source-url stringlengths 62 64 | Prompt stringlengths 762 25.3k | Correct Answer stringlengths 74 7.83k | vulnerability-overview stringlengths 186 24.7k |
|---|---|---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-22-109-03 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could cause a denial-of-service condition, allow for remote code execution, or provide unauthorized privilege escalation. | 3.2.1 INCORRECT PERMISSION ASSIGNMENT FOR CRITICAL RESOURCE CWE-732 The affected product is vulnerable to misconfigured binaries, allowing users on the target PC with SYSTEM level privileges access to overwrite the binary and modify files to gain privilege escalation. CVE-2021-38483 has been assigned to this vulnerabil... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-109-02 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an attacker to redirect the user to a malicious webpage or to download a malicious file. | 3.2.1 OPEN REDIRECT CWE-601 WebCtrl Version 6.1 Help index pages are vulnerable to open redirection. If a user visits a maliciously crafted URL, this vulnerability could allow an attacker to redirect a user to a malicious webpage or download a malicious file. CVE-2022-1019 has been assigned to this vulnerability. A CVS... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-109-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow an attacker to log in to modify the system. | 3.2.1 IMPROPER RESTRICTION OF EXCESSIVE AUTHENTICATION ATTEMPTS CWE-307 There is no limit to the number of attempts to authenticate for the local configuration pages for the Hills ComNav Version 3002-19 interface, which allows local attackers to brute-force credentials. CVE-2022-26519 has been assigned to this vulnerab... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-109-04 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could provide attackers a way to traverse the file system to access files or directories that are outside of the restricted directory; allow the upload or transfer files of dangerous types that can be automatically processed within the product's environment; allow an una... | 3.2.1 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 An attacker can inject JavaScript code into a specific parameter that can executed upon accessing the dashboard or the main page. CVE-2021-43932 has been assigned to this vulnerability. A CVSS v3 base score of 9.0 has been... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-109-05 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow an unauthorized user to store dangerous data in a trusted database; potentially exposing sensitive information; allow malicious users to upload arbitrary files; provide attackers a way to traverse the file system to access files or directories that are outsid... | 3.2.1 CROSS-SITE SCRIPTING CWE-79 An authenticated attacker can inject arbitrary JavaScript into critical parameters. CVE-2021-43932 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.2 INFORMATION EXPOSURE CWE-2... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-104-17 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an authenticated attacker to extract information from a database protected field. | 3.2.1 IMPROPER ACCESS CONTROL CWE-284 The affected product is vulnerable when querying the database as it is possible to sort the results using a protected field. An authenticated attacker could exploit this vulnerability to extract information. CVE-2022-25650 has been assigned to this vulnerability. A CVSS v3 base sco... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-104-15 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow arbitrary code execution. | 3.2.1 OUT-OF-BOUNDS READ CWE-125 The affected application contains an out of bounds read past the end of an allocated buffer while parsing specially crafted files. This could allow an attacker to execute code in the context of the current process. CVE-2022-28661 has been assigned to this vulnerability. A CVSS v3 base s... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-104-14 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an attacker to achieve privilege escalation on the web server of certain devices configured by SIMATIC STEP 7 (TIA Portal) due to incorrect handling of the webservers user management configuration during downloading. | 3.2.1 IMPROPER ACCESS CONTROL CWE-284 An attacker could achieve privilege escalation on the web server of certain devices due to an improper access control vulnerability in the engineering system software. The attacker needs to have direct access to the impacted web server. CVE-2021-42029 has been assigned to this vuln... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-104-11 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow an attacker to obtain local/remote code execution and local privilege escalation. | 3.2.1 INCORRECT PERMISSION ASSIGNMENT FOR CRITICAL RESOURCE CWE-732 Affected applications improperly assign permissions to critical directories and files used by the application processes. This could allow a local unprivileged attacker to achieve code execution with Administrator or even NT Authority/System privileges.... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-104-10 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an attacker to access files without authentication. | 3.2.1 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306 Affected devices do not require a user to be authenticated to access certain files. This could allow an unauthenticated attacker to download these files. CVE-2022-27480 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the ... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-104-09 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow an unauthenticated attacker to reboot, cause denial-of-service conditions, and impact the system by other means through buffer overflow vulnerabilities. | 3.2.1 IMPROPER INPUT VALIDATION CWE-20 Affected devices do not properly validate the HTTP headers of incoming requests. This could allow an unauthenticated remote attacker to crash affected devices. CVE-2022-25751 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been assigned; the CVSS vector st... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-104-08 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow an attacker to cause various denial-of-service conditions. | 3.2.1 CONCURRENT EXECUTION USING SHARED RESOURCE WITH IMPROPER SYNCHRONIZATION ('RACE CONDITION') CWE-362 The affected product does not properly handle resources of ARP requests. This could allow an attacker to cause a race condition that leads to a crash of the entire device. CVE-2022-27481 has been assigned to this v... |
