CVE-2015-3973

Janitza UMG 508, 509, 511, 604, and 605 devices improperly generate session tokens, which makes it easier for remote attackers to determine a PIN value via unspecified computations on session-token values.
References
Link Resource
https://ics-cert.us-cert.gov/advisories/ICSA-15-265-03 Patch Third Party Advisory US Government Resource
https://ics-cert.us-cert.gov/advisories/ICSA-15-265-03 Patch Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

OR cpe:2.3:h:janitza:umg_508:*:*:*:*:*:*:*:*
cpe:2.3:h:janitza:umg_509:*:*:*:*:*:*:*:*
cpe:2.3:h:janitza:umg_511:*:*:*:*:*:*:*:*
cpe:2.3:h:janitza:umg_604:*:*:*:*:*:*:*:*
cpe:2.3:h:janitza:umg_605:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:30

Type Values Removed Values Added
References () https://ics-cert.us-cert.gov/advisories/ICSA-15-265-03 - Patch, Third Party Advisory, US Government Resource () https://ics-cert.us-cert.gov/advisories/ICSA-15-265-03 - Patch, Third Party Advisory, US Government Resource

Information

Published : 2015-10-28 10:59

Updated : 2024-11-21 02:30


NVD link : CVE-2015-3973

Mitre link : CVE-2015-3973

CVE.ORG link : CVE-2015-3973


JSON object : View

Products Affected

janitza

  • umg_509
  • umg_508
  • umg_604
  • umg_511
  • umg_605
CWE
CWE-254

7PK - Security Features