Vulnerabilities
Vulnerable Software
Security Vulnerabilities - CVEs Published In June 2022
LRM utilizes elevated privileges. An unauthenticated malicious actor can upload and execute code remotely at the operating system level, which can allow an attacker to change settings, configurations, software, or access sensitive data on the affected produc. An attacker could also exploit this vulnerability to access APIs not intended for general use and interact through the network.
CVSS Score
10.0
EPSS Score
0.002
Published
2022-06-24
LRM contains a directory traversal vulnerability that can allow a malicious actor to upload outside the intended directory structure.
CVSS Score
10.0
EPSS Score
0.002
Published
2022-06-24
LRM does not restrict the types of files that can be uploaded to the affected product. A malicious actor can upload any file type, including executable code that allows for a remote code exploit.
CVSS Score
10.0
EPSS Score
0.002
Published
2022-06-24
LRM does not implement authentication or authorization by default. A malicious actor can inject, replay, modify, and/or intercept sensitive data.
CVSS Score
9.1
EPSS Score
0.002
Published
2022-06-24
LRM version 2.4 and lower does not implement TLS encryption. A malicious actor can MITM attack sensitive data in-transit, including credentials.
CVSS Score
7.4
EPSS Score
0.001
Published
2022-06-24
The default password for the web application’s root user (the vendor’s private account) was weak and the MD5 hash was used to crack the password using a widely available open-source tool.
CVSS Score
6.5
EPSS Score
0.001
Published
2022-06-24
Client-side JavaScript controls may be bypassed by directly running a JS function to reboot the PLC (e.g., from the browser console) or by loading the corresponding, browser accessible PHP script
CVSS Score
7.5
EPSS Score
0.002
Published
2022-06-24
Weak default root user credentials allow remote attackers to easily obtain OS superuser privileges over the open TCP port for SSH.
CVSS Score
9.8
EPSS Score
0.005
Published
2022-06-24
The tested version of Dominion Voting Systems ImageCast X does not validate application signatures to a trusted root certificate. Use of a trusted root certificate ensures software installed on a device is traceable to, or verifiable against, a cryptographic key provided by the manufacturer to detect tampering. An attacker could leverage this vulnerability to install malicious code, which could also be spread to other vulnerable ImageCast X devices via removable media.
CVSS Score
6.8
EPSS Score
0.0
Published
2022-06-24
The tested version of Dominion Voting Systems ImageCast X’s on-screen application hash display feature, audit log export, and application export functionality rely on self-attestation mechanisms. An attacker could leverage this vulnerability to disguise malicious applications on a device.
CVSS Score
4.6
EPSS Score
0.001
Published
2022-06-24


Contact Us

Shodan ® - All rights reserved