Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Combi\-Stream_mslq_firmware
(Vzug)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 5 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2019-10-06 | CVE-2019-17218 | An issue was discovered on V-Zug Combi-Steam MSLQ devices before Ethernet R07 and before WLAN R05. By default, the communication to the web service is unencrypted via http. An attacker is able to intercept and sniff communication to the web service. | Combi\-Stream_mslq_firmware | 9.1 | ||
2019-10-06 | CVE-2019-17219 | An issue was discovered on V-Zug Combi-Steam MSLQ devices before Ethernet R07 and before WLAN R05. By default, the device does not enforce any authentication. An adjacent attacker is able to use the network interface without proper access control. | Combi\-Stream_mslq_firmware | N/A | ||
2019-10-06 | CVE-2019-17217 | An issue was discovered on V-Zug Combi-Steam MSLQ devices before Ethernet R07 and before WLAN R05. There is no CSRF protection established on the web service. | Combi\-Stream_mslq_firmware | N/A | ||
2019-10-06 | CVE-2019-17216 | An issue was discovered on V-Zug Combi-Steam MSLQ devices before Ethernet R07 and before WLAN R05. Password authentication uses MD5 to hash passwords. Cracking is possible with minimal effort. | Combi\-Stream_mslq_firmware | N/A | ||
2019-10-06 | CVE-2019-17215 | An issue was discovered on V-Zug Combi-Steam MSLQ devices before Ethernet R07 and before WLAN R05. There is no bruteforce protection (e.g., lockout) established. An attacker might be able to bruteforce the password to authenticate on the device. | Combi\-Stream_mslq_firmware | N/A |