Search criteria
4 vulnerabilities by Kieback&Peter
CVE-2025-6225 (GCVE-0-2025-6225)
Vulnerability from cvelistv5 – Published: 2026-01-07 13:00 – Updated: 2026-01-07 14:12
VLAI?
Title
Command injection in Kieback&Peter Neutrino-GLT
Summary
Kieback&Peter Neutrino-GLT product is used for building management. It's web component "SM70 PHWEB" is vulnerable to shell command injection via login form. The injected commands would execute with low privileges. The vulnerability has been fixed in version 9.40.02
Severity ?
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Kieback&Peter | Neutrino-GLT |
Affected:
0 , < 9.40.02
(custom)
|
Credits
Jan Barszcz
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-6225",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-01-07T14:12:25.758893Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-01-07T14:12:33.502Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"modules": [
"SM70 PHWEB"
],
"product": "Neutrino-GLT",
"vendor": "Kieback\u0026Peter",
"versions": [
{
"lessThan": "9.40.02",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Jan Barszcz"
}
],
"datePublic": "2026-01-07T13:38:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eKieback\u0026amp;Peter Neutrino-GLT product is used for building management. It\u0027s w\u003c/span\u003eeb component\u0026nbsp;\"SM70 PHWEB\" is vulnerable to shell command injection via login form. The injected commands would execute with low privileges. The vulnerability has been fixed in version 9.40.02"
}
],
"value": "Kieback\u0026Peter Neutrino-GLT product is used for building management. It\u0027s web component\u00a0\"SM70 PHWEB\" is vulnerable to shell command injection via login form. The injected commands would execute with low privileges. The vulnerability has been fixed in version 9.40.02"
}
],
"impacts": [
{
"capecId": "CAPEC-88",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-88 OS Command Injection"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "LOW",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-01-07T13:00:46.715Z",
"orgId": "4bb8329e-dd38-46c1-aafb-9bf32bcb93c6",
"shortName": "CERT-PL"
},
"references": [
{
"url": "https://cert.pl/en/posts/2026/01/CVE-2025-6225/"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Command injection in Kieback\u0026Peter Neutrino-GLT",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "4bb8329e-dd38-46c1-aafb-9bf32bcb93c6",
"assignerShortName": "CERT-PL",
"cveId": "CVE-2025-6225",
"datePublished": "2026-01-07T13:00:46.715Z",
"dateReserved": "2025-06-18T09:58:30.445Z",
"dateUpdated": "2026-01-07T14:12:33.502Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2024-43698 (GCVE-0-2024-43698)
Vulnerability from cvelistv5 – Published: 2024-10-22 21:23 – Updated: 2024-10-23 14:42
VLAI?
Title
Kieback&Peter DDC4000 Series Use of Weak Credentials
Summary
Kieback & Peter's DDC4000 series uses weak credentials, which may allow an unauthenticated attacker to get full admin rights on the system.
Severity ?
9.8 (Critical)
CWE
- CWE-1391 - Use of Weak Credentials
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Kieback&Peter | DDC4040e |
Affected:
0 , ≤ 1.17.6
(custom)
|
|||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||
Credits
Raphael Ruf of terreActive AG reported these vulnerabilities to CISA.
