Filtered by vendor Haascnc
Subscribe
Total
3 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-41636 | 1 Haascnc | 1 Haas Controller | 2024-11-21 | N/A | 9.1 CRITICAL |
Communication traffic involving "Ethernet Q Commands" service of Haas Controller version 100.20.000.1110 is transmitted in cleartext. This allows an attacker to obtain sensitive information being passed to and from the controller. | |||||
CVE-2022-2475 | 1 Haascnc | 2 Haas Controller, Haas Controller Firmware | 2024-11-21 | N/A | 9.8 CRITICAL |
Haas Controller version 100.20.000.1110 has insufficient granularity of access control when using the "Ethernet Q Commands" service. Any user is able to write macros into registers outside of the authorized accessible range. This could allow a user to access privileged resources or resources out of context. | |||||
CVE-2022-2474 | 1 Haascnc | 2 Haas Controller, Haas Controller Firmware | 2024-11-21 | N/A | 9.8 CRITICAL |
Authentication is currently unsupported in Haas Controller version 100.20.000.1110 when using the “Ethernet Q Commands” service, which allows any user on the same network segment as the controller (even while connected remotely) to access the service and write unauthorized macros to the device. |