Lucene search

K
Opto22Snap Pac S1 Firmware

5 matches found

CVE
CVE
added 2023/08/24 5:15 p.m.36 views

CVE-2023-40708

The File Transfer Protocol (FTP) port is open by default in the SNAP PAC S1 Firmware version R10.3b. This could allow an adversary to access some device files.

5.8CVSS5.7AI score0.00108EPSS
CVE
CVE
added 2023/08/24 5:15 p.m.36 views

CVE-2023-40710

An adversary could cause a continuous restart loop to the entire device by sending a large quantity of HTTP GET requests if the controller has the built-in web server enabled but does not have the built-in web server completely set up and configured for the SNAP PAC S1 Firmware version R10.3b

7.5CVSS7.2AI score0.00091EPSS
CVE
CVE
added 2023/08/24 5:15 p.m.30 views

CVE-2023-40706

There is no limit on the number of login attempts in the web server for the SNAP PAC S1 Firmware version R10.3b. This could allow for a brute-force attack on the built-in web server login.

9.8CVSS9.3AI score0.00079EPSS
CVE
CVE
added 2023/08/24 5:15 p.m.29 views

CVE-2023-40707

There are no requirements for setting a complex password in the built-in web server of the SNAP PAC S1 Firmware version R10.3b, which could allow for a successful brute force attack if users don't set up complex credentials.

8.6CVSS8.2AI score0.00058EPSS
CVE
CVE
added 2023/08/24 5:15 p.m.29 views

CVE-2023-40709

An adversary could crash the entire device by sending a large quantity of ICMP requests if the controller has the built-in web server enabled but does not have the built-in web server completely set up and configured for the SNAP PAC S1 Firmware version R10.3b

7.5CVSS7.2AI score0.00091EPSS