no warranties of any kind regarding any information contained within this advisory. Further, CISA does not endorse any commercial product or service. Please contact Schneider Electric CPCERT directly for any questions regarding this advisory.

Revision History

  • Initial Release Date: 2026-01-13
Date Revision Summary
2026-01-13 1 Original Release
2026-01-27 2 Initial Republication of Schneider Electric CPCERT SEVD-2026-013-03 advisory

Legal Notice and Terms of Use

CISA Cybersecurity Advisory , Tue, 27 Jan 26 12:00:00 +0000

View CSAF

Summary

Successful exploitation of this vulnerability could allow an attacker to perform unauthorized actions on the file system.

The following versions of iba Systems ibaPDA are affected:

  • ibaPDA (CVE-2025-14988)
CVSS Vendor Equipment Vulnerabilities
v3 9.8 iba Systems iba Systems ibaPDA Incorrect Permission Assignment for Critical Resource

Background

  • Critical Infrastructure Sectors: Critical Manufacturing
  • Countries/Areas Deployed: Worldwide
  • Company Headquarters Location: Germany

Vulnerabilities

Expand All +

CVE-2025-14988

A security issue has been identified in ibaPDA that could allow unauthorized actions on the file system under certain conditions. This may impact the confidentiality, integrity, or availability of the system.

View CVE Details


Affected Products

iba Systems ibaPDA
Vendor:
iba Systems
Product Version:
iba Systems ibaPDA: 8.12.0
Product Status:
known_affected
Remediations

Vendor fix
iba Systems recommends users update to ibaPDA v8.12.1 or a later version.

Mitigation
If Installing the update is not possible, iba Systems recommends users:

Mitigation
Enable User Management:To activate user management, navigate to User Management settings under the Configure option. Set a password for the admin user to enable user management.

Vendor fix
Configure Server Access:To configure, open Server Access Manager (found under Configure in the ibaPDA Client). Set the configuration to restrict access. For example, only 127.0.0.1 (localhost) or specific system IP addresses to communicate with ibaPDA can connect to the ibaPDA Server. (In this example, only connections from localhost are permitted to access ibaPDA.)

Vendor fix
Restrict Connections to Localhost (if ibaPDA is only accessed from the system where it runs):

Vendor fix
Go to I/O Manager, then General, and deactivate the option "Automatically open necessary ports in Windows Firewall." (If this option remains active, after a restart of ibaPDA or a restart for data acquisition, the firewall will be reconfigured automatically.)

Vendor fix
Then, go to Advanced Windows Firewall settings and delete or deactivate all incoming rules for the ibaPDA Client and Server.

Vendor fix
Manually create firewall rules for the connection used for ibaPDA and verify that the correct ports are configured. For assistance with identifying the ports used by the ibaPDA service can be found in the iba Help Center.

Vendor fix
Note: After making the changes, verify that all ibaPDA services are operating as expected and that the data acquisition is functioning correctly.

Relevant CWE: CWE-732 Incorrect Permission Assignment for Critical Resource


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 9.8 CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Acknowledgments

  • Siemens reported this vulnerability to CISA

Legal Notice and Terms of Use

This product is provided subject to this Notification (https://www.cisa.gov/notification) and this Privacy & Use policy (https://www.cisa.gov/privacy-policy).


Recommended Practices

CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability, such as:

Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the Internet.

Locate control system networks and remote devices behind firewalls and isolating them from business networks.

When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.

CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.

CISA also recommends users take the following measures to protect themselves from social engineering attacks:

Do not click web links or open attachments in unsolicited email messages.

Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams.

Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.

No known public exploitation specifically targeting this vulnerability has been reported to CISA at this time.


Revision History

  • Initial Release Date: 2026-01-27
Date Revision Summary
2026-01-27 1 Initial Publication

Legal Notice and Terms of Use

CISA Cybersecurity Advisory , Mon, 26 Jan 26 12:00:00 +0000

CISA has added five new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

  • CVE-2018-14634 Linux Kernel Integer Overflow Vulnerability
  • CVE-2025-52691 SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type Vulnerability
  • CVE-2026-21509 Microsoft Office Security Feature Bypass Vulnerability
  • CVE-2026-23760 SmarterTools SmarterMail Authentication Bypass Using an Alternate Path or Channel Vulnerability
  • CVE-2026-24061 GNU InetUtils Argument Injection Vulnerability

These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.

Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.

Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria

CISA Cybersecurity Advisory , Fri, 23 Jan 26 12:00:00 +0000

Executive Summary

In response to the June 6, 2025, Executive Order (EO) 14306, “Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity and Amending Executive Order 13694 and Executive Order 14144,” the Cybersecurity and Infrastructure Security Agency (CISA) is providing and regularly updating the below lists to aid in post-quantum cryptography (PQC) adoption. The lists include hardware and software categories with example types of widely available products that use PQC standards to protect sensitive information.1 The lists focus on categories of available products, typically acquired by the federal government, that utilize cryptographic algorithms. Because PQC-capable products are widely available in the listed categories, organizations should acquire only PQC-capable products when planning acquisitions and procuring products in these categories.  

Introduction

Purpose

The lists below are CISA’s response to Executive Order (EO) 14306, which instructed:

By December 1, 2025, the Secretary of Homeland Security, acting through the Director of the Cybersecurity and Infrastructure Security Agency (CISA), and in consultation with the Director of the National Security Agency, shall release and thereafter regularly update a list of product categories in which products that support post-quantum cryptography (PQC) are widely available.

When a particular category offers widely available PQC-capable products, organizations should plan acquisitions to procure only PQC-capable products from that category.

Scope and Definitions

The scope of the lists below includes categories of hardware and software products that are—or are anticipated to be—widely available and use PQC standards. 

Note: “Widely available” describes products that are generally available in the marketplace, and agencies can acquire them in accordance with their typical procurement policies and procedures.

The categories cover hardware and software products that apply PQC standards for encryption and authentication through the following cryptographic functions:

  • Key establishment:2 A function in the lifecycle of keying material; the process by which cryptographic keys are securely established among cryptographic modules using manual transport methods (e.g., key loaders), automated methods (e.g., key-transport and/or key-agreement protocols), or a combination of automated and manual methods (consisting of key transport plus key agreement).
  • Digital signatures:3 The result of a cryptographic transformation of data that, when properly implemented, provides the services of 1. origin authentication, 2. data integrity, and 3. signer non-repudiation. 

Key establishment is often essential for establishing confidential communication using encryption among two or more parties. Digital signatures are often essential for authenticating the parties participating in a communication and for establishing the authenticity of data, products, and services.

Automated cryptographic discovery and inventory products are out of scope of these lists.

Considerations for Products That Use PQC Standards

PQC Transition of Information Technology (IT) Infrastructure

Recognizing the global need to support PQC algorithms, product manufacturers are developing new products and updating existing products to incorporate post-quantum cryptographic standards. 

National Institute of Standards and Technology

In 2016, the National Institute of Standards and Technology (NIST) initiated a process to solicit, evaluate, and standardize one or more quantum-resistant public-key cryptographic algorithms. The ongoing PQC standardization process has produced PQC standards and will likely standardize additional algorithms in the coming years.

The NIST Internal Report (IR) 8547, Transition to Post-Quantum Cryptography Standards, describes NIST’s expected approach to transitioning from quantum-vulnerable cryptographic algorithms to post-quantum digital signature algorithms and key-establishment schemes. The report identifies existing quantum-vulnerable cryptographic standards and the current quantum-resistant standards that organizations will use in the transition. The report informs the efforts and timelines of federal agencies, industry, and standards organizations for transitioning products, services, and infrastructure to PQC. NIST will revise this report and feed into other algorithms- and application-specific guidance for the transition to PQC as necessary to support transition timelines.

Table 1 shows three NIST PQC standards along with a recommendation for stateful hash-based signature algorithms that support quantum-resistant standards.
 

Table 1: NIST Standard PQC Algorithms

Cryptographic Function

Algorithm Standard

Standard

Key Establishment Module-Lattice-Based Key- Encapsulation Mechanism (ML-KEM) Federal Information Processing Standards (FIPS) 203
Digital Signature Module-Lattice-Based Digital Signature Algorithm (ML-DSA) Federal Information Processing Standards (FIPS) 204
Digital Signature Stateless Hash-Based Digital Signature Algorithm (SLH-DSA) Federal Information Processing Standards (FIPS) 205
Digital Signature Stateful Hash-Based Digital Signature Algorithms: Leighton-Micali Signature Scheme (LMS), Hierarchical Merkle Signature Scheme (HMS), eXtended Merkle Signature Scheme (XMSS), eXtended Merkle Signature Scheme with Multi-Tree (XMSSMT) NISTSP 800-208

