Search criteria Use full-text search for keyword queries.
Combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by dates instead of relevance.

573 vulnerabilities

CVE-2025-41712 (GCVE-0-2025-41712)

Vulnerability from cvelistv5 – Published: 2026-03-10 08:27 – Updated: 2026-03-10 16:51
VLAI?
Title
Incorrect Permission Assignment on power analyzer
Summary
An unauthenticated remote attacker who tricks a user to upload a manipulated HTML file can get access to sensitive information on the device. This is a result of incorrect permission assignment for the web server.
CWE
  • CWE-732 - Incorrect Permission Assignment for Critical Resource
Assigner
Credits
Deutsche Telekom Security (DT Security)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41712",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-03-10T15:35:50.983890Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-03-10T16:51:35.020Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "UMG 96RM-E 24V(5222063)",
          "vendor": "Janitza",
          "versions": [
            {
              "lessThanOrEqual": "3.13",
              "status": "affected",
              "version": "0.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "UMG 96RM-E 230V(5222062)",
          "vendor": "Janitza",
          "versions": [
            {
              "lessThanOrEqual": "3.13",
              "status": "affected",
              "version": "0.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ENERGY METER 750-230 (2540910000)",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThanOrEqual": "3.13",
              "status": "affected",
              "version": "0.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ENERGY METER 750-24 (2540900000)",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThanOrEqual": "3.13",
              "status": "affected",
              "version": "0.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Deutsche Telekom Security (DT Security)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAn unauthenticated remote attacker who tricks a user to upload a manipulated HTML file can get access to sensitive information on the device. This is a result of incorrect permission assignment for the web server.\u003c/span\u003e\u003cbr\u003e"
            }
          ],
          "value": "An unauthenticated remote attacker who tricks a user to upload a manipulated HTML file can get access to sensitive information on the device. This is a result of incorrect permission assignment for the web server."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-732",
              "description": "CWE-732 Incorrect Permission Assignment for Critical Resource",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-03-10T08:27:10.120Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://certvde.com/en/advisories/VDE-2025-079/"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://certvde.com/en/advisories/VDE-2025-096/"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://janitza.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2025-079.json"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://weidmueller.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2025-096.json"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Incorrect Permission Assignment on power analyzer",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41712",
    "datePublished": "2026-03-10T08:27:10.120Z",
    "dateReserved": "2025-04-16T11:17:48.311Z",
    "dateUpdated": "2026-03-10T16:51:35.020Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-41711 (GCVE-0-2025-41711)

Vulnerability from cvelistv5 – Published: 2026-03-10 08:26 – Updated: 2026-03-10 16:51
VLAI?
Title
Use of a Broken or Risky Cryptographic Algorithm for firmware images of power analyzer
Summary
An unauthenticated remote attacker can use firmware images to extract password hashes and brute force plaintext passwords of accounts with limited access.
CWE
  • CWE-327 - Use of a Broken or Risky Cryptographic Algorithm
Assigner
Credits
Deutsche Telekom Security (DT Security)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41711",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-03-10T15:57:57.426147Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-03-10T16:51:40.984Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "UMG 96RM-E 24V(5222063)",
          "vendor": "Janitza",
          "versions": [
            {
              "lessThanOrEqual": "3.13",
              "status": "affected",
              "version": "0.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "UMG 96RM-E 230V(5222062)",
          "vendor": "Janitza",
          "versions": [
            {
              "lessThanOrEqual": "3.13",
              "status": "affected",
              "version": "0.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ENERGY METER 750-230 (2540910000)",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThanOrEqual": "3.13",
              "status": "affected",
              "version": "0.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ENERGY METER 750-24 (2540900000)",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThanOrEqual": "3.13",
              "status": "affected",
              "version": "0.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Deutsche Telekom Security (DT Security)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAn unauthenticated remote attacker can use firmware images to extract password hashes and brute force plaintext passwords of accounts with limited access.\u003c/span\u003e\u003cbr\u003e"
            }
          ],
          "value": "An unauthenticated remote attacker can use firmware images to extract password hashes and brute force plaintext passwords of accounts with limited access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-327",
              "description": "CWE-327 Use of a Broken or Risky Cryptographic Algorithm",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-03-10T08:26:48.759Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://certvde.com/en/advisories/VDE-2025-079/"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://certvde.com/en/advisories/VDE-2025-096/"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://janitza.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2025-079.json"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://weidmueller.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2025-096.json"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Use of a Broken or Risky Cryptographic Algorithm for firmware images of power analyzer",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41711",
    "datePublished": "2026-03-10T08:26:48.759Z",
    "dateReserved": "2025-04-16T11:17:48.311Z",
    "dateUpdated": "2026-03-10T16:51:40.984Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-41710 (GCVE-0-2025-41710)

Vulnerability from cvelistv5 – Published: 2026-03-10 08:26 – Updated: 2026-03-10 16:51
VLAI?
Title
Use of Hard-coded Credentials in power analyzer
Summary
An unauthenticated remote attacker may use hardcodes credentials to get access to the previously activated FTP Server with limited read and write privileges.
CWE
  • CWE-798 - Use of Hard-coded Credentials
Assigner
Credits
Deutsche Telekom Security (DT Security)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41710",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-03-10T15:57:59.951313Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-03-10T16:51:47.193Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "UMG 96RM-E 24V(5222063)",
          "vendor": "Janitza",
          "versions": [
            {
              "lessThanOrEqual": "3.13",
              "status": "affected",
              "version": "0.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "UMG 96RM-E 230V(5222062)",
          "vendor": "Janitza",
          "versions": [
            {
              "lessThanOrEqual": "3.13",
              "status": "affected",
              "version": "0.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ENERGY METER 750-230 (2540910000)",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThanOrEqual": "3.13",
              "status": "affected",
              "version": "0.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ENERGY METER 750-24 (2540900000)",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThanOrEqual": "3.13",
              "status": "affected",
              "version": "0.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Deutsche Telekom Security (DT Security)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAn unauthenticated remote attacker may use hardcodes credentials to get access to the previously activated FTP Server with limited read and write privileges.\u003c/span\u003e\u003cbr\u003e"
            }
          ],
          "value": "An unauthenticated remote attacker may use hardcodes credentials to get access to the previously activated FTP Server with limited read and write privileges."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-798",
              "description": "CWE-798 Use of Hard-coded Credentials",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-03-10T08:26:30.909Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://certvde.com/en/advisories/VDE-2025-079/"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://certvde.com/en/advisories/VDE-2025-096/"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://janitza.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2025-079.json"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://weidmueller.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2025-096.json"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Use of Hard-coded Credentials in power analyzer",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41710",
    "datePublished": "2026-03-10T08:26:30.909Z",
    "dateReserved": "2025-04-16T11:17:48.311Z",
    "dateUpdated": "2026-03-10T16:51:47.193Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-41709 (GCVE-0-2025-41709)

Vulnerability from cvelistv5 – Published: 2026-03-10 08:26 – Updated: 2026-03-10 16:51
VLAI?
Title
Command injection in power analyzer via Modbus-TCP and Modbus-RTU
Summary
[PROBLEMTYPE] in [COMPONENT] in [VENDOR] [PRODUCT] [VERSION] on [PLATFORMS] allows [ATTACKER] to [IMPACT] via [VECTOR]
CWE
  • CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Assigner
Credits
Deutsche Telekom Security (DT Security)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41709",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-03-10T15:58:49.458010Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-03-10T16:51:53.333Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "UMG 96RM-E 24V(5222063)",
          "vendor": "Janitza",
          "versions": [
            {
              "lessThanOrEqual": "3.13",
              "status": "affected",
              "version": "0.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "UMG 96RM-E 230V(5222062)",
          "vendor": "Janitza",
          "versions": [
            {
              "lessThanOrEqual": "3.13",
              "status": "affected",
              "version": "0.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ENERGY METER 750-230 (2540910000)",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThanOrEqual": "3.13",
              "status": "affected",
              "version": "0.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ENERGY METER 750-24 (2540900000)",
          "vendor": "Weidmueller",
          "versions": [
            {
              "lessThanOrEqual": "3.13",
              "status": "affected",
              "version": "0.0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Deutsche Telekom Security (DT Security)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "[PROBLEMTYPE] in [COMPONENT] in [VENDOR] [PRODUCT] [VERSION] on [PLATFORMS] allows [ATTACKER] to [IMPACT] via [VECTOR]"
            }
          ],
          "value": "[PROBLEMTYPE] in [COMPONENT] in [VENDOR] [PRODUCT] [VERSION] on [PLATFORMS] allows [ATTACKER] to [IMPACT] via [VECTOR]"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-03-10T08:26:14.936Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://certvde.com/en/advisories/VDE-2025-079/"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://certvde.com/en/advisories/VDE-2025-096/"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://janitza.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2025-079.json"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://weidmueller.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2025-096.json"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Command injection in power analyzer via Modbus-TCP and Modbus-RTU",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41709",
    "datePublished": "2026-03-10T08:26:14.936Z",
    "dateReserved": "2025-04-16T11:17:48.311Z",
    "dateUpdated": "2026-03-10T16:51:53.333Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-2364 (GCVE-0-2026-2364)

Vulnerability from cvelistv5 – Published: 2026-03-10 07:22 – Updated: 2026-03-10 16:51
VLAI?
Title
CODESYS Installer TOCTOU Privilege Escalation
Summary
If a legitimate user confirms a self-update prompt or initiate an installation of a CODESYS Development System, a low privileged local attacker can gain elevated rights due to a TOCTOU vulnerability in the CODESYS installer.
CWE
  • CWE-367 - Time-of-check Time-of-use (TOCTOU) Race Condition
Assigner
Impacted products
Vendor Product Version
CODESYS CODESYS Installer Affected: 0.0.0 , < 2.6.1.0 (semver)
Create a notification for this product.
Credits
David Ruscheweyh from SEW-EURODRIVE GmbH & Co KG
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-2364",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-03-10T15:39:49.202345Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-03-10T16:51:59.328Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "CODESYS Installer",
          "vendor": "CODESYS",
          "versions": [
            {
              "lessThan": "2.6.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "David Ruscheweyh from SEW-EURODRIVE GmbH \u0026 Co KG"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "If a legitimate user confirms a self-update prompt or initiate an installation of a CODESYS Development System, a low privileged local attacker can gain elevated rights due to a TOCTOU vulnerability in the CODESYS installer.\u003cbr\u003e"
            }
          ],
          "value": "If a legitimate user confirms a self-update prompt or initiate an installation of a CODESYS Development System, a low privileged local attacker can gain elevated rights due to a TOCTOU vulnerability in the CODESYS installer."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-367",
              "description": "CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-03-10T07:22:42.658Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://certvde.com/de/advisories/VDE-2026-012"
        }
      ],
      "source": {
        "advisory": "VDE-2026-012",
        "defect": [
          "CERT@VDE#641953"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "CODESYS Installer TOCTOU Privilege Escalation",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2026-2364",
    "datePublished": "2026-03-10T07:22:42.658Z",
    "dateReserved": "2026-02-11T18:46:15.172Z",
    "dateUpdated": "2026-03-10T16:51:59.328Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-41772 (GCVE-0-2025-41772)

