The affected Bachmann Electronic M-Base Controllers of version MSYS v1.06.14 and later use weak cryptography to protect device passwords. Affected controllers that are actively supported include MX207, MX213, MX220, MC206, MC212, MC220, and MH230 hardware controllers, and affected end-of-life controller include MC205, MC210, MH212, ME203, CS200, MP213, MP226, MPC240, MPC265, MPC270, MPC293, MPE270, and CPC210 hardware controllers. Security Level 0 is set at default from the manufacturer, which could allow an unauthenticated remote attacker to gain access to the password hashes. Security Level 4 is susceptible if an authenticated remote attacker or an unauthenticated person with physical access to the device reads and decrypts the password to conduct further attacks.
Category Archives: Advisories
CVE-2020-16235
Inadequate encryption may allow the credentials used by Emerson OpenEnterprise, up through version 3.3.5, to access field devices and external systems to be obtained.
libarchive-3.5.3-2.fc36
FEDORA-2022-bbb5ec21b2
Packages in this update:
libarchive-3.5.3-2.fc36
Update description:
Fix for CVE-2022-26280
CVE-2020-4970
IBM Security Identity Governance and Intelligence 5.2.4, 5.2.5, and 5.2.6 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 192429.
CVE-2021-26630
Improper input validation vulnerability in HANDY Groupware’s ActiveX moudle allows attackers to download or execute arbitrary files. This vulnerability can be exploited by using the file download or execution path as the parameter value of the vulnerable function.
CVE-2021-26631
Improper input validation vulnerability in Mangboard commerce package could lead to occur for abnormal request. A remote attacker can exploit this vulnerability to manipulate the total order amount into a negative number and then pay for the order.
rubygem-git-1.11.0-1.fc34
FEDORA-2022-353e1cf8b6
Packages in this update:
rubygem-git-1.11.0-1.fc34
Update description:
Security fix for CVE-2022-25648
rubygem-git-1.11.0-1.fc36
FEDORA-2022-1aa40056fc
Packages in this update:
rubygem-git-1.11.0-1.fc36
Update description:
Security fix for CVE-2022-25648
rubygem-git-1.11.0-1.fc35
FEDORA-2022-f09e0d8b0e
Packages in this update:
rubygem-git-1.11.0-1.fc35
Update description:
Security fix for CVE-2022-25648
USN-5424-2: OpenLDAP vulnerability
USN-5424-1 fixed a vulnerability in OpenLDAP. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.
Original advisory details:
It was discovered that OpenLDAP incorrectly handled certain SQL statements
within LDAP queries in the experimental back-sql backend. A remote attacker
could possibly use this issue to perform an SQL injection attack and alter
the database.