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:kieback\\\u0026peter:ddc4400_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ddc4400_firmware",
"vendor": "kieback\\\u0026peter",
"versions": [
{
"lessThanOrEqual": "1.12.14",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:kieback\\\u0026peter:ddc4002e_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ddc4002e_firmware",
"vendor": "kieback\\\u0026peter",
"versions": [
{
"lessThanOrEqual": "1.17.6",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:kieback\\\u0026peter:ddc4200e_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ddc4200e_firmware",
"vendor": "kieback\\\u0026peter",
"versions": [
{
"lessThanOrEqual": "1.17.6",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:kieback\\\u0026peter:ddc4002_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ddc4002_firmware",
"vendor": "kieback\\\u0026peter",
"versions": [
{
"lessThanOrEqual": "1.12.14",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:kieback\\\u0026peter:ddc4100_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ddc4100_firmware",
"vendor": "kieback\\\u0026peter",
"versions": [
{
"lessThanOrEqual": "1.7.4",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:kieback\\\u0026peter:ddc4200_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ddc4200_firmware",
"vendor": "kieback\\\u0026peter",
"versions": [
{
"lessThanOrEqual": "1.12.14",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:kieback\\\u0026peter:ddc4200-l_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ddc4200-l_firmware",
"vendor": "kieback\\\u0026peter",
"versions": [
{
"lessThanOrEqual": "1.12.14",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:kieback\\\u0026peter:ddc4400e_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ddc4400e_firmware",
"vendor": "kieback\\\u0026peter",
"versions": [
{
"lessThanOrEqual": "1.17.6",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:kieback\\\u0026peter:ddc4020e_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ddc4020e_firmware",
"vendor": "kieback\\\u0026peter",
"versions": [
{
"lessThanOrEqual": "1.17.6",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:kieback\\\u0026peter:ddc4040e_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ddc4040e_firmware",
"vendor": "kieback\\\u0026peter",
"versions": [
{
"lessThanOrEqual": "1.17.6",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-43698",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-23T14:42:13.531525Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-23T14:42:24.238Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "DDC4040e",
"vendor": "Kieback\u0026Peter",
"versions": [
{
"lessThanOrEqual": "1.17.6",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DDC4020e",
"vendor": "Kieback\u0026Peter",
"versions": [
{
"lessThanOrEqual": "1.17.6",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DDC4400e",
"vendor": "Kieback\u0026Peter",
"versions": [
{
"lessThanOrEqual": "1.17.6",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DDC4200e",
"vendor": "Kieback\u0026Peter",
"versions": [
{
"lessThanOrEqual": "1.17.6",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DDC4002e",
"vendor": "Kieback\u0026Peter",
"versions": [
{
"lessThanOrEqual": "1.17.6",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DDC4400",
"vendor": "Kieback\u0026Peter",
"versions": [
{
"lessThanOrEqual": "1.12.14",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DDC4200-L",
"vendor": "Kieback\u0026Peter",
"versions": [
{
"lessThanOrEqual": "1.12.14",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DDC4200",
"vendor": "Kieback\u0026Peter",
"versions": [
{
"lessThanOrEqual": "1.12.14",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DDC4100",
"vendor": "Kieback\u0026Peter",
"versions": [
{
"lessThanOrEqual": "1.7.4",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DDC4002",
"vendor": "Kieback\u0026Peter",
"versions": [
{
"lessThanOrEqual": "1.12.14",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Raphael Ruf of terreActive AG reported these vulnerabilities to CISA."
}
],
"datePublic": "2024-10-17T16:36:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eKieback \u0026amp; Peter\u0027s DDC4000 series\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003euses weak credentials, which may allow an unauthenticated attacker to get full admin rights on the system.\u003c/span\u003e\n\n\u003c/span\u003e\n\n\u003c/span\u003e"
}
],
"value": "Kieback \u0026 Peter\u0027s DDC4000 series\u00a0uses weak credentials, which may allow an unauthenticated attacker to get full admin rights on the system."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-1391",
"description": "CWE-1391 Use of Weak Credentials",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-22T21:23:17.403Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-291-05"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eKieback\u0026amp;Peter DDC4002, DDC4100, DDC4200, DDC4200-L and DDC4400 \ncontrollers are considered End-of-Life (EOL) and are no longer \nsupported. Users operating these controllers should ensure they are \noperated in a strictly separate OT environment and consider updating to a\n supported controller.\u003c/p\u003e\n\u003cp\u003eKieback\u0026amp;Peter recommends users update to DDC4002e, DDC4200e, DDC4400e, DDC4020e and DDC4040e controllers.\u003c/p\u003e\n\u003cp\u003eKieback\u0026amp;Peter recommends all affected users contact their local \nKieback\u0026amp;Peter office to update the firmware of the supported DDC \nsystems to v1.21.0 or later.\u003c/p\u003e\n\n\u003cbr\u003e"
}
],
"value": "Kieback\u0026Peter DDC4002, DDC4100, DDC4200, DDC4200-L and DDC4400 \ncontrollers are considered End-of-Life (EOL) and are no longer \nsupported. Users operating these controllers should ensure they are \noperated in a strictly separate OT environment and consider updating to a\n supported controller.\n\n\nKieback\u0026Peter recommends users update to DDC4002e, DDC4200e, DDC4400e, DDC4020e and DDC4040e controllers.\n\n\nKieback\u0026Peter recommends all affected users contact their local \nKieback\u0026Peter office to update the firmware of the supported DDC \nsystems to v1.21.0 or later."
}
],
"source": {
"advisory": "ICSA-24-291-05",
"discovery": "EXTERNAL"
},
"title": "Kieback\u0026Peter DDC4000 Series Use of Weak Credentials",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2024-43698",
"datePublished": "2024-10-22T21:23:17.403Z",
"dateReserved": "2024-08-21T18:03:31.231Z",
"dateUpdated": "2024-10-23T14:42:24.238Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-43812 (GCVE-0-2024-43812)
Vulnerability from cvelistv5 – Published: 2024-10-22 21:19 – Updated: 2024-10-23 14:43
VLAI?
