Vulnerabilites related to cyberpower - powerpanel
CVE-2023-25133 (GCVE-0-2023-25133)
Vulnerability from cvelistv5
Published
2023-04-24 00:00
Modified
2025-02-04 17:22
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-269 - Improper Privilege Management
Summary
Improper privilege management vulnerability in default.cmd file in PowerPanel Business Local/Remote for Windows v4.8.6 and earlier, PowerPanel Business Management for Windows v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 32bit v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 64bit v4.8.6 and earlier, PowerPanel Business Management for Linux 32bit v4.8.6 and earlier, PowerPanel Business Management for Linux 64bit v4.8.6 and earlier, PowerPanel Business Local/Remote for MacOS v4.8.6 and earlier, and PowerPanel Business Management for MacOS v4.8.6 and earlier allows remote attackers to execute operation system commands via unspecified vectors.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | CyberPower | PowerPanel Business Local / Remote |
Version: unspecified < |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:18:35.307Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://zuso.ai/Advisory/" }, { "tags": [ "x_transferred" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" }, { "tags": [ "x_transferred" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_linux#downloads" }, { "tags": [ "x_transferred" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_mac#downloads" }, { "tags": [ "x_transferred" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_virtual_machine#downloads" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-25133", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-04T17:22:25.498117Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-04T17:22:44.012Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "platforms": [ "Windows, MacOS, Linux" ], "product": "PowerPanel Business Local / Remote", "vendor": "CyberPower", "versions": [ { "lessThanOrEqual": "v4.8.6", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "platforms": [ "Windows, MacOS, Linux" ], "product": "PowerPanel Business Management", "vendor": "CyberPower", "versions": [ { "lessThanOrEqual": "v4.8.6", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper privilege management vulnerability in default.cmd file in PowerPanel Business Local/Remote for Windows v4.8.6 and earlier, PowerPanel Business Management for Windows v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 32bit v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 64bit v4.8.6 and earlier, PowerPanel Business Management for Linux 32bit v4.8.6 and earlier, PowerPanel Business Management for Linux 64bit v4.8.6 and earlier, PowerPanel Business Local/Remote for MacOS v4.8.6 and earlier, and PowerPanel Business Management for MacOS v4.8.6 and earlier allows remote attackers to execute operation system commands via unspecified vectors." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-24T00:00:00.000Z", "orgId": "256c161b-b921-402b-8c3b-c6c9c14d5d88", "shortName": "ZUSO ART" }, "references": [ { "url": "https://zuso.ai/Advisory/" }, { "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" }, { "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_linux#downloads" }, { "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_mac#downloads" }, { "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_virtual_machine#downloads" } ], "source": { "defect": [ "ZA-2023-03" ], "discovery": "EXTERNAL" }, "title": "Improper privilege management vulnerability in CyberPower PowerPanel Business", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "256c161b-b921-402b-8c3b-c6c9c14d5d88", "assignerShortName": "ZUSO ART", "cveId": "CVE-2023-25133", "datePublished": "2023-04-24T00:00:00.000Z", "dateReserved": "2023-02-02T00:00:00.000Z", "dateUpdated": "2025-02-04T17:22:44.012Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-31409 (GCVE-0-2024-31409)
Vulnerability from cvelistv5
Published
2024-05-15 20:00
Modified
2025-08-07 18:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-863 - Incorrect Authorization
Summary
Certain MQTT wildcards are not blocked on the
CyberPower PowerPanel
system, which might result in an attacker obtaining data from throughout the system after gaining access to any device.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
CyberPower | PowerPanel business |
Version: 0 < 4.9.0 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:cyberpower:powerpanel_business:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "powerpanel_business", "vendor": "cyberpower", "versions": [ { "lessThan": "4.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-31409", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-05-24T18:48:30.373199Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:36:52.524Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:52:56.873Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01" }, { "tags": [ "x_transferred" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerPanel business", "vendor": "CyberPower", "versions": [ { "lessThan": "4.