In default installations of Microchip maxView Storage Manager (for Adaptec Smart Storage Controllers) where Redfish server is configured for remote system management, unauthorized access can occur, with data modification and information disclosure. This affects 3.00.23484 through 4.14.00.26064 (except for the patched versions 3.07.23980 and 4.07.00.25339).
Max CVSS
10.0
EPSS Score
0.09%
Published
2024-01-08
Updated
2024-02-15
A vulnerability has been identified in SIMATIC IPC1047E (All versions with maxView Storage Manager < V4.14.00.26068 on Windows), SIMATIC IPC647E (All versions with maxView Storage Manager < V4.14.00.26068 on Windows), SIMATIC IPC847E (All versions with maxView Storage Manager < V4.14.00.26068 on Windows). In default installations of maxView Storage Manager where Redfish® server is configured for remote system management, a vulnerability has been identified that can provide unauthorized access.
Max CVSS
10.0
EPSS Score
0.09%
Published
2024-01-09
Updated
2024-01-16
A vulnerability has been identified in SIMATIC IPC1047 (All versions), SIMATIC IPC1047E (All versions with maxView Storage Manager < 4.09.00.25611 on Windows), SIMATIC IPC647D (All versions), SIMATIC IPC647E (All versions with maxView Storage Manager < 4.09.00.25611 on Windows), SIMATIC IPC847D (All versions), SIMATIC IPC847E (All versions with maxView Storage Manager < 4.09.00.25611 on Windows). The Adaptec Maxview application on affected devices is using a non-unique TLS certificate across installations to protect the communication from the local browser to the local application. A local attacker may use this key to decrypt intercepted local traffic between the browser and the application and could perform a man-in-the-middle attack in order to modify data in transit.
Max CVSS
6.3
EPSS Score
0.04%
Published
2023-04-11
Updated
2024-01-11
The Microchip RN4870 module firmware 1.43 (and the Microchip PIC LightBlue Explorer Demo 4.2 DT100112) mishandles reject messages.
Max CVSS
8.6
EPSS Score
0.09%
Published
2022-12-19
Updated
2022-12-27
The Microchip RN4870 module firmware 1.43 (and the Microchip PIC LightBlue Explorer Demo 4.2 DT100112) accepts PairCon_rmSend with incorrect values.
Max CVSS
6.5
EPSS Score
0.05%
Published
2022-12-19
Updated
2022-12-27
The Microchip RN4870 module firmware 1.43 (and the Microchip PIC LightBlue Explorer Demo 4.2 DT100112) accepts PauseEncReqPlainText before pairing is complete.
Max CVSS
5.4
EPSS Score
0.05%
Published
2022-12-19
Updated
2022-12-27
The Microchip RN4870 module firmware 1.43 (and the Microchip PIC LightBlue Explorer Demo 4.2 DT100112) allows attackers to bypass passkey entry in legacy pairing.
Max CVSS
5.4
EPSS Score
0.05%
Published
2022-12-19
Updated
2022-12-27
The Microchip RN4870 module firmware 1.43 (and the Microchip PIC LightBlue Explorer Demo 4.2 DT100112) is unresponsive with ConReqTimeoutZero.
Max CVSS
7.5
EPSS Score
0.06%
Published
2022-12-19
Updated
2022-12-27
An issue was discovered on Microchip RN4870 1.43 devices. An attacker within BLE radio range can cause a denial of service by sending a cleartext encryption pause request.
Max CVSS
6.5
EPSS Score
0.04%
Published
2023-02-08
Updated
2023-02-16
An issue was discovered on Microchip RN4870 1.43 devices. An attacker within BLE radio range can cause a denial of service by sending a pair confirm message with wrong values.
Max CVSS
6.5
EPSS Score
0.04%
Published
2023-02-08
Updated
2023-02-16
An issue was discovered on Microchip RN4870 1.43 devices. An attacker within BLE radio range can bypass passkey entry in the legacy pairing of the device.
Max CVSS
5.3
EPSS Score
0.05%
Published
2023-02-08
Updated
2023-02-16
Nordic Semiconductor, Microchip Technology NRF5340-DK DT100112 was discovered to contain an issue which allows attackers to cause a Denial of Service (DoS) via a crafted ConReq packet.