https://www.cisa.gov/news-events/ics-advisories/icsa-16-327-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities may allow an attacker to elevate privileges on the affected devices or cause a denial-of-service condition. | 4.2.1 IMPROPER PRIVILEGE MANAGEMENT CWE-269 Users with elevated privileges to TIA-Portal and project data on the engineering station could possibly get privileged access on affected devices. CVE-2016-8561 has been assigned to this vulnerability. A CVSS v3 base score of 6.6 has been calculated; the CVSS vector string is... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-104-04 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow an attacker within Wi-Fi range to forge encrypted frames, which could result in sensitive data disclosure and traffic manipulation. | 3.2.1 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306 The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesnt require the A-MSDU flag in the plaintext QoS header field to be authenticated. Against devices that support receiving non-SSP A-MSDU frames... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-104-02 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow a remote attacker to use a session token that has not been cleared upon log out of an authenticated user. | 3.2.1 INCOMPLETE CLEANUP CWE-459 Under certain circumstances the session token is not cleared upon log out. CVE-2021-36205 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H). |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-104-03 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could result in data compromise, data modification, and a denial-of-service condition. | 3.2.1 INSUFFICIENT VERIFICATION OF DATA AUTHENTICITY CWE-345 Authorized users may install a maliciously modified package file when updating the device via the web user interface. The user may inadvertently use a package file obtained from an unauthorized source or a file that was compromised between download and deploy... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-104-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an attacker to gain sensitive information. | 3.2.1 IMPROPER RESTRICTION OF XML EXTERNAL ENTITY REFERENCE CWE-611 In four instances the affected product does not properly restrict references of XML external entities while processing specific project files, which may allow unauthorized information disclosure. CVE-2022-1331 has been assigned to this vulnerability. A... |
https://www.cisa.gov/news-events/ics-advisories/icsa-20-042-06 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an attacker with network access to cause a denial-of-service condition. | 4.2.1 INCORRECT CALCULATION OF BUFFER SIZE CWE-131 Through specially crafted messages, when encrypted communication is enabled, an attacker with network access could compromise the availability of the system by causing a denial-of-service condition. CVE-2019-19282 has been assigned to this vulnerability. A CVSS v3 base... |
https://www.cisa.gov/news-events/ics-advisories/icsa-20-042-02 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow remote attackers to conduct a denial-of-service attack by sending specially crafted packets to Port 161/UDP (SNMP). | 4.2.1 DATA PROCESSING ERRORS CWE-19 An error in the message handling of SNMP messages allows remote attackers to cause a denial-of-service condition and execute arbitrary code via a crafted packet sent on Port 161/UDP (SNMP). CVE-2015-5621 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been ca... |
https://www.cisa.gov/news-events/ics-advisories/icsa-19-344-04 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an attacker already in a man-in-the-middle position to modify network traffic exchanged on Port 102/TCP. | 4.2.1 USE OF BROKEN OR RISKY CRYPTOGRAPHIC ALGORITHM CWE-327 An attacker in a man-in-the-middle position could modify network traffic exchanged on Port 102/TCP. Successful exploitation requires an attacker be able to perform a man-in-the-middle attack. Subsequent exploitation of this vulnerability could compromise comm... |
https://www.cisa.gov/news-events/ics-advisories/icsa-21-194-03 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an attacker to perform a denial-of-service attack if a large amount of PROFINET Discovery and Configuration Protocol (DCP) reset packets is sent to the affected devices. | 4.2.1 ALLOCATION OF RESOURCES WITHOUT LIMITS OR THROTTLING CWE-770 Affected devices contain a vulnerability that allows an unauthenticated attacker to trigger a denial-of-service condition. This vulnerability can be triggered if a large amount of DCP resent packets are sent to the device. CVE-2020-28400 has been assign... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-013-05 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow an attacker to conduct code injections, store data in undesired locations, execute arbitrary SQL statements, and run cross-site request forgery attacks. | 4.2.1 UNRESTRICTED UPLOAD OF FILE WITH DANGEROUS TYPE CWE-434 The COMOS Web component of COMOS allows to upload and store arbitrary files at the webserver. This could allow an attacker to store malicious files. CVE-2021-37194 has been assigned to this vulnerability. A CVSS v3 base score of 4.3 has been calculated; the ... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-069-12 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability in third-party components could cause a denial-of-service condition, act as a man-in-the-middle, allow an attacker to retrieve sensitive information, or allow an attacker to gain privileged functions. | 4.2.1 USING COMPONENTS WITH KNOWN VULNERABILITIES CWE-1035 Vulnerabilities in third-party components could cause a denial-of-service condition, act as a man-in-the-middle, allow an attacker to retrieve sensitive information, or allow an attacker to gain privileged functions. CVE-2021-37208, CVE-2021-42016, CVE-2021-420... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-069-08 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow arbitrary code execution and sensitive information extraction. | 4.2.1 CROSS-SITE SCRIPTING CWE-79 An attacker could achieve cross-site scripting by sending a specially crafted link to users with administrator privileges, resulting in improper neutralization of data sent to the webpage through the SVN WebClient. CVE-2021-44478 has been assigned to this vulnerability. A CVSS v3 base ... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-102-05 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could cause a denial-of-service condition, allow full control of robot functions, or expose sensitive information. | 3.2.1 MISSING AUTHORIZATION CWE-862 An unauthenticated attacker can arbitrarily add new users with administrative privileges and delete or modify existing users. CVE-2022-1066 has been assigned to this vulnerability. A CVSS v3 base score of 8.2 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-102-02 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could cause a denial-of-service condition or allow remote code execution. | 3.2.1 HEAP-BASED BUFFER OVERFLOW CWE-122 The affected product uses a vulnerable version of Wind River VxWorks that could result in a heap-based buffer overflow in the DHCP client CVE-2021-29998 has been assigned to this vulnerability. A CVSS v3 base score of 9.0 has been calculated; the CVSS vector string is (AV:N/AC:H... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-102-03 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an authenticated attacker with network access to execute code by uploading a malicious zip file. | 3.2.1 IMPROPER LIMITATION OF A PATHNAME TO A RESTRICTED DIRECTORY ('PATH TRAVERSAL') CWE-22 The affected product may allow an attacker with access to the Ignition web configuration to run arbitrary code. CVE-2022-1264 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vec... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-102-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an attacker to execute commands remotely with system privileges. | 3.2.1 INADEQUATE ENCRYPTION STRENGTH CWE-326 An unauthenticated network user can craft specific packets targeting a Valmet DNA service, listening by default on a specific TCP port. By exploiting a predictable encryption key, the attacker can remotely trigger commands to be executed with system privileges. CVE-2021-2672... |
https://www.cisa.gov/news-events/ics-advisories/icsa-21-278-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow an attacker to cause a denial-of-service condition by sending specially crafted packets. | 4.2.1 IMPROPER HANDLING OF EXCEPTIONAL CONDITIONS CWE-755 An attacker could send specially crafted packets cause to cause several different denial-of-service conditions due to the improper handling of exceptional conditions. CVE-2021-20602 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been ca... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-097-02 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could cause the affect device to become unresponsive, resulting in a denial-of-service condition and requiring a manual reboot. | 3.2.1 INCOMPLETE INTERNAL STATE DISTINCTION CWE-372 The affected product is vulnerable to errors in handling out-of-order packets, which may cause the device to stop responding to any Ethernet-based requests. The resulting denial-of-service condition will not self-resolve, requiring a reboot to restore normal operation... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-097-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities may result in a denial-of-service condition, code execution, and code exposure. | 3.2.1 USE OF HARD-CODED CREDENTIALS CWE-798 The affected product allows active SSH and telnet services with hard-coded credentials. CVE-2021-34565 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). 3.2.2 UNCONTROLLED... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-095-02 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an authenticated attacker to inject malicious code into the MUI PDF export feature. | 3.2.1 SERVER-SIDE REQUEST FORGERY (SSRF) CWE-918 An authenticated attacker could inject malicious code into the MUI PDF export feature, which could result in server-side request forgery. CVE-2021-36202 has been assigned to this vulnerability. A CVSS v3 base score of 8.4 has been assigned; the CVSS vector string is (AV:... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-095-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow arbitrary code execution. | 3.2.1 DESERIALIZATION OF UNTRUSTED DATA CWE-502 Connected Components Workbench, ISaGRAF Workbench, and Safety Instrumented System Workstation do not limit the objects that can be deserialized. This allows attackers to craft a malicious serialized object that, if opened by a local user in Connected Components Workbench,... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-067-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could result in full system access, remote code execution, read/change configuration, file system read access, log information access, and a denial-of-service condition. | 4.2.1 USE OF HARD-CODED CREDENTIALS CWE-798 The affected product uses hard-coded credentials for its UltraVNC installation. Successful exploitation of this vulnerability could allow a remote authenticated attacker to take full remote control of the host operating system. CVE-2022-25246 has been assigned to this vulnera... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-090-07 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability may allow an attacker to download a modified program to the controller. | 3.2.1 IMPROPER CONTROL OF GENERATION OF CODE (CODE INJECTION) CWE-94 An attacker who achieves administrator access on a workstation running Studio 5000 Logix Designer could inject controller code undetectable to a user. CVE-2022-1159 has been assigned to this vulnerability. A CVSS v3 base score of 7.7 has been assigned... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-090-05 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability may allow an attacker to modify user programs. A user could then unknowingly download those modified elements containing malicious code. | 3.2.1 INCLUSION OF FUNCTIONALITY FROM UNTRUSTED CONTROL SPHERE CWE-829 An attacker with the ability to modify a user program may change user program code on some ControlLogix, CompactLogix, and GuardLogix Control systems. Studio 5000 Logix Designer writes user-readable program code to a separate location than the execu... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-090-03 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow an attacker to disclose sensitive information and execute arbitrary code. | 3.2.1 ACCESS OF UNINITIALIZED POINTER CWE-824 The affected product is vulnerable due to an invalid pointer initialization, which may lead to information disclosure. CVE-2022-21168 has been assigned to this vulnerability. A CVSS v3 base score of 3.3 has been calculated; the CVSS vector string is (AV:L/AC:L/PR:N/UI:R/S:U... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-090-02 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could cause a denial-of-service condition. | 3.2.1 IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119 A vulnerability exists in a specific Node.js function, which could allow various kinds of memory corruption and cause a denial-of-service condition. CVE-2020-8174 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 ha... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-090-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could result from exfiltration of data from local files to a remote system controlled by an attacker. | 3.2.1 IMPROPER RESTRICTION OF XML EXTERNAL ENTITY REFERENCE CWE-611 An improper restriction of XML external entity reference vulnerability exists that could result in information disclosure when opening a malicious solution file provided by an attacker with SCADAPack Workbench. This could be exploited to pass data from... |