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Amir Preminger and Noam Moshe of Claroty Team82 Research reported these vulnerabilities to CISA." } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cdiv\u003e\n\nCertain MQTT wildcards are not blocked on the \nCyberPower PowerPanel\n\nsystem, which might result in an attacker obtaining data from throughout the system after gaining access to any device.\u003cbr\u003e\u003c/div\u003e" } ], "value": "Certain MQTT wildcards are not blocked on the \nCyberPower PowerPanel\n\nsystem, which might result in an attacker obtaining data from throughout the system after gaining access to any device." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863 Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-07T18:26:54.578Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01" }, { "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eCyberPower has released a new version (v4.10.1 or later version) of PowerPanel business that fixes these vulnerabilities.\u003c/p\u003e\n\u003cp\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads\"\u003ehttps://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads\u003c/a\u003e\u003cbr\u003e\u003c/p\u003e\n\n\u003cbr\u003e" } ], "value": "CyberPower has released a new version (v4.10.1 or later version) of PowerPanel business that fixes these vulnerabilities.\n\n\n https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" } ], "source": { "advisory": "ICSA-24-123-01", "discovery": "EXTERNAL" }, "title": "CyberPower PowerPanel business Incorrect Authorization", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2024-31409", "datePublished": "2024-05-15T20:00:22.532Z", "dateReserved": "2024-04-29T16:47:22.337Z", "dateUpdated": "2025-08-07T18:26:54.578Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-25131 (GCVE-0-2023-25131)
Vulnerability from cvelistv5
Published
2023-04-24 00:00
Modified
2025-02-04 17:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-1393 - Use of Default Password
Summary
Use of default password vulnerability in PowerPanel Business Local/Remote for Windows v4.8.6 and earlier, PowerPanel Business Management for Windows v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 32bit v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 64bit v4.8.6 and earlier, PowerPanel Business Management for Linux 32bit v4.8.6 and earlier, PowerPanel Business Management for Linux 64bit v4.8.6 and earlier, PowerPanel Business Local/Remote for MacOS v4.8.6 and earlier, and PowerPanel Business Management for MacOS v4.8.6 and earlier allows remote attackers to log in to the server directly to perform administrative functions. Upon installation or upon first login, the application does not ask the user to change the 'admin' password.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | CyberPower | PowerPanel Business Local / Remote |
Version: unspecified < |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:18:35.329Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://zuso.ai/Advisory/" }, { "tags": [ "x_transferred" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" }, { "tags": [ "x_transferred" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_linux#downloads" }, { "tags": [ "x_transferred" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_mac#downloads" }, { "tags": [ "x_transferred" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_virtual_machine#downloads" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-25131", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-04T17:25:46.888522Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-04T17:25:51.219Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "platforms": [ "windows, MacOS, Linux" ], "product": "PowerPanel Business Local / Remote", "vendor": "CyberPower", "versions": [ { "lessThanOrEqual": "v4.8.6", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "platforms": [ "windows, MacOS, Linux" ], "product": "PowerPanel Business Management", "vendor": "CyberPower", "versions": [ { "lessThanOrEqual": "v4.8.6", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Use of default password vulnerability in PowerPanel Business Local/Remote for Windows v4.8.6 and earlier, PowerPanel Business Management for Windows v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 32bit v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 64bit v4.8.6 and earlier, PowerPanel Business Management for Linux 32bit v4.8.6 and earlier, PowerPanel Business Management for Linux 64bit v4.8.6 and earlier, PowerPanel Business Local/Remote for MacOS v4.8.6 and earlier, and PowerPanel Business Management for MacOS v4.8.6 and earlier allows remote attackers to log in to the server directly to perform administrative functions. Upon installation or upon first login, the application does not ask the user to change the \u0027admin\u0027 password." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.4, "baseSeverity": "CRITICAL", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1393", "description": "CWE-1393 Use of Default Password", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-24T00:00:00.000Z", "orgId": "256c161b-b921-402b-8c3b-c6c9c14d5d88", "shortName": "ZUSO ART" }, "references": [ { "url": "https://zuso.ai/Advisory/" }, { "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" }, { "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_linux#downloads" }, { "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_mac#downloads" }, { "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_virtual_machine#downloads" } ], "source": { "defect": [ "ZA-2023-01" ], "discovery": "EXTERNAL" }, "title": "Use of default password vulnerability in CyberPower PowerPanel Business", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "256c161b-b921-402b-8c3b-c6c9c14d5d88", "assignerShortName": "ZUSO ART", "cveId": "CVE-2023-25131", "datePublished": "2023-04-24T00:00:00.000Z", "dateReserved": "2023-02-02T00:00:00.000Z", "dateUpdated": "2025-02-04T17:25:51.219Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-31856 (GCVE-0-2024-31856)
