U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
  • Results Type: Overview
  • Keyword (text search): SCADA
  • Search Type: Search All
There are 224 matching records.
Displaying matches 1 through 20.
Vuln ID Summary CVSS Severity
CVE-2024-22096

In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, an attacker can append path traversal characters to the filename when using a specific command, allowing them to read arbitrary files from the system.

Published: February 01, 2024; 7:15:55 PM -0500
V3.1: 6.5 MEDIUM
V2.0:(not available)
CVE-2024-22016

In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, an authorized user can write directly to the Scada directory. This may allow privilege escalation.

Published: February 01, 2024; 7:15:55 PM -0500
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2024-21869

In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, the affected product stores plaintext credentials in various places. This may allow an attacker with local access to see them.

Published: February 01, 2024; 7:15:55 PM -0500
V3.1: 5.5 MEDIUM
V2.0:(not available)
CVE-2024-21866

In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, the affected product responds back with an error message containing sensitive data if it receives a specific malformed request.

Published: February 01, 2024; 7:15:55 PM -0500
V3.1: 5.3 MEDIUM
V2.0:(not available)
CVE-2024-21794

In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, an attacker can redirect users to malicious pages through the login page.

Published: February 01, 2024; 7:15:54 PM -0500
V3.1: 5.4 MEDIUM
V2.0:(not available)
CVE-2024-21764

In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, the product uses hard-coded credentials, which may allow an attacker to connect to a specific port.

Published: February 01, 2024; 7:15:54 PM -0500
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2024-21852

In Rapid Software LLC's Rapid SCADA versions prior to Version 5.8.4, an attacker can supply a malicious configuration file by utilizing a Zip Slip vulnerability in the unpacking routine to achieve remote code execution.

Published: February 01, 2024; 6:15:10 PM -0500
V3.1: 8.8 HIGH
V2.0:(not available)
CVE-2023-33472

An issue was discovered in Scada-LTS v2.7.5.2 build 4551883606 and before, allows remote attackers with low-level authentication to escalate privileges, execute arbitrary code, and obtain sensitive information via Event Handlers function.

Published: January 12, 2024; 9:15:07 PM -0500
V3.1: 8.8 HIGH
V2.0:(not available)
CVE-2023-6061

Multiple components of Iconics SCADA Suite are prone to a Phantom DLL loading vulnerability. This issue arises from the applications improperly searching for and loading dynamic link libraries, potentially allowing an attacker to execute malicious code via a DLL with a matching name in an accessible search path. The affected components are: * MMXFax.exe * winfax.dll * MelSim2ComProc.exe * Sim2ComProc.dll * MMXCall_in.exe * libdxxmt.dll * libsrlmt.dll

Published: December 07, 2023; 7:15:07 PM -0500
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-42494

EisBaer Scada - CWE-749: Exposed Dangerous Method or Function

Published: October 25, 2023; 2:17:31 PM -0400
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-42493

EisBaer Scada - CWE-256: Plaintext Storage of a Password

Published: October 25, 2023; 2:17:31 PM -0400
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-42492

EisBaer Scada - CWE-321: Use of Hard-coded Cryptographic Key

Published: October 25, 2023; 2:17:31 PM -0400
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-42491

EisBaer Scada - CWE-285: Improper Authorization

Published: October 25, 2023; 2:17:31 PM -0400
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-42490

EisBaer Scada - CWE-200: Exposure of Sensitive Information to an Unauthorized Actor

Published: October 25, 2023; 2:17:31 PM -0400
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2023-42489

EisBaer Scada - CWE-732: Incorrect Permission Assignment for Critical Resource

Published: October 25, 2023; 2:17:31 PM -0400
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-42488

EisBaer Scada - CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Published: October 25, 2023; 2:17:31 PM -0400
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2023-4986

A vulnerability classified as problematic was found in Supcon InPlant SCADA up to 20230901. Affected by this vulnerability is an unknown functionality of the file Project.xml. The manipulation leads to password hash with insufficient computational effort. Local access is required to approach this attack. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB-239797 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Published: September 15, 2023; 11:15:08 AM -0400
V3.1: 2.5 LOW
V2.0:(not available)
CVE-2023-4985

A vulnerability classified as critical has been found in Supcon InPlant SCADA up to 20230901. Affected is an unknown function of the file Project.xml. The manipulation leads to improper authentication. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-239796. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Published: September 15, 2023; 11:15:07 AM -0400
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2023-4485

ARDEREG ​Sistema SCADA Central versions 2.203 and prior login page are vulnerable to an unauthenticated blind SQL injection attack. An attacker could manipulate the application's SQL query logic to extract sensitive information or perform unauthorized actions within the database. In this case, the vulnerability could allow an attacker to execute arbitrary SQL queries through the login page, potentially leading to unauthorized access, data leakage, or even disruption of critical industrial processes.

Published: September 05, 2023; 8:15:07 PM -0400
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-0956

External input could be used on TEL-STER TelWin SCADA WebInterface to construct paths to files and directories without properly neutralizing special elements within the pathname, which could allow an unauthenticated attacker to read files on the system.

Published: August 03, 2023; 3:15:10 PM -0400
V3.1: 7.5 HIGH
V2.0:(not available)