Lucene search

K
JtektPc10b-p Tcc-6373 Firmware

4 matches found

CVE
CVE
added 2022/07/26 10:15 p.m.68 views

CVE-2022-29958

JTEKT TOYOPUC PLCs through 2022-04-29 do not ensure data integrity. They utilize the unauthenticated CMPLink/TCP protocol for engineering purposes, including downloading projects and control logic to the PLC. Control logic is downloaded to the PLC on a block-by-block basis with a given memory addre...

9.8CVSS9.7AI score0.0008EPSS
CVE
CVE
added 2022/07/26 10:15 p.m.62 views

CVE-2022-29951

JTEKT TOYOPUC PLCs through 2022-04-29 mishandle authentication. They utilize the CMPLink/TCP protocol (configurable on ports 1024-65534 on either TCP or UDP) for a wide variety of engineering purposes such as starting and stopping the PLC, downloading and uploading projects, and changing configurat...

9.1CVSS9.2AI score0.00071EPSS
CVE
CVE
added 2021/04/19 10:15 p.m.61 views

CVE-2021-27458

If Ethernet communication of the JTEKT Corporation TOYOPUC product series’ (TOYOPUC-PC10 Series: PC10G-CPU TCC-6353: All versions, PC10GE TCC-6464: All versions, PC10P TCC-6372: All versions, PC10P-DP TCC-6726: All versions, PC10P-DP-IO TCC-6752: All versions, PC10B-P TCC-6373: All versions, PC10B ...

7.5CVSS7.5AI score0.00263EPSS
CVE
CVE
added 2021/09/10 12:15 p.m.41 views

CVE-2021-33011

All versions of the afffected TOYOPUC-PC10 Series,TOYOPUC-Plus Series,TOYOPUC-PC3J/PC2J Series, TOYOPUC-Nano Series products may not be able to properly process an ICMP flood, which may allow an attacker to deny Ethernet communications between affected devices.

4.3CVSS4.5AI score0.00066EPSS