CVE-2019-19228 (GCVE-0-2019-19228)
Vulnerability from cvelistv5 – Published: 2019-12-04 18:52 – Updated: 2024-08-05 02:09
VLAI?
Summary
Fronius Solar Inverter devices before 3.14.1 (HM 1.12.1) allow attackers to bypass authentication because the password for the today account is stored in the /tmp/web_users.conf file.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T02:09:39.342Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://seclists.org/bugtraq/2019/Dec/5"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://sec-consult.com/en/blog/advisories/multiple-vulnerabilites-in-fronius-solar-inverter-series-cve-2019-19229-cve-2019-19228/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/155562/Fronius-Solar-Inverter-Series-Insecure-Communication-Path-Traversal.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Fronius Solar Inverter devices before 3.14.1 (HM 1.12.1) allow attackers to bypass authentication because the password for the today account is stored in the /tmp/web_users.conf file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-12-05T00:06:08.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://seclists.org/bugtraq/2019/Dec/5"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://sec-consult.com/en/blog/advisories/multiple-vulnerabilites-in-fronius-solar-inverter-series-cve-2019-19229-cve-2019-19228/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/155562/Fronius-Solar-Inverter-Series-Insecure-Communication-Path-Traversal.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-19228",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Fronius Solar Inverter devices before 3.14.1 (HM 1.12.1) allow attackers to bypass authentication because the password for the today account is stored in the /tmp/web_users.conf file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://seclists.org/bugtraq/2019/Dec/5",
"refsource": "MISC",
"url": "https://seclists.org/bugtraq/2019/Dec/5"
},
{
"name": "https://sec-consult.com/en/blog/advisories/multiple-vulnerabilites-in-fronius-solar-inverter-series-cve-2019-19229-cve-2019-19228/",
"refsource": "MISC",
"url": "https://sec-consult.com/en/blog/advisories/multiple-vulnerabilites-in-fronius-solar-inverter-series-cve-2019-19229-cve-2019-19228/"
},
{
"name": "http://packetstormsecurity.com/files/155562/Fronius-Solar-Inverter-Series-Insecure-Communication-Path-Traversal.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/155562/Fronius-Solar-Inverter-Series-Insecure-Communication-Path-Traversal.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2019-19228",
"datePublished": "2019-12-04T18:52:09.000Z",
"dateReserved": "2019-11-22T00:00:00.000Z",
"dateUpdated": "2024-08-05T02:09:39.342Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2019-19228",
"date": "2026-04-27",
"epss": "0.0024",
"percentile": "0.47271"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2019-19228\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2019-12-04T19:15:11.767\",\"lastModified\":\"2024-11-21T04:34:22.433\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Fronius Solar Inverter devices before 3.14.1 (HM 1.12.1) allow attackers to bypass authentication because the password for the today account is stored in the /tmp/web_users.conf file.\"},{\"lang\":\"es\",\"value\":\"Los dispositivos Fronius Solar Inverter versiones anteriores a la versi\u00f3n 3.14.1 (HM versi\u00f3n 1.12.1), permiten a atacantes omitir la autenticaci\u00f3n porque la contrase\u00f1a de la cuenta today es almacenada en el archivo /tmp/web_users.conf.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-312\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:datamanager_box_2.0_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"245ACB0D-0781-4D49-ADB9-97400B1EA3D5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:datamanager_box_2.0:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF24C166-3339-47EF-BB18-CE0EC71B185B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:eco_25.0-3-s_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"35DCE88D-4E7B-42CB-8D95-4880412C1688\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:eco_25.0-3-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27155573-E4B2-4E86-97F4-6AED326593ED\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:eco_27.0-3-s_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"EEB40DC8-1259-401C-AED1-8EA0B9D9EE84\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:eco_27.0-3-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7470FAA2-4A5E-4685-B302-84BAEC7ADA13\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:galvo_1.5-1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"CBB06706-7543-4812-A77F-B51CBA8A8B3E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:galvo_1.5-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"772C3A65-CAA7-4386-A486-467F90F105B6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:galvo_1.5-1_208-240_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"8676D69F-B3C2-4C5D-A1EB-B144CDB9D22F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:galvo_1.5-1_208-240:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2ABB0FB-4A81-4B14-B92F-A9FA0BC70D12\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:galvo_2.0-1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"304D549E-1F2A-4CA6-8FC8-84F81BC6C528\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:galvo_2.0-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CBC9537-D253-4FF5-95E9-D7A92C0D8EFD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:galvo_2.0-1_208-240_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"B9E95193-15C8-4C2E-B9E9-FDE374890F5B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:galvo_2.0-1_208-240:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC707FF8-A409-40A5-AEC9-F00622770513\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:galvo_2.5-1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"6AA8B940-2143-4640-B6EA-725ACB1694D7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:galvo_2.5-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"766F6B78-9F2D-4FD4-ABFA-46222942686C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:galvo_2.5-1_208-240_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"FA243E0E-64D8-4DE1-88F3-E380870FBD78\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:galvo_2.5-1_208-240:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EC958B3-2D97-4C08-AC35-06881785F994\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:galvo_3.0-1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"0ADF0A31-97BC-4A9B-9448-01C2BCD66C80\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:galvo_3.0-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"689C8228-D748-42BA-8EC8-23022E3C693C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:galvo_3.1-1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"78B247FC-8809-4931-B5AB-BE1FFC9C70B4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:galvo_3.1-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDD4789F-A6F2-4A0F-9E9B-5BAB40A52891\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:galvo_3.1-1_208-240_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"75B7F0E6-F70C-4E6D-9C63-6CAF6E5DACFE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:galvo_3.1-1_208-240:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E1857E3-8FE2-497F-8A24-FEDF718E7A4B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:primo_10.0-1_208-240_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"FFD90216-9EC8-48E9-B766-E3B1AC793204\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:primo_10.0-1_208-240:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"662E30C1-2730-414A-B8A6-C6CE2C5B2363\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:primo_11.4-1_208-240_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"9A194A44-9A82-41E4-BA60-C6DDFECD459B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:primo_11.4-1_208-240:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7369962-8506-4F3A-BD19-3777F7A42129\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:primo_12.5-1_208-240_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"82B7AA45-C106-4A6F-B8A3-B392CF0CA3DC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:primo_12.5-1_208-240:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8210ABAD-28BD-4A3C-9A81-32EC7D3968A2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:primo_15.0-1_208-240_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"B628F627-7380-494F-881A-6707F01199CE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:primo_15.0-1_208-240:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B7CE23E-F57C-4D11-8C7E-64557D6C659E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:primo_3.0-1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"82C6434F-66F5-4C3A-B9A3-D9F56681EFB1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:primo_3.0-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84A4E111-E466-49EB-800C-741337E548D4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:primo_3.5-1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"0FF74E81-8DA6-4E0C-9E5E-A11187D091B9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:primo_3.5-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFA1175A-14FD-421F-A63E-6BCD960C3D6C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:primo_3.6-1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"EA8E1FAF-D21D-4FA6-8E8F-BC0E7FFBC4A7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:primo_3.6-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBE15F4D-91DD-4F0F-8E1A-EA3EE3D835A8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:primo_3.8-1_208-240_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"205E74AE-2251-40AF-941A-A93DD1E8799F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:primo_3.8-1_208-240:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEE961E4-898D-4872-9254-7431BBFEECA6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:primo_4.0-1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"EC9FB3D7-ABF1-4407-8B48-C775273B738D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:primo_4.0-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B70B312-2F2A-49DC-8530-5D2C35B84755\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:primo_4.6-1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"F20411C3-4337-4432-AAD3-4AA300CF1AC5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:primo_4.6-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E093358-C7F3-4989-B80F-E6D8B0E6946D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:primo_5.0-1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"03E5B07B-539E-49B7-86FD-CCC14A00052A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:primo_5.0-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8761B05-45CF-44E8-AE4A-40B61DE7A389\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:primo_5.0-1_208-240_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"DE8801C6-0A83-4F08-9F35-2773B23E19B2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:primo_5.0-1_208-240:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A410FA6B-75CD-4AE6-BC6B-43341AA9BEF1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:primo_5.0-1_aus_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"1D3576D7-AFA5-4694-83D5-00891BA57D1C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:primo_5.0-1_aus:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4B6A026-E6EE-4CE0-84D0-8DEF18B52CE3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:primo_5.0-1_sc_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"BA259AA5-91CE-4DD8-A5F2-9C3FC6DCEE8F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:primo_5.0-1_sc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7AB2C8F-1DCE-4861-940B-AEF5389E4EA4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:primo_6.0-1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"54B665AA-665B-418E-9280-8F1AE39127C4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:primo_6.0-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08E321E3-6266-4DED-9502-B167E606010A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:primo_6.0-1_208-240_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"1499E4BE-47BA-4E64-B5DA-894D013EE3D1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:primo_6.0-1_208-240:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1D1F266-4573-42E3-96B3-81861B8B7802\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:primo_7.6-1_208-240_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"4B8A9D44-6AAF-4F1B-AC0F-1C120F29E50D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:primo_7.6-1_208-240:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FABD33B7