Product:

Iboot\-Pdu4\-N20_firmware

(Dataprobe)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 18
Date Id Summary Products Score Patch Annotated
2023-05-22 CVE-2022-46738 The affected product exposes multiple sensitive data fields of the affected product. An attacker can use the SNMP command to get device mac address and login as admin. Iboot\-Pdu4\-C20_firmware, Iboot\-Pdu4\-N20_firmware, Iboot\-Pdu4a\-C10_firmware, Iboot\-Pdu4a\-C20_firmware, Iboot\-Pdu4a\-N15_firmware, Iboot\-Pdu4a\-N20_firmware, Iboot\-Pdu4sa\-C10_firmware, Iboot\-Pdu4sa\-C20_firmware, Iboot\-Pdu4sa\-N15_firmware, Iboot\-Pdu4sa\-N20_firmware, Iboot\-Pdu8a\-2c10_firmware, Iboot\-Pdu8a\-2c20_firmware, Iboot\-Pdu8a\-2n15_firmware, Iboot\-Pdu8a\-2n20_firmware, Iboot\-Pdu8a\-C10_firmware, Iboot\-Pdu8a\-C20_firmware, Iboot\-Pdu8a\-N15_firmware, Iboot\-Pdu8a\-N20_firmware, Iboot\-Pdu8sa\-2n15_firmware, Iboot\-Pdu8sa\-C10_firmware, Iboot\-Pdu8sa\-N15_firmware, Iboot\-Pdu8sa\-N20_firmware 9.8
2023-05-22 CVE-2022-46658 The affected product is vulnerable to a stack-based buffer overflow which could lead to a denial of service or remote code execution. Iboot\-Pdu4\-C20_firmware, Iboot\-Pdu4\-N20_firmware, Iboot\-Pdu4a\-C10_firmware, Iboot\-Pdu4a\-C20_firmware, Iboot\-Pdu4a\-N15_firmware, Iboot\-Pdu4a\-N20_firmware, Iboot\-Pdu4sa\-C10_firmware, Iboot\-Pdu4sa\-C20_firmware, Iboot\-Pdu4sa\-N15_firmware, Iboot\-Pdu4sa\-N20_firmware, Iboot\-Pdu8a\-2c10_firmware, Iboot\-Pdu8a\-2c20_firmware, Iboot\-Pdu8a\-2n15_firmware, Iboot\-Pdu8a\-2n20_firmware, Iboot\-Pdu8a\-C10_firmware, Iboot\-Pdu8a\-C20_firmware, Iboot\-Pdu8a\-N15_firmware, Iboot\-Pdu8a\-N20_firmware, Iboot\-Pdu8sa\-2n15_firmware, Iboot\-Pdu8sa\-C10_firmware, Iboot\-Pdu8sa\-N15_firmware, Iboot\-Pdu8sa\-N20_firmware 9.8
2023-08-14 CVE-2023-3259 The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier is vulnerable to authentication bypass. By manipulating the IP address field in the "iBootPduSiteAuth" cookie, a malicious agent can direct the device to connect to a rouge database.Successful exploitation allows the malicious agent to take actions with administrator privileges including, but not limited to, manipulating power levels, modifying user accounts, and exporting confidential user information Iboot\-Pdu4\-C20_firmware, Iboot\-Pdu4\-N20_firmware, Iboot\-Pdu4a\-C10_firmware, Iboot\-Pdu4a\-C20_firmware, Iboot\-Pdu4a\-N15_firmware, Iboot\-Pdu4a\-N20_firmware, Iboot\-Pdu4sa\-C10_firmware, Iboot\-Pdu4sa\-C20_firmware, Iboot\-Pdu4sa\-N15_firmware, Iboot\-Pdu4sa\-N20_firmware, Iboot\-Pdu8a\-2c10_firmware, Iboot\-Pdu8a\-2c20_firmware, Iboot\-Pdu8a\-2n15_firmware, Iboot\-Pdu8a\-2n20_firmware, Iboot\-Pdu8a\-C10_firmware, Iboot\-Pdu8a\-C20_firmware, Iboot\-Pdu8a\-N15_firmware, Iboot\-Pdu8a\-N20_firmware, Iboot\-Pdu8sa\-2n15_firmware, Iboot\-Pdu8sa\-C10_firmware, Iboot\-Pdu8sa\-N15_firmware, Iboot\-Pdu8sa\-N20_firmware 9.8
