2022-12-21
|
CVE-2022-3183
|
Dataprobe iBoot-PDU FW versions prior to 1.42.06162022 contain a vulnerability where a specific function does not sanitize the input provided by the user, which may expose the affected to an OS command injection vulnerability.
|
Iboot\-Pdu4\-N20_firmware, Iboot\-Pdu4a\-N15_firmware, Iboot\-Pdu4a\-N20_firmware, Iboot\-Pdu4sa\-N15_firmware, Iboot\-Pdu4sa\-N20_firmware, Iboot\-Pdu8a\-2n15_firmware, Iboot\-Pdu8a\-2n20_firmware, Iboot\-Pdu8a\-N15_firmware, Iboot\-Pdu8a\-N20_firmware, Iboot\-Pdu8sa\-2n15_firmware, Iboot\-Pdu8sa\-N15_firmware, Iboot\-Pdu8sa\-N20_firmware
|
9.8
|
|
|
2022-12-21
|
CVE-2022-3185
|
Dataprobe iBoot-PDU FW versions prior to 1.42.06162022 contain a vulnerability where the affected product exposes sensitive data concerning the device.
|
Iboot\-Pdu4\-N20_firmware, Iboot\-Pdu4a\-N15_firmware, Iboot\-Pdu4a\-N20_firmware, Iboot\-Pdu4sa\-N15_firmware, Iboot\-Pdu4sa\-N20_firmware, Iboot\-Pdu8a\-2n15_firmware, Iboot\-Pdu8a\-2n20_firmware, Iboot\-Pdu8a\-N15_firmware, Iboot\-Pdu8a\-N20_firmware, Iboot\-Pdu8sa\-2n15_firmware, Iboot\-Pdu8sa\-N15_firmware, Iboot\-Pdu8sa\-N20_firmware
|
5.3
|
|
|
2022-12-21
|
CVE-2022-3184
|
Dataprobe iBoot-PDU FW versions prior to 1.42.06162022 contain a vulnerability where the device’s existing firmware allows unauthenticated users to access an old PHP page vulnerable to directory traversal, which may allow a user to write a file to the webroot directory.
|
Iboot\-Pdu4\-N20_firmware, Iboot\-Pdu4a\-N15_firmware, Iboot\-Pdu4a\-N20_firmware, Iboot\-Pdu4sa\-N15_firmware, Iboot\-Pdu4sa\-N20_firmware, Iboot\-Pdu8a\-2n15_firmware, Iboot\-Pdu8a\-2n20_firmware, Iboot\-Pdu8a\-N15_firmware, Iboot\-Pdu8a\-N20_firmware, Iboot\-Pdu8sa\-2n15_firmware, Iboot\-Pdu8sa\-N15_firmware, Iboot\-Pdu8sa\-N20_firmware
|
9.8
|
|
|
2022-12-21
|
CVE-2022-3186
|
Dataprobe iBoot-PDU FW versions prior to 1.42.06162022 contain a vulnerability where the affected product allows an attacker to access the device’s main management page from the cloud. This feature enables users to remotely connect devices, however, the current implementation permits users to access other device's information.
|
Iboot\-Pdu4\-N20_firmware, Iboot\-Pdu4a\-N15_firmware, Iboot\-Pdu4a\-N20_firmware, Iboot\-Pdu4sa\-N15_firmware, Iboot\-Pdu4sa\-N20_firmware, Iboot\-Pdu8a\-2n15_firmware, Iboot\-Pdu8a\-2n20_firmware, Iboot\-Pdu8a\-N15_firmware, Iboot\-Pdu8a\-N20_firmware, Iboot\-Pdu8sa\-2n15_firmware, Iboot\-Pdu8sa\-N15_firmware, Iboot\-Pdu8sa\-N20_firmware
|
7.5
|
|
|
2022-12-21
|
CVE-2022-3188
|
Dataprobe iBoot-PDU FW versions prior to 1.42.06162022 contain a vulnerability where unauthenticated users could open PHP index pages without authentication and download the history file from the device; the history file includes the latest actions completed by specific users.
|
Iboot\-Pdu4\-N20_firmware, Iboot\-Pdu4a\-N15_firmware, Iboot\-Pdu4a\-N20_firmware, Iboot\-Pdu4sa\-N15_firmware, Iboot\-Pdu4sa\-N20_firmware, Iboot\-Pdu8a\-2n15_firmware, Iboot\-Pdu8a\-2n20_firmware, Iboot\-Pdu8a\-N15_firmware, Iboot\-Pdu8a\-N20_firmware, Iboot\-Pdu8sa\-2n15_firmware, Iboot\-Pdu8sa\-N15_firmware, Iboot\-Pdu8sa\-N20_firmware
|
5.3
|
|
|
2022-12-21
|
CVE-2022-3189
|
Dataprobe iBoot-PDU FW versions prior to 1.42.06162022 contain a vulnerability where a specially crafted PHP script could use parameters from a HTTP request to create a URL capable of changing the host parameter. The changed host parameter in the HTTP could point to another host that will send a request to the host or IP specified in the changed host parameter.