https://www.cisa.gov/news-events/ics-advisories/icsa-20-303-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could cause a denial-of-service condition in the Ethernet port on the CPU module. | 3.2.1Uncontrolled Resource Consumption CWE-400 Mitsubishi Electric MELSEC iQ-R, Q, and L Series CPU modules are vulnerable to uncontrolled resource consumption. When the CPU module receives a specially crafted packet from a malicious attacker, Ethernet communication may enter a denial-of-service condition and a reset i... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-090-06 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow an attacker to control the configuration of the radio, join the network without proper authorization, or keep valid users from using the system correctly. | 3.2.1 IMPROPER INPUT VALIDATION CWE-20 This previously disclosed vulnerability in the GoAhead Webserver may allow remote code execution in iNET/iNET II, TD220X, and TD220MAX series radios. CVE-2017-17562 has been assigned to this vulnerability. A CVSS v3 base score of 10.0 has been calculated; the CVSS vector string is... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-088-04 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could crash the application when inputting a registration key. | 3.2.1 STACK-BASED BUFFER OVERFLOW CWE-121 The affected product is vulnerable to a stack-based buffer overflow in the registration field. This may cause the program to crash when a long character string is used. CVE-2022-1068 has been assigned to this vulnerability. A CVSS v3 base score of 5.5 has been assigned; the CVS... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-088-02 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities when parsing an NCI file could allow code execution. | 3.2.1 STACK-BASED BUFFER OVERFLOW CWE-121 The affected product is vulnerable to multiple stack-based buffer overflow conditions while parsing a specific project file, which may allow an attacker to locally execute arbitrary code. CVE-2022-26419 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has be... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-088-03 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow an attacker to modify a victims system files or information, disclose application full path, disclose sensitive information to an unauthorized actor, and launch a common web attack. | 3.2.1 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 Multiple stored XSS vulnerabilities exist in the LinkOne application, allowing multiple web attacks and the theft of sensitive information. CVE-2021-40337 has been assigned to these vulnerabilities. A CVSS v3 base score of... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-083-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities in CAMS server functions can be abused to suppress alarms, read or write files, crash the server, or execute arbitrary code. | 3.2.1 USE OF HARD-CODED CREDENTIALS CWE-798 If the password for the OS account created when installing the product has not been changed from the default password and the hard-coded credentials (default password) for the account are used, an attacker could access files and shared memory in the system. The product is not... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-083-02 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow arbitrary operating system commands injection. | 3.2.1 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN A COMMAND ('COMMAND INJECTION') CWE-77 An authenticated user may be able to misuse parameters to inject arbitrary operating system commands. CVE-2022-0999 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector s... |
https://www.cisa.gov/news-events/ics-advisories/icsa-20-168-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities may allow remote code execution or exposure of sensitive information. | 4.2.1 IMPROPER HANDLING OF LENGTH PARAMETER INCONSISTENCY CWE-130 Improper handling of length parameter inconsistency in IPv4/UDP component when handling a packet sent by an unauthorized network attacker. This vulnerability may result in remote code execution. CVE-2020-11896 has been assigned to this vulnerability. A C... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-074-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow a low privileged authenticated user to remotely execute arbitrary code. | 3.1.1 EXECUTION WITH UNNECESSARY PRIVILEGES CWE-250 The affected products are vulnerable to an authenticated remote user with low privileges who could successfully insert and execute arbitrary code in the node running the AC 800M OPC Server. CVE-2021-22284 has been assigned to this vulnerability. A CVSS v3 base score o... |
https://www.cisa.gov/news-events/ics-advisories/icsa-20-203-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow an attacker to alter and forge a license file, cause a denial-of-service condition, potentially attain remote code execution, read heap data, and prevent normal operation of third-party software dependent on the CodeMeter. | 4.2.1 BUFFER ACCESS WITH INCORRECT LENGTH VALUE CWE-805 Multiple memory corruption vulnerabilities exist where the packet parser mechanism does not verify length fields. An attacker could send specially crafted packets to exploit these vulnerabilities. CVE-2020-14509 has been assigned to this vulnerability. A CVSS v3 b... |
https://www.cisa.gov/news-events/ics-advisories/icsa-20-252-07 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability may allow an authenticated user to enable information disclosure via local access. | 4.2.1 EXPOSURE OF SENSITIVE INFORMATION TO AN UNAUTHORIZED ACTOR CWE-200 Incomplete cleanup from specific special register read operations in some Intel processors may allow an authenticated user to potentially enable information disclosure via local access. CVE-2020-0543 has been assigned to this vulnerability. A CVSS... |