Max CVSS
6.5
EPSS Score
0.04%
Published
2023-02-08
Updated
2023-02-16

CVE-2022-40022

Public exploit
Microchip Technology (Microsemi) SyncServer S650 was discovered to contain a command injection vulnerability.
Max CVSS
9.8
EPSS Score
82.87%
Published
2023-02-13
Updated
2023-06-14
In version 6.5 Microchip MiWi software and all previous versions including legacy products, the stack is validating only two out of four Message Integrity Check (MIC) bytes.
Max CVSS
7.5
EPSS Score
0.22%
Published
2021-08-05
Updated
2022-07-12
In version 6.5 of Microchip MiWi software and all previous versions including legacy products, there is a possibility of frame counters being validated/updated prior to the message authentication. With this vulnerability in place, an attacker may increment the incoming frame counter values by injecting messages with a sufficiently large frame counter value and invalid payload. This results in denial of service/valid packets in the network. There is also a possibility of a replay attack in the stack.
Max CVSS
7.5
EPSS Score
0.18%
Published
2021-08-05
Updated
2022-07-12
In Microchip MPLAB Net 3.6.1, TCP ISNs are improperly random.
Max CVSS
9.1
EPSS Score
0.07%
Published
2023-10-10
Updated
2023-10-13
Bleichenbacher's attack on PKCS #1 v1.5 padding for RSA in Microchip Libraries for Applications 2018-11-26 All up to 2018-11-26. The vulnerability can allow one to use Bleichenbacher's oracle attack to decrypt an encrypted ciphertext by making successive queries to the server using the vulnerable library, resulting in remote information disclosure.
Max CVSS
5.9
EPSS Score
0.35%
Published
2021-01-19
Updated
2021-09-08
An issue was discovered in picoTCP 1.7.0. The code for processing the IPv6 headers does not validate whether the IPv6 payload length field is equal to the actual size of the payload, which leads to an Out-of-Bounds read during the ICMPv6 checksum calculation, resulting in either Denial-of-Service or Information Disclosure. This affects pico_ipv6_extension_headers and pico_checksum_adder (in pico_ipv6.c and pico_frame.c).
Max CVSS
9.1
EPSS Score
0.28%
Published
2020-12-11
Updated
2020-12-14
The Secure Monitor in Microchip Atmel ATSAMA5 products use a hardcoded key to encrypt and authenticate secure applets.
Max CVSS
7.5
EPSS Score
0.17%
Published
2020-09-14
Updated
2020-09-18
CMAC verification functionality in Microchip Atmel ATSAMA5 products is vulnerable to vulnerable to timing and power analysis attacks.
Max CVSS
7.5
EPSS Score
0.17%
Published
2020-09-14
Updated
2020-09-18
Microchip Atmel ATSAMA5 products in Secure Mode allow an attacker to bypass existing security mechanisms related to applet handling.
Max CVSS
7.5
EPSS Score
0.08%
Published
2020-09-14
Updated
2020-09-18
Symmetricom SyncServer S100 2.90.70.3, S200 1.30, S250 1.25, S300 2.65.0, and S350 2.80.1 devices mishandle session validation, leading to unauthenticated creation, modification, or elimination of users.
Max CVSS
7.5
EPSS Score
0.13%
Published
2020-02-17
Updated
2021-07-21
Symmetricom SyncServer S100 2.90.70.3, S200 1.30, S250 1.25, S300 2.65.0, and S350 2.80.1 devices allow Directory Traversal via the FileName parameter to authlog.php.
Max CVSS
6.5
EPSS Score
0.13%
Published
2020-02-17
Updated
2020-02-19
Symmetricom SyncServer S100 2.90.70.3, S200 1.30, S250 1.25, S300 2.65.0, and S350 2.80.1 devices allow Directory Traversal via the FileName parameter to kernlog.php.
Max CVSS
6.5
EPSS Score
0.13%
Published
2020-02-17
Updated
2020-02-19
Symmetricom SyncServer S100 2.90.70.3, S200 1.30, S250 1.25, S300 2.65.0, and S350 2.80.1 devices allow Directory Traversal via the FileName parameter to daemonlog.php.
Max CVSS
6.5
EPSS Score
0.13%
Published
2020-02-17
Updated
2020-02-19
35 vulnerabilities found
1 2
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!