Umg 509
by Janitza
CVEs (7)
| CVE | Sev | Risk | CVSS | EPSS | KEV | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2015-3973 | 0.00 | — | 0.01 | Oct 28, 2015 | Janitza UMG 508, 509, 511, 604, and 605 devices improperly generate session tokens, which makes it easier for remote attackers to determine a PIN value via unspecified computations on session-token values. | ||
| CVE-2015-3972 | 0.00 | — | 0.01 | Oct 28, 2015 | The web interface on Janitza UMG 508, 509, 511, 604, and 605 devices supports only short PIN values for authentication, which makes it easier for remote attackers to obtain access via a brute-force attack. | ||
| CVE-2015-3971 | 0.00 | — | 0.00 | Oct 28, 2015 | The debug interface on Janitza UMG 508, 509, 511, 604, and 605 devices does not require authentication, which allows remote attackers to read or write to files, or execute arbitrary JASIC code, via a session on TCP port 1239. | ||
| CVE-2015-3970 | 0.00 | — | 0.01 | Oct 28, 2015 | Multiple cross-site scripting (XSS) vulnerabilities in the web interface on Janitza UMG 508, 509, 511, 604, and 605 devices allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. | ||
| CVE-2015-3969 | 0.00 | — | 0.00 | Oct 28, 2015 | Janitza UMG 508, 509, 511, 604, and 605 devices allow remote attackers to obtain sensitive network-connection information via a request to UDP port (1) 1234 or (2) 1235. | ||
| CVE-2015-3968 | 0.00 | — | 0.00 | Oct 28, 2015 | The FTP service on Janitza UMG 508, 509, 511, 604, and 605 devices has a default password, which makes it easier for remote attackers to read or write to files via a session on TCP port 21. | ||
| CVE-2015-3967 | 0.00 | — | 0.00 | Oct 28, 2015 | Cross-site request forgery (CSRF) vulnerability on Janitza UMG 508, 509, 511, 604, and 605 devices allows remote attackers to hijack the authentication of arbitrary users. |
- CVE-2015-3973Oct 28, 2015risk 0.00cvss —epss 0.01
Janitza UMG 508, 509, 511, 604, and 605 devices improperly generate session tokens, which makes it easier for remote attackers to determine a PIN value via unspecified computations on session-token values.
- CVE-2015-3972Oct 28, 2015risk 0.00cvss —epss 0.01
The web interface on Janitza UMG 508, 509, 511, 604, and 605 devices supports only short PIN values for authentication, which makes it easier for remote attackers to obtain access via a brute-force attack.
- CVE-2015-3971Oct 28, 2015risk 0.00cvss —epss 0.00
The debug interface on Janitza UMG 508, 509, 511, 604, and 605 devices does not require authentication, which allows remote attackers to read or write to files, or execute arbitrary JASIC code, via a session on TCP port 1239.
- CVE-2015-3970Oct 28, 2015risk 0.00cvss —epss 0.01
Multiple cross-site scripting (XSS) vulnerabilities in the web interface on Janitza UMG 508, 509, 511, 604, and 605 devices allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
- CVE-2015-3969Oct 28, 2015risk 0.00cvss —epss 0.00
Janitza UMG 508, 509, 511, 604, and 605 devices allow remote attackers to obtain sensitive network-connection information via a request to UDP port (1) 1234 or (2) 1235.
- CVE-2015-3968Oct 28, 2015risk 0.00cvss —epss 0.00
The FTP service on Janitza UMG 508, 509, 511, 604, and 605 devices has a default password, which makes it easier for remote attackers to read or write to files via a session on TCP port 21.
- CVE-2015-3967Oct 28, 2015risk 0.00cvss —epss 0.00
Cross-site request forgery (CSRF) vulnerability on Janitza UMG 508, 509, 511, 604, and 605 devices allows remote attackers to hijack the authentication of arbitrary users.