Vulnerability from cvelistv5 – Published: 2026-03-09 08:18 – Updated: 2026-03-09 18:18
VLAI?
Title
wwwupdate.cgi Session token in URL
Summary
An unauthenticated remote attacker can obtain valid session tokens because they are exposed in plaintext within the URL parameters of the wwwupdate.cgi endpoint in UBR.
CWE
  • CWE-598 - Use of GET Request Method With Sensitive Query Strings
Assigner
Impacted products
Vendor Product Version
MBS UBR-01 Mk II Affected: 0.0.0 , < 6.0.1.0 (semver)
Create a notification for this product.
    MBS UBR-02 Affected: 0.0.0 , < 6.0.1.0 (semver)
Create a notification for this product.
    MBS UBR-LON Affected: 0.0.0 , < 6.0.1.0 (semver)
Create a notification for this product.
Credits
Adrien Rey from Cyber Defense Campus Zurich Daniel Hulliger from Armasuisse
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41772",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-03-09T18:17:43.406586Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-03-09T18:18:41.648Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "UBR-01 Mk II",
          "vendor": "MBS",
          "versions": [
            {
              "lessThan": "6.0.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "UBR-02",
          "vendor": "MBS",
          "versions": [
            {
              "lessThan": "6.0.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "UBR-LON",
          "vendor": "MBS",
          "versions": [
            {
              "lessThan": "6.0.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Adrien Rey from Cyber Defense Campus Zurich"
        },
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Daniel Hulliger from Armasuisse"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An unauthenticated remote attacker can obtain valid session tokens because they are exposed in plaintext within the URL parameters of the wwwupdate.cgi endpoint in UBR.\u003cbr\u003e"
            }
          ],
          "value": "An unauthenticated remote attacker can obtain valid session tokens because they are exposed in plaintext within the URL parameters of the wwwupdate.cgi endpoint in UBR."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-598",
              "description": "CWE-598 Use of GET Request Method With Sensitive Query Strings",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-03-09T08:18:49.918Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://www.mbs-solutions.de/mbs-2025-0001"
        }
      ],
      "source": {
        "defect": [
          "CERT@VDE#641895"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "wwwupdate.cgi Session token in URL",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41772",
    "datePublished": "2026-03-09T08:18:49.918Z",
    "dateReserved": "2025-04-16T11:18:45.761Z",
    "dateUpdated": "2026-03-09T18:18:41.648Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-41767 (GCVE-0-2025-41767)

Vulnerability from cvelistv5 – Published: 2026-03-09 08:18 – Updated: 2026-03-09 18:19
VLAI?
Title
Signature bypass on update upload
Summary
A high-privileged remote attacker can fully compromise the device by abusing an update signature bypass vulnerability in the wwwupdate.cgi method in the web interface of UBR.
CWE
  • CWE-347 - Improper Verification of Cryptographic Signature
Assigner
Impacted products
Vendor Product Version
MBS UBR-01 Mk II Affected: 0.0.0 , < 6.0.1.0 (semver)
Create a notification for this product.
    MBS UBR-02 Affected: 0.0.0 , < 6.0.1.0 (semver)
Create a notification for this product.
    MBS UBR-LON Affected: 0.0.0 , < 6.0.1.0 (semver)
Create a notification for this product.
Credits
Adrien Rey from Cyber Defense Campus Zurich Daniel Hulliger from Armasuisse
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41767",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-03-09T18:18:54.140033Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-03-09T18:19:09.365Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "UBR-01 Mk II",
          "vendor": "MBS",
          "versions": [
            {
              "lessThan": "6.0.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "UBR-02",
          "vendor": "MBS",
          "versions": [
            {
              "lessThan": "6.0.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "UBR-LON",
          "vendor": "MBS",
          "versions": [
            {
              "lessThan": "6.0.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Adrien Rey from Cyber Defense Campus Zurich"
        },
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Daniel Hulliger from Armasuisse"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A high-privileged remote attacker can fully compromise the device by abusing an update signature bypass vulnerability in the wwwupdate.cgi method in the web interface of UBR.\u003cbr\u003e"
            }
          ],
          "value": "A high-privileged remote attacker can fully compromise the device by abusing an update signature bypass vulnerability in the wwwupdate.cgi method in the web interface of UBR."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-347",
              "description": "CWE-347 Improper Verification of Cryptographic Signature",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-03-09T08:18:17.428Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://www.mbs-solutions.de/mbs-2025-0001"
        }
      ],
      "source": {
        "defect": [
          "CERT@VDE#641895"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Signature bypass on update upload",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41767",
    "datePublished": "2026-03-09T08:18:17.428Z",
    "dateReserved": "2025-04-16T11:18:45.761Z",
    "dateUpdated": "2026-03-09T18:19:09.365Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-41766 (GCVE-0-2025-41766)

Vulnerability from cvelistv5 – Published: 2026-03-09 08:18 – Updated: 2026-03-09 20:14
VLAI?
Title
Stack buffer overflow on parsing web request
Summary
A low-privileged remote attacker can trigger a stack-based buffer overflow via a crafted HTTP POST request using the ubr-network method resulting in full device compromise.
CWE
Assigner
Impacted products
Vendor Product Version
MBS UBR-01 Mk II Affected: 0.0.0 , < 6.0.1.0 (semver)
Create a notification for this product.
    MBS UBR-02 Affected: 0.0.0 , < 6.0.1.0 (semver)
Create a notification for this product.
    MBS UBR-LON Affected: 0.0.0 , < 6.0.1.0 (semver)
Create a notification for this product.
Credits
Adrien Rey from Cyber Defense Campus Zurich Daniel Hulliger from Armasuisse
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41766",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-03-09T20:03:36.827793Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-03-09T20:14:03.688Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "UBR-01 Mk II",
          "vendor": "MBS",
          "versions": [
            {
              "lessThan": "6.0.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "UBR-02",
          "vendor": "MBS",
          "versions": [
            {
              "lessThan": "6.0.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "UBR-LON",
          "vendor": "MBS",
          "versions": [
            {
              "lessThan": "6.0.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Adrien Rey from Cyber Defense Campus Zurich"
        },
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Daniel Hulliger from Armasuisse"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A low-privileged remote attacker can trigger a stack-based buffer overflow via a crafted HTTP POST request using the ubr-network method resulting in full device compromise.\u003cbr\u003e"
            }
          ],
          "value": "A low-privileged remote attacker can trigger a stack-based buffer overflow via a crafted HTTP POST request using the ubr-network method resulting in full device compromise."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-03-09T08:18:03.783Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://www.mbs-solutions.de/mbs-2025-0001"
        }
      ],
      "source": {
        "defect": [
          "CERT@VDE#641895"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Stack buffer overflow on parsing web request",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41766",
    "datePublished": "2026-03-09T08:18:03.783Z",
    "dateReserved": "2025-04-16T11:18:45.761Z",
    "dateUpdated": "2026-03-09T20:14:03.688Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-41765 (GCVE-0-2025-41765)

Vulnerability from cvelistv5 – Published: 2026-03-09 08:17 – Updated: 2026-03-09 20:14
VLAI?
Title
Unchecked role in wwwupload.cgi
Summary
Due to insufficient authorization enforcement, an unauthorized remote attacker can exploit the wwwupload.cgi endpoint to upload and apply arbitrary data. This includes, but is not limited to, contact images, HTTPS certificates, system backups for restoration, server peer configurations, and BACnet/SC server certificates and keys.
CWE
Assigner
Impacted products
Vendor Product Version
MBS UBR-01 Mk II Affected: 0.0.0 , < 6.0.1.0 (semver)
Create a notification for this product.
    MBS UBR-02 Affected: 0.0.0 , < 6.0.1.0 (semver)
Create a notification for this product.
    MBS UBR-LON Affected: 0.0.0 , < 6.0.1.0 (semver)
Create a notification for this product.
Credits
Adrien Rey from Cyber Defense Campus Zurich Daniel Hulliger from Armasuisse
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41765",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-03-09T20:03:25.311007Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-03-09T20:14:03.869Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "UBR-01 Mk II",
          "vendor": "MBS",
          "versions": [
            {
              "lessThan": "6.0.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "UBR-02",
          "vendor": "MBS",
          "versions": [
            {
              "lessThan": "6.0.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "UBR-LON",
          "vendor": "MBS",
          "versions": [
            {
              "lessThan": "6.0.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Adrien Rey from Cyber Defense Campus Zurich"
        },
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Daniel Hulliger from Armasuisse"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Due to insufficient authorization enforcement, an unauthorized remote attacker can exploit the wwwupload.cgi endpoint to upload and apply arbitrary data. This includes, but is not limited to, contact images, HTTPS certificates, system backups for restoration, server peer configurations, and BACnet/SC server certificates and keys.\u003cbr\u003e"
            }
          ],
          "value": "Due to insufficient authorization enforcement, an unauthorized remote attacker can exploit the wwwupload.cgi endpoint to upload and apply arbitrary data. This includes, but is not limited to, contact images, HTTPS certificates, system backups for restoration, server peer configurations, and BACnet/SC server certificates and keys."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-862",
              "description": "CWE-862 Missing Authorization",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-03-09T08:17:54.920Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://www.mbs-solutions.de/mbs-2025-0001"
        }
      ],
      "source": {
        "defect": [
          "CERT@VDE#641895"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Unchecked role in wwwupload.cgi",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41765",
    "datePublished": "2026-03-09T08:17:54.920Z",
    "dateReserved": "2025-04-16T11:18:45.760Z",
    "dateUpdated": "2026-03-09T20:14:03.869Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-41764 (GCVE-0-2025-41764)