-38AD-4CF3-A4B9-3060EB64BD1D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:primo_8.2-1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"F7B6BFC9-FDCC-4924-AFE2-33A6C07852FD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:primo_8.2-1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E3BA8D1-5DD4-4237-9C76-CC5C7BC07302\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:primo_8.2-1_208-240_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"542DE2DE-24E5-49C8-9B04-3C5827B3AAF9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:primo_8.2-1_208-240:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DED9DBA-00BA-446F-BE13-9479DCD3F845\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:symo_10.0-3-m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"8ED63DBF-43F8-4968-92A9-49CA69FA6265\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:symo_10.0-3-m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB854ED3-EFAA-4B33-B1D3-3FE12A4EFC53\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:symo_10.0-3-m-os_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"D6E66D2C-26BF-4CCC-A639-A6B2CFBF4ECB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:symo_10.0-3-m-os:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78B5D777-0FBC-401D-B454-AADB57C530AA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:symo_10.0-3_208-240_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"D8C2FEC0-0C70-42FF-A0E4-CE6BE05294F0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:symo_10.0-3_208-240:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E315EAE7-9E24-402F-AE89-01683A64FA76\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:symo_10.0-3_480_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"865FDFE9-5D11-4D37-803C-C5324108AA8C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:symo_10.0-3_480:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1814D6E8-C57F-465B-8DF4-F139DADE8195\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:symo_12.0-3_208-240_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"22FB8073-69AC-45B2-8A06-D0A6486C98F3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:symo_12.0-3_208-240:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39C2008A-8A76-4A7E-9372-AB59EBCD9856\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:symo_12.5-3-m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"4127386E-9C6D-40AB-99CC-71518EC0AF5A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:symo_12.5-3-m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0FE8A33-38FC-4265-99F4-A3758F04CA5F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:symo_12.5-3_480_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"F18A9553-98D6-4A92-8B5F-47A3929C2B79\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:symo_12.5-3_480:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4547570B-3137-405E-AAA7-A31AEC405DE8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:symo_15.0-3-m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"C04264DC-F48F-4CA1-93D6-2F979B9C0748\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:symo_15.0-3-m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"034C15EB-6965-449A-894A-0554ABB2A5EF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:symo_15.0-3_107_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"430F6C06-09C1-45BC-923F-CE730B8CDF7D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:symo_15.0-3_107:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E384570C-B8E2-4B44-80D8-902C0B0DAE4E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:symo_15.0-3_480_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"09162B51-D263-4C62-9BBC-B774A36EC512\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:symo_15.0-3_480:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7C7D969-90A9-431E-9A28-65DFF67E212C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:symo_17.5-3-m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"E3B25A38-FA14-49D8-8944-D6CCD8D34460\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:symo_17.5-3-m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D59844E2-A8EB-43C5-B5DB-E2518CCEF0C5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:symo_17.5-3_480_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"E1324F92-FB4E-486A-888B-AD7A6D58E9D0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:symo_17.5-3_480:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD4E8624-BBA8-4C95-8BDE-F2B4D3667D5A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:symo_20.0-3-m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"5E284C2D-5AFB-4509-8C4B-44B6A2616781\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:symo_20.0-3-m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E51D86C2-2616-4305-B270-D981EF480CF6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:symo_20.0-3_480_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"5F04B3C5-ABE2-44FE-97F7-1748BA10439A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:symo_20.0-3_480:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67A906C5-013E-41D2-9B21-2FCF6969D9A6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:symo_22.7-3_480_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"945E8368-5354-44AC-B6FC-4DB889E18CA9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:symo_22.7-3_480:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C739C4C-35BC-4BAD-81BA-DC8DB7E2F25D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:symo_24.0-3_480_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"0A83DF88-8051-4644-BECA-FB9619A5B5D0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:symo_24.0-3_480:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31DF3EC6-E82C-4D66-9F99-CAD9B1DFF294\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:symo_3.0-3-m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"99823D3B-9B18-4711-80E7-182184262A54\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:symo_3.0-3-m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD37FDC9-5F81-46CF-A1DD-6F702DAC6F15\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:symo_3.0-3-s_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"AA79FFFA-214B-4C91-8711-98DF0E563C90\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:symo_3.0-3-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36880761-C6A3-4953-AC8C-5F1070237240