CVE-2015-3972

The web interface on Janitza UMG 508, 509, 511, 604, and 605 devices supports only short PIN values for authentication, which makes it easier for remote attackers to obtain access via a brute-force attack.
References
Link Resource
https://ics-cert.us-cert.gov/advisories/ICSA-15-265-03 Patch Third Party Advisory US Government Resource
https://ics-cert.us-cert.gov/advisories/ICSA-15-265-03 Patch Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

OR cpe:2.3:h:janitza:umg_508:-:*:*:*:*:*:*:*
cpe:2.3:h:janitza:umg_509:-:*:*:*:*:*:*:*
cpe:2.3:h:janitza:umg_511:-:*:*:*:*:*:*:*
cpe:2.3:h:janitza:umg_604:-:*:*:*:*:*:*:*
cpe:2.3:h:janitza:umg_605:-:*:*:*:*:*:*:*

History

21 Nov 2024, 02:30

Type Values Removed Values Added
References () https://ics-cert.us-cert.gov/advisories/ICSA-15-265-03 - Patch, Third Party Advisory, US Government Resource () https://ics-cert.us-cert.gov/advisories/ICSA-15-265-03 - Patch, Third Party Advisory, US Government Resource

Information

Published : 2015-10-28 10:59

Updated : 2024-11-21 02:30


NVD link : CVE-2015-3972

Mitre link : CVE-2015-3972

CVE.ORG link : CVE-2015-3972


JSON object : View

Products Affected

janitza

  • umg_509
  • umg_508
  • umg_604
  • umg_511
  • umg_605
CWE
CWE-254

7PK - Security Features