Product Lists

Table 2 details widely available categories with respective types of hardware and software products that use PQC standards to protect sensitive information well into the foreseeable future, including after the advent of a cryptographically relevant quantum computer (CRQC). Organizations building PQC migration plans can use these categories as a guide to assess future technological needs. Once a category is listed as having PQC-capable products widely available, organizations should plan acquisitions to procure only PQC-capable products in that category.4 

Table 3 does not list categories of PQC-capable products that are currently widely available; instead, it lists product categories where manufacturer implementation and testing of PQC capabilities are encouraged. It is important that the products listed in Table 3 implement PQC for core features and for all secondary functionality, such as for software updates. As the Table 3 product categories mature their capabilities and transition to PQC, CISA will move them from Table 3 to the list in Table 2.

Tables 2 and 3 consider efforts within the General Services Administration (GSA),5,6 CISA,7 NIST,8 and the National Security Agency (NSA)9.  Note: Tables 2 and 3 are not exhaustive lists; CISA will periodically update these tables as needed to cover new examples of widely available products that use PQC standards.

Table 2: Widely Available Hardware and Software Product Categories That Use PQC Standards

Product Category*

Example Product Type

Cloud Services Platform-as-a-service (PaaS), infrastructure-as-a-service (IaaS) 
Collaboration Software Chat/messaging
Web Software Web browsers, web servers
Endpoint Security10 Data at rest (DAR) security, full disk encryption

Most of these categories have implemented PQC for key encapsulation and key agreement but have not yet widely implemented PQC for digital signatures and authentication. As a result, these categories are not considered to be fully quantum resistant; CISA includes them on this list because one of their main security services is quantum resistant and Federal Civilian Executive Branch (FCEB) departments and agencies should procure them appropriately. 

Table 3: Hardware and Software Product Categories Transitioning to Use PQC Standards

Product Category

Example Product Type

Networking Hardware Proxy servers, routers, firewalls, switches, appliances
Networking Software Software-defined network (SDN), domain name service (DNS), network operating systems
Cloud Services Software-as-a-service (SaaS)
Telecommunications Hardware Desk phones, fax machine, voice over IP (VoIP), radio
Computers (Physical and Virtual) Operating systems, hypervisors, containers
Computer Peripherals Wireless keyboards, wireless headsets
Storage Area Network Appliances, operating systems, applications
Identity, Credential, and Access Management (ICAM) Software Identity management systems, identity provider and federation services, certificate authorities, access brokers, access management software, public key infrastructure (PKI) management software 
Identity, Credential, and Access Management (ICAM) Hardware Hardware security modules (HSM), authentication tokens, badges/cards, badge/card readers
Collaboration Software Email clients, email servers, conferencing, file sharing
Data Database, Structured Query Language (SQL) server 
Endpoint Security Password managers, antivirus/anti-malware software, asset management
Enterprise Security Continuous diagnostics and mitigation (CDM) tools, intrusion detection/monitoring, inspection systems, security information, and event monitoring (SIEM)

Note: The above lists exclude categories of hardware and software products, such as operational technology (OT) and internet of things (IoT) devices, that are not considered traditional IT products. These also should be transitioning to PQC standards as well but are out of scope for these lists.

Notes 

  1. Per EO 14306, “the Secretary of Homeland Security, acting through the Director of the Cybersecurity and Infrastructure Security Agency (CISA), and in consultation with the Director of the National Security Agency, shall release and thereafter regularly update a list of product categories in which products that support post-quantum cryptography (PQC) are widely available.”
  2. https://csrc.nist.rip/glossary/term/key_establishment
  3. https://csrc.nist.rip/glossary/term/digital_signature
  4. Even once a product that supports PQC standards is procured, it may need to use non-PQC algorithms for a time for interoperability reasons.
  5. https://buy.gsa.gov/api/system/files/documents/final-508c-pqc_buyer-s_guide_2025.pdf
  6. https://www.gsa.gov/technology/it-contract-vehicles-and-purchasing-programs/multiple-award-schedule-it
  7. https://www.cisa.gov/sites/default/files/cdm_files/HWAMInitializationGuide.pdf
  8. https://www.nist.gov/itl/executive-order-improving-nations-cybersecurity/critical-software-definition-explanatory
  9. https://www.niap-ccevs.org/products
  10. The principal security service of the Endpoint Security category is not naturally quantum vulnerable. When procuring, one needs to ensure that other relevant features of the product, such as firmware updates, are utilizing post-quantum cryptography (PQC).

