Vulnerabilities (CVE)

Filtered by vendor Mobotix Subscribe
Total 7 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-30018 1 Mobotix 1 Mxcontrolcenter 2024-02-13 6.5 MEDIUM 8.8 HIGH
Mobotix Control Center (MxCC) through 2.5.4.5 has Insufficiently Protected Credentials, Storing Passwords in a Recoverable Format via the MxCC.ini config file. The credential storage method in this software enables an attacker/user of the machine to gain admin access to the software and gain access to recordings/recording locations.
CVE-2019-12502 1 Mobotix 2 S14, S14 Firmware 2023-12-10 9.3 HIGH 8.8 HIGH
There is a lack of CSRF countermeasures on MOBOTIX S14 MX-V4.2.1.61 cameras, as demonstrated by adding an admin account via the /admin/access URI.
CVE-2019-7675 1 Mobotix 2 S14, S14 Firmware 2023-12-10 5.0 MEDIUM 7.5 HIGH
An issue was discovered on MOBOTIX S14 MX-V4.2.1.61 devices. The default management application is delivered over cleartext HTTP with Basic Authentication, as demonstrated by the /admin/index.html URI.
CVE-2019-7673 1 Mobotix 2 S14, S14 Firmware 2023-12-10 5.0 MEDIUM 7.5 HIGH
An issue was discovered on MOBOTIX S14 MX-V4.2.1.61 devices. Administrator Credentials are stored in the 13-character DES hash format.
CVE-2019-7674 1 Mobotix 2 S14, S14 Firmware 2023-12-10 5.0 MEDIUM 9.8 CRITICAL
An issue was discovered on MOBOTIX S14 MX-V4.2.1.61 devices. /admin/access accepts a request to set the "aaaaa" password, considered insecure for some use cases, from a user.
CVE-2009-5154 1 Mobotix 2 S14, S14 Firmware 2023-12-10 10.0 HIGH 9.8 CRITICAL
An issue was discovered on MOBOTIX S14 MX-V4.2.1.61 devices. There is a default password of meinsm for the admin account.
CVE-2006-2490 1 Mobotix 1 Mobotix Ip Network Camera 2023-12-10 4.3 MEDIUM N/A
Multiple cross-site scripting (XSS) vulnerabilities in Mobotix IP Network Cameras M1 1.9.4.7 and M10 2.0.5.2, and other versions before 2.2.3.18 for M10/D10 and 3.0.3.31 for M22, allow remote attackers to inject arbitrary web script or HTML via URL-encoded values in (1) the query string to help/help, (2) the get_image_info_abspath parameter to control/eventplayer, and (3) the source_ip parameter to events.tar.