Vulnerability from cvelistv5 – Published: 2026-03-09 08:17 – Updated: 2026-03-09 20:14
VLAI?
Title
Unchecked role in wwwupdate.cgi
Summary
Due to insufficient authorization enforcement, an unauthorized remote attacker can exploit the wwwupdate.cgi endpoint to upload and apply arbitrary updates.
CWE
Assigner
Impacted products
Vendor Product Version
MBS UBR-01 Mk II Affected: 0.0.0 , < 6.0.1.0 (semver)
Create a notification for this product.
    MBS UBR-02 Affected: 0.0.0 , < 6.0.1.0 (semver)
Create a notification for this product.
    MBS UBR-LON Affected: 0.0.0 , < 6.0.1.0 (semver)
Create a notification for this product.
Credits
Adrien Rey from Cyber Defense Campus Zurich Daniel Hulliger from Armasuisse
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41764",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-03-09T20:03:13.228044Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-03-09T20:14:04.019Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "UBR-01 Mk II",
          "vendor": "MBS",
          "versions": [
            {
              "lessThan": "6.0.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "UBR-02",
          "vendor": "MBS",
          "versions": [
            {
              "lessThan": "6.0.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "UBR-LON",
          "vendor": "MBS",
          "versions": [
            {
              "lessThan": "6.0.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Adrien Rey from Cyber Defense Campus Zurich"
        },
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Daniel Hulliger from Armasuisse"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Due to insufficient authorization enforcement, an unauthorized remote attacker can exploit the wwwupdate.cgi endpoint to upload and apply arbitrary updates.\u003cbr\u003e"
            }
          ],
          "value": "Due to insufficient authorization enforcement, an unauthorized remote attacker can exploit the wwwupdate.cgi endpoint to upload and apply arbitrary updates."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-862",
              "description": "CWE-862 Missing Authorization",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-03-09T08:17:45.486Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://www.mbs-solutions.de/mbs-2025-0001"
        }
      ],
      "source": {
        "defect": [
          "CERT@VDE#641895"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Unchecked role in wwwupdate.cgi",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41764",
    "datePublished": "2026-03-09T08:17:45.486Z",
    "dateReserved": "2025-04-16T11:18:45.760Z",
    "dateUpdated": "2026-03-09T20:14:04.019Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-41763 (GCVE-0-2025-41763)

Vulnerability from cvelistv5 – Published: 2026-03-09 08:17 – Updated: 2026-03-09 20:14
VLAI?
Title
Unchecked role in wwwdnload.cgi
Summary
A low‑privileged remote attacker can directly interact with the wwwdnload.cgi endpoint to download any resource available to administrators, including system backups and certificate request files.
CWE
  • CWE-497 - Exposure of Sensitive System Information to an Unauthorized Control Sphere
Assigner
Impacted products
Vendor Product Version
MBS UBR-01 Mk II Affected: 0.0.0 , < 6.0.1.0 (semver)
Create a notification for this product.
    MBS UBR-02 Affected: 0.0.0 , < 6.0.1.0 (semver)
Create a notification for this product.
    MBS UBR-LON Affected: 0.0.0 , < 6.0.1.0 (semver)
Create a notification for this product.
Credits
Adrien Rey from Cyber Defense Campus Zurich Daniel Hulliger from Armasuisse
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41763",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-03-09T20:03:00.492923Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-03-09T20:14:04.157Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "UBR-01 Mk II",
          "vendor": "MBS",
          "versions": [
            {
              "lessThan": "6.0.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "UBR-02",
          "vendor": "MBS",
          "versions": [
            {
              "lessThan": "6.0.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "UBR-LON",
          "vendor": "MBS",
          "versions": [
            {
              "lessThan": "6.0.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Adrien Rey from Cyber Defense Campus Zurich"
        },
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Daniel Hulliger from Armasuisse"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A low\u2011privileged remote attacker can directly interact with the wwwdnload.cgi endpoint to download any resource available to administrators, including system backups and certificate request files.\u003cbr\u003e"
            }
          ],
          "value": "A low\u2011privileged remote attacker can directly interact with the wwwdnload.cgi endpoint to download any resource available to administrators, including system backups and certificate request files."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-497",
              "description": "CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-03-09T08:17:36.947Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://www.mbs-solutions.de/mbs-2025-0001"
        }
      ],
      "source": {
        "defect": [
          "CERT@VDE#641895"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Unchecked role in wwwdnload.cgi",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41763",
    "datePublished": "2026-03-09T08:17:36.947Z",
    "dateReserved": "2025-04-16T11:18:45.760Z",
    "dateUpdated": "2026-03-09T20:14:04.157Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-41762 (GCVE-0-2025-41762)

Vulnerability from cvelistv5 – Published: 2026-03-09 08:17 – Updated: 2026-03-09 20:14
VLAI?
Title
Secret leak with wwwdnload.cgi
Summary
An unauthenticated attacker can abuse the weak hash of the backup generated by the wwwdnload.cgi endpoint to gain unauthorized access to sensitive data, including password hashes and certificates.
CWE
Assigner
Impacted products
Vendor Product Version
MBS UBR-01 Mk II Affected: 0.0.0 , < 6.0.1.0 (semver)
Create a notification for this product.
    MBS UBR-02 Affected: 0.0.0 , < 6.0.1.0 (semver)
Create a notification for this product.
    MBS UBR-LON Affected: 0.0.0 , < 6.0.1.0 (semver)
Create a notification for this product.
Credits
Adrien Rey from Cyber Defense Campus Zurich Daniel Hulliger from Armasuisse
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41762",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-03-09T20:02:52.027636Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-03-09T20:14:04.321Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "UBR-01 Mk II",
          "vendor": "MBS",
          "versions": [
            {
              "lessThan": "6.0.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "UBR-02",
          "vendor": "MBS",
          "versions": [
            {
              "lessThan": "6.0.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "UBR-LON",
          "vendor": "MBS",
          "versions": [
            {
              "lessThan": "6.0.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Adrien Rey from Cyber Defense Campus Zurich"
        },
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Daniel Hulliger from Armasuisse"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An unauthenticated attacker can abuse the weak hash of the backup generated by the wwwdnload.cgi endpoint to gain unauthorized access to sensitive data, including password hashes and certificates.\u003cbr\u003e"
            }
          ],
          "value": "An unauthenticated attacker can abuse the weak hash of the backup generated by the wwwdnload.cgi endpoint to gain unauthorized access to sensitive data, including password hashes and certificates."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-328",
              "description": "CWE-328 Use of Weak Hash",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-03-09T08:17:27.510Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://www.mbs-solutions.de/mbs-2025-0001"
        }
      ],
      "source": {
        "defect": [
          "CERT@VDE#641895"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Secret leak with wwwdnload.cgi",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41762",
    "datePublished": "2026-03-09T08:17:27.510Z",
    "dateReserved": "2025-04-16T11:18:45.760Z",
    "dateUpdated": "2026-03-09T20:14:04.321Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-41761 (GCVE-0-2025-41761)

Vulnerability from cvelistv5 – Published: 2026-03-09 08:17 – Updated: 2026-03-09 20:14
VLAI?
Title
Privilege escalation possible
Summary
A low‑privileged local attacker who gains access to the UBR service account (e.g., via SSH) can escalate privileges to obtain full system access. This is due to the service account being permitted to execute certain binaries (e.g., tcpdump and ip) with sudo.
CWE
  • CWE-88 - Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Assigner
Impacted products
Vendor Product Version
MBS UBR-01 Mk II Affected: 0.0.0 , < 6.0.1.0 (semver)
Create a notification for this product.
    MBS UBR-02 Affected: 0.0.0 , < 6.0.1.0 (semver)
Create a notification for this product.
    MBS UBR-LON Affected: 0.0.0 , < 6.0.1.0 (semver)
Create a notification for this product.
Credits
Adrien Rey from Cyber Defense Campus Zurich Daniel Hulliger from Armasuisse
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41761",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-03-09T20:02:37.352857Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-03-09T20:14:04.600Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "UBR-01 Mk II",
          "vendor": "MBS",
          "versions": [
            {
              "lessThan": "6.0.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "UBR-02",
          "vendor": "MBS",
          "versions": [
            {
              "lessThan": "6.0.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "UBR-LON",
          "vendor": "MBS",
          "versions": [
            {
              "lessThan": "6.0.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Adrien Rey from Cyber Defense Campus Zurich"
        },
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Daniel Hulliger from Armasuisse"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A low\u2011privileged local attacker who gains access to the UBR service account (e.g., via SSH) can escalate privileges to obtain full system access. This is due to the service account being permitted to execute certain binaries (e.g., tcpdump and ip) with sudo.\u003cbr\u003e"
            }
          ],
          "value": "A low\u2011privileged local attacker who gains access to the UBR service account (e.g., via SSH) can escalate privileges to obtain full system access. This is due to the service account being permitted to execute certain binaries (e.g., tcpdump and ip) with sudo."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-88",
              "description": "CWE-88 Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-03-09T08:17:11.116Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://www.mbs-solutions.de/mbs-2025-0001"
        }
      ],
      "source": {
        "defect": [
          "CERT@VDE#641895"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Privilege escalation possible",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41761",
    "datePublished": "2026-03-09T08:17:11.116Z",
    "dateReserved": "2025-04-16T11:18:45.760Z",
    "dateUpdated": "2026-03-09T20:14:04.600Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-41760 (GCVE-0-2025-41760)

Vulnerability from cvelistv5 – Published: 2026-03-09 08:16 – Updated: 2026-03-09 20:14
VLAI?
Title
Pass filter with Empty Table
Summary
An administrator may attempt to block all traffic by configuring a pass filter with an empty table. However, in UBR, an empty list does not enforce any restrictions and allows all network traffic to pass unfiltered.
CWE
  • CWE-636 - Not Failing Securely ('Failing Open')
Assigner
Impacted products
Vendor Product Version
MBS UBR-01 Mk II Affected: 0.0.0 , < 6.0.1.0 (semver)
Create a notification for this product.
    MBS UBR-02 Affected: 0.0.0 , < 6.0.1.0 (semver)
Create a notification for this product.
    MBS UBR-LON Affected: 0.0.0 , < 6.0.1.0 (semver)
Create a notification for this product.
Credits
Adrien Rey from Cyber Defense Campus Zurich Daniel Hulliger from Armasuisse
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41760",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-03-09T20:02:28.122177Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-03-09T20:14:05.647Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "UBR-01 Mk II",
          "vendor": "MBS",
          "versions": [
            {
              "lessThan": "6.0.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "UBR-02",
          "vendor": "MBS",
          "versions": [
            {
              "lessThan": "6.0.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "UBR-LON",
          "vendor": "MBS",
          "versions": [
            {
              "lessThan": "6.0.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Adrien Rey from Cyber Defense Campus Zurich"
        },
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Daniel Hulliger from Armasuisse"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An administrator may attempt to block all traffic by configuring a pass filter with an empty table. However, in UBR, an empty list does not enforce any restrictions and allows all network traffic to pass unfiltered.\u003cbr\u003e"
            }
          ],
          "value": "An administrator may attempt to block all traffic by configuring a pass filter with an empty table. However, in UBR, an empty list does not enforce any restrictions and allows all network traffic to pass unfiltered."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-636",
              "description": "CWE-636 Not Failing Securely (\u0027Failing Open\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-03-09T08:16:55.770Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://www.mbs-solutions.de/mbs-2025-0001"
        }
      ],
      "source": {
        "defect": [
          "CERT@VDE#641895"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Pass filter with Empty Table",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41760",
    "datePublished": "2026-03-09T08:16:55.770Z",
    "dateReserved": "2025-04-16T11:18:45.760Z",
    "dateUpdated": "2026-03-09T20:14:05.647Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-41759 (GCVE-0-2025-41759)