 

Please share your thoughts!

We welcome your feedback. 

CISA Product Survey

CISA Cybersecurity Advisory , Fri, 23 Jan 26 12:00:00 +0000

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. 

  • CVE-2024-37079 Broadcom VMware vCenter Server Out-of-bounds Write Vulnerability 

This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise. 

Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information. 

Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria

CISA Cybersecurity Advisory , Thu, 22 Jan 26 12:00:00 +0000

View CSAF

Summary

Successful exploitation of this vulnerability could enable an attacker to execute arbitrary code.

The following versions of Delta Electronics DIAView are affected:

  • DIAView (CVE-2026-0975)
CVSS Vendor Equipment Vulnerabilities
v3 7.8 Delta Electronics Delta Electronics DIAView Improper Neutralization of Special Elements used in a Command ('Command Injection')

Background

  • Critical Infrastructure Sectors: Chemical, Commercial Facilities, Critical Manufacturing, Energy, Transportation Systems, Water and Wastewater
  • Countries/Areas Deployed: Worldwide
  • Company Headquarters Location: Taiwan

Vulnerabilities

Expand All +

CVE-2026-0975

DIAView functions can execute shell commands within a project script. If an attacker tricks the victim into running a project containing a malicious script, then arbitrary code can be executed when the malicious project starts.

View CVE Details


Affected Products

Delta Electronics DIAView
Vendor:
Delta Electronics
Product Version:
Delta Electronics DIAView: 4.2.0
Product Status:
known_affected
Remediations

Vendor fix
Delta Electronics recommends users update to DIAView v4.4 or later.

Mitigation
For more information, see Delta Electronics advisory Delta-PCSA-2026-00002.

Mitigation
Delta Electronics offers users the following general recommendations:

Mitigation
Do not click on untrusted Internet links or open unsolicited attachments in emails.

Mitigation
Avoid exposing control systems and equipment to the Internet.

Mitigation
Place control system networks and remote devices behind firewalls, and isolate them from the business network.

Mitigation
When remote access is required, use a secure access method, such as a virtual private network (VPN).

Mitigation
If you have any product-related support concerns, contact Delta via the portal page for any information or materials you may require.

Relevant CWE: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.8 HIGH CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Acknowledgments

  • An anonymous researcher at Trend Zero Day Initiative reported this vulnerability to CISA

Legal Notice and Terms of Use

This product is provided subject to this Notification (https://www.cisa.gov/notification) and this Privacy & Use policy (https://www.cisa.gov/privacy-policy).


Recommended Practices

CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability. CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.

No known public exploitation specifically targeting this vulnerability has been reported to CISA at this time. This vulnerability is not exploitable remotely.


Revision History

  • Initial Release Date: 2026-01-22
Date Revision Summary
2026-01-22 1 Initial Publication

Legal Notice and Terms of Use

CISA Cybersecurity Advisory , Thu, 22 Jan 26 12:00:00 +0000

View CSAF

Summary

Successful exploitation of this vulnerability could allow an authenticated attacker to escalate their privileges and control devices outside of their authorized scope.

The following versions of Hubitat Elevation Hubs are affected:

  • Elevation C3 (CVE-2026-1201)
  • Elevation C4 (CVE-2026-1201)
  • Elevation C5 (CVE-2026-1201)
  • Elevation C7 (CVE-2026-1201)
  • Elevation C8 (CVE-2026-1201)
  • Elevation C8 pro (CVE-2026-1201)
CVSS Vendor Equipment Vulnerabilities
v3 9.1 Hubitat Hubitat Elevation Hubs Authorization Bypass Through User-Controlled Key

Background

  • Critical Infrastructure Sectors: Energy, Communications
  • Countries/Areas Deployed: Worldwide
  • Company Headquarters Location: United States

Vulnerabilities

Expand All +

CVE-2026-1201

An Authorization Bypass Through User-Controlled Key vulnerability in Hubitat Elevation home automation controllers prior to version 2.4.2.157 could allow a remote authenticated user to control connected devices outside of their authorized scope via client-side request manipulation.