2023-08-14 CVE-2023-3260 The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier is vulnerable to command injection via the `user-name` URL parameter. An authenticated malicious agent can exploit this vulnerability to execute arbitrary command on the underlying Linux operating system. Powerpanel_server, Iboot\-Pdu4\-C20_firmware, Iboot\-Pdu4\-N20_firmware, Iboot\-Pdu4a\-C10_firmware, Iboot\-Pdu4a\-C20_firmware, Iboot\-Pdu4a\-N15_firmware, Iboot\-Pdu4a\-N20_firmware, Iboot\-Pdu4sa\-C10_firmware, Iboot\-Pdu4sa\-C20_firmware, Iboot\-Pdu4sa\-N15_firmware, Iboot\-Pdu4sa\-N20_firmware, Iboot\-Pdu8a\-2c10_firmware, Iboot\-Pdu8a\-2c20_firmware, Iboot\-Pdu8a\-2n15_firmware, Iboot\-Pdu8a\-2n20_firmware, Iboot\-Pdu8a\-C10_firmware, Iboot\-Pdu8a\-C20_firmware, Iboot\-Pdu8a\-N15_firmware, Iboot\-Pdu8a\-N20_firmware, Iboot\-Pdu8sa\-2n15_firmware, Iboot\-Pdu8sa\-C10_firmware, Iboot\-Pdu8sa\-N15_firmware, Iboot\-Pdu8sa\-N20_firmware 8.8
2023-08-14 CVE-2023-3261 The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier contains a buffer overflow vulnerability in the librta.so.0.0.0 library.Successful exploitation could cause denial of service or unexpected behavior with respect to all interactions relying on the targeted vulnerable binary, including the ability to log in via the web server. Powerpanel_server, Iboot\-Pdu4\-C20_firmware, Iboot\-Pdu4\-N20_firmware, Iboot\-Pdu4a\-C10_firmware, Iboot\-Pdu4a\-C20_firmware, Iboot\-Pdu4a\-N15_firmware, Iboot\-Pdu4a\-N20_firmware, Iboot\-Pdu4sa\-C10_firmware, Iboot\-Pdu4sa\-C20_firmware, Iboot\-Pdu4sa\-N15_firmware, Iboot\-Pdu4sa\-N20_firmware, Iboot\-Pdu8a\-2c10_firmware, Iboot\-Pdu8a\-2c20_firmware, Iboot\-Pdu8a\-2n15_firmware, Iboot\-Pdu8a\-2n20_firmware, Iboot\-Pdu8a\-C10_firmware, Iboot\-Pdu8a\-C20_firmware, Iboot\-Pdu8a\-N15_firmware, Iboot\-Pdu8a\-N20_firmware, Iboot\-Pdu8sa\-2n15_firmware, Iboot\-Pdu8sa\-C10_firmware, Iboot\-Pdu8sa\-N15_firmware, Iboot\-Pdu8sa\-N20_firmware 7.2