Title
Kieback&Peter DDC4000 Series Path Traversal Insufficiently Protected Credentials
Summary
Kieback & Peter's DDC4000 series has an insufficiently protected credentials vulnerability, which may allow an unauthenticated attacker with access to /etc/passwd to read the password hashes of all users on the system.
Severity ?
CWE
- CWE-522 - Insufficiently Protected Credentials
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Kieback&Peter | DDC4040e |
Affected:
0 , ≤ 1.17.6
(custom)
|
|||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||
Credits
Raphael Ruf of terreActive AG reported these vulnerabilities to CISA.
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:kieback\\\u0026peter:ddc4400_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ddc4400_firmware",
"vendor": "kieback\\\u0026peter",
"versions": [
{
"lessThanOrEqual": "1.12.14",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:kieback\\\u0026peter:ddc4002e_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ddc4002e_firmware",
"vendor": "kieback\\\u0026peter",
"versions": [
{
"lessThanOrEqual": "1.17.6",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:kieback\\\u0026peter:ddc4200e_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ddc4200e_firmware",
"vendor": "kieback\\\u0026peter",
"versions": [
{
"lessThanOrEqual": "1.17.6",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:kieback\\\u0026peter:ddc4002_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ddc4002_firmware",
"vendor": "kieback\\\u0026peter",
"versions": [
{
"lessThanOrEqual": "1.12.14",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:kieback\\\u0026peter:ddc4100_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ddc4100_firmware",
"vendor": "kieback\\\u0026peter",
"versions": [
{
"lessThanOrEqual": "1.7.4",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:kieback\\\u0026peter:ddc4200_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ddc4200_firmware",
"vendor": "kieback\\\u0026peter",
"versions": [
{
"lessThanOrEqual": "1.12.14",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:kieback\\\u0026peter:ddc4200-l_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ddc4200-l_firmware",
"vendor": "kieback\\\u0026peter",
"versions": [
{
"lessThanOrEqual": "1.12.14",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:kieback\\\u0026peter:ddc4400e_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ddc4400e_firmware",
"vendor": "kieback\\\u0026peter",
"versions": [
{
"lessThanOrEqual": "1.17.6",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:kieback\\\u0026peter:ddc4020e_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ddc4020e_firmware",
"vendor": "kieback\\\u0026peter",
"versions": [
{
"lessThanOrEqual": "1.17.6",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:kieback\\\u0026peter:ddc4040e_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ddc4040e_firmware",
"vendor": "kieback\\\u0026peter",
"versions": [
{
"lessThanOrEqual": "1.17.6",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-43812",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-23T14:41:41.280464Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-23T14:43:37.078Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "DDC4040e",
"vendor": "Kieback\u0026Peter",
"versions": [
{
"lessThanOrEqual": "1.17.6",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DDC4020e",
"vendor": "Kieback\u0026Peter",
"versions": [
{
"lessThanOrEqual": "1.17.6",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DDC4400e",
"vendor": "Kieback\u0026Peter",
"versions": [
{
"lessThanOrEqual": "1.17.6",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DDC4200e",
"vendor": "Kieback\u0026Peter",
"versions": [
{
"lessThanOrEqual": "1.17.6",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DDC4002e",
"vendor": "Kieback\u0026Peter",
"versions": [
{
"lessThanOrEqual": "1.17.6",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DDC4400",
"vendor": "Kieback\u0026Peter",
"versions": [
{
"lessThanOrEqual": "1.12.14",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DDC4200-L",
"vendor": "Kieback\u0026Peter",
"versions": [
{
"lessThanOrEqual": "1.12.14",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DDC4200",
"vendor": "Kieback\u0026Peter",
"versions": [
{
"lessThanOrEqual": "1.12.14",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DDC4100",
"vendor": "Kieback\u0026Peter",
"versions": [
{
"lessThanOrEqual": "1.7.4",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DDC4002",
"vendor": "Kieback\u0026Peter",
"versions": [
{
"lessThanOrEqual": "1.12.14",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Raphael Ruf of terreActive AG reported these vulnerabilities to CISA."