View CVE Details


Affected Products

Hubitat Elevation Hubs
Vendor:
Hubitat
Product Version:
Hubitat Elevation C3: <firmware_2.4.2.157, Hubitat Elevation C4: <firmware_2.4.2.157, Hubitat Elevation C5: <firmware_2.4.2.157, Hubitat Elevation C7: <firmware_2.4.2.157, Hubitat Elevation C8: <firmware_2.4.2.157, Hubitat Elevation C8 pro: <firmware_2.4.2.157
Product Status:
known_affected
Remediations

Mitigation
Hubitat has released the following for users to implement:

Mitigation
Firmware version 2.4.2.157

Relevant CWE: CWE-639 Authorization Bypass Through User-Controlled Key


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 9.1 CRITICAL CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Acknowledgments

  • Aaron 'theHastyOne' Hasty of Ostrich Lab reported this vulnerability to CISA

Legal Notice and Terms of Use

This product is provided subject to this Notification (https://www.cisa.gov/notification) and this Privacy & Use policy (https://www.cisa.gov/privacy-policy).


Recommended Practices

CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability, such as:

Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.

Locate control system networks and remote devices behind firewalls and isolating them from business networks.

When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.

CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.

CISA also recommends users take the following measures to protect themselves from social engineering attacks:

Do not click web links or open attachments in unsolicited email messages.

Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams.

Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.

No known public exploitation specifically targeting this vulnerability has been reported to CISA at this time.


Revision History

  • Initial Release Date: 2026-01-22
Date Revision Summary
2026-01-22 1 Initial Publication

Legal Notice and Terms of Use

CISA Cybersecurity Advisory , Thu, 22 Jan 26 12:00:00 +0000

CISA has added four new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

  • CVE-2025-31125 Vite Vitejs Improper Access Control Vulnerability
  • CVE-2025-34026 Versa Concerto Improper Authentication Vulnerability
  • CVE-2025-54313 Prettier eslint-config-prettier Embedded Malicious Code Vulnerability
  • CVE-2025-68645 Synacor Zimbra Collaboration Suite (ZCS) PHP Remote File Inclusion Vulnerability

These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.

Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the KEV Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.

Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of KEV Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.

CISA Cybersecurity Advisory , Thu, 22 Jan 26 12:00:00 +0000

View CSAF

Summary

Successful exploitation of these vulnerabilities could lead to degraded service, a denial-of-service, or unauthorized remote command execution, which could lead to spoofing or a manipulation of charging station statuses.

The following versions of EVMAPA are affected:

  • EVMAPA (CVE-2025-54816, CVE-2025-53968, CVE-2025-55705)
CVSS Vendor Equipment Vulnerabilities
v3 9.4 EVMAPA EVMAPA Missing Authentication for Critical Function, Improper Restriction of Excessive Authentication Attempts, Insufficient Session Expiration

Background

  • Critical Infrastructure Sectors: Transportation Systems
  • Countries/Areas Deployed: Czechia, Slovakia
  • Company Headquarters Location: Czechia

Vulnerabilities

Expand All +

CVE-2025-54816

This vulnerability occurs when a WebSocket endpoint does not enforce proper authentication mechanisms, allowing unauthorized users to establish connections. As a result, attackers can exploit this weakness to gain unauthorized access to sensitive data or perform unauthorized actions. Given that no authentication is required, this can lead to privilege escalation and potentially compromise the security of the entire system.

View CVE Details


Affected Products

EVMAPA
Vendor:
EVMAPA
Product Version:
EVMAPA EVMAPA: vers:all/*
Product Status:
known_affected
Remediations

Vendor fix
CVE-2025-54816: EVMAPA informed CISA some of their charging stations do not allow changes to the authorization key using the Open Charge Point Protocol (OCPP). Currently, charge point operators have the option to connect stations using WebSocket Secure (WSS), and EVMAPA connects stations they supply via their own VPN. For OCPP 2.x and newer stations, EVMAPA plans to implement BASIC authorization control.

Relevant CWE: CWE-306 Missing Authentication for Critical Function


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 9.4 CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L

CVE-2025-53968

This vulnerability arises because there are no limitations on the number of authentication attempts a user can make. An attacker can exploit this weakness by continuously sending authentication requests, leading to a denial-of-service (DoS) condition. This can overwhelm the authentication system, rendering it unavailable to legitimate users and potentially causing service disruption. This can also allow attackers to conduct brute-force attacks to gain unauthorized access.

View CVE Details


Affected Products

EVMAPA
Vendor:
EVMAPA
Product Version:
EVMAPA EVMAPA: vers:all/*
Product Status:
known_affected
Remediations

Vendor fix
CVE-2025-53968: EVMAPA did not release a statement regarding this vulnerability. Contact EVMAPA directly for more information.