Vulnerability from cvelistv5
Published
2024-05-15 19:52
Modified
2024-08-02 01:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
An attacker with certain MQTT permissions can create malicious messages
to all CyberPower PowerPanel devices. This could result in an attacker injecting
SQL syntax, writing arbitrary files to the system, and executing remote
code.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
CyberPower | PowerPanel business |
Version: 0 < 4.9.0 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:cyberpower:powerpanel_business:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "powerpanel_business", "vendor": "cyberpower", "versions": [ { "lessThan": "4.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-31856", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-05-16T18:07:00.379722Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:36:10.715Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:59:49.843Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01" }, { "tags": [ "x_transferred" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerPanel business", "vendor": "CyberPower", "versions": [ { "lessThan": "4.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Amir Preminger and Noam Moshe of Claroty Team82 Research reported these vulnerabilities to CISA." } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cdiv\u003e\n\nAn attacker with certain MQTT permissions can create malicious messages \nto all CyberPower PowerPanel devices. This could result in an attacker injecting \nSQL syntax, writing arbitrary files to the system, and executing remote \ncode.\n\n\u003cbr\u003e\u003c/div\u003e" } ], "value": "An attacker with certain MQTT permissions can create malicious messages \nto all CyberPower PowerPanel devices. This could result in an attacker injecting \nSQL syntax, writing arbitrary files to the system, and executing remote \ncode." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-15T19:52:37.407Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01" }, { "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\u003cp\u003eCyberPower has released a new version (v4.10.1 or later version) of PowerPanel business that fixes these vulnerabilities.\u003c/p\u003e\n\u003cp\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads\"\u003ehttps://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads\u003c/a\u003e\u003cbr\u003e\u003c/p\u003e\n\n\u003cbr\u003e" } ], "value": "CyberPower has released a new version (v4.10.1 or later version) of PowerPanel business that fixes these vulnerabilities.\n\n\n https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" } ], "source": { "advisory": "ICSA-24-123-01", "discovery": "EXTERNAL" }, "title": "CyberPower PowerPanel business SQL Injection", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2024-31856", "datePublished": "2024-05-15T19:52:37.407Z", "dateReserved": "2024-04-29T16:47:22.333Z", "dateUpdated": "2024-08-02T01:59:49.843Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-33625 (GCVE-0-2024-33625)
Vulnerability from cvelistv5
Published
2024-05-15 19:19
Modified
2024-08-02 02:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
CyberPower PowerPanel business
application code contains a hard-coded JWT signing key. This could
result in an attacker forging JWT tokens to bypass authentication.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
CyberPower | PowerPanel business |
Version: 0 < 4.9.0 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:cyberpower:powerpanel_business:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "powerpanel_business", "vendor": "cyberpower", "versions": [ { "lessThan": "4.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-33625", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-16T18:45:00.332821Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:45:30.871Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:36:04.325Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01" }, { "tags": [ "x_transferred" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerPanel business", "vendor": "CyberPower", "versions": [ { "lessThan": "4.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Amir Preminger and Noam Moshe of Claroty Team82 Research reported these vulnerabilities to CISA." } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\nCyberPower PowerPanel business \napplication code contains a hard-coded JWT signing key. This could \nresult in an attacker forging JWT tokens to bypass authentication.\n\n" } ], "value": "CyberPower PowerPanel business \napplication code contains a hard-coded JWT signing key. This could \nresult in an attacker forging JWT tokens to bypass authentication." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-259", "description": "CWE-259", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-15T19:19:53.960Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01" }, { "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\u003cp\u003eCyberPower has released a new version (v4.10.1 or later version) of PowerPanel business that fixes these vulnerabilities.\u003c/p\u003e\n\u003cp\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads\"\u003ehttps://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads\u003c/a\u003e\u003cbr\u003e\u003c/p\u003e\n\n\u003cbr\u003e" } ], "value": "CyberPower has released a new version (v4.10.1 or later version) of PowerPanel business that fixes these vulnerabilities.\n\n\n https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" } ], "source": { "advisory": "ICSA-24-123-01", "discovery": "EXTERNAL" }, "title": "CyberPower PowerPanel business Use of Hard-coded Password", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2024-33625", "datePublished": "2024-05-15T19:19:53.960Z", "dateReserved": "2024-04-29T16:47:22.341Z", "dateUpdated": "2024-08-02T02:36:04.325Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-32042 (GCVE-0-2024-32042)
Vulnerability from cvelistv5
Published
2024-05-15 19:39
Modified
2024-08-02 02:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
The key used to encrypt passwords stored in the database can be found in
the
CyberPower PowerPanel
application code, allowing the passwords to be recovered.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
CyberPower | PowerPanel business |
Version: 0 < 4.9.0 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:cyberpower:powerpanel_business:*:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "powerpanel_business", "vendor": "cyberpower", "versions": [ { "lessThan": "4.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-32042", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-05-24T18:50:17.986724Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:51:52.502Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:06:43.266Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01" }, { "tags": [ "x_transferred" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerPanel business", "vendor": "CyberPower", "versions": [ { "lessThan": "4.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Amir Preminger and Noam Moshe of Claroty Team82 Research reported these vulnerabilities to CISA." } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cdiv\u003e\nThe key used to encrypt passwords stored in the database can be found in\n the \nCyberPower PowerPanel\n\napplication code, allowing the passwords to be recovered.\n\n\u003cbr\u003e\u003c/div\u003e" } ], "value": "The key used to encrypt passwords stored in the database can be found in\n the \nCyberPower PowerPanel\n\napplication code, allowing the passwords to be recovered." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-257", "description": "CWE-257", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-15T19:39:08.086Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01" }, { "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\u003cp\u003eCyberPower has released a new version (v4.10.1 or later version) of PowerPanel business that fixes these vulnerabilities.\u003c/p\u003e\n\u003cp\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads\"\u003ehttps://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads\u003c/a\u003e\u003cbr\u003e\u003c/p\u003e\n\n\u003cbr\u003e" } ], "value": "CyberPower has released a new version (v4.10.1 or later version) of PowerPanel business that fixes these vulnerabilities.\n\n\n https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" } ], "source": { "advisory": "ICSA-24-123-01", "discovery": "EXTERNAL" }, "title": "CyberPower PowerPanel business Storing Passwords in a Recoverable Format", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2024-32042", "datePublished": "2024-05-15T19:39:08.086Z", "dateReserved": "2024-04-29T16:47:22.354Z", "dateUpdated": "2024-08-02T02:06:43.266Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-32053 (GCVE-0-2024-32053)
Vulnerability from cvelistv5
Published
2024-05-15 19:34
Modified
2024-08-02 02:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Hard-coded credentials are used by the
CyberPower PowerPanel
platform to authenticate to the
database, other services, and the cloud. This could result in an
attacker gaining access to services with the privileges of a Powerpanel
business application.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
CyberPower | PowerPanel business |