Vulnerability from cvelistv5 – Published: 2026-03-09 08:16 – Updated: 2026-03-09 20:14
VLAI?
Title
Use of wildcard (“*” or “all”) in Block list
Summary
An administrator may attempt to block all networks by specifying "\*" or "all" as the network identifier. However, these values are not supported and do not trigger any validation error. Instead, they are silently interpreted as network 0 which results in no networks being blocked at all.
CWE
  • CWE-636 - Not Failing Securely ('Failing Open')
Assigner
Impacted products
Vendor Product Version
MBS UBR-01 Mk II Affected: 0.0.0 , < 6.0.1.0 (semver)
Create a notification for this product.
    MBS UBR-02 Affected: 0.0.0 , < 6.0.1.0 (semver)
Create a notification for this product.
    MBS UBR-LON Affected: 0.0.0 , < 6.0.1.0 (semver)
Create a notification for this product.
Credits
Adrien Rey from Cyber Defense Campus Zurich Daniel Hulliger from Armasuisse
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41759",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-03-09T20:02:16.957824Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-03-09T20:14:05.817Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "UBR-01 Mk II",
          "vendor": "MBS",
          "versions": [
            {
              "lessThan": "6.0.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "UBR-02",
          "vendor": "MBS",
          "versions": [
            {
              "lessThan": "6.0.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "UBR-LON",
          "vendor": "MBS",
          "versions": [
            {
              "lessThan": "6.0.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Adrien Rey from Cyber Defense Campus Zurich"
        },
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Daniel Hulliger from Armasuisse"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An administrator may attempt to block all networks by specifying \"\\*\" or \"all\" as the network identifier. However, these values are not supported and do not trigger any validation error. Instead, they are silently interpreted as network 0 which results in no networks being blocked at all.\u003cbr\u003e"
            }
          ],
          "value": "An administrator may attempt to block all networks by specifying \"\\*\" or \"all\" as the network identifier. However, these values are not supported and do not trigger any validation error. Instead, they are silently interpreted as network 0 which results in no networks being blocked at all."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-636",
              "description": "CWE-636 Not Failing Securely (\u0027Failing Open\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-03-09T08:16:46.067Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://www.mbs-solutions.de/mbs-2025-0001"
        }
      ],
      "source": {
        "defect": [
          "CERT@VDE#641895"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Use of wildcard (\u201c*\u201d or \u201call\u201d) in Block list",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41759",
    "datePublished": "2026-03-09T08:16:46.067Z",
    "dateReserved": "2025-04-16T11:18:45.760Z",
    "dateUpdated": "2026-03-09T20:14:05.817Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-41758 (GCVE-0-2025-41758)

Vulnerability from cvelistv5 – Published: 2026-03-09 08:16 – Updated: 2026-03-09 20:14
VLAI?
Title
Arbitrary Write with wwwupload.cgi
Summary
A low-privileged remote attacker can exploit an arbitrary file write vulnerability in the wwupload.cgi endpoint. Due to path traversal this can lead to overwriting arbitrary files on the device and achieving a full system compromise.
CWE
  • CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Assigner
Impacted products
Vendor Product Version
MBS UBR-01 Mk II Affected: 0.0.0 , < 6.0.1.0 (semver)
Create a notification for this product.
    MBS UBR-02 Affected: 0.0.0 , < 6.0.1.0 (semver)
Create a notification for this product.
    MBS UBR-LON Affected: 0.0.0 , < 6.0.1.0 (semver)
Create a notification for this product.
Credits
Adrien Rey from Cyber Defense Campus Zurich Daniel Hulliger from Armasuisse
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41758",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-03-09T20:02:06.656318Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-03-09T20:14:05.983Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "UBR-01 Mk II",
          "vendor": "MBS",
          "versions": [
            {
              "lessThan": "6.0.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "UBR-02",
          "vendor": "MBS",
          "versions": [
            {
              "lessThan": "6.0.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "UBR-LON",
          "vendor": "MBS",
          "versions": [
            {
              "lessThan": "6.0.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Adrien Rey from Cyber Defense Campus Zurich"
        },
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Daniel Hulliger from Armasuisse"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A low-privileged remote attacker can exploit an arbitrary file write vulnerability in the wwupload.cgi endpoint. Due to path traversal this can lead to overwriting arbitrary files on the device and achieving a full system compromise.\u003cbr\u003e"
            }
          ],
          "value": "A low-privileged remote attacker can exploit an arbitrary file write vulnerability in the wwupload.cgi endpoint. Due to path traversal this can lead to overwriting arbitrary files on the device and achieving a full system compromise."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-22",
              "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-03-09T08:16:30.500Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://www.mbs-solutions.de/mbs-2025-0001"
        }
      ],
      "source": {
        "defect": [
          "CERT@VDE#641895"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Arbitrary Write with wwwupload.cgi",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41758",
    "datePublished": "2026-03-09T08:16:30.500Z",
    "dateReserved": "2025-04-16T11:18:45.760Z",
    "dateUpdated": "2026-03-09T20:14:05.983Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-41757 (GCVE-0-2025-41757)

Vulnerability from cvelistv5 – Published: 2026-03-09 08:16 – Updated: 2026-03-09 20:14
VLAI?
Title
Arbitrary Write with ubr-restore
Summary
A low-privileged remote attacker can abuse the backup restore functionality of UBR (ubr-restore) which runs with elevated privileges and does not validate the contents of the backup archive to create or overwrite arbitrary files anywhere on the system.
CWE
  • CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Assigner
Impacted products
Vendor Product Version
MBS UBR-01 Mk II Affected: 0.0.0 , < 6.0.1.0 (semver)
Create a notification for this product.
    MBS UBR-02 Affected: 0.0.0 , < 6.0.1.0 (semver)
Create a notification for this product.
    MBS UBR-LON Affected: 0.0.0 , < 6.0.1.0 (semver)
Create a notification for this product.
Credits
Adrien Rey from Cyber Defense Campus Zurich Daniel Hulliger from Armasuisse
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41757",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-03-09T20:01:53.568390Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-03-09T20:14:06.180Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "UBR-01 Mk II",
          "vendor": "MBS",
          "versions": [
            {
              "lessThan": "6.0.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "UBR-02",
          "vendor": "MBS",
          "versions": [
            {
              "lessThan": "6.0.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "UBR-LON",
          "vendor": "MBS",
          "versions": [
            {
              "lessThan": "6.0.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Adrien Rey from Cyber Defense Campus Zurich"
        },
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Daniel Hulliger from Armasuisse"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A low-privileged remote attacker can abuse the backup restore functionality of UBR (ubr-restore) which runs with elevated privileges and does not validate the contents of the backup archive to create or overwrite arbitrary files anywhere on the system.\u003cbr\u003e"
            }
          ],
          "value": "A low-privileged remote attacker can abuse the backup restore functionality of UBR (ubr-restore) which runs with elevated privileges and does not validate the contents of the backup archive to create or overwrite arbitrary files anywhere on the system."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-22",
              "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-03-09T08:16:20.464Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://www.mbs-solutions.de/mbs-2025-0001"
        }
      ],
      "source": {
        "defect": [
          "CERT@VDE#641895"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Arbitrary Write with ubr-restore",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41757",
    "datePublished": "2026-03-09T08:16:20.464Z",
    "dateReserved": "2025-04-16T11:18:45.760Z",
    "dateUpdated": "2026-03-09T20:14:06.180Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-41756 (GCVE-0-2025-41756)

Vulnerability from cvelistv5 – Published: 2026-03-09 08:16 – Updated: 2026-03-09 20:14
VLAI?
Title
Arbitrary Write with ubr-editfile
Summary
A low-privileged remote attacker can exploit the ubr-editfile method in wwwubr.cgi, an undocumented and unused API endpoint to write arbitrary files on the system.
CWE
  • CWE-1242 - Inclusion of Undocumented Features or Chicken Bits
Assigner
Impacted products
Vendor Product Version
MBS UBR-01 Mk II Affected: 0.0.0 , < 6.0.1.0 (semver)
Create a notification for this product.
    MBS UBR-02 Affected: 0.0.0 , < 6.0.1.0 (semver)
Create a notification for this product.
    MBS UBR-LON Affected: 0.0.0 , < 6.0.1.0 (semver)
Create a notification for this product.
Credits
Adrien Rey from Cyber Defense Campus Zurich Daniel Hulliger from Armasuisse
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41756",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-03-09T20:01:41.875068Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-03-09T20:14:06.365Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "UBR-01 Mk II",
          "vendor": "MBS",
          "versions": [
            {
              "lessThan": "6.0.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "UBR-02",
          "vendor": "MBS",
          "versions": [
            {
              "lessThan": "6.0.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "UBR-LON",
          "vendor": "MBS",
          "versions": [
            {
              "lessThan": "6.0.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Adrien Rey from Cyber Defense Campus Zurich"
        },
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Daniel Hulliger from Armasuisse"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A low-privileged remote attacker can exploit the ubr-editfile method in wwwubr.cgi, an undocumented and unused API endpoint to write arbitrary files on the system.\u003cbr\u003e"
            }
          ],
          "value": "A low-privileged remote attacker can exploit the ubr-editfile method in wwwubr.cgi, an undocumented and unused API endpoint to write arbitrary files on the system."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1242",
              "description": "CWE-1242 Inclusion of Undocumented Features or Chicken Bits",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-03-09T08:16:10.423Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://www.mbs-solutions.de/mbs-2025-0001"
        }
      ],
      "source": {
        "defect": [
          "CERT@VDE#641895"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Arbitrary Write with ubr-editfile",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41756",
    "datePublished": "2026-03-09T08:16:10.423Z",
    "dateReserved": "2025-04-16T11:18:45.759Z",
    "dateUpdated": "2026-03-09T20:14:06.365Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-41755 (GCVE-0-2025-41755)

Vulnerability from cvelistv5 – Published: 2026-03-09 08:16 – Updated: 2026-03-09 20:14
VLAI?
Title
Arbitrary Read with ubr-logread
Summary
A low-privileged remote attacker can exploit the ubr-logread method in wwwubr.cgi to read arbitrary files on the system. The endpoint accepts a parameter specifying the log file to open (e.g., /tmp/weblog{some_number}), but this parameter is not properly validated, allowing an attacker to modify it to reference any file and retrieve its contents.
CWE
  • CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Assigner
Impacted products
Vendor Product Version
MBS UBR-01 Mk II Affected: 0.0.0 , < 6.0.1.0 (semver)
Create a notification for this product.
    MBS UBR-02 Affected: 0.0.0 , < 6.0.1.0 (semver)
Create a notification for this product.
    MBS UBR-LON Affected: 0.0.0 , < 6.0.1.0 (semver)
Create a notification for this product.
Credits
Adrien Rey from Cyber Defense Campus Zurich Daniel Hulliger from Armasuisse
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41755",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-03-09T20:01:31.567720Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-03-09T20:14:06.501Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "UBR-01 Mk II",
          "vendor": "MBS",
          "versions": [
            {
              "lessThan": "6.0.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "UBR-02",
          "vendor": "MBS",
          "versions": [
            {
              "lessThan": "6.0.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "UBR-LON",
          "vendor": "MBS",
          "versions": [
            {
              "lessThan": "6.0.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Adrien Rey from Cyber Defense Campus Zurich"
        },
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Daniel Hulliger from Armasuisse"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A low-privileged remote attacker can exploit the ubr-logread method in wwwubr.cgi to read arbitrary files on the system. The endpoint accepts a parameter specifying the log file to open (e.g., /tmp/weblog{some_number}), but this parameter is not properly validated, allowing an attacker to modify it to reference any file and retrieve its contents.\u003cbr\u003e"
            }
          ],
          "value": "A low-privileged remote attacker can exploit the ubr-logread method in wwwubr.cgi to read arbitrary files on the system. The endpoint accepts a parameter specifying the log file to open (e.g., /tmp/weblog{some_number}), but this parameter is not properly validated, allowing an attacker to modify it to reference any file and retrieve its contents."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-22",
              "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-03-09T08:16:00.702Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://www.mbs-solutions.de/mbs-2025-0001"
        }
      ],
      "source": {
        "defect": [
          "CERT@VDE#641895"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Arbitrary Read with ubr-logread",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41755",
    "datePublished": "2026-03-09T08:16:00.702Z",
    "dateReserved": "2025-04-16T11:18:45.759Z",
    "dateUpdated": "2026-03-09T20:14:06.501Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-41754 (GCVE-0-2025-41754)

Vulnerability from cvelistv5 – Published: 2026-03-09 08:15 – Updated: 2026-03-09 20:14
VLAI?
Title
Arbitrary Read with ubr-editfile
Summary
A low-privileged remote attacker can exploit the ubr-editfile method in wwwubr.cgi, an undocumented and unused API endpoint to read arbitrary files on the system.
CWE
  • CWE-1242 - Inclusion of Undocumented Features or Chicken Bits
Assigner
Impacted products
Vendor Product Version
MBS UBR-01 Mk II Affected: 0.0.0 , < 6.0.1.0 (semver)
Create a notification for this product.
    MBS UBR-02 Affected: 0.0.0 , < 6.0.1.0 (semver)
Create a notification for this product.
    MBS UBR-LON Affected: 0.0.0 , < 6.0.1.0 (semver)
Create a notification for this product.
Credits
Adrien Rey from Cyber Defense Campus Zurich Daniel Hulliger from Armasuisse
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41754",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-03-09T20:01:21.260674Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-03-09T20:14:06.663Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "UBR-01 Mk II",
          "vendor": "MBS",
          "versions": [
            {
              "lessThan": "6.0.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "UBR-02",
          "vendor": "MBS",
          "versions": [
            {
              "lessThan": "6.0.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "UBR-LON",
          "vendor": "MBS",
          "versions": [
            {
              "lessThan": "6.0.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Adrien Rey from Cyber Defense Campus Zurich"
        },
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Daniel Hulliger from Armasuisse"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A low-privileged remote attacker can exploit the ubr-editfile method in wwwubr.cgi, an undocumented and unused API endpoint to read arbitrary files on the system.\u003cbr\u003e"
            }
          ],
          "value": "A low-privileged remote attacker can exploit the ubr-editfile method in wwwubr.cgi, an undocumented and unused API endpoint to read arbitrary files on the system."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1242",
              "description": "CWE-1242 Inclusion of Undocumented Features or Chicken Bits",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-03-09T08:15:49.619Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://www.mbs-solutions.de/mbs-2025-0001"
        }
      ],
      "source": {
        "defect": [
          "CERT@VDE#641895"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Arbitrary Read with ubr-editfile",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41754",
    "datePublished": "2026-03-09T08:15:49.619Z",
    "dateReserved": "2025-04-16T11:18:45.759Z",
    "dateUpdated": "2026-03-09T20:14:06.663Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-22906 (GCVE-0-2026-22906)

Vulnerability from cvelistv5 – Published: 2026-02-09 07:40 – Updated: 2026-02-09 15:31
VLAI?
Title
Hardcoded Key Allows Credential Disclosure
Summary
User credentials are stored using AES‑ECB encryption with a hardcoded key. An unauthenticated remote attacker obtaining the configuration file can decrypt and recover plaintext usernames and passwords, especially when combined with the authentication bypass.
CWE
  • CWE-321 - Use of Hard-coded Cryptographic Key
Assigner
Impacted products
Vendor Product Version
WAGO 0852-1322 Affected: 0.0.0 , ≤ 2.64 (semver)
Create a notification for this product.
Credits
Diconium
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-22906",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-09T15:29:06.439394Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-09T15:31:17.549Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "0852-1322",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "2.64",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "0852-1328",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "2.64",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "0852-1322",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "2.64"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "0852-1328",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "2.64"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Diconium"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "User credentials are stored using AES\u2011ECB encryption with a hardcoded key. An unauthenticated remote attacker obtaining the configuration file can decrypt and recover plaintext usernames and passwords, especially when combined with the authentication bypass.\u003cbr\u003e"
            }
          ],
          "value": "User credentials are stored using AES\u2011ECB encryption with a hardcoded key. An unauthenticated remote attacker obtaining the configuration file can decrypt and recover plaintext usernames and passwords, especially when combined with the authentication bypass."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-321",
              "description": "CWE-321 Use of Hard-coded Cryptographic Key",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-09T07:40:33.546Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://certvde.com/de/advisories/VDE-2026-004"
        }
      ],
      "source": {
        "advisory": "VDE-2026-004",
        "defect": [
          "CERT@VDE#641934"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Hardcoded Key Allows Credential Disclosure",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2026-22906",
    "datePublished": "2026-02-09T07:40:33.546Z",
    "dateReserved": "2026-01-13T08:33:25.684Z",
    "dateUpdated": "2026-02-09T15:31:17.549Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-22905 (GCVE-0-2026-22905)

Vulnerability from cvelistv5 – Published: 2026-02-09 07:40 – Updated: 2026-02-09 15:33
VLAI?
Title
Authentication Bypass via URI Traversal
Summary
An unauthenticated remote attacker can bypass authentication by exploiting insufficient URI validation and using path traversal sequences (e.g., /js/../cgi-bin/post.cgi), gaining unauthorized access to protected CGI endpoints and configuration downloads.
CWE
  • CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Assigner
Impacted products
Vendor Product Version
WAGO 0852-1322 Affected: 0.0.0 , ≤ 2.64 (semver)
Create a notification for this product.
Credits
Diconium
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-22905",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-09T15:33:12.951248Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-09T15:33:33.687Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "0852-1322",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "2.64",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "0852-1328",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "2.64",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "0852-1322",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "2.64"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "0852-1328",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "2.64"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Diconium"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An unauthenticated remote attacker can bypass authentication by exploiting insufficient URI validation and using path traversal sequences (e.g., /js/../cgi-bin/post.cgi), gaining unauthorized access to protected CGI endpoints and configuration downloads.\u003cbr\u003e"
            }
          ],
          "value": "An unauthenticated remote attacker can bypass authentication by exploiting insufficient URI validation and using path traversal sequences (e.g., /js/../cgi-bin/post.cgi), gaining unauthorized access to protected CGI endpoints and configuration downloads."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-22",
              "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-09T07:40:17.801Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://certvde.com/de/advisories/VDE-2026-004"
        }
      ],
      "source": {
        "advisory": "VDE-2026-004",
        "defect": [
          "CERT@VDE#641934"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Authentication Bypass via URI Traversal",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2026-22905",
    "datePublished": "2026-02-09T07:40:17.801Z",
    "dateReserved": "2026-01-13T08:33:25.684Z",
    "dateUpdated": "2026-02-09T15:33:33.687Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-22904 (GCVE-0-2026-22904)

Vulnerability from cvelistv5 – Published: 2026-02-09 07:40 – Updated: 2026-02-09 15:34
VLAI?
Title
Stack Overflow via Oversized Cookie Fields in lighttpd
Summary
Improper length handling when parsing multiple cookie fields (including TRACKID) allows an unauthenticated remote attacker to send oversized cookie values and trigger a stack buffer overflow, resulting in a denial‑of‑service condition and possible remote code execution.
CWE
  • CWE-121 - Stack-based Buffer Overflow
Assigner
Impacted products
Vendor Product Version
WAGO 0852-1322 Affected: 0.0.0 , ≤ 2.64 (semver)
Create a notification for this product.
Credits
Diconium
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-22904",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-09T15:34:33.982565Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-09T15:34:53.334Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "0852-1322",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "2.64",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "0852-1328",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "2.64",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "0852-1322",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "2.64"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "0852-1328",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "2.64"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Diconium"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Improper length handling when parsing multiple cookie fields (including TRACKID) allows an unauthenticated remote attacker to send oversized cookie values and trigger a stack buffer overflow, resulting in a denial\u2011of\u2011service condition and possible remote code execution.\u003cbr\u003e"
            }
          ],
          "value": "Improper length handling when parsing multiple cookie fields (including TRACKID) allows an unauthenticated remote attacker to send oversized cookie values and trigger a stack buffer overflow, resulting in a denial\u2011of\u2011service condition and possible remote code execution."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-121",
              "description": "CWE-121 Stack-based Buffer Overflow",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-09T07:40:00.484Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://certvde.com/de/advisories/VDE-2026-004"
        }
      ],
      "source": {
        "advisory": "VDE-2026-004",
        "defect": [
          "CERT@VDE#641934"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Stack Overflow via Oversized Cookie Fields in lighttpd",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2026-22904",
    "datePublished": "2026-02-09T07:40:00.484Z",
    "dateReserved": "2026-01-13T08:33:25.683Z",
    "dateUpdated": "2026-02-09T15:34:53.334Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-22903 (GCVE-0-2026-22903)

Vulnerability from cvelistv5 – Published: 2026-02-09 07:39 – Updated: 2026-02-09 15:36
VLAI?
Title
Stack Overflow via SESSIONID Cookie in lighttpd
Summary
An unauthenticated remote attacker can send a crafted HTTP request containing an overly long SESSIONID cookie. This can trigger a stack buffer overflow in the modified lighttpd server, causing it to crash and potentially enabling remote code execution due to missing stack protections.
CWE
  • CWE-121 - Stack-based Buffer Overflow
Assigner
Impacted products
Vendor Product Version
WAGO 0852-1322 Affected: 0.0.0 , ≤ 2.64 (semver)
Create a notification for this product.
Credits
Diconium
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-22903",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-09T15:36:08.801691Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-09T15:36:36.790Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "0852-1322",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "2.64",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "0852-1328",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "2.64",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "0852-1322",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "2.64"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "0852-1328",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "2.64"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Diconium"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An unauthenticated remote attacker can send a crafted HTTP request containing an overly long SESSIONID cookie. This can trigger a stack buffer overflow in the modified lighttpd server, causing it to crash and potentially enabling remote code execution due to missing stack protections.\u003cbr\u003e"
            }
          ],
          "value": "An unauthenticated remote attacker can send a crafted HTTP request containing an overly long SESSIONID cookie. This can trigger a stack buffer overflow in the modified lighttpd server, causing it to crash and potentially enabling remote code execution due to missing stack protections."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-121",
              "description": "CWE-121 Stack-based Buffer Overflow",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-09T07:39:42.537Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://certvde.com/de/advisories/VDE-2026-004"
        }
      ],
      "source": {
        "advisory": "VDE-2026-004",
        "defect": [
          "CERT@VDE#641934"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Stack Overflow via SESSIONID Cookie in lighttpd",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2026-22903",
    "datePublished": "2026-02-09T07:39:42.537Z",
    "dateReserved": "2026-01-13T08:33:25.683Z",
    "dateUpdated": "2026-02-09T15:36:36.790Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2022-50981 (GCVE-0-2022-50981)