}
],
"datePublic": "2024-10-17T16:36:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eKieback \u0026amp; Peter\u0027s DDC4000 series\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ehas an insufficiently protected credentials vulnerability, which may allow an unauthenticated attacker with access to /etc/passwd to read the password hashes of all users on the system.\u003c/span\u003e\n\n\u003c/span\u003e\n\n\u003c/span\u003e"
}
],
"value": "Kieback \u0026 Peter\u0027s DDC4000 series\u00a0has an insufficiently protected credentials vulnerability, which may allow an unauthenticated attacker with access to /etc/passwd to read the password hashes of all users on the system."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "LOCAL",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-522",
"description": "CWE-522 Insufficiently Protected Credentials",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-22T21:19:23.383Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-291-05"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eKieback\u0026amp;Peter DDC4002, DDC4100, DDC4200, DDC4200-L and DDC4400 \ncontrollers are considered End-of-Life (EOL) and are no longer \nsupported. Users operating these controllers should ensure they are \noperated in a strictly separate OT environment and consider updating to a\n supported controller.\u003c/p\u003e\n\u003cp\u003eKieback\u0026amp;Peter recommends users update to DDC4002e, DDC4200e, DDC4400e, DDC4020e and DDC4040e controllers.\u003c/p\u003e\n\u003cp\u003eKieback\u0026amp;Peter recommends all affected users contact their local \nKieback\u0026amp;Peter office to update the firmware of the supported DDC \nsystems to v1.21.0 or later.\u003c/p\u003e\n\n\u003cbr\u003e"
}
],
"value": "Kieback\u0026Peter DDC4002, DDC4100, DDC4200, DDC4200-L and DDC4400 \ncontrollers are considered End-of-Life (EOL) and are no longer \nsupported. Users operating these controllers should ensure they are \noperated in a strictly separate OT environment and consider updating to a\n supported controller.\n\n\nKieback\u0026Peter recommends users update to DDC4002e, DDC4200e, DDC4400e, DDC4020e and DDC4040e controllers.\n\n\nKieback\u0026Peter recommends all affected users contact their local \nKieback\u0026Peter office to update the firmware of the supported DDC \nsystems to v1.21.0 or later."
}
],
"source": {
"advisory": "ICSA-24-291-05",
"discovery": "EXTERNAL"
},
"title": "Kieback\u0026Peter DDC4000 Series Path Traversal Insufficiently Protected Credentials",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2024-43812",
"datePublished": "2024-10-22T21:19:23.383Z",
"dateReserved": "2024-08-21T18:03:31.222Z",
"dateUpdated": "2024-10-23T14:43:37.078Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-41717 (GCVE-0-2024-41717)
Vulnerability from cvelistv5 – Published: 2024-10-22 21:13 – Updated: 2024-10-23 14:43
VLAI?
Title
Kieback&Peter DDC4000 Series Path Traversal
Summary
Kieback & Peter's DDC4000 series is vulnerable to a path traversal vulnerability, which may allow an unauthenticated attacker to read files on the system.
Severity ?
9.8 (Critical)
CWE
- CWE-22 - Path Traversal
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Kieback & Peter | DDC4040e |
Affected:
0 , ≤ 1.17.6
(custom)
|
|||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||
Credits
Raphael Ruf of terreActive AG reported these vulnerabilities to CISA.
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:kieback\\\u0026peter:ddc4400_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ddc4400_firmware",
"vendor": "kieback\\\u0026peter",
"versions": [
{
"lessThanOrEqual": "1.12.14",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:kieback\\\u0026peter:ddc4002e_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ddc4002e_firmware",
"vendor": "kieback\\\u0026peter",
"versions": [
{
"lessThanOrEqual": "1.17.6",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:kieback\\\u0026peter:ddc4200e_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ddc4200e_firmware",
"vendor": "kieback\\\u0026peter",
"versions": [
{
"lessThanOrEqual": "1.17.6",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:kieback\\\u0026peter:ddc4002_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ddc4002_firmware",
"vendor": "kieback\\\u0026peter",
"versions": [
{
"lessThanOrEqual": "1.12.14",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:kieback\\\u0026peter:ddc4100_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ddc4100_firmware",
"vendor": "kieback\\\u0026peter",
"versions": [
{
"lessThanOrEqual": "1.7.4",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:kieback\\\u0026peter:ddc4200_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ddc4200_firmware",
"vendor": "kieback\\\u0026peter",
"versions": [
{
"lessThanOrEqual": "1.12.14",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:kieback\\\u0026peter:ddc4200-l_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ddc4200-l_firmware",
"vendor": "kieback\\\u0026peter",
"versions": [
{