https://www.cisa.gov/news-events/ics-advisories/icsa-21-103-13 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow an attacker to poison the DNS cache or spoof DNS resolving. | 4.2.1 IMPROPER NULL TERMINATION CWE-170 The DNS domain name label parsing functionality does not properly validate the null-terminated name in DNS-responses. The parsing of malformed responses could result in a read past the end of an allocated structure. An attacker with a privileged position in the network could leve... |
https://www.cisa.gov/news-events/ics-advisories/icsa-21-315-09 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow sensitive data disclosure or modification of data in transit. | 3.2.1 MISSING ENCRYPTION OF SENSITIVE DATA CWE-311 The web server of affected devices transmits data without TLS encryption. This could allow an unauthenticated remote attacker in a man-in-the-middle position to read sensitive data, such as administrator credentials, or modify data in transit. CVE-2021-40366 has been a... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-041-05 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an attacker access through an exploitable access control. | 4.2.1 USE OF HARD-CODED CREDENTIALS CWE-798 Affected applications use an exploitable access control within a database service, which could allow an attacker to access the database. CVE-2021-45106 has been assigned to this vulnerability. A CVSS v3 base score of 9.9 has been calculated; the CVSS vector string is (AV:N/AC... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-069-11 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow local attackers to escalate privileges to root. | 3.2.1 IMPROPER PRIVILEGE MANAGEMENT CWE-269 The sc SUID binary on affected devices provides several commands used to execute system commands or modify system files. A specific set of operations using sc could allow local attackers to escalate their privileges to root. CVE-2022-24408 has been assigned to this vulnerabil... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-069-10 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow an attacker to leverage the vulnerabilities to leak information or perform remote code execution in the context of the current process. | 3.2.1 OUT-OF-BOUNDS WRITE CWE-787 The affected application contains an out-of-bounds write past the end of an allocated structure while parsing specially crafted NEU files. This could allow an attacker to execute code in the context of the current process. CVE-2021-46162 has been assigned to this vulnerability. A CVSS ... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-069-09 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability in third-party components could allow an attacker to interfere with the affected product in various ways. | 3.2.1 USING COMPONENTS WITH KNOWN VULNERABILITIES CWE-1035 There are 71 third-party components affected by this vulnerability as Node.js, cURL, SQLite, CivetWeb and DNS(ISC BIND) could allow an attacker to interfere with the affected product. CVE-2019-19242, CVE-2019-19244, CVE-2019-19317, CVE-2019-19603, CVE-2019-1964... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-069-05 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could cause a crash, arbitrary code execution, or data exfiltration. | 3.2.1 IMPROPER RESTRICTION OF OPERATIONS WITHIN THE BOUNDS OF A MEMORY BUFFER CWE-119 The starview+.exe allows a corruption vulnerability while parsing specially crafted .SCE files. This could allow an attacker to execute code in the context of the current process. CVE-2022-24661 has been assigned to this vulnerability... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-069-06 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities may result in leaked information or remote code execution in the context of the current process. | 3.2.1 MEMORY ALLOCATION WITH EXCESSIVE SIZE VALUE CWE-789 Open Design Alliance Drawings SDK before 2021.12 contains a memory allocation with excessive size vulnerability when parsing specially crafted DGN files. This could allow an attacker to execute code in the context of the current process. CVE-2021-25173 has been ... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-069-07 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow an unauthenticated attacker to hijack and redirect users to a malicious webpage or allow an authenticated attacker to access sensitive files. | 3.2.1 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 The Group Management page of affected devices is vulnerable to cross-site scripting. The vulnerability allows an attacker to send malicious JavaScript code that could result in hijacking of the users cookie/session tokens,... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-069-02 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could lead to information leaks or a denial-of-service condition. | 3.2.1 ACCESS OF RESOURCE USING INCOMPATIBLE TYPE ('TYPE CONFUSION') CWE-843 The affected product is vulnerable when ICMP echo packets with fake IP options allow the sending ICMP echo reply messages to arbitrary hosts on the network. CVE-2021-31344 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-034-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an attacker to gain remote code execution. | 4.2.1 IMPROPER INPUT VALIDATION CWE-20 The affected product does not properly validate user input, allowing an attacker to enter malicious input and potentially gain remote code execution. CVE-2021-44228 has been assigned to this vulnerability. A CVSS v3 base score of 10.0 has been assigned; the CVSS vector string is (... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-067-02 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could expose cleartext credentials for the network user account or for logged-in users to an authorized, low privilege user. The cleartext credentials would also be exposed if the user creates a diagnostic memory dump of the relevant process and saves it to a non-protected ... | 3.2.1 CLEARTEXT STORAGE OF SENSITIVE INFORMATION IN MEMORY CWE-316 The affected product stores sensitive information in cleartext, which may allow access to an attacker or a low-privileged user. CVE-2022-0835 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been calculated; the CVSS vector strin... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-063-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow a nearby attacker to execute diagnostic functions in the trailer or light the trailer ABS fault telltale in a tractor. Please visit NMFTAfor more details. | 3.2.1 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306 Trailer brake controllers implement diagnostic functions which can be invoked by replaying J2497 messages. There is no authentication or authorization for these functions. CVE-2022-25922 has been assigned to this vulnerability. A CVSS v3 base score of 6.1 has b... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-062-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow an attacker to inject and execute arbitrary code. | 3.2.1 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 Persistent cross-site scripting (XSS) in the web interface of ipDIO allows an authenticated remote attacker to introduce arbitrary JavaScript by injecting an XSS payload into specific fields. The XSS payload will be execut... |