2023-08-14 CVE-2023-3262 The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier uses hard-coded credentials for all interactions with the internal Postgres database.A malicious agent with the ability to execute operating system commands on the device can leverage this vulnerability to read, modify, or delete arbitrary database records. Iboot\-Pdu4\-C20_firmware, Iboot\-Pdu4\-N20_firmware, Iboot\-Pdu4a\-C10_firmware, Iboot\-Pdu4a\-C20_firmware, Iboot\-Pdu4a\-N15_firmware, Iboot\-Pdu4a\-N20_firmware, Iboot\-Pdu4sa\-C10_firmware, Iboot\-Pdu4sa\-C20_firmware, Iboot\-Pdu4sa\-N15_firmware, Iboot\-Pdu4sa\-N20_firmware, Iboot\-Pdu8a\-2c10_firmware, Iboot\-Pdu8a\-2c20_firmware, Iboot\-Pdu8a\-2n15_firmware, Iboot\-Pdu8a\-2n20_firmware, Iboot\-Pdu8a\-C10_firmware, Iboot\-Pdu8a\-C20_firmware, Iboot\-Pdu8a\-N15_firmware, Iboot\-Pdu8a\-N20_firmware, Iboot\-Pdu8sa\-2n15_firmware, Iboot\-Pdu8sa\-C10_firmware, Iboot\-Pdu8sa\-N15_firmware, Iboot\-Pdu8sa\-N20_firmware 6.7
2023-08-14 CVE-2023-3263 The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier is vulnerable to authentication bypass in the REST API due to the mishandling of special characters when parsing credentials.Successful exploitation allows the malicious agent to obtain a valid authorization token and read information relating to the state of the relays and power distribution. Iboot\-Pdu4\-C20_firmware, Iboot\-Pdu4\-N20_firmware, Iboot\-Pdu4a\-C10_firmware, Iboot\-Pdu4a\-C20_firmware, Iboot\-Pdu4a\-N15_firmware, Iboot\-Pdu4a\-N20_firmware, Iboot\-Pdu4sa\-C10_firmware, Iboot\-Pdu4sa\-C20_firmware, Iboot\-Pdu4sa\-N15_firmware, Iboot\-Pdu4sa\-N20_firmware, Iboot\-Pdu8a\-2c10_firmware, Iboot\-Pdu8a\-2c20_firmware, Iboot\-Pdu8a\-2n15_firmware, Iboot\-Pdu8a\-2n20_firmware, Iboot\-Pdu8a\-C10_firmware, Iboot\-Pdu8a\-C20_firmware, Iboot\-Pdu8a\-N15_firmware, Iboot\-Pdu8a\-N20_firmware, Iboot\-Pdu8sa\-2n15_firmware, Iboot\-Pdu8sa\-C10_firmware, Iboot\-Pdu8sa\-N15_firmware, Iboot\-Pdu8sa\-N20_firmware 7.5
2023-08-14 CVE-2023-3264 The Dataprobe iBoot PDU running firmware version 1.43.03312023 or earlier uses hard-coded credentials for all interactions with the internal Postgres database. A malicious agent with the ability to execute operating system commands on the device can leverage this vulnerability to read, modify, or delete arbitrary database records. Powerpanel_server, Iboot\-Pdu4\-C20_firmware, Iboot\-Pdu4\-N20_firmware, Iboot\-Pdu4a\-C10_firmware, Iboot\-Pdu4a\-C20_firmware, Iboot\-Pdu4a\-N15_firmware, Iboot\-Pdu4a\-N20_firmware, Iboot\-Pdu4sa\-C10_firmware, Iboot\-Pdu4sa\-C20_firmware, Iboot\-Pdu4sa\-N15_firmware, Iboot\-Pdu4sa\-N20_firmware, Iboot\-Pdu8a\-2c10_firmware, Iboot\-Pdu8a\-2c20_firmware, Iboot\-Pdu8a\-2n15_firmware, Iboot\-Pdu8a\-2n20_firmware, Iboot\-Pdu8a\-C10_firmware, Iboot\-Pdu8a\-C20_firmware, Iboot\-Pdu8a\-N15_firmware, Iboot\-Pdu8a\-N20_firmware, Iboot\-Pdu8sa\-2n15_firmware, Iboot\-Pdu8sa\-C10_firmware, Iboot\-Pdu8sa\-N15_firmware, Iboot\-Pdu8sa\-N20_firmware 9.8