Lucene search

K

Automation Runtime Security Vulnerabilities

cve
cve

CVE-2019-19108

An authentication weakness in the SNMP service in B&R Automation Runtime versions 2.96, 3.00, 3.01, 3.06 to 3.10, 4.00 to 4.63, 4.72 and above allows unauthenticated users to modify the configuration of B&R products via SNMP.

9.4CVSS

9.2AI Score

0.001EPSS

2020-04-20 10:15 PM
33
cve
cve

CVE-2020-11637

A memory leak in the TFTP service in B&R Automation Runtime versions <N4.26, <N4.34, <F4.45, <E4.53, <D4.63, <A4.73 and prior could allow an unauthenticated attacker with network access to cause a denial of service (DoS) condition.

7.5CVSS

7.3AI Score

0.001EPSS

2020-10-15 04:15 PM
31
cve
cve

CVE-2021-22275

Buffer Overflow vulnerability in B&R Automation Runtime webserver allows an unauthenticated network-based attacker to stop the cyclic program on the device and cause a denial of service.

8.6CVSS

8.3AI Score

0.001EPSS

2022-05-13 03:15 PM
58
10
cve
cve

CVE-2022-4286

A reflected cross-site scripting (XSS) vulnerability exists in System Diagnostics Manager of B&R Automation Runtime versions >=3.00 and <=C4.93 that enables a remote attacker to execute arbitrary JavaScript in the context of the users browser session.

6.1CVSS

5.9AI Score

0.001EPSS

2023-02-14 03:15 PM
35
cve
cve

CVE-2023-3242

Improper initialization implementation in Portmapper used in B&R Industrial Automation Automation Runtime <G4.93 allows unauthenticated network-based attackers to cause permanent denial-of-service conditions.

8.6CVSS

5.7AI Score

0.001EPSS

2023-07-26 06:15 PM
46
cve
cve

CVE-2023-6028

A reflectedcross-site scripting (XSS) vulnerability exists in the SVG version of SystemDiagnostics Manager of B&R Automation Runtime versions <= G4.93 thatenables a remote attacker to execute arbitrary JavaScript code in the contextof the attacked user’s browser session.

6.1CVSS

6AI Score

0.001EPSS

2024-02-05 06:15 PM
17
cve
cve

CVE-2024-0323

The FTP server used on the B&RAutomation Runtime supports unsecure encryption mechanisms, such as SSLv3,TLSv1.0 and TLS1.1. An network-based attacker can exploit the flaws to conductman-in-the-middle attacks or to decrypt communications between the affected productclients.

9.8CVSS

9.3AI Score

0.001EPSS

2024-02-05 04:15 PM
36