https://www.cisa.gov/news-events/ics-advisories/icsa-21-231-02 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an attacker access to system credentials. | 4.2.1 USE OF PASSWORD HASH WITH INSUFFICIENT COMPUTATIONAL EFFORT CWE-916 The affected products utilize a weak encryption algorithm for storage and transmission of sensitive data, which may allow an attacker to more easily obtain credentials used for access. CVE-2021-32997 has been assigned to this vulnerability. A CVS... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-055-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code. | 3.2.1 STACK-BASED BUFFER OVERFLOW CWE-121 The affected product is vulnerable to a stack-based buffer overflow while processing project files, which may allow an attacker to execute arbitrary code. CVE-2022-25170 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been calculated; the CVSS vector st... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-055-02 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow information to be disclosed, tampered with, or result in a denial-of-service condition. | 3.2.1 CROSS-SITE SCRIPTING CWE-79 Multiple vulnerabilities due to cross-site scripting exist in Energy Saving Data Collecting Server (EcoWebServerIII), which may result in information disclosure or information tampering of the product. CVE-2016-10735, CVE-2018-14040, CVE-2018-14042, CVE-2018-20676, CVE-2019-8331, CVE-2... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-053-03 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow an attacker to leverage the misconfigured privileges to the installed directory and achieve code execution in the applications context and permissions. | 3.2.1 INCORRECT DEFAULT PERMISSIONS CWE-276 The affected product is vulnerable to a permissions misconfiguration that may allow an attacker to locally write files to the Program Announcer directory and elevate permissions whenever the program is executed. CVE-2022-23922 has been assigned to this vulnerability. A CVSS v... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-053-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an attacker to achieve both code execution and local privilege escalation. | 3.2.1 IMPROPER PRIVILEGE MANAGEMENT CWE-269 Exploitation of this vulnerability may result in local privilege escalation and code execution. GE maintains exploitation of this vulnerability is only possible if the attacker has login access to a machine actively running CIMPLICITY, the CIMPLICITY server is not already run... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-053-02 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an attacker to capture a connection session, resulting in disclosure of sensitive information. | 3.2.1 CLEARTEXT TRANSMISSION OF SENSITIVE INFORMATION CWE-319 The affected product is vulnerable due to cleartext transmission of credentials seen in the CIMPLICITY network, which can be easily spoofed and used to log in to make operational changes to the system. CVE-2022-21798 has been assigned to this vulnerability. ... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-046-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could result in a variety of issues, including disclosure of data and loss of control of the SCADA system with IGSS running in production mode. | 3.2.1 INTEGER OVERFLOW OR WRAPAROUND CWE-190 A vulnerability exists that could cause heap-based buffer overflow, leading to denial of service and potentially remote code execution when an attacker sends multiple specially crafted messages. CVE-2022-24310 has been assigned to this vulnerability. A CVSS v3 base score of ... |
https://www.cisa.gov/news-events/ics-advisories/icsa-19-225-03 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could cause a denial-of-service condition. | 4.2.1 INSUFFICIENT RESOURCE POOLCWE-410 An attacker may send large message packages repeatedly to the telnet service, which may allow a denial-of-service condition. CVE-2019-10942 has been assigned to this vulnerability. A CVSS v3 base score of 8.6 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C... |
https://www.cisa.gov/news-events/ics-advisories/icsa-21-257-13 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an attacker with network access to the LAN interface of an affected device to hijack an ongoing connection or spoof a new one. | 4.2.1 USE OF INSUFFICIENTLY RANDOM VALUES CWE-330 The underlying TCP/IP stack does not properly calculate the random numbers used as ISN (Initial Sequence Numbers). An adjacent attacker with network access to the LAN interface could interfere with traffic, spoof the connection, and gain access to sensitive information.... |
https://www.cisa.gov/news-events/ics-advisories/icsa-21-350-16 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could lead to a crash of the application or arbitrary code execution. | 4.2.1 OUT-OF-BOUNDS WRITE CWE-787 The affected application lacks proper validation of user-supplied data when parsing DICOM files, which could result in an out-of-bounds write past the end of an allocated structure. An attacker could leverage this vulnerability to execute code in the context of the current process. CVE... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-041-06 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could compromise the confidentiality and integrity of the affected product. | 3.2.1 CROSS-SITE SCRIPTING CWE-79 The integrated web application Online Help in affected product contains a cross-site scripting vulnerability that could be exploited if unsuspecting users are tricked into accessing a malicious link. CVE-2022-23312 has been assigned to this vulnerability. A CVSS v3 base score of 5.4 ha... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-041-03 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could cause a leak of information or allow an attacker to perform remote code execution in the context of the current process. | 3.2.1 OUT-OF-BOUNDS WRITE CWE-787 Affected application contains an out of bounds write past the end of an allocated structure while parsing specially crafted NEU files. This could allow an attacker to execute code in the context of the current process. CVE-2021-46151 has been assigned to this vulnerability. A CVSS v3 b... |