Version: 0 < 4.9.0 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:cyberpower:powerpanel_business:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "powerpanel_business", "vendor": "cyberpower", "versions": [ { "lessThan": "4.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-32053", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-05-16T15:58:18.805976Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:51:38.726Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:06:43.251Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01" }, { "tags": [ "x_transferred" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerPanel business", "vendor": "CyberPower", "versions": [ { "lessThan": "4.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Amir Preminger and Noam Moshe of Claroty Team82 Research reported these vulnerabilities to CISA." } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Hard-coded credentials are used by the\u0026nbsp;\nCyberPower PowerPanel \n\n platform to authenticate to the \ndatabase, other services, and the cloud. This could result in an \nattacker gaining access to services with the privileges of a Powerpanel \nbusiness application.\n\n\u003cbr\u003e" } ], "value": "Hard-coded credentials are used by the\u00a0\nCyberPower PowerPanel \n\n platform to authenticate to the \ndatabase, other services, and the cloud. This could result in an \nattacker gaining access to services with the privileges of a Powerpanel \nbusiness application." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-798", "description": "CWE-798", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-15T19:34:30.153Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01" }, { "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\u003cp\u003eCyberPower has released a new version (v4.10.1 or later version) of PowerPanel business that fixes these vulnerabilities.\u003c/p\u003e\n\u003cp\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads\"\u003ehttps://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads\u003c/a\u003e\u003cbr\u003e\u003c/p\u003e\n\n\u003cbr\u003e" } ], "value": "CyberPower has released a new version (v4.10.1 or later version) of PowerPanel business that fixes these vulnerabilities.\n\n\n https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" } ], "source": { "advisory": "ICSA-24-123-01", "discovery": "EXTERNAL" }, "title": "CyberPower PowerPanel business Use of Hard-coded Credentials", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2024-32053", "datePublished": "2024-05-15T19:34:30.153Z", "dateReserved": "2024-04-29T16:47:22.358Z", "dateUpdated": "2024-08-02T02:06:43.251Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-25132 (GCVE-0-2023-25132)
Vulnerability from cvelistv5
Published
2023-04-24 00:00
Modified
2025-02-04 17:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-434 - Unrestricted Upload of File with Dangerous Type
Summary
Unrestricted upload of file with dangerous type vulnerability in default.cmd file in PowerPanel Business Local/Remote for Windows v4.8.6 and earlier, PowerPanel Business Management for Windows v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 32bit v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 64bit v4.8.6 and earlier, PowerPanel Business Management for Linux 32bit v4.8.6 and earlier, PowerPanel Business Management for Linux 64bit v4.8.6 and earlier, PowerPanel Business Local/Remote for MacOS v4.8.6 and earlier, and PowerPanel Business Management for MacOS v4.8.6 and earlier allows remote attackers to execute operation system commands via unspecified vectors.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | CyberPower | PowerPanel Business Local / Remote |
Version: unspecified < |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T11:18:35.973Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://zuso.ai/Advisory/" }, { "tags": [ "x_transferred" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" }, { "tags": [ "x_transferred" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_linux#downloads" }, { "tags": [ "x_transferred" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_mac#downloads" }, { "tags": [ "x_transferred" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_virtual_machine#downloads" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-25132", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-04T17:25:10.879424Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-04T17:25:19.666Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "platforms": [ "Windows, MacOS, Linux" ], "product": "PowerPanel Business Local / Remote", "vendor": "CyberPower", "versions": [ { "lessThanOrEqual": "v4.8.6", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "platforms": [ "Windows, MacOS, Linux" ], "product": "PowerPanel Business Management", "vendor": "CyberPower", "versions": [ { "lessThanOrEqual": "v4.8.6", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "Unrestricted upload of file with dangerous type vulnerability in default.cmd file in PowerPanel Business Local/Remote for Windows v4.8.6 and earlier, PowerPanel Business Management for Windows v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 32bit v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 64bit v4.8.6 and earlier, PowerPanel Business Management for Linux 32bit v4.8.6 and earlier, PowerPanel Business Management for Linux 64bit v4.8.6 and earlier, PowerPanel Business Local/Remote for MacOS v4.8.6 and earlier, and PowerPanel Business Management for MacOS v4.8.6 and earlier allows remote attackers to execute operation system commands via unspecified vectors." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-434", "description": "CWE-434 Unrestricted Upload of File with Dangerous Type", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-24T00:00:00.000Z", