Search criteria

2 vulnerabilities found for icc613_firmware by bender

CVE-2021-34589 (GCVE-0-2021-34589)

Vulnerability from nvd – Published: 2022-04-27 15:15 – Updated: 2024-09-16 21:08
VLAI?
Title
Bender Charge Controller: RFID leak
Summary
In Bender/ebee Charge Controllers in multiple versions are prone to an RFID leak. The RFID of the last charge event can be read without authentication via the web interface.
CWE
Assigner
References
Impacted products
Vendor Product Version
Bender / ebee CC612 Affected: 5.11.x , < 5.11.2 (custom)
Affected: 5.12.x , < 5.12.5 (custom)
Affected: 5.13.x , < 5.13.2 (custom)
Affected: 5.20.x , < 5.20.2 (custom)
Create a notification for this product.
    Bender / ebee CC613 Affected: 5.11.x , < 5.11.2 (custom)
Affected: 5.12.x , < 5.12.5 (custom)
Affected: 5.13.x , < 5.13.2 (custom)
Affected: 5.20.x , < 5.20.2 (custom)
Create a notification for this product.
    Bender / ebee ICC15xx Affected: 5.11.x , < 5.11.2 (custom)
Affected: 5.12.x , < 5.12.5 (custom)
Affected: 5.13.x , < 5.13.2 (custom)
Affected: 5.20.x , < 5.20.2 (custom)
Create a notification for this product.
    Bender / ebee ICC16xx Affected: 5.11.x , < 5.11.2 (custom)
Affected: 5.12.x , < 5.12.5 (custom)
Affected: 5.13.x , < 5.13.2 (custom)
Affected: 5.20.x , < 5.20.2 (custom)
Create a notification for this product.
Credits
Bender thanks the IT security researchers at OpenSource Security GmbH for their thorough and in-depth work. The issue was coordinated by CERT@VDE.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T00:19:46.936Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2021-047"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "CC612",
          "vendor": "Bender / ebee",
          "versions": [
            {
              "lessThan": "5.11.2",
              "status": "affected",
              "version": "5.11.x",
              "versionType": "custom"
            },
            {
              "lessThan": "5.12.5",
              "status": "affected",
              "version": "5.12.x",
              "versionType": "custom"
            },
            {
              "lessThan": "5.13.2",
              "status": "affected",
              "version": "5.13.x",
              "versionType": "custom"
            },
            {
              "lessThan": "5.20.2",
              "status": "affected",
              "version": "5.20.x",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "CC613",
          "vendor": "Bender / ebee",
          "versions": [
            {
              "lessThan": "5.11.2",
              "status": "affected",
              "version": "5.11.x",
              "versionType": "custom"
            },
            {
              "lessThan": "5.12.5",
              "status": "affected",
              "version": "5.12.x",
              "versionType": "custom"
            },
            {
              "lessThan": "5.13.2",
              "status": "affected",
              "version": "5.13.x",
              "versionType": "custom"
            },
            {
              "lessThan": "5.20.2",
              "status": "affected",
              "version": "5.20.x",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ICC15xx",
          "vendor": "Bender / ebee",
          "versions": [
            {
              "lessThan": "5.11.2",
              "status": "affected",
              "version": "5.11.x",
              "versionType": "custom"
            },
            {
              "lessThan": "5.12.5",
              "status": "affected",
              "version": "5.12.x",
              "versionType": "custom"
            },
            {
              "lessThan": "5.13.2",
              "status": "affected",
              "version": "5.13.x",
              "versionType": "custom"
            },
            {
              "lessThan": "5.20.2",
              "status": "affected",
              "version": "5.20.x",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ICC16xx",
          "vendor": "Bender / ebee",
          "versions": [
            {
              "lessThan": "5.11.2",
              "status": "affected",
              "version": "5.11.x",
              "versionType": "custom"
            },
            {
              "lessThan": "5.12.5",
              "status": "affected",
              "version": "5.12.x",
              "versionType": "custom"
            },
            {
              "lessThan": "5.13.2",
              "status": "affected",
              "version": "5.13.x",
              "versionType": "custom"
            },
            {
              "lessThan": "5.20.2",
              "status": "affected",
              "version": "5.20.x",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Bender thanks the IT security researchers at OpenSource Security GmbH for their thorough and in-depth work. The issue was coordinated by CERT@VDE."