https://www.cisa.gov/news-events/ics-advisories/icsa-21-068-06 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could cause a denial-of-service condition. | 4.2.1 OUT-OF-BOUNDS READ CWE-125 An attacker located in the same network could trigger a denial-of-service condition on the device by sending a specially crafted IP packet. CVE-2020-13987 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-041-04 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an attacker to use a specially crafted link to steal login credentials. | 3.2.1 OPEN REDIRECT CWE-601 SINEMA Remote Connect Server below v2.0 is affected by an open redirect vulnerability. An attacker could trick a valid authenticated user into clicking a malicious link, allowing the theft of login credentials. CVE-2022-23102 has been assigned to this vulnerability. A CVSS v3 base score of 5... |
https://www.cisa.gov/news-events/ics-advisories/icsa-21-243-02 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could crash the device being accessed; a buffer overflow condition may allow remote code execution. | 4.2.1 INTEGER COERCION ERROR CWE-192 The affected products are vulnerable to integer coercion errors, which cause the device to crash. A restart is required. CVE-2021-32996 has been assigned to this vulnerability. A CVSS v3 base score of 7.4 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-034-02 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow an attacker to gain user data (including organization details) and other sensitive data, compromise Mimosas AWS (Amazon Web Services) cloud EC2 instance and S3 Buckets, and execute unauthorized remote code on all cloud-connected Mimosa devices. | 3.2.1 IMPROPER AUTHORIZATION CWE-285 The affected product does not perform proper authorization and authentication checks on multiple API routes. An attacker may gain access to these API routes and achieve remote code execution, create a denial-of-service condition, and obtain sensitive information. CVE-2022-21196 has ... |
https://www.cisa.gov/news-events/ics-advisories/icsa-21-315-02 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could result in denial-of-service or buffer-overflow conditions, which may lead to remote code execution or information exposure. | 4.2.1 WRITE-WHAT-WHERE CONDITION CWE-123 Eclipse CycloneDDS versions prior to 0.8.0 are vulnerable to a write-what-where condition, which may allow an attacker to write arbitrary values in the XML parser. CVE-2021-38441 has been assigned to this vulnerability. A CVSS v3 base score of 6.6 has been calculated; the CVSS v... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-032-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an attacker to inject and execute arbitrary shell commands as an Admin user. | 3.2.1 IMPROPER NEUTRALIZATION OF SPECIAL ELEMENTS USED IN AN OS COMMAND ('OS COMMAND INJECTION') CWE-78 The affected product is vulnerable to an authenticated OS command injection, which may allow an attacker to inject and execute arbitrary shell commands as the Admin (root) user. CVE-2022-0365 has been assigned to thi... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-032-02 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow unauthorized access to intercept traffic using the hardcoded key. This could allow an attacker to achieve Web Server login and perform further actions. | 3.2.1 USE OF HARD-CODED CRYPTOGRAPHIC KEY CWE-321 The affected product has a hardcoded private key available inside the project folder, which may allow an attacker to achieve Web Server login and perform further actions. CVE-2022-22987 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assign... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-025-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could result in data exfiltration or arbitrary write, overwrite, and execution. | 3.2.1 IMPROPER RESTRICTION OF XML EXTERNAL ENTITY REFERENCE CWE-611 GE Gas Power ToolBoxST Version v04.07.05C suffers from an XML external entity (XXE) vulnerability using the DTD parameter entities technique that could result in disclosure and retrieval of arbitrary data on the affected node via an out-of-band (OOB) a... |
https://www.cisa.gov/news-events/ics-advisories/icsa-20-343-02 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow malicious attackers to cause deterioration of communication performance or cause a denial-of-service condition of the TCP communication functions of the products requiring a re-boot of the device to recover. | 4.2.1 OUT-OF-BOUNDS READ CWE-125 There is an out-of-bounds read vulnerability that may allow attackers to cause deterioration in communication performance or cause a denial-of-service condition of the TCP communication functions of the products by sending specially crafted packets. CVE-2020-5675 has been assigned to th... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-020-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could result in unauthorized access to information, unauthorized access to GENESIS64 and MC Works64 functionality, or the disabling of SQL Server. | 3.2.1 IMPROPER NEUTRALIZATION OF INPUT DURING WEB PAGE GENERATION ('CROSS-SITE SCRIPTING') CWE-79 ICONICS MobileHMI and Mitsubishi Electric MC Mobile products lack proper validation checks on user input and external data when they are used to render a page to the client. CVE-2022-23127 has been assigned to this vulnera... |
https://www.cisa.gov/news-events/ics-advisories/icsa-21-131-02 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability may be able to stop the communication function of the products, requiring a reset to regain functionality. | 4.2.1 BUFFER ACCESS WITH INCORRECT LENGTH VALUE CWE-805 An attacker could exploit this vulnerability to cause a denial-of-service condition in the MODBUS/TCP server communication function of GOT2000 series, GOT SIMPLE series, SoftGOT2000 and Tension Controller. CVE-2021-20589 has been assigned to this vulnerability. A ... |