Vulnerability from cvelistv5 – Published: 2026-02-02 14:12 – Updated: 2026-02-02 17:22
VLAI?
Title
Multiple Innomic VibroLine VLX HD 5.0 and avibia AVLX weak password requirements
Summary
An unauthenticated remote attacker can gain full access on the affected devices as they are shipped without a password by default and setting one is not enforced.
CWE
  • CWE-306 - Missing Authentication for Critical Function
Assigner
Impacted products
Vendor Product Version
Innomic VibroLine VLX1 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLX2 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLX4 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLX6 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLX8 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    avibia AvibiaLine AVLX1 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    avibia AvibiaLine AVLX2 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    avibia AvibiaLine AVLX4 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    avibia AvibiaLine AVLX6 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    avibia AvibiaLine AVLX8 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLE1 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Create a notification for this product.
    Innomic VibroLine VLE2 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Create a notification for this product.
    Innomic VibroLine VLE4 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Create a notification for this product.
    Innomic VibroLine VLE6 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Create a notification for this product.
    Innomic VibroLine VLE8 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Create a notification for this product.
    avibia AvibiaLine AVLE1 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Unaffected: 2.1.1866
Create a notification for this product.
    avibia AvibiaLine AVLE2 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Unaffected: 2.1.1866
Create a notification for this product.
    avibia AvibiaLine AVLE4 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Unaffected: 2.1.1866
Create a notification for this product.
    avibia AvibiaLine AVLE6 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Unaffected: 2.1.1866
Create a notification for this product.
    avibia AvibiaLine AVLE8 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Unaffected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLE1 HD 5.0 Unaffected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLE2 HD 5.0 Unaffected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLE4 HD 5.0 Unaffected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLE6 HD 5.0 Unaffected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLE8 HD 5.0 Unaffected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLE1 HD 4.0 Unaffected: 1.4.1074 , ≤ 1.4.1116 (semver)
Create a notification for this product.
    Innomic VibroLine VLE2 HD 4.0 Unaffected: 1.4.1074 , ≤ 1.4.1116 (semver)
Create a notification for this product.
    Innomic VibroLine VLE4 HD 4.0 Unaffected: 1.4.1074 , ≤ 1.4.1116 (semver)
Create a notification for this product.
    Innomic VibroLine VLE6 HD 4.0 Unaffected: 1.4.1074 , ≤ 1.4.1116 (semver)
Create a notification for this product.
    Innomic VibroLine VLE8 HD 4.0 Unaffected: 1.4.1074 , ≤ 1.4.1116 (semver)
Create a notification for this product.
    Innomic VibroLine VLX1 HD 4.0 Unaffected: 1.5.1074 , ≤ 1.5.1116 (semver)
Create a notification for this product.
    Innomic VibroLine VLX2 HD 4.0 Unaffected: 1.5.1074 , ≤ 1.5.1116 (semver)
Create a notification for this product.
    Innomic VibroLine VLX4 HD 4.0 Unaffected: 1.5.1074 , ≤ 1.5.1116 (semver)
Create a notification for this product.
    Innomic VibroLine VLX6 HD 4.0 Unaffected: 1.5.1074 , ≤ 1.5.1116 (semver)
Create a notification for this product.
    Innomic VibroLine VLX8 HD 4.0 Unaffected: 1.5.1074 , ≤ 1.5.1116 (semver)
Create a notification for this product.
Date Public ?
2026-02-02 14:11
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-50981",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-02T17:21:57.296726Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-02T17:22:10.010Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX1 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX2 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX4 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX6 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX8 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLX1 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLX2 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLX4 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLX6 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLX8 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE1 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE2 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE4 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE6 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE8 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLE1 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLE2 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLE4 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLE6 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLE8 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE1 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE2 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE4 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE6 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE8 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE1 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.4.1116",
              "status": "unaffected",
              "version": "1.4.1074",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE2 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.4.1116",
              "status": "unaffected",
              "version": "1.4.1074",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE4 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.4.1116",
              "status": "unaffected",
              "version": "1.4.1074",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE6 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.4.1116",
              "status": "unaffected",
              "version": "1.4.1074",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE8 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.4.1116",
              "status": "unaffected",
              "version": "1.4.1074",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX1 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.5.1116",
              "status": "unaffected",
              "version": "1.5.1074",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX2 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.5.1116",
              "status": "unaffected",
              "version": "1.5.1074",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX4 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.5.1116",
              "status": "unaffected",
              "version": "1.5.1074",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX6 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.5.1116",
              "status": "unaffected",
              "version": "1.5.1074",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX8 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.5.1116",
              "status": "unaffected",
              "version": "1.5.1074",
              "versionType": "semver"
            }
          ]
        }
      ],
      "datePublic": "2026-02-02T14:11:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An unauthenticated remote attacker can gain full access on the affected devices as they are shipped without a password by default and setting one is not enforced.\u003cbr\u003e"
            }
          ],
          "value": "An unauthenticated remote attacker can gain full access on the affected devices as they are shipped without a password by default and setting one is not enforced."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-306",
              "description": "CWE-306 Missing Authentication for Critical Function",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-02T14:40:16.380Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.innomic.com/.well-known/csaf/white/2026/ids-2026-0001.html"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.innomic.com/.well-known/csaf/white/2026/ids-2026-0001.json"
        }
      ],
      "source": {
        "advisory": "CERT@VDE#641933",
        "discovery": "UNKNOWN"
      },
      "title": "Multiple Innomic VibroLine VLX HD 5.0 and avibia AVLX weak password requirements",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2022-50981",
    "datePublished": "2026-02-02T14:12:05.100Z",
    "dateReserved": "2026-01-12T08:05:55.994Z",
    "dateUpdated": "2026-02-02T17:22:10.010Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2022-50980 (GCVE-0-2022-50980)

Vulnerability from cvelistv5 – Published: 2026-02-02 14:11 – Updated: 2026-02-02 17:23
VLAI?
Title
Multiple Innomic VibroLine VLX and avibia AVLX allow unauthenticated configuration preset change via CAN
Summary
A unauthenticated adjacent attacker could potentially disrupt operations by switching between multiple configuration presets via CAN.
CWE
  • CWE-306 - Missing Authentication for Critical Function
Assigner
Impacted products
Vendor Product Version
Innomic VibroLine VLX1 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLX2 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLX4 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLX6 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLX8 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    avibia AvibiaLine AVLX1 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    avibia AvibiaLine AVLX2 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    avibia AvibiaLine AVLX4 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    avibia AvibiaLine AVLX6 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    avibia AvibiaLine AVLX8 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLE1 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Create a notification for this product.
    Innomic VibroLine VLE2 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Create a notification for this product.
    Innomic VibroLine VLE4 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Create a notification for this product.
    Innomic VibroLine VLE6 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Create a notification for this product.
    Innomic VibroLine VLE8 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Create a notification for this product.
    avibia AvibiaLine AVLE1 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Unaffected: 2.1.1866
Create a notification for this product.
    avibia AvibiaLine AVLE2 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Unaffected: 2.1.1866
Create a notification for this product.
    avibia AvibiaLine AVLE4 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Unaffected: 2.1.1866
Create a notification for this product.
    avibia AvibiaLine AVLE6 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Unaffected: 2.1.1866
Create a notification for this product.
    avibia AvibiaLine AVLE8 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Unaffected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLE1 HD 5.0 Unaffected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLE2 HD 5.0 Unaffected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLE4 HD 5.0 Unaffected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLE6 HD 5.0 Unaffected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLE8 HD 5.0 Unaffected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLE1 HD 4.0 Unaffected: 1.4.1074 , ≤ 1.4.1116 (semver)
Create a notification for this product.
    Innomic VibroLine VLE2 HD 4.0 Unaffected: 1.4.1074 , ≤ 1.4.1116 (semver)
Create a notification for this product.
    Innomic VibroLine VLE4 HD 4.0 Unaffected: 1.4.1074 , ≤ 1.4.1116 (semver)
Create a notification for this product.
    Innomic VibroLine VLE6 HD 4.0 Unaffected: 1.4.1074 , ≤ 1.4.1116 (semver)
Create a notification for this product.
    Innomic VibroLine VLE8 HD 4.0 Unaffected: 1.4.1074 , ≤ 1.4.1116 (semver)
Create a notification for this product.
    Innomic VibroLine VLX1 HD 4.0 Unaffected: 1.5.1074 , ≤ 1.5.1116 (semver)
Create a notification for this product.
    Innomic VibroLine VLX2 HD 4.0 Unaffected: 1.5.1074 , ≤ 1.5.1116 (semver)
Create a notification for this product.
    Innomic VibroLine VLX4 HD 4.0 Unaffected: 1.5.1074 , ≤ 1.5.1116 (semver)
Create a notification for this product.
    Innomic VibroLine VLX6 HD 4.0 Unaffected: 1.5.1074 , ≤ 1.5.1116 (semver)
Create a notification for this product.
    Innomic VibroLine VLX8 HD 4.0 Unaffected: 1.5.1074 , ≤ 1.5.1116 (semver)
Create a notification for this product.
Date Public ?
2026-02-02 14:11
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-50980",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-02T17:23:06.920289Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-02T17:23:17.439Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX1 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX2 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX4 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX6 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX8 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLX1 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLX2 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLX4 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLX6 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLX8 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE1 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE2 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE4 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE6 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE8 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLE1 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLE2 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLE4 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLE6 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLE8 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE1 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE2 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE4 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE6 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE8 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE1 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.4.1116",
              "status": "unaffected",
              "version": "1.4.1074",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE2 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.4.1116",
              "status": "unaffected",
              "version": "1.4.1074",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE4 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.4.1116",
              "status": "unaffected",
              "version": "1.4.1074",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE6 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.4.1116",
              "status": "unaffected",
              "version": "1.4.1074",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE8 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.4.1116",
              "status": "unaffected",
              "version": "1.4.1074",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX1 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.5.1116",
              "status": "unaffected",
              "version": "1.5.1074",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX2 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.5.1116",
              "status": "unaffected",
              "version": "1.5.1074",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX4 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.5.1116",
              "status": "unaffected",
              "version": "1.5.1074",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX6 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.5.1116",
              "status": "unaffected",
              "version": "1.5.1074",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX8 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.5.1116",
              "status": "unaffected",
              "version": "1.5.1074",
              "versionType": "semver"
            }
          ]
        }
      ],
      "datePublic": "2026-02-02T14:11:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A unauthenticated adjacent attacker could potentially disrupt operations by switching between multiple configuration presets via CAN."
            }
          ],
          "value": "A unauthenticated adjacent attacker could potentially disrupt operations by switching between multiple configuration presets via CAN."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-306",
              "description": "CWE-306 Missing Authentication for Critical Function",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-02T14:39:41.970Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.innomic.com/.well-known/csaf/white/2026/ids-2026-0001.html"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.innomic.com/.well-known/csaf/white/2026/ids-2026-0001.json"
        }
      ],
      "source": {
        "advisory": "CERT@VDE#641933",
        "discovery": "UNKNOWN"
      },
      "title": "Multiple Innomic VibroLine VLX and avibia AVLX allow unauthenticated configuration preset change via CAN",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2022-50980",
    "datePublished": "2026-02-02T14:11:21.236Z",
    "dateReserved": "2026-01-12T08:05:55.994Z",
    "dateUpdated": "2026-02-02T17:23:17.439Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2022-50979 (GCVE-0-2022-50979)