Relevant CWE: CWE-307 Improper Restriction of Excessive Authentication Attempts


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.5 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2025-55705

This vulnerability occurs when the system permits multiple simultaneous connections to the backend using the same charging station ID. This can result in unauthorized access, data inconsistency, or potential manipulation of charging sessions. The lack of proper session management and expiration control allows attackers to exploit this weakness by reusing valid charging station IDs to establish multiple sessions concurrently.

View CVE Details


Affected Products

EVMAPA
Vendor:
EVMAPA
Product Version:
EVMAPA EVMAPA: vers:all/*
Product Status:
known_affected
Remediations

Vendor fix
CVE-2025-55705: EVMAPA informed CISA they have resolved this issue and do not allow simultaneous connection of charging stations with the same CBID.

Relevant CWE: CWE-613 Insufficient Session Expiration


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.3 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Acknowledgments

  • Khaled Sarieddine reported these vulnerabilities to CISA
  • Mohammad Ali Sayed reported these vulnerabilities to CISA

Legal Notice and Terms of Use

This product is provided subject to this Notification (https://www.cisa.gov/notification) and this Privacy & Use policy (https://www.cisa.gov/privacy-policy).


Recommended Practices

CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities, such as:

Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the Internet.

Locate control system networks and remote devices behind firewalls and isolating them from business networks.

When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.

CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.

No known public exploitation specifically targeting these vulnerabilities has been reported to CISA at this time.


Revision History

  • Initial Release Date: 2026-01-22
Date Revision Summary
2026-01-22 1 Initial Publication

Legal Notice and Terms of Use

CISA Cybersecurity Advisory , Thu, 22 Jan 26 12:00:00 +0000

View CSAF

Summary

Successful exploitation of this vulnerability could allow an attacker to cause a failure within the operating system of the machine hosting the ICU tool.

The following versions of Johnson Controls Inc. iSTAR Configuration Utility (ICU) tool are affected:

  • iSTAR Configuration Utility (ICU) tool (CVE-2025-26386)
CVSS Vendor Equipment Vulnerabilities
v3 7.1 Johnson Controls Inc. Johnson Controls Inc. iSTAR Configuration Utility (ICU) tool Stack-based Buffer Overflow

Background

  • Critical Infrastructure Sectors: Commercial Facilities, Critical Manufacturing, Energy, Government Services and Facilities, Transportation Systems
  • Countries/Areas Deployed: Worldwide
  • Company Headquarters Location: Ireland

Vulnerabilities

Expand All +

CVE-2025-26386

Under certain circumstances, a successful exploitation of this vulnerability could result in failure within the operating system of the machine hosting the ICU tool.

View CVE Details


Affected Products

Johnson Controls Inc. iSTAR Configuration Utility (ICU) tool
Vendor:
Johnson Controls Inc.
Product Version:
Johnson Controls Inc. iSTAR Configuration Utility (ICU) tool: <=6.9.7
Product Status:
known_affected
Remediations

Mitigation
Johnson Controls Inc. recommends the following:

Vendor fix
Update the iSTAR Configuration Utility (ICU) tool to version 6.9.8

Mitigation
For more detailed mitigation instructions, please see Johnson Controls Product Security Advisory JCI-PSA-2025-08 v1 at the following location: https://www.johnsoncontrols.com/trust-center/cybersecurity/security-advisories

Relevant CWE: CWE-121 Stack-based Buffer Overflow


Metrics

CVSS Version Base Score Base Severity Vector String
3.1 7.1 HIGH CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H

Acknowledgments

  • Tenable reported this vulnerability to CISA

Legal Notice and Terms of Use

This product is provided subject to this Notification (https://www.cisa.gov/notification) and this Privacy & Use policy (https://www.cisa.gov/privacy-policy).


Recommended Practices

CISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability, such as:

Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.

Locate control system networks and remote devices behind firewalls and isolating them from business networks.

When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.

CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.

CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.

Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.

Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.

CISA also recommends users take the following measures to protect themselves from social engineering attacks:

Do not click web links or open attachments in unsolicited email messages.

Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams.

Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.

No known public exploitation specifically targeting this vulnerability has been reported to CISA at this time.


Revision History

  • Initial Release Date: 2026-01-22
Date Revision Summary
2026-01-22 1 Initial Publication

Legal Notice and Terms of Use

BioThreat Corporation