Vulnerabilities (CVE)

Filtered by vendor Piigab Subscribe
Total 9 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-34995 1 Piigab 2 M-bus 900s, M-bus 900s Firmware 2023-12-10 N/A 9.8 CRITICAL
There are no requirements for setting a complex password for PiiGAB M-Bus, which could contribute to a successful brute force attack if the password is inline with recommended password guidelines.
CVE-2023-31277 1 Piigab 2 M-bus 900s, M-bus 900s Firmware 2023-12-10 N/A 7.5 HIGH
PiiGAB M-Bus transmits credentials in plaintext format.
CVE-2023-32652 1 Piigab 2 M-bus 900s, M-bus 900s Firmware 2023-12-10 N/A 6.1 MEDIUM
PiiGAB M-Bus does not validate identification strings before processing, which could make it vulnerable to cross-site scripting attacks.
CVE-2023-34433 1 Piigab 2 M-bus 900s, M-bus 900s Firmware 2023-12-10 N/A 9.8 CRITICAL
PiiGAB M-Bus stores passwords using a weak hash algorithm.
CVE-2023-36859 1 Piigab 2 M-bus 900s, M-bus 900s Firmware 2023-12-10 N/A 9.8 CRITICAL
PiiGAB M-Bus SoftwarePack 900S does not correctly sanitize user input, which could allow an attacker to inject arbitrary commands.
CVE-2023-35987 1 Piigab 2 M-bus 900s, M-bus 900s Firmware 2023-12-10 N/A 9.8 CRITICAL
PiiGAB M-Bus contains hard-coded credentials which it uses for authentication.
CVE-2023-35765 1 Piigab 2 M-bus 900s, M-bus 900s Firmware 2023-12-10 N/A 6.5 MEDIUM
PiiGAB M-Bus stores credentials in a plaintext file, which could allow a low-level user to gain admin credentials.
CVE-2023-33868 1 Piigab 2 M-bus 900s, M-bus 900s Firmware 2023-12-10 N/A 9.8 CRITICAL
The number of login attempts is not limited. This could allow an attacker to perform a brute force on HTTP basic authentication.
CVE-2023-35120 1 Piigab 2 M-bus 900s, M-bus 900s Firmware 2023-12-10 N/A 8.8 HIGH
PiiGAB M-Bus is vulnerable to cross-site request forgery. An attacker who wants to execute a certain command could send a phishing mail to the owner of the device and hope that the owner clicks on the link. If the owner of the device has a cookie stored that allows the owner to be logged in, then the device could execute the GET or POST link request.