VYPR

PE6208

by Aten

CVEs (9)

  • CVE-2023-43850May 28, 2024
    risk 0.00cvss epss 0.01

    Improper input validation in the user management function of web interface in Aten PE6208 2.3.228 and 2.4.232 allows remote authenticated users to cause a partial DoS of web interface via HTTP POST request.

  • CVE-2023-43849May 28, 2024
    risk 0.00cvss epss 0.01

    Incorrect access control in firmware upgrade function of web interface in Aten PE6208 2.3.228 and 2.4.232 allows remote authenticated users to submit a firmware image via HTTP POST requests. This may result in DoS or remote code execution.

  • CVE-2023-43848May 28, 2024
    risk 0.00cvss epss 0.01

    Incorrect access control in the firewall management function of web interface in Aten PE6208 2.3.228 and 2.4.232 allows remote authenticated users to alter local firewall settings of the device as if they were the administrator via HTTP POST request.

  • CVE-2023-43847May 28, 2024
    risk 0.00cvss epss 0.01

    Incorrect access control in the outlet control function of web interface in Aten PE6208 2.3.228 and 2.4.232 allows remote authenticated users to control all the outlets as if they were the administrator via HTTP POST requests.

  • CVE-2023-43846May 28, 2024
    risk 0.00cvss epss 0.00

    Incorrect access control in logs management function of web interface in Aten PE6208 2.3.228 and 2.4.232 allows remote attackers to get the device logs via HTTP GET request. The logs contain such information as user names and IP addresses used in the infrastructure. This information may help the attackers to conduct further attacks in the infrastructure.

  • CVE-2023-43845May 28, 2024
    risk 0.00cvss epss 0.00

    Aten PE6208 2.3.228 and 2.4.232 have default credentials for the privileged telnet account. The user is not asked to change the credentials after first login. If not changed, attackers can log in to the telnet console and gain administrator privileges.

  • CVE-2023-43844May 28, 2024
    risk 0.00cvss epss 0.00

    Aten PE6208 2.3.228 and 2.4.232 have default credentials for the privileged web interface account. The user is not asked to change the credentials after first login. If not changed, attackers can log in to the web interface and gain administrator privileges.

  • CVE-2023-43843May 28, 2024
    risk 0.00cvss epss 0.01

    Incorrect access control in the account management function of web interface in Aten PE6208 2.3.228 and 2.4.232 allows remote authenticated users to read user and administrator accounts passwords via HTTP GET request.

  • CVE-2023-43842May 28, 2024
    risk 0.00cvss epss 0.01

    Incorrect access control in the account management function of web interface in Aten PE6208 2.3.228 and 2.4.232 allows remote authenticated users to alter user and administrator accounts credentials via HTTP POST request.