"lessThanOrEqual": "1.12.14",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:kieback\\\u0026peter:ddc4400e_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ddc4400e_firmware",
"vendor": "kieback\\\u0026peter",
"versions": [
{
"lessThanOrEqual": "1.17.6",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:kieback\\\u0026peter:ddc4020e_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ddc4020e_firmware",
"vendor": "kieback\\\u0026peter",
"versions": [
{
"lessThanOrEqual": "1.17.6",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:kieback\\\u0026peter:ddc4040e_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "ddc4040e_firmware",
"vendor": "kieback\\\u0026peter",
"versions": [
{
"lessThanOrEqual": "1.17.6",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-41717",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-23T14:42:00.715222Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-23T14:43:52.114Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "DDC4040e",
"vendor": "Kieback \u0026 Peter",
"versions": [
{
"lessThanOrEqual": "1.17.6",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DDC4020e",
"vendor": "Kieback\u0026Peter",
"versions": [
{
"lessThanOrEqual": "1.17.6",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DDC4400e",
"vendor": "Kieback\u0026Peter",
"versions": [
{
"lessThanOrEqual": "1.17.6",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DDC4200e",
"vendor": "Kieback\u0026Peter",
"versions": [
{
"lessThanOrEqual": "1.17.6",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DDC4002e",
"vendor": "Kieback\u0026Peter",
"versions": [
{
"lessThanOrEqual": "1.17.6",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DDC4400",
"vendor": "Kieback\u0026Peter",
"versions": [
{
"lessThanOrEqual": "1.12.14",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DDC4200-L",
"vendor": "Kieback\u0026Peter",
"versions": [
{
"lessThanOrEqual": "1.12.14",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DDC4200",
"vendor": "Kieback\u0026Peter",
"versions": [
{
"lessThanOrEqual": "1.12.14",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DDC4100",
"vendor": "Kieback\u0026Peter",
"versions": [
{
"lessThanOrEqual": "1.7.4",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "DDC4002",
"vendor": "Kieback\u0026Peter",
"versions": [
{
"lessThanOrEqual": "1.12.14",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Raphael Ruf of terreActive AG reported these vulnerabilities to CISA."
}
],
"datePublic": "2024-10-17T16:36:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eKieback \u0026amp; Peter\u0027s DDC4000 series\u0026nbsp;is vulnerable to a path traversal vulnerability, which may allow an unauthenticated attacker to read files on the system.\u003c/span\u003e\n\n\u003c/span\u003e"
}
],
"value": "Kieback \u0026 Peter\u0027s DDC4000 series\u00a0is vulnerable to a path traversal vulnerability, which may allow an unauthenticated attacker to read files on the system."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-22",
"description": "CWE-22 Path Traversal",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-22T21:13:37.183Z",
"orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"shortName": "icscert"
},
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-291-05"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eKieback\u0026amp;Peter DDC4002, DDC4100, DDC4200, DDC4200-L and DDC4400 \ncontrollers are considered End-of-Life (EOL) and are no longer \nsupported. Users operating these controllers should ensure they are \noperated in a strictly separate OT environment and consider updating to a\n supported controller.\u003c/p\u003e\n\u003cp\u003eKieback\u0026amp;Peter recommends users update to DDC4002e, DDC4200e, DDC4400e, DDC4020e and DDC4040e controllers.\u003c/p\u003e\n\u003cp\u003eKieback\u0026amp;Peter recommends all affected users contact their local \nKieback\u0026amp;Peter office to update the firmware of the supported DDC \nsystems to v1.21.0 or later.\u003c/p\u003e\n\n\u003cbr\u003e"
}
],
"value": "Kieback\u0026Peter DDC4002, DDC4100, DDC4200, DDC4200-L and DDC4400 \ncontrollers are considered End-of-Life (EOL) and are no longer \nsupported. Users operating these controllers should ensure they are \noperated in a strictly separate OT environment and consider updating to a\n supported controller.\n\n\nKieback\u0026Peter recommends users update to DDC4002e, DDC4200e, DDC4400e, DDC4020e and DDC4040e controllers.\n\n\nKieback\u0026Peter recommends all affected users contact their local \nKieback\u0026Peter office to update the firmware of the supported DDC \nsystems to v1.21.0 or later."
}
],
"source": {
"advisory": "ICSA-24-291-05",
"discovery": "EXTERNAL"
},
"title": "Kieback\u0026Peter DDC4000 Series Path Traversal",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6",
"assignerShortName": "icscert",
"cveId": "CVE-2024-41717",
"datePublished": "2024-10-22T21:13:37.183Z",
"dateReserved": "2024-08-21T18:03:31.239Z",
"dateUpdated": "2024-10-23T14:43:52.114Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}