Lucene search

K

UNEM Security Vulnerabilities

cve
cve

CVE-2023-1711

A vulnerability exists in a FOXMAN-UN and UNEM logging component, it only affects systems that use remote authentication to the network elements. If exploited an attacker could obtain confidential information. List of CPEs: * cpe:2.3:a:hitachienergy:foxman_un:R9C::::::: * ...

4.4CVSS

4.8AI Score

0.001EPSS

2023-05-30 07:15 PM
18
cve
cve

CVE-2021-40342

In the DES implementation, the affected product versions use a default key for encryption. Successful exploitation allows an attacker to obtain sensitive information and gain access to the network elements that are managed by the affected products versions. This issue affects FOXMAN-UN product:...

9.8CVSS

9.2AI Score

0.001EPSS

2023-01-05 10:15 PM
28
cve
cve

CVE-2021-40341

DES cipher, which has inadequate encryption strength, is used Hitachi Energy FOXMAN-UN to encrypt user credentials used to access the Network Elements. Successful exploitation allows sensitive information to be decrypted easily. This issue affects FOXMAN-UN product: FOXMAN-UN R16A, FOXMAN-UN...

5.5CVSS

7.2AI Score

0.0004EPSS

2023-01-05 10:15 PM
30
cve
cve

CVE-2022-3928

Hardcoded credential is found in affected products' message queue. An attacker that manages to exploit this vulnerability will be able to access data to the internal message queue. This issue affects FOXMAN-UN product: FOXMAN-UN R15B, FOXMAN-UN R15A, FOXMAN-UN R14B, FOXMAN-UN R14A, FOXMAN-UN...

5.5CVSS

7.2AI Score

0.0004EPSS

2023-01-05 10:15 PM
23
cve
cve

CVE-2022-3929

Communication between the client and the server application of the affected products is partially done using CORBA (Common Object Request Broker Architecture) over TCP/IP. This protocol is not encrypted and allows tracing of internal messages. This issue affects FOXMAN-UN product: FOXMAN-UN...

9.8CVSS

9.5AI Score

0.002EPSS

2023-01-05 10:15 PM
31
cve
cve

CVE-2022-3927

The affected products store both public and private key that are used to sign and protect Custom Parameter Set (CPS) file from modification. An attacker that manages to exploit this vulnerability will be able to change the CPS file, sign it so that it is trusted as the legitimate CPS file. This...

9.8CVSS

9.4AI Score

0.002EPSS

2023-01-05 10:15 PM
24