https://www.cisa.gov/news-events/ics-advisories/icsa-21-103-14 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an attacker to poison the DNS cache or spoof DNS resolving. | 4.2.1 USE OF INSUFFICIENTLY RANDOM VALUES CWE-330 The DNS client does not properly randomize UDP port numbers of DNS requests. This could allow an attacker to poison the DNS cache or spoof DNS resolving. CVE-2021-27393 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS ve... |
https://www.cisa.gov/news-events/ics-advisories/icsa-21-266-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow a user to execute arbitrary code on the controller. | 4.2.1 IMPROPER CONTROL OF GENERATION OF CODE ('CODE INJECTION') CWE-94 The affected controllers do not properly sanitize the input containing code syntax. As a result, an attacker could craft code to alter the intended controller flow of the software. CVE-2021-38448 has been assigned to this vulnerability. A CVSS v3 ba... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-013-07 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability may cause a denial-of-service condition in the affected product. | 3.2.1 IMPROPER INITIALIZATION CWE-665 An attacker could send a specially crafted packet that could create a denial-of-service condition in the communication function of the product. A system reset is required for recovery. CVE-2021-20613 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calc... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-013-06 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an attacker to achieve persistence on the system or cause a denial-of-service condition. | 3.2.1 UNQUOTED SEARCH PATH OR ELEMENT CWE-428 A service is started by an unquoted registry entry. As there are spaces in this path, attackers with write privilege to those directories could plant executables that will run in place of the legitimate process. Attackers could achieve persistence on the system (backdoors) ... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-013-04 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an unauthenticated attacker to read device information. | 3.2.1 IMPROPER INPUT VALIDATION CWE-20 An improper input validation vulnerability in the web server could allow an unauthenticated user to access device information. CVE-2021-41769 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-013-03 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could result in access to TFTP memory buffer contents, information leaks, and denial-of-service conditions. | 3.2.1 ACCESS OF RESOURCE USING INCOMPATIBLE TYPE (TYPE CONFUSION') CWE-843 ICMP echo packets with fake IP options allow sending ICMP echo reply messages to arbitrary hosts on the network. CVE-2021-31344 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-013-02 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow a privileged user to enable a debug port with default credentials and access to certain log files. | 3.2.1 USE OF HARD-CODED CREDENTIALS CWE-798 An undocumented debug port uses hard-coded default credentials. If this port is enabled by a privileged user, an attacker aware of the credentials could access an administrative debug shell on the affected device. CVE-2021-45033 has been assigned to this vulnerability. A CVSS... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-013-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could lead to a denial-of-service condition in the communication function of the product or cause other unspecified effects. | 3.2.1 LACK OF ADMINISTRATOR CONTROL OVER SECURITY CWE-671 The affected product is vulnerable due to a lack of administrative controls, which may allow an attacker to remotely send specially crafted packets and cause a denial-of-service condition or other unspecified effects. CVE-2021-20612 has been assigned to this vul... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-006-03 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of these vulnerabilities could allow an attacker to upload, alter, and/or download the PLC user program. An attacker could also access the PLC web server and hijack the controllers, resulting in the manipulation and/or suspension of the PLC output. | 3.2.1 UNPROTECTED TRANSPORT OF CREDENTIALS CWE-523 An attacker may obtain the user credentials from the communication between the PLC and the software. As a result, the PLC user program may be uploaded, altered, and/or downloaded. CVE-2021-37400 has been assigned to this vulnerability. A CVSS v3 base score of 7.6 has b... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-006-02 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could cause a denial-of-service condition. | 3.2.1 UNCONTROLLED RESOURCE CONSUMPTION CWE-400 A specially crafted packet sent to the Fernhill SCADA Server may cause an exception, causing the server process (FHSvrService.exe) to exit. CVE-2022-21155 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (... |
https://www.cisa.gov/news-events/ics-advisories/icsa-22-006-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability may allow arbitrary code execution. | 3.2.1 STACK-BASED BUFFER OVERFLOW CWE-121 The affected product is vulnerable to a stack-based buffer overflow while processing specific project files, which may allow an attacker to execute arbitrary code. CVE-2022-21137 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS ve... |
https://www.cisa.gov/news-events/ics-advisories/icsa-21-357-02 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow an attacker to enter malicious input resulting in remote code execution. | 3.2.1 IMPROPER INPUT VALIDATION CWE-20 An attacker could enter malicious data into the affected product, causing remote code execution. CVE-2021-44228 has been assigned to this vulnerability. A CVSS v3 base score of 10.0 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). |
https://www.cisa.gov/news-events/ics-advisories/icsa-21-357-01 | You are given the following descriptions of a cyber incident Vulnerability Overview. Please perform an analysis and deduce the risk evaluation. Return your answer in one sentence in a format such as "Successful exploitation of this vulnerability could allow an attacker to inject arbitrary JavaScript into a user's web b... | Successful exploitation of this vulnerability could allow remote attackers to obtain sensitive information. | 3.2.1 CLEARTEXT TRANSMISSION OF SENSITIVE INFORMATION CWE-319 The affected products contain vulnerable firmware, which could allow an attacker to sniff the traffic and decrypt login credential details. This could give an attacker admin rights through the HTTP web server. CVE-2021-4161has been assigned to this vulnerabi... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.