VAR-201512-0013

Vulnerability from variot - Updated: 2025-04-13 23:29

Saia Burgess PCD1.M0xx0, PCD1.M2xx0, PCD2.M5xx0, PCD3.Mxx60, PCD3.Mxxx0, PCD7.D4xxD, PCD7.D4xxV, PCD7.D4xxWTPF, and PCD7.D4xxxT5F devices before 1.24.50 and PCD3.T665 and PCD3.T666 devices before 1.24.41 have hardcoded credentials, which allows remote attackers to obtain administrative access via an FTP session. Saia Burgess Controls PCD Controller is a family of programmable controllers for measurement, regulation and control tasks at Saia Burgess Controls, Switzerland. A number of security vulnerabilities exist in Saia Burgess Controls products that use hard-coded certificates for programs. A remote attacker could exploit the vulnerability to gain unauthorized access to the device. The following products and versions are affected: Saia Burgess Controls PCD7.D4xxxT5F, PCD7.D4xxV, PCD7.D4xxD, PCD7.D4xxWTPF, PCD7.D4xxxT5F, PCD7.D4xxV VGA MB Panels, PCD7.D4xxD SVGA MB Panels, PCD7.D4xxWTPF WVGA MB Panels 1.24.41 and earlier versions; PCD3.T665, PCD3.T666 1.24.30 and earlier versions; PCD1.M0xx0/M2xx0, PCD2.M5xx0, PCD3.Mxxx0, PCD3.Mxx60 1.24.25 and earlier versions

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201512-0013",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "pcd3.t666",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "saia burgess controls",
        "version": "1.24.30"
      },
      {
        "model": "pcd1.m0xx0",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "saia burgess controls",
        "version": "1.24.25"
      },
      {
        "model": "pcd7.d4xxxt5f",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "saia burgess controls",
        "version": "1.24.41"
      },
      {
        "model": "pcd3.mxxx0",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "saia burgess controls",
        "version": "1.24.25"
      },
      {
        "model": "pcd7.d4xxv",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "saia burgess controls",
        "version": "1.24.41"
      },
      {
        "model": "pcd7.d4xxv vga mb",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "saia burgess controls",
        "version": "1.24.41"
      },
      {
        "model": "pcd7.d4xxd",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "saia burgess controls",
        "version": "1.24.41"
      },
      {
        "model": "pcd7.d4xxd svga mb",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "saia burgess controls",
        "version": "1.24.41"
      },
      {
        "model": "pcd3.t665",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "saia burgess controls",
        "version": "1.24.30"
      },
      {
        "model": "pcd3.mxx60",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "saia burgess controls",
        "version": "1.24.25"
      },
      {
        "model": "pcd2.m5xx0",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "saia burgess controls",
        "version": "1.24.25"
      },
      {
        "model": "pcd7.d4xxwtpf wvga mb",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "saia burgess controls",
        "version": "1.24.41"
      },
      {
        "model": "pcd7.d4xxwtpf",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "saia burgess controls",
        "version": "1.24.41"
      },
      {
        "model": "pcd1.m2xx0",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "saia burgess controls",
        "version": "1.24.25"
      },
      {
        "model": "pcd1.m0xx0",
        "scope": null,
        "trust": 0.8,
        "vendor": "saia burgess controls",
        "version": null
      },
      {
        "model": "pcd1.m0xx0",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "saia burgess controls",
        "version": "1.24.50"
      },
      {
        "model": "pcd1.m2xx0",
        "scope": null,
        "trust": 0.8,
        "vendor": "saia burgess controls",
        "version": null
      },
      {
        "model": "pcd1.m2xx0",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "saia burgess controls",
        "version": "1.24.50"
      },
      {
        "model": "pcd2.m5xx0",
        "scope": null,
        "trust": 0.8,
        "vendor": "saia burgess controls",
        "version": null
      },
      {
        "model": "pcd2.m5xx0",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "saia burgess controls",
        "version": "1.24.50"
      },
      {
        "model": "pcd3.mxx60",
        "scope": null,
        "trust": 0.8,
        "vendor": "saia burgess controls",
        "version": null
      },
      {
        "model": "pcd3.mxx60",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "saia burgess controls",
        "version": "1.24.50"
      },
      {
        "model": "pcd3.mxxx0",
        "scope": null,
        "trust": 0.8,
        "vendor": "saia burgess controls",
        "version": null
      },
      {
        "model": "pcd3.mxxx0",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "saia burgess controls",
        "version": "1.24.50"
      },
      {
        "model": "pcd3.t665",
        "scope": null,
        "trust": 0.8,
        "vendor": "saia burgess controls",
        "version": null
      },
      {
        "model": "pcd3.t665",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "saia burgess controls",
        "version": "1.24.41"
      },
      {
        "model": "pcd3.t666",
        "scope": null,