        }
      ],
      "datePublic": "2022-04-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "In Bender/ebee Charge Controllers in multiple versions are prone to an RFID leak. The RFID of the last charge event can be read without authentication via the web interface."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-200",
              "description": "CWE-200 Information Exposure",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-04-27T15:15:27",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://cert.vde.com/en/advisories/VDE-2021-047"
        }
      ],
      "source": {
        "advisory": "VDE-2021-047",
        "defect": [
          "CERT@VDE#64088"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "Bender Charge Controller: RFID leak",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "info@cert.vde.com",
          "DATE_PUBLIC": "2022-04-27T10:00:00.000Z",
          "ID": "CVE-2021-34589",
          "STATE": "PUBLIC",
          "TITLE": "Bender Charge Controller: RFID leak"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "CC612",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "5.11.x",
                            "version_value": "5.11.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "5.12.x",
                            "version_value": "5.12.5"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "5.13.x",
                            "version_value": "5.13.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "5.20.x",
                            "version_value": "5.20.2"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "CC613",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "5.11.x",
                            "version_value": "5.11.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "5.12.x",
                            "version_value": "5.12.5"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "5.13.x",
                            "version_value": "5.13.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "5.20.x",
                            "version_value": "5.20.2"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ICC15xx",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "5.11.x",
                            "version_value": "5.11.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "5.12.x",
                            "version_value": "5.12.5"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "5.13.x",
                            "version_value": "5.13.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "5.20.x",
                            "version_value": "5.20.2"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ICC16xx",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "5.11.x",
                            "version_value": "5.11.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "5.12.x",
                            "version_value": "5.12.5"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "5.13.x",
                            "version_value": "5.13.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "5.20.x",
                            "version_value": "5.20.2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Bender / ebee"
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "Bender thanks the IT security researchers at OpenSource Security GmbH for their thorough and in-depth work. The issue was coordinated by CERT@VDE."
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In Bender/ebee Charge Controllers in multiple versions are prone to an RFID leak. The RFID of the last charge event can be read without authentication via the web interface."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-200 Information Exposure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://cert.vde.com/en/advisories/VDE-2021-047",
              "refsource": "CONFIRM",
              "url": "https://cert.vde.com/en/advisories/VDE-2021-047"
            }
          ]
        },
        "source": {
          "advisory": "VDE-2021-047",
          "defect": [
            "CERT@VDE#64088"
          ],
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2021-34589",
    "datePublished": "2022-04-27T15:15:27.151287Z",
    "dateReserved": "2021-06-10T00:00:00",
    "dateUpdated": "2024-09-16T21:08:59.841Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-34589 (GCVE-0-2021-34589)

Vulnerability from cvelistv5 – Published: 2022-04-27 15:15 – Updated: 2024-09-16 21:08
VLAI?
Title
Bender Charge Controller: RFID leak
Summary
In Bender/ebee Charge Controllers in multiple versions are prone to an RFID leak. The RFID of the last charge event can be read without authentication via the web interface.
CWE
Assigner
References
Impacted products
Vendor Product Version
Bender / ebee CC612 Affected: 5.11.x , < 5.11.2 (custom)
Affected: 5.12.x , < 5.12.5 (custom)
Affected: 5.13.x , < 5.13.2 (custom)
Affected: 5.20.x , < 5.20.2 (custom)
Create a notification for this product.
    Bender / ebee CC613 Affected: 5.11.x , < 5.11.2 (custom)
Affected: 5.12.x , < 5.12.5 (custom)
Affected: 5.13.x , < 5.13.2 (custom)
Affected: 5.20.x , < 5.20.2 (custom)
Create a notification for this product.
    Bender / ebee ICC15xx Affected: 5.11.x , < 5.11.2 (custom)
Affected: 5.12.x , < 5.12.5 (custom)
Affected: 5.13.x , < 5.13.2 (custom)
Affected: 5.20.x , < 5.20.2 (custom)
Create a notification for this product.
    Bender / ebee ICC16xx Affected: 5.11.x , < 5.11.2 (custom)
Affected: 5.12.x , < 5.12.5 (custom)
Affected: 5.13.x , < 5.13.2 (custom)
Affected: 5.20.x , < 5.20.2 (custom)
Create a notification for this product.