\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:symo_3.7-3-m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"502280D5-2820-4677-9E65-5B9F2F51B0D2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:symo_3.7-3-m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C0741EF-007C-4F41-9B76-3CAF350226A4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:symo_3.7-3-s_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"75CA17D5-9D99-4788-881A-AEC5BEA43624\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:symo_3.7-3-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D5C7150-B260-43FF-9535-A44ED2ECDC83\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:symo_4.5-3-m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"936CEBD4-DAE3-4B99-9B40-28C4FC16AC55\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:symo_4.5-3-m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B07DFF0F-A3FB-44A7-A197-BAFA236E90CA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:symo_4.5-3-s_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"27DE2248-012D-49E6-AC4F-3410FA11CDA6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:symo_4.5-3-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B694D9C-D052-4C90-B600-8212652F4A51\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:symo_5.0-3-m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"C87A1022-FF21-4861-9701-A8333806E358\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:symo_5.0-3-m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9C5773D-3720-47D8-9EF9-340A65758C0D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:symo_6.0-3-m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"D8C7403F-1F68-4BB0-94F3-50EA2775F8C3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:symo_6.0-3-m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1678A8D-5A58-4D0C-AD94-D43E3CA34EEB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:symo_7.0-3-m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"D1161F52-CC5C-44CD-BAFA-F77C97881DB1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:symo_7.0-3-m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B356901-7F88-49B6-9F60-16458B76F9F2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:symo_8.2-3-m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"BA44AA69-3C61-43E2-B7F5-1CF2249A6FED\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:symo_8.2-3-m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B106A04-7B0D-4285-AC41-8B82C4C95816\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:symo_advanced_10.0-3_208-240_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"B9520A32-F409-48D9-8A01-BDD611B47AFD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:symo_advanced_10.0-3_208-240:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A1565F4-C84E-45DC-8532-EE3BA2353382\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:symo_advanced_12.0-3_208-240_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"B1775969-651A-4ACC-A3E2-041B0D191168\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:symo_advanced_12.0-3_208-240:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C480E5F-9C9B-44A4-A822-9B0830866237\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:symo_advanced_15.0-3_480_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"F4E827C2-CB59-4737-BEE2-3B7B413CFB86\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:symo_advanced_15.0-3_480:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABC875EA-2702-4087-8352-A068C60EF310\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:symo_advanced_20.0-3_480_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"A4C58CDA-C040-40B9-9E12-1E36CCCD8679\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:symo_advanced_20.0-3_480:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD6FC4A7-F299-4CC3-A792-D7462AD6B97B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:symo_advanced_22.7-3_480_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"A286732F-FFBD-41EF-9C19-1DB8EF9AEADA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:symo_advanced_22.7-3_480:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32BCEF7B-50E3-4967-90A2-9CBE2F05F321\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:symo_advanced_24.0-3_480_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"9372F747-6EE8-4307-AEA5-C58689A82F7E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:symo_advanced_24.0-3_480:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"598F8578-B90F-421A-88CD-35ED544A8E23\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:symo_hybrid_3.0-3-m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"160B0D21-9628-41E2-8373-AACABC8C3844\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:symo_hybrid_3.0-3-m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF85E276-4DBC-4C3C-BF1B-491244EDDBE6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:symo_hybrid_4.0-3-m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"6C515080-70A6-480C-9C0E-2F4C060699DD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:symo_hybrid_4.0-3-m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F342D1CF-F05B-4FD8-84DD-31261778A0FA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fronius:symo_hybrid_5.0-3-m_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"3.14.1\",\"matchCriteriaId\":\"033E56CC-48FB-4C4D-B89A-CEF9CE0BE15B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:fronius:symo_hybrid_5.0-3-m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7C144E6-2D6D-485A-89EE-F1B901A7E067\"}]}]}],\"references\":[{\"url\":\"http://packetstormsecurity.com/files/155562/Fronius-Solar-Inverter-Series-Insecure-Communication-Path-Traversal.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://sec-consult.com/en/blog/advisories/multiple-vulnerabilites-in-fronius-solar-inverter-series-cve-2019-19229-cve-2019-19228/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Dec/5\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/155562/Fronius-Solar-Inverter-Series-Insecure-Communication-Path-Traversal.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://sec-consult.com/en/blog/advisories/multiple-vulnerabilites-in-fronius-solar-inverter-series-cve-2019-19229-cve-2019-19228/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://seclists.org/bugtraq/2019/Dec/5\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…