Vulnerability from cvelistv5 – Published: 2026-02-02 14:10 – Updated: 2026-02-02 17:23
VLAI?
Title
Multiple Innomic VibroLine VLX and avibia AVLX allow unauthenticated configuration preset change via Modbus (RS485)
Summary
An unauthenticated adjacent attacker could potentially disrupt operations by switching between multiple configuration presets via Modbus (RS485).
CWE
  • CWE-306 - Missing Authentication for Critical Function
Assigner
Impacted products
Vendor Product Version
Innomic VibroLine VLX1 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLX2 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLX4 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLX6 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLX8 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    avibia AvibiaLine AVLX1 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    avibia AvibiaLine AVLX2 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    avibia AvibiaLine AVLX4 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    avibia AvibiaLine AVLX6 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    avibia AvibiaLine AVLX8 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLE1 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Create a notification for this product.
    Innomic VibroLine VLE2 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Create a notification for this product.
    Innomic VibroLine VLE4 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Create a notification for this product.
    Innomic VibroLine VLE6 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Create a notification for this product.
    Innomic VibroLine VLE8 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Create a notification for this product.
    avibia AvibiaLine AVLE1 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Unaffected: 2.1.1866
Create a notification for this product.
    avibia AvibiaLine AVLE2 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Unaffected: 2.1.1866
Create a notification for this product.
    avibia AvibiaLine AVLE4 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Unaffected: 2.1.1866
Create a notification for this product.
    avibia AvibiaLine AVLE6 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Unaffected: 2.1.1866
Create a notification for this product.
    avibia AvibiaLine AVLE8 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Unaffected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLE1 HD 5.0 Unaffected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLE2 HD 5.0 Unaffected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLE4 HD 5.0 Unaffected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLE6 HD 5.0 Unaffected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLE8 HD 5.0 Unaffected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLE1 HD 4.0 Unaffected: 1.4.1074 , ≤ 1.4.1116 (semver)
Create a notification for this product.
    Innomic VibroLine VLE2 HD 4.0 Unaffected: 1.4.1074 , ≤ 1.4.1116 (semver)
Create a notification for this product.
    Innomic VibroLine VLE4 HD 4.0 Unaffected: 1.4.1074 , ≤ 1.4.1116 (semver)
Create a notification for this product.
    Innomic VibroLine VLE6 HD 4.0 Unaffected: 1.4.1074 , ≤ 1.4.1116 (semver)
Create a notification for this product.
    Innomic VibroLine VLE8 HD 4.0 Unaffected: 1.4.1074 , ≤ 1.4.1116 (semver)
Create a notification for this product.
    Innomic VibroLine VLX1 HD 4.0 Unaffected: 1.5.1074 , ≤ 1.5.1116 (semver)
Create a notification for this product.
    Innomic VibroLine VLX2 HD 4.0 Unaffected: 1.5.1074 , ≤ 1.5.1116 (semver)
Create a notification for this product.
    Innomic VibroLine VLX4 HD 4.0 Unaffected: 1.5.1074 , ≤ 1.5.1116 (semver)
Create a notification for this product.
    Innomic VibroLine VLX6 HD 4.0 Unaffected: 1.5.1074 , ≤ 1.5.1116 (semver)
Create a notification for this product.
    Innomic VibroLine VLX8 HD 4.0 Unaffected: 1.5.1074 , ≤ 1.5.1116 (semver)
Create a notification for this product.
Date Public ?
2026-02-02 14:09
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-50979",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-02T17:23:44.913929Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-02T17:23:54.319Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX1 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX2 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX4 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX6 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX8 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLX1 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLX2 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLX4 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLX6 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLX8 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE1 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE2 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE4 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE6 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE8 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLE1 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLE2 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLE4 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLE6 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLE8 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE1 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE2 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE4 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE6 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE8 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE1 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.4.1116",
              "status": "unaffected",
              "version": "1.4.1074",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE2 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.4.1116",
              "status": "unaffected",
              "version": "1.4.1074",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE4 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.4.1116",
              "status": "unaffected",
              "version": "1.4.1074",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE6 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.4.1116",
              "status": "unaffected",
              "version": "1.4.1074",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE8 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.4.1116",
              "status": "unaffected",
              "version": "1.4.1074",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX1 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.5.1116",
              "status": "unaffected",
              "version": "1.5.1074",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX2 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.5.1116",
              "status": "unaffected",
              "version": "1.5.1074",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX4 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.5.1116",
              "status": "unaffected",
              "version": "1.5.1074",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX6 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.5.1116",
              "status": "unaffected",
              "version": "1.5.1074",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX8 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.5.1116",
              "status": "unaffected",
              "version": "1.5.1074",
              "versionType": "semver"
            }
          ]
        }
      ],
      "datePublic": "2026-02-02T14:09:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An unauthenticated adjacent attacker could potentially disrupt operations by switching between multiple configuration presets via Modbus (RS485)."
            }
          ],
          "value": "An unauthenticated adjacent attacker could potentially disrupt operations by switching between multiple configuration presets via Modbus (RS485)."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-306",
              "description": "CWE-306 Missing Authentication for Critical Function",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-02T14:39:08.454Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.innomic.com/.well-known/csaf/white/2026/ids-2026-0001.html"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.innomic.com/.well-known/csaf/white/2026/ids-2026-0001.json"
        }
      ],
      "source": {
        "advisory": "CERT@VDE#641933",
        "discovery": "UNKNOWN"
      },
      "title": "Multiple Innomic VibroLine VLX and avibia AVLX allow unauthenticated configuration preset change via Modbus (RS485)",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2022-50979",
    "datePublished": "2026-02-02T14:10:40.182Z",
    "dateReserved": "2026-01-12T08:05:55.994Z",
    "dateUpdated": "2026-02-02T17:23:54.319Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2022-50978 (GCVE-0-2022-50978)

Vulnerability from cvelistv5 – Published: 2026-02-02 14:09 – Updated: 2026-02-02 17:24
VLAI?
Title
Multiple Innomic VibroLine VLX and avibia AVLX allow unauthenticated configuration preset change via Modbus (TCP)
Summary
An unauthenticated remote attacker could potentially disrupt operations by switching between multiple configuration presets via Modbus (TCP).
CWE
  • CWE-306 - Missing Authentication for Critical Function
Assigner
Impacted products
Vendor Product Version
Innomic VibroLine VLX1 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLX2 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLX4 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLX6 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLX8 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    avibia AvibiaLine AVLX1 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    avibia AvibiaLine AVLX2 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    avibia AvibiaLine AVLX4 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    avibia AvibiaLine AVLX6 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    avibia AvibiaLine AVLX8 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLE1 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Create a notification for this product.
    Innomic VibroLine VLE2 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Create a notification for this product.
    Innomic VibroLine VLE4 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Create a notification for this product.
    Innomic VibroLine VLE6 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Create a notification for this product.
    Innomic VibroLine VLE8 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Create a notification for this product.
    avibia AvibiaLine AVLE1 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Unaffected: 2.1.1866
Create a notification for this product.
    avibia AvibiaLine AVLE2 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Unaffected: 2.1.1866
Create a notification for this product.
    avibia AvibiaLine AVLE4 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Unaffected: 2.1.1866
Create a notification for this product.
    avibia AvibiaLine AVLE6 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Unaffected: 2.1.1866
Create a notification for this product.
    avibia AvibiaLine AVLE8 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Unaffected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLE1 HD 5.0 Unaffected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLE2 HD 5.0 Unaffected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLE4 HD 5.0 Unaffected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLE6 HD 5.0 Unaffected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLE8 HD 5.0 Unaffected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLE1 HD 4.0 Unaffected: 1.4.1074 , ≤ 1.4.1116 (semver)
Create a notification for this product.
    Innomic VibroLine VLE2 HD 4.0 Unaffected: 1.4.1074 , ≤ 1.4.1116 (semver)
Create a notification for this product.
    Innomic VibroLine VLE4 HD 4.0 Unaffected: 1.4.1074 , ≤ 1.4.1116 (semver)
Create a notification for this product.
    Innomic VibroLine VLE6 HD 4.0 Unaffected: 1.4.1074 , ≤ 1.4.1116 (semver)
Create a notification for this product.
    Innomic VibroLine VLE8 HD 4.0 Unaffected: 1.4.1074 , ≤ 1.4.1116 (semver)
Create a notification for this product.
    Innomic VibroLine VLX1 HD 4.0 Unaffected: 1.5.1074 , ≤ 1.5.1116 (semver)
Create a notification for this product.
    Innomic VibroLine VLX2 HD 4.0 Unaffected: 1.5.1074 , ≤ 1.5.1116 (semver)
Create a notification for this product.
    Innomic VibroLine VLX4 HD 4.0 Unaffected: 1.5.1074 , ≤ 1.5.1116 (semver)
Create a notification for this product.
    Innomic VibroLine VLX6 HD 4.0 Unaffected: 1.5.1074 , ≤ 1.5.1116 (semver)
Create a notification for this product.
    Innomic VibroLine VLX8 HD 4.0 Unaffected: 1.5.1074 , ≤ 1.5.1116 (semver)
Create a notification for this product.
Date Public ?
2026-02-02 14:09
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-50978",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-02T17:24:34.847473Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-02T17:24:43.146Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX1 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX2 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX4 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX6 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX8 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLX1 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLX2 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLX4 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLX6 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLX8 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE1 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE2 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE4 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE6 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE8 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLE1 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLE2 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLE4 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLE6 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLE8 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE1 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE2 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE4 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE6 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE8 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE1 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.4.1116",
              "status": "unaffected",
              "version": "1.4.1074",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE2 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.4.1116",
              "status": "unaffected",
              "version": "1.4.1074",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE4 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.4.1116",
              "status": "unaffected",
              "version": "1.4.1074",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE6 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.4.1116",
              "status": "unaffected",
              "version": "1.4.1074",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE8 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.4.1116",
              "status": "unaffected",
              "version": "1.4.1074",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX1 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.5.1116",
              "status": "unaffected",
              "version": "1.5.1074",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX2 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.5.1116",
              "status": "unaffected",
              "version": "1.5.1074",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX4 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.5.1116",
              "status": "unaffected",
              "version": "1.5.1074",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX6 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.5.1116",
              "status": "unaffected",
              "version": "1.5.1074",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX8 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.5.1116",
              "status": "unaffected",
              "version": "1.5.1074",
              "versionType": "semver"
            }
          ]
        }
      ],
      "datePublic": "2026-02-02T14:09:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An unauthenticated remote attacker could potentially disrupt operations by switching between multiple configuration presets via Modbus (TCP)."
            }
          ],
          "value": "An unauthenticated remote attacker could potentially disrupt operations by switching between multiple configuration presets via Modbus (TCP)."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-306",
              "description": "CWE-306 Missing Authentication for Critical Function",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-02T14:37:42.537Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.innomic.com/.well-known/csaf/white/2026/ids-2026-0001.html"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.innomic.com/.well-known/csaf/white/2026/ids-2026-0001.json"
        }
      ],
      "source": {
        "advisory": "CERT@VDE#641933",
        "discovery": "UNKNOWN"
      },
      "title": "Multiple Innomic VibroLine VLX and avibia AVLX allow unauthenticated configuration preset change via Modbus (TCP)",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2022-50978",
    "datePublished": "2026-02-02T14:09:43.563Z",
    "dateReserved": "2026-01-12T08:05:55.994Z",
    "dateUpdated": "2026-02-02T17:24:43.146Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2022-50977 (GCVE-0-2022-50977)