Credits
Bender thanks the IT security researchers at OpenSource Security GmbH for their thorough and in-depth work. The issue was coordinated by CERT@VDE.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T00:19:46.936Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2021-047"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "CC612",
          "vendor": "Bender / ebee",
          "versions": [
            {
              "lessThan": "5.11.2",
              "status": "affected",
              "version": "5.11.x",
              "versionType": "custom"
            },
            {
              "lessThan": "5.12.5",
              "status": "affected",
              "version": "5.12.x",
              "versionType": "custom"
            },
            {
              "lessThan": "5.13.2",
              "status": "affected",
              "version": "5.13.x",
              "versionType": "custom"
            },
            {
              "lessThan": "5.20.2",
              "status": "affected",
              "version": "5.20.x",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "CC613",
          "vendor": "Bender / ebee",
          "versions": [
            {
              "lessThan": "5.11.2",
              "status": "affected",
              "version": "5.11.x",
              "versionType": "custom"
            },
            {
              "lessThan": "5.12.5",
              "status": "affected",
              "version": "5.12.x",
              "versionType": "custom"
            },
            {
              "lessThan": "5.13.2",
              "status": "affected",
              "version": "5.13.x",
              "versionType": "custom"
            },
            {
              "lessThan": "5.20.2",
              "status": "affected",
              "version": "5.20.x",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ICC15xx",
          "vendor": "Bender / ebee",
          "versions": [
            {
              "lessThan": "5.11.2",
              "status": "affected",
              "version": "5.11.x",
              "versionType": "custom"
            },
            {
              "lessThan": "5.12.5",
              "status": "affected",
              "version": "5.12.x",
              "versionType": "custom"
            },
            {
              "lessThan": "5.13.2",
              "status": "affected",
              "version": "5.13.x",
              "versionType": "custom"
            },
            {
              "lessThan": "5.20.2",
              "status": "affected",
              "version": "5.20.x",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "ICC16xx",
          "vendor": "Bender / ebee",
          "versions": [
            {
              "lessThan": "5.11.2",
              "status": "affected",
              "version": "5.11.x",
              "versionType": "custom"
            },
            {
              "lessThan": "5.12.5",
              "status": "affected",
              "version": "5.12.x",
              "versionType": "custom"
            },
            {
              "lessThan": "5.13.2",
              "status": "affected",
              "version": "5.13.x",
              "versionType": "custom"
            },
            {
              "lessThan": "5.20.2",
              "status": "affected",
              "version": "5.20.x",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Bender thanks the IT security researchers at OpenSource Security GmbH for their thorough and in-depth work. The issue was coordinated by CERT@VDE."
        }
      ],
      "datePublic": "2022-04-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "In Bender/ebee Charge Controllers in multiple versions are prone to an RFID leak. The RFID of the last charge event can be read without authentication via the web interface."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-200",
              "description": "CWE-200 Information Exposure",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-04-27T15:15:27",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://cert.vde.com/en/advisories/VDE-2021-047"
        }
      ],
      "source": {
        "advisory": "VDE-2021-047",
        "defect": [
          "CERT@VDE#64088"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "Bender Charge Controller: RFID leak",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "info@cert.vde.com",
          "DATE_PUBLIC": "2022-04-27T10:00:00.000Z",
          "ID": "CVE-2021-34589",
          "STATE": "PUBLIC",
          "TITLE": "Bender Charge Controller: RFID leak"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "CC612",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "5.11.x",
                            "version_value": "5.11.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "5.12.x",
                            "version_value": "5.12.5"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "5.13.x",
                            "version_value": "5.13.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "5.20.x",
                            "version_value": "5.20.2"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "CC613",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "5.11.x",
                            "version_value": "5.11.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "5.12.x",
                            "version_value": "5.12.5"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "5.13.x",
                            "version_value": "5.13.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "5.20.x",
                            "version_value": "5.20.2"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ICC15xx",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "5.11.x",
                            "version_value": "5.11.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "5.12.x",
                            "version_value": "5.12.5"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "5.13.x",
                            "version_value": "5.13.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "5.20.x",
                            "version_value": "5.20.2"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ICC16xx",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "5.11.x",
                            "version_value": "5.11.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "5.12.x",
                            "version_value": "5.12.5"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "5.13.x",
                            "version_value": "5.13.2"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "5.20.x",
                            "version_value": "5.20.2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Bender / ebee"
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "Bender thanks the IT security researchers at OpenSource Security GmbH for their thorough and in-depth work. The issue was coordinated by CERT@VDE."
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In Bender/ebee Charge Controllers in multiple versions are prone to an RFID leak. The RFID of the last charge event can be read without authentication via the web interface."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-200 Information Exposure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://cert.vde.com/en/advisories/VDE-2021-047",
              "refsource": "CONFIRM",
              "url": "https://cert.vde.com/en/advisories/VDE-2021-047"
            }
          ]
        },
        "source": {
          "advisory": "VDE-2021-047",
          "defect": [
            "CERT@VDE#64088"
          ],
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2021-34589",
    "datePublished": "2022-04-27T15:15:27.151287Z",
    "dateReserved": "2021-06-10T00:00:00",
    "dateUpdated": "2024-09-16T21:08:59.841Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}