Filtered by vendor Enbra
Subscribe
Total
3 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2021-34572 | 1 Enbra | 1 Ewm | 2024-02-28 | 3.3 LOW | 6.5 MEDIUM |
Enbra EWM 1.7.29 does not check for or detect replay attacks sent by wireless M-Bus Security mode 5 devices. Instead timestamps of the sensor are replaced by the time of the readout even if the data is a replay of earlier data. | |||||
CVE-2021-34571 | 1 Enbra | 1 Ewm | 2024-02-28 | 2.9 LOW | 6.5 MEDIUM |
Multiple Wireless M-Bus devices by Enbra use Hard-coded Credentials in Security mode 5 without an option to change the encryption key. An adversary can learn all information that is available in Enbra EWM. | |||||
CVE-2021-34573 | 1 Enbra | 1 Ewm | 2024-02-28 | 2.1 LOW | 5.5 MEDIUM |
In Enbra EWM in Version 1.7.29 together with several tested wireless M-Bus Sensors the events backflow and "no flow" are not reconized or misinterpreted. This may lead to wrong values and missing events. |