        "trust": 0.8,
        "vendor": "saia burgess controls",
        "version": null
      },
      {
        "model": "pcd3.t666",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "saia burgess controls",
        "version": "1.24.41"
      },
      {
        "model": "pcd7.d4xxd svga mb panels",
        "scope": null,
        "trust": 0.8,
        "vendor": "saia burgess controls",
        "version": null
      },
      {
        "model": "pcd7.d4xxd svga mb panels",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "saia burgess controls",
        "version": "1.24.50"
      },
      {
        "model": "pcd7.d4xxv vga mb panels",
        "scope": null,
        "trust": 0.8,
        "vendor": "saia burgess controls",
        "version": null
      },
      {
        "model": "pcd7.d4xxv vga mb panels",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "saia burgess controls",
        "version": "1.24.50"
      },
      {
        "model": "pcd7.d4xxwtpf wvga mb panels",
        "scope": null,
        "trust": 0.8,
        "vendor": "saia burgess controls",
        "version": null
      },
      {
        "model": "pcd7.d4xxwtpf wvga mb panels",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "saia burgess controls",
        "version": "1.24.50"
      },
      {
        "model": "pcd7.d4xxxt5f",
        "scope": null,
        "trust": 0.8,
        "vendor": "saia burgess controls",
        "version": null
      },
      {
        "model": "pcd7.d4xxxt5f",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "saia burgess controls",
        "version": "1.24.50"
      },
      {
        "model": "burgess controls pcd7.d4xxwtpf",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "saia",
        "version": "1.24.50"
      },
      {
        "model": "burgess controls pcd7.d4xxd",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "saia",
        "version": "1.24.50"
      },
      {
        "model": "burgess controls pcd7.d4xxv",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "saia",
        "version": "1.24.50"
      },
      {
        "model": "burgess controls pcd7.d4xxxt5f",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "saia",
        "version": "1.24.50"
      },
      {
        "model": "burgess controls pcd3.mxx60",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "saia",
        "version": "1.24.50"
      },
      {
        "model": "burgess controls pcd3.mxxx0",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "saia",
        "version": "1.24.50"
      },
      {
        "model": "burgess controls pcd2.m5xx0",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "saia",
        "version": "1.24.50"
      },
      {
        "model": "burgess controls pcd1.m0xx0/m2xx0",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "saia",
        "version": "1.24.50"
      },
      {
        "model": "burgess controls pcd3.t665",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "saia",
        "version": "1.24.41"
      },
      {
        "model": "burgess controls pcd3.t666",
        "scope": "lt",
        "trust": 0.6,
        "vendor": "saia",
        "version": "1.24.41"
      },
      {
        "model": "pcd7.d4xxv",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "saia burgess controls",
        "version": "1.24.41"
      },
      {
        "model": "pcd7.d4xxd svga mb",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "saia burgess controls",
        "version": "1.24.41"
      },
      {
        "model": "pcd3.mxx60",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "saia burgess controls",
        "version": "1.24.25"
      },
      {
        "model": "pcd7.d4xxv vga mb",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "saia burgess controls",
        "version": "1.24.41"
      },
      {
        "model": "pcd3.mxxx0",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "saia burgess controls",
        "version": "1.24.25"
      },
      {
        "model": "pcd3.t665",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "saia burgess controls",
        "version": "1.24.30"
      },
      {
        "model": "pcd3.t666",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "saia burgess controls",
        "version": "1.24.30"
      },
      {
        "model": "pcd1.m2xx0",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "saia burgess controls",
        "version": "1.24.25"
      },
      {
        "model": "pcd7.d4xxxt5f",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "saia burgess controls",
        "version": "1.24.41"
      },
      {
        "model": "pcd7.d4xxd",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "saia burgess controls",
        "version": "1.24.41"
      },
      {
        "model": "burgess controls pcd7.d4xxxt5f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "saia",
        "version": "0"
      },
      {
        "model": "burgess controls pcd7.d4xxwtpf wvga mb panels",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "saia",
        "version": "0"
      },
      {
        "model": "burgess controls pcd7.d4xxwtpf",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "saia",
        "version": "0"
      },
      {
        "model": "burgess controls pcd7.d4xxv vga mb panels",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "saia",
        "version": "0"
      },
      {
        "model": "burgess controls pcd7.d4xxv",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "saia",
        "version": "0"
      },
      {
        "model": "burgess controls pcd7.d4xxd svga mb panels",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "saia",
        "version": "0"
      },
      {
        "model": "burgess controls pcd7.d4xxd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "saia",
        "version": "0"
      },
      {
        "model": "burgess controls pcd3.t666",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "saia",
        "version": "0"
      },
      {
        "model": "burgess controls pcd3.t665",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "saia",
        "version": "0"
      },
      {
        "model": "burgess controls pcd3.mxxx0",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "saia",
        "version": "0"
      },
      {
        "model": "burgess controls pcd3.mxx60",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "saia",
        "version": "0"
      },
      {
        "model": "burgess controls pcd2.m5xx0",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "saia",
        "version": "0"
      },
      {
        "model": "burgess controls pcd1.m2xx0",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "saia",
        "version": "0"
      },
      {
        "model": "burgess controls pcd1.m0xx0",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "saia",
        "version": "0"
      },
      {
        "model": "burgess controls pcd7.d4xxxt5f",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "saia",
        "version": "1.24.50"
      },
      {
        "model": "burgess controls pcd7.d4xxwtpf wvga mb panels",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "saia",
        "version": "1.24.50"
      },
      {
        "model": "burgess controls pcd7.d4xxwtpf",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "saia",
        "version": "1.24.50"
      },
      {
        "model": "burgess controls pcd7.d4xxv vga mb panels",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "saia",
        "version": "1.24.50"
      },
      {
        "model": "burgess controls pcd7.d4xxv",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "saia",
        "version": "1.24.50"
      },
      {
        "model": "burgess controls pcd7.d4xxd svga mb panels",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "saia",
        "version": "1.24.50"
      },
      {
        "model": "burgess controls pcd7.d4xxd",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "saia",
        "version": "1.24.50"
      },
      {
        "model": "burgess controls pcd3.t666",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "saia",
        "version": "1.24.41"
      },
      {
        "model": "burgess controls pcd3.t665",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "saia",
        "version": "1.24.41"
      },
      {
        "model": "burgess controls pcd3.mxxx0",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "saia",
        "version": "1.24.50"
      },
      {
        "model": "burgess controls pcd3.mxx60",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "saia",
        "version": "1.24.50"
      },
      {
        "model": "burgess controls pcd2.m5xx0",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "saia",
        "version": "1.24.50"
      },
      {
        "model": "burgess controls pcd1.m2xx0",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "saia",
        "version": "1.24.50"
      },
      {
        "model": "burgess controls pcd1.m0xx0",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "saia",
        "version": "1.24.50"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "pcd7 d4xxv vga mb",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "pcd7 d4xxwtpf wvga mb",
        "version": "1.24.41"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "pcd7 d4xxwtpf",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "pcd1 m0xx0",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "pcd7 d4xxxt5f",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "pcd7 d4xxv",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "pcd7 d4xxd",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "pcd3 mxxx0",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "pcd7 d4xxd svga mb",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "pcd3 t666",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "pcd1 m2xx0",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "pcd3 mxx60",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "pcd3 t665",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "pcd2 m5xx0",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "6d5ceb16-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-07900"
      },
      {
        "db": "BID",
        "id": "78422"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-006516"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201512-006"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-7911"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/h:saia_burgess_controls:pcd1.m0xx0",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:saia_burgess_controls:pcd1.m0xx0_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:saia_burgess_controls:pcd1.m2xx0",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:saia_burgess_controls:pcd1.m2xx0_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:saia_burgess_controls:pcd2.m5xx0",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:saia_burgess_controls:pcd2.m5xx0_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:saia_burgess_controls:pcd3.mxx60",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:saia_burgess_controls:pcd3.mxx60_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:saia_burgess_controls:pcd3.mxxx0",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:saia_burgess_controls:pcd3.mxxx0_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:saia_burgess_controls:pcd3.t665",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:saia_burgess_controls:pcd3.t665_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:saia_burgess_controls:pcd3.t666",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:saia_burgess_controls:pcd3.t666_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:saia_burgess_controls:pcd7.d4xxd_svga_mb",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:saia_burgess_controls:pcd7.d4xxd_svga_mb_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:saia_burgess_controls:pcd7.d4xxv_vga_mb",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:saia_burgess_controls:pcd7.d4xxv_vga_mb_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:saia_burgess_controls:pcd7.d4xxwtpf_wvga_mb",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:saia_burgess_controls:pcd7.d4xxwtpf_wvga_mb_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:saia_burgess_controls:pcd7.d4xxxt5f",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:saia_burgess_controls:pcd7.d4xxxt5f_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-006516"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Artyom Kurbatov",
    "sources": [
      {
        "db": "BID",
        "id": "78422"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2015-7911",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2015-7911",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 9.4,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2015-07900",
            "impactScore": 9.2,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "NONE",
            "baseScore": 9.4,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "6d5ceb16-2351-11e6-abef-000c29c66e3d",
            "impactScore": 9.2,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:N",
            "version": "2.9 [IVD]"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-85872",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "id": "CVE-2015-7911",
            "impactScore": 5.2,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2015-7911",
            "trust": 1.0,
            "value": "CRITICAL"
          },
          {
            "author": "NVD",
            "id": "CVE-2015-7911",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2015-07900",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201512-006",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "IVD",
            "id": "6d5ceb16-2351-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-85872",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "6d5ceb16-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-07900"
      },
      {
        "db": "VULHUB",
        "id": "VHN-85872"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-006516"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201512-006"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-7911"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Saia Burgess PCD1.M0xx0, PCD1.M2xx0, PCD2.M5xx0, PCD3.Mxx60, PCD3.Mxxx0, PCD7.D4xxD, PCD7.D4xxV, PCD7.D4xxWTPF, and PCD7.D4xxxT5F devices before 1.24.50 and PCD3.T665 and PCD3.T666 devices before 1.24.41 have hardcoded credentials, which allows remote attackers to obtain administrative access via an FTP session. Saia Burgess Controls PCD Controller is a family of programmable controllers for measurement, regulation and control tasks at Saia Burgess Controls, Switzerland. A number of security vulnerabilities exist in Saia Burgess Controls products that use hard-coded certificates for programs. A remote attacker could exploit the vulnerability to gain unauthorized access to the device. The following products and versions are affected: Saia Burgess Controls PCD7.D4xxxT5F, PCD7.D4xxV, PCD7.D4xxD, PCD7.D4xxWTPF, PCD7.D4xxxT5F, PCD7.D4xxV VGA MB Panels, PCD7.D4xxD SVGA MB Panels, PCD7.D4xxWTPF WVGA MB Panels 1.24.41 and earlier versions; PCD3.T665, PCD3.T666 1.24.30 and earlier versions; PCD1.M0xx0/M2xx0, PCD2.M5xx0, PCD3.Mxxx0, PCD3.Mxx60 1.24.25 and earlier versions",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2015-7911"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-006516"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-07900"
      },
      {
        "db": "BID",
        "id": "78422"
      },
      {
        "db": "IVD",
        "id": "6d5ceb16-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "VULHUB",
        "id": "VHN-85872"
      }
    ],
    "trust": 2.7
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2015-7911",
        "trust": 3.6
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-15-335-01",
        "trust": 3.4
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201512-006",
        "trust": 0.9
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-07900",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-006516",
        "trust": 0.8
      },
      {
        "db": "BID",
        "id": "78422",
        "trust": 0.4
      },
      {
        "db": "IVD",
        "id": "6D5CEB16-2351-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-85872",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "6d5ceb16-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-07900"
      },
      {
        "db": "VULHUB",
        "id": "VHN-85872"
      },
      {
        "db": "BID",
        "id": "78422"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-006516"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201512-006"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-7911"
      }
    ]
  },
  "id": "VAR-201512-0013",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "6d5ceb16-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-07900"
      },
      {
        "db": "VULHUB",
        "id": "VHN-85872"
      }
    ],
    "trust": 1.5666666999999999
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "6d5ceb16-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-07900"
      }
    ]
  },
  "last_update_date": "2025-04-13T23:29:31.227000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Firmware for Saia PCD COSinus",
        "trust": 0.8,
        "url": "https://www.sbc-support.com/en/product-index/firmware-for-saia-pcdr-cosinus/firmware-used-in-production/"
      },
      {
        "title": "Patches for several PCA hardcoded password vulnerabilities in Saia Burgess Controls products",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/67571"
      },
      {
        "title": "Multiple Saia Burgess Controls Fixes for device trust management vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=58874"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-07900"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-006516"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201512-006"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-255",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-85872"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-006516"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-7911"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.4,
        "url": "https://ics-cert.us-cert.gov/advisories/icsa-15-335-01"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-7911"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-7911"
      },
      {
        "trust": 0.3,
        "url": "http://www.saia-pcd.com/saia-burgess-controls-ag/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2015-07900"
      },
      {
        "db": "VULHUB",
        "id": "VHN-85872"
      },
      {
        "db": "BID",
        "id": "78422"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-006516"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201512-006"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-7911"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "6d5ceb16-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2015-07900"
      },
      {
        "db": "VULHUB",
        "id": "VHN-85872"
      },
      {
        "db": "BID",
        "id": "78422"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-006516"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201512-006"
      },
      {
        "db": "NVD",
        "id": "CVE-2015-7911"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2015-12-03T00:00:00",
        "db": "IVD",
        "id": "6d5ceb16-2351-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2015-12-03T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2015-07900"
      },
      {
        "date": "2015-12-23T00:00:00",
        "db": "VULHUB",
        "id": "VHN-85872"
      },
      {
        "date": "2015-12-02T00:00:00",
        "db": "BID",
        "id": "78422"
      },
      {
        "date": "2015-12-24T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-006516"
      },
      {
        "date": "2015-12-02T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201512-006"
      },
      {
        "date": "2015-12-23T03:59:03.200000",
        "db": "NVD",
        "id": "CVE-2015-7911"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2015-12-03T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2015-07900"
      },
      {
        "date": "2015-12-23T00:00:00",
        "db": "VULHUB",
        "id": "VHN-85872"
      },
      {
        "date": "2015-12-02T00:00:00",
        "db": "BID",
        "id": "78422"
      },
      {
        "date": "2015-12-24T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2015-006516"
      },
      {
        "date": "2015-12-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201512-006"
      },
      {
        "date": "2025-04-12T10:46:40.837000",
        "db": "NVD",
        "id": "CVE-2015-7911"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201512-006"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Saia Burgess PCD Vulnerabilities that can gain management access in products",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2015-006516"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Trust management",
    "sources": [
      {
        "db": "IVD",
        "id": "6d5ceb16-2351-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201512-006"
      }
    ],
    "trust": 0.8
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…