Vulnerability from cvelistv5 – Published: 2026-02-02 14:08 – Updated: 2026-02-02 17:25
VLAI?
Title
Multiple Innomic VibroLine VLX and avibia AVLX allow unauthenticated configuration preset change via HTTP
Summary
An unauthenticated remote attacker could potentially disrupt operations by switching between multiple configuration presets via HTTP.
CWE
  • CWE-306 - Missing Authentication for Critical Function
Assigner
Impacted products
Vendor Product Version
Innomic VibroLine VLX1 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLX2 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLX4 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLX6 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLX8 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    avibia AvibiaLine AVLX1 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    avibia AvibiaLine AVLX2 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    avibia AvibiaLine AVLX4 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    avibia AvibiaLine AVLX6 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    avibia AvibiaLine AVLX8 HD 5.0 Affected: 2.1.1340 , ≤ 2.1.1387 (semver)
Affected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLE1 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Create a notification for this product.
    Innomic VibroLine VLE2 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Create a notification for this product.
    Innomic VibroLine VLE4 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Create a notification for this product.
    Innomic VibroLine VLE6 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Create a notification for this product.
    Innomic VibroLine VLE8 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Create a notification for this product.
    avibia AvibiaLine AVLE1 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Unaffected: 2.1.1866
Create a notification for this product.
    avibia AvibiaLine AVLE2 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Unaffected: 2.1.1866
Create a notification for this product.
    avibia AvibiaLine AVLE4 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Unaffected: 2.1.1866
Create a notification for this product.
    avibia AvibiaLine AVLE6 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Unaffected: 2.1.1866
Create a notification for this product.
    avibia AvibiaLine AVLE8 HD 5.0 Unaffected: 2.1.1340 , ≤ 2.1.1387 (semver)
Unaffected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLE1 HD 5.0 Unaffected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLE2 HD 5.0 Unaffected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLE4 HD 5.0 Unaffected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLE6 HD 5.0 Unaffected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLE8 HD 5.0 Unaffected: 2.1.1866
Create a notification for this product.
    Innomic VibroLine VLE1 HD 4.0 Unaffected: 1.4.1074 , ≤ 1.4.1116 (semver)
Create a notification for this product.
    Innomic VibroLine VLE2 HD 4.0 Unaffected: 1.4.1074 , ≤ 1.4.1116 (semver)
Create a notification for this product.
    Innomic VibroLine VLE4 HD 4.0 Unaffected: 1.4.1074 , ≤ 1.4.1116 (semver)
Create a notification for this product.
    Innomic VibroLine VLE6 HD 4.0 Unaffected: 1.4.1074 , ≤ 1.4.1116 (semver)
Create a notification for this product.
    Innomic VibroLine VLE8 HD 4.0 Unaffected: 1.4.1074 , ≤ 1.4.1116 (semver)
Create a notification for this product.
    Innomic VibroLine VLX1 HD 4.0 Unaffected: 1.5.1074 , ≤ 1.5.1116 (semver)
Create a notification for this product.
    Innomic VibroLine VLX2 HD 4.0 Unaffected: 1.5.1074 , ≤ 1.5.1116 (semver)
Create a notification for this product.
    Innomic VibroLine VLX4 HD 4.0 Unaffected: 1.5.1074 , ≤ 1.5.1116 (semver)
Create a notification for this product.
    Innomic VibroLine VLX6 HD 4.0 Unaffected: 1.5.1074 , ≤ 1.5.1116 (semver)
Create a notification for this product.
    Innomic VibroLine VLX8 HD 4.0 Unaffected: 1.5.1074 , ≤ 1.5.1116 (semver)
Create a notification for this product.
Date Public ?
2026-02-02 14:08
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-50977",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-02T17:25:09.978101Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-02T17:25:19.355Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX1 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX2 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX4 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX6 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX8 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLX1 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLX2 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLX4 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLX6 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLX8 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "affected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE1 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE2 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE4 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE6 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE8 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLE1 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLE2 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLE4 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLE6 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "AvibiaLine AVLE8 HD 5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "2.1.1387",
              "status": "unaffected",
              "version": "2.1.1340",
              "versionType": "semver"
            },
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE1 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE2 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE4 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE6 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE8 HD 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "status": "unaffected",
              "version": "2.1.1866"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE1 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.4.1116",
              "status": "unaffected",
              "version": "1.4.1074",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE2 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.4.1116",
              "status": "unaffected",
              "version": "1.4.1074",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE4 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.4.1116",
              "status": "unaffected",
              "version": "1.4.1074",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE6 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.4.1116",
              "status": "unaffected",
              "version": "1.4.1074",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLE8 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.4.1116",
              "status": "unaffected",
              "version": "1.4.1074",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX1 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.5.1116",
              "status": "unaffected",
              "version": "1.5.1074",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX2 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.5.1116",
              "status": "unaffected",
              "version": "1.5.1074",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX4 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.5.1116",
              "status": "unaffected",
              "version": "1.5.1074",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX6 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.5.1116",
              "status": "unaffected",
              "version": "1.5.1074",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "modules": [
            "firmware"
          ],
          "product": "VibroLine VLX8 HD 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "1.5.1116",
              "status": "unaffected",
              "version": "1.5.1074",
              "versionType": "semver"
            }
          ]
        }
      ],
      "datePublic": "2026-02-02T14:08:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An unauthenticated remote attacker could potentially disrupt operations by switching\u0026nbsp;between multiple configuration presets via HTTP."
            }
          ],
          "value": "An unauthenticated remote attacker could potentially disrupt operations by switching\u00a0between multiple configuration presets via HTTP."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-306",
              "description": "CWE-306 Missing Authentication for Critical Function",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-02T14:36:09.068Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.innomic.com/.well-known/csaf/white/2026/ids-2026-0001.html"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.innomic.com/.well-known/csaf/white/2026/ids-2026-0001.json"
        }
      ],
      "source": {
        "advisory": "CERT@VDE#641933",
        "discovery": "UNKNOWN"
      },
      "title": "Multiple Innomic VibroLine VLX and avibia AVLX allow unauthenticated configuration preset change via HTTP",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2022-50977",
    "datePublished": "2026-02-02T14:08:59.192Z",
    "dateReserved": "2026-01-12T08:05:55.994Z",
    "dateUpdated": "2026-02-02T17:25:19.355Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2022-50976 (GCVE-0-2022-50976)

Vulnerability from cvelistv5 – Published: 2026-02-02 14:08 – Updated: 2026-02-02 17:25
VLAI?
Title
Innomic VibroLine Configurator and avibia Configurator allow unintended device reset via USB
Summary
A local attacker could cause a full device reset by resetting the device passwords using an invalid reset file via USB.
CWE
  • CWE-1288 - Improper Validation of Consistency within Input
Assigner
Impacted products
Vendor Product Version
Innomic VibroLine Configurator 5.0 Affected: 5.0.2416 , ≤ 5.0.2486 (semver)
Unaffected: 5.1.2730
Create a notification for this product.
    avibia AvibiaLine Configurator 5.0 Affected: 5.0.2416 , ≤ 5.0.2486 (semver)
Unaffected: 5.1.2730
Create a notification for this product.
    Innomic VibroLine Configurator 4.0 Unaffected: 4.0.1931 , ≤ 4.0.2406 (semver)
Create a notification for this product.
Date Public ?
2026-02-02 14:08
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-50976",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-02T17:25:42.635940Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-02T17:25:50.864Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "VibroLine Configurator 5.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "5.0.2486",
              "status": "affected",
              "version": "5.0.2416",
              "versionType": "semver"
            },
            {
              "status": "unaffected",
              "version": "5.1.2730"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AvibiaLine Configurator  5.0",
          "vendor": "avibia",
          "versions": [
            {
              "lessThanOrEqual": "5.0.2486",
              "status": "affected",
              "version": "5.0.2416",
              "versionType": "semver"
            },
            {
              "status": "unaffected",
              "version": "5.1.2730"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "VibroLine Configurator 4.0",
          "vendor": "Innomic",
          "versions": [
            {
              "lessThanOrEqual": "4.0.2406",
              "status": "unaffected",
              "version": "4.0.1931",
              "versionType": "semver"
            }
          ]
        }
      ],
      "datePublic": "2026-02-02T14:08:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eA local attacker could cause a full device reset by resetting the device passwords using an invalid reset file via USB.\u003cbr\u003e\u003c/p\u003e"
            }
          ],
          "value": "A local attacker could cause a full device reset by resetting the device passwords using an invalid reset file via USB."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.7,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1288",
              "description": "CWE-1288: Improper Validation of Consistency within Input",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-02T14:08:24.139Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.innomic.com/.well-known/csaf/white/2026/ids-2026-0001.html"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.innomic.com/.well-known/csaf/white/2026/ids-2026-0001.json"
        }
      ],
      "source": {
        "advisory": "CERT@VDE#641933",
        "discovery": "UNKNOWN"
      },
      "title": "Innomic VibroLine Configurator and avibia Configurator allow unintended device reset via USB",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2022-50976",
    "datePublished": "2026-02-02T14:08:24.139Z",
    "dateReserved": "2026-01-12T08:05:55.994Z",
    "dateUpdated": "2026-02-02T17:25:50.864Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}