PowerPanel
by Cyberpower
CVEs (9)
| CVE | Vendor / Product | Sev | Risk | CVSS | EPSS | KEV | Published | Description |
|---|---|---|---|---|---|---|---|---|
| CVE-2024-33615 | Hig | 0.57 | 8.8 | 0.01 | May 15, 2024 | A specially crafted Zip file containing path traversal characters can be imported to the CyberPower PowerPanel server, which allows file writing to the server outside the intended scope, and could allow an attacker to achieve remote code execution. | ||
| CVE-2024-31409 | 0.00 | — | 0.00 | May 15, 2024 | Certain MQTT wildcards are not blocked on the CyberPower PowerPanel system, which might result in an attacker obtaining data from throughout the system after gaining access to any device. | |||
| CVE-2024-31410 | 0.00 | — | 0.00 | May 15, 2024 | The devices which CyberPower PowerPanel manages use identical certificates based on a hard-coded cryptographic key. This can allow an attacker to impersonate any client in the system and send malicious data. | |||
| CVE-2024-31856 | 0.00 | — | 0.00 | May 15, 2024 | An attacker with certain MQTT permissions can create malicious messages to all CyberPower PowerPanel devices. This could result in an attacker injecting SQL syntax, writing arbitrary files to the system, and executing remote code. | |||
| CVE-2024-32042 | 0.00 | — | 0.00 | May 15, 2024 | The key used to encrypt passwords stored in the database can be found in the CyberPower PowerPanel application code, allowing the passwords to be recovered. | |||
| CVE-2024-32047 | 0.00 | — | 0.00 | May 15, 2024 | Hard-coded credentials for the CyberPower PowerPanel test server can be found in the production code. This might result in an attacker gaining access to the testing or production server. | |||
| CVE-2024-32053 | 0.00 | — | 0.00 | May 15, 2024 | Hard-coded credentials are used by the CyberPower PowerPanel platform to authenticate to the database, other services, and the cloud. This could result in an attacker gaining access to services with the privileges of a Powerpanel business application. | |||
| CVE-2024-33625 | 0.00 | — | 0.00 | May 15, 2024 | CyberPower PowerPanel business application code contains a hard-coded JWT signing key. This could result in an attacker forging JWT tokens to bypass authentication. | |||
| CVE-2024-34025 | 0.00 | — | 0.00 | May 15, 2024 | CyberPower PowerPanel business application code contains a hard-coded set of authentication credentials. This could result in an attacker bypassing authentication and gaining administrator privileges. |
- risk 0.57cvss 8.8epss 0.01
A specially crafted Zip file containing path traversal characters can be imported to the CyberPower PowerPanel server, which allows file writing to the server outside the intended scope, and could allow an attacker to achieve remote code execution.
- CVE-2024-31409May 15, 2024risk 0.00cvss —epss 0.00
Certain MQTT wildcards are not blocked on the CyberPower PowerPanel system, which might result in an attacker obtaining data from throughout the system after gaining access to any device.
- CVE-2024-31410May 15, 2024risk 0.00cvss —epss 0.00
The devices which CyberPower PowerPanel manages use identical certificates based on a hard-coded cryptographic key. This can allow an attacker to impersonate any client in the system and send malicious data.
- CVE-2024-31856May 15, 2024risk 0.00cvss —epss 0.00
An attacker with certain MQTT permissions can create malicious messages to all CyberPower PowerPanel devices. This could result in an attacker injecting SQL syntax, writing arbitrary files to the system, and executing remote code.
- CVE-2024-32042May 15, 2024risk 0.00cvss —epss 0.00
The key used to encrypt passwords stored in the database can be found in the CyberPower PowerPanel application code, allowing the passwords to be recovered.
- CVE-2024-32047May 15, 2024risk 0.00cvss —epss 0.00
Hard-coded credentials for the CyberPower PowerPanel test server can be found in the production code. This might result in an attacker gaining access to the testing or production server.
- CVE-2024-32053May 15, 2024risk 0.00cvss —epss 0.00
Hard-coded credentials are used by the CyberPower PowerPanel platform to authenticate to the database, other services, and the cloud. This could result in an attacker gaining access to services with the privileges of a Powerpanel business application.
- CVE-2024-33625May 15, 2024risk 0.00cvss —epss 0.00
CyberPower PowerPanel business application code contains a hard-coded JWT signing key. This could result in an attacker forging JWT tokens to bypass authentication.
- CVE-2024-34025May 15, 2024risk 0.00cvss —epss 0.00
CyberPower PowerPanel business application code contains a hard-coded set of authentication credentials. This could result in an attacker bypassing authentication and gaining administrator privileges.