DES cipher, which has inadequate encryption strength, is used Hitachi Energy FOXMAN-UN to encrypt user credentials used to access the Network Elements. Successful exploitation allows sensitive information to be decrypted easily. This issue affects FOXMAN-UN product: FOXMAN-UN R16A, FOXMAN-UN R15B, ...
7.1CVSS
5.3AI Score
0.0004EPSS
In the DES implementation, the affected product versions use a default key for encryption. Successful exploitation allows an attacker to obtain sensitive information and gain access to the network elements that are managed by the affected products versions. This issue affects FOXMAN-UN product: FOX...
9.8CVSS
9.2AI Score
0.002EPSS
The affected products store both public and private key that are used to sign andprotect Custom Parameter Set (CPS) file from modification. An attacker that manages to exploit this vulnerability will be able to changethe CPS file, sign it so that it is trusted as the legitimate CPS file. This issue...
9.8CVSS
9.3AI Score
0.002EPSS
Hardcoded credential is found in affected products' message queue. An attacker that manages to exploit this vulnerability will be able to access data to the internal message queue. This issue affects FOXMAN-UN product: FOXMAN-UN R15B, FOXMAN-UN R15A, FOXMAN-UN R14B, FOXMAN-UN R14A, FOXMAN-UN R11B, ...
7.1CVSS
5.4AI Score
0.0004EPSS
Communication between the client and the server application of the affected products is partially done using CORBA (Common Object Request Broker Architecture) over TCP/IP. This protocol is not encrypted and allows tracing of internal messages. This issue affects FOXMAN-UN product: FOXMAN-UN R15B, F...
9.8CVSS
9.4AI Score
0.002EPSS
A vulnerability exists in a FOXMAN-UN and UNEM logging component, it only affects systems that use remote authentication to the network elements.If exploited an attacker could obtain confidential information. List of CPEs: cpe:2.3:a:hitachienergy:foxman_un:R9C:: :: :: :* cpe:2.3:a:hitachienergy:fox...
4.4CVSS
4.8AI Score
0.001EPSS
A heap-based buffer overflow vulnerability exists in the FOXMAN-UN/UNEM thatif exploited will generally lead to a denial of service but can be usedto execute arbitrary code, which is usually outside the scope of aprogram's implicit security policy
9.8CVSS
8.8AI Score
0.001EPSS
vulnerability exists in the FOXMAN-UN/UNEM server / API Gateway that if exploited an attacker could use to allow unintended commands orcode to be executed on the UNEM server allowing sensitive data tobe read or modified or could cause other unintended behavior
9.8CVSS
9.2AI Score
0.001EPSS
An authentication bypass vulnerability exists in the FOXMAN-UN/UNEM server /API Gateway component that if exploited allows attackers withoutany access to interact with the services and the post-authenticationattack surface.
10CVSS
9.6AI Score
0.001EPSS
A user/password reuse vulnerability exists in the FOXMAN-UN/UNEM application and server management. If exploited a malicious usercould use the passwords and login information to extend access onthe server and other services.
9.9CVSS
6.6AI Score
0.001EPSS
A vulnerability exists in the FOXMAN-UN/UNEM server that affects the messagequeueing mechanism’s certificate validation. If exploited an attacker could spoof a trusted entity causing a loss of confidentialityand integrity.
8CVSS
7.7AI Score
0.001EPSS
A vulnerability exists in the FOXMAN-UN/UNEM server / APIGateway thatif exploited allows a malicious user to perform an arbitrary numberof authentication attempts using different passwords, andeventually gain access to the targeted account.
6.5CVSS
7.3AI Score
0.0005EPSS
A vulnerability exists in the FOXMAN-UN/UNEM in which sensitive information isstored in cleartext within a resource that might be accessible to another control sphere.
4.1CVSS
3.4AI Score
0.0004EPSS