|
Iboot\-Pdu4\-N20_firmware, Iboot\-Pdu4a\-N15_firmware, Iboot\-Pdu4a\-N20_firmware, Iboot\-Pdu4sa\-N15_firmware, Iboot\-Pdu4sa\-N20_firmware, Iboot\-Pdu8a\-2n15_firmware, Iboot\-Pdu8a\-2n20_firmware, Iboot\-Pdu8a\-N15_firmware, Iboot\-Pdu8a\-N20_firmware, Iboot\-Pdu8sa\-2n15_firmware, Iboot\-Pdu8sa\-N15_firmware, Iboot\-Pdu8sa\-N20_firmware
|
5.3
|
|
|
2022-12-21
|
CVE-2022-3187
|
Dataprobe iBoot-PDU FW versions prior to 1.42.06162022 contain a vulnerability where certain PHP pages only validate when a valid connection is established with the database. However, these PHP pages do not verify the validity of a user. Attackers could leverage this lack of verification to read the state of outlets.
|
Iboot\-Pdu4\-N20_firmware, Iboot\-Pdu4a\-N15_firmware, Iboot\-Pdu4a\-N20_firmware, Iboot\-Pdu4sa\-N15_firmware, Iboot\-Pdu4sa\-N20_firmware, Iboot\-Pdu8a\-2n15_firmware, Iboot\-Pdu8a\-2n20_firmware, Iboot\-Pdu8a\-N15_firmware, Iboot\-Pdu8a\-N20_firmware, Iboot\-Pdu8sa\-2n15_firmware, Iboot\-Pdu8sa\-N15_firmware, Iboot\-Pdu8sa\-N20_firmware
|
5.3
|
|
|
2023-05-22
|
CVE-2022-4945
|
The Dataprobe cloud usernames and passwords are stored in plain text in a specific file. Any user able to read this specific file from the device could compromise other devices connected to the user's cloud.
|
Iboot\-Pdu4\-C20_firmware, Iboot\-Pdu4\-N20_firmware, Iboot\-Pdu4a\-C10_firmware, Iboot\-Pdu4a\-C20_firmware, Iboot\-Pdu4a\-N15_firmware, Iboot\-Pdu4a\-N20_firmware, Iboot\-Pdu4sa\-C10_firmware, Iboot\-Pdu4sa\-C20_firmware, Iboot\-Pdu4sa\-N15_firmware, Iboot\-Pdu4sa\-N20_firmware, Iboot\-Pdu8a\-2c10_firmware, Iboot\-Pdu8a\-2c20_firmware, Iboot\-Pdu8a\-2n15_firmware, Iboot\-Pdu8a\-2n20_firmware, Iboot\-Pdu8a\-C10_firmware, Iboot\-Pdu8a\-C20_firmware, Iboot\-Pdu8a\-N15_firmware, Iboot\-Pdu8a\-N20_firmware, Iboot\-Pdu8sa\-2n15_firmware, Iboot\-Pdu8sa\-C10_firmware, Iboot\-Pdu8sa\-N15_firmware, Iboot\-Pdu8sa\-N20_firmware
|
6.5
|
|
|
2023-05-22
|
CVE-2022-47311
|
A proprietary protocol for iBoot devices is used for control and keepalive commands. The function compares the username and password; it also contains the configuration data for the user specified. If the user does not exist, then it sends a value for username and password, which allows successful authentication for a connection.
|
Iboot\-Pdu4\-C20_firmware, Iboot\-Pdu4\-N20_firmware, Iboot\-Pdu4a\-C10_firmware, Iboot\-Pdu4a\-C20_firmware, Iboot\-Pdu4a\-N15_firmware, Iboot\-Pdu4a\-N20_firmware, Iboot\-Pdu4sa\-C10_firmware, Iboot\-Pdu4sa\-C20_firmware, Iboot\-Pdu4sa\-N15_firmware, Iboot\-Pdu4sa\-N20_firmware, Iboot\-Pdu8a\-2c10_firmware, Iboot\-Pdu8a\-2c20_firmware, Iboot\-Pdu8a\-2n15_firmware, Iboot\-Pdu8a\-2n20_firmware, Iboot\-Pdu8a\-C10_firmware, Iboot\-Pdu8a\-C20_firmware, Iboot\-Pdu8a\-N15_firmware, Iboot\-Pdu8a\-N20_firmware, Iboot\-Pdu8sa\-2n15_firmware, Iboot\-Pdu8sa\-C10_firmware, Iboot\-Pdu8sa\-N15_firmware, Iboot\-Pdu8sa\-N20_firmware
|
8.8
|
|
|
2023-05-22
|
CVE-2022-47320
|
The iBoot device’s basic discovery protocol assists in initial device configuration. The discovery protocol shows basic information about devices on the network and allows users to perform configuration changes.
|
Iboot\-Pdu4\-C20_firmware, Iboot\-Pdu4\-N20_firmware, Iboot\-Pdu4a\-C10_firmware, Iboot\-Pdu4a\-C20_firmware, Iboot\-Pdu4a\-N15_firmware, Iboot\-Pdu4a\-N20_firmware, Iboot\-Pdu4sa\-C10_firmware, Iboot\-Pdu4sa\-C20_firmware, Iboot\-Pdu4sa\-N15_firmware, Iboot\-Pdu4sa\-N20_firmware, Iboot\-Pdu8a\-2c10_firmware, Iboot\-Pdu8a\-2c20_firmware, Iboot\-Pdu8a\-2n15_firmware, Iboot\-Pdu8a\-2n20_firmware, Iboot\-Pdu8a\-C10_firmware, Iboot\-Pdu8a\-C20_firmware, Iboot\-Pdu8a\-N15_firmware, Iboot\-Pdu8a\-N20_firmware, Iboot\-Pdu8sa\-2n15_firmware, Iboot\-Pdu8sa\-C10_firmware, Iboot\-Pdu8sa\-N15_firmware, Iboot\-Pdu8sa\-N20_firmware
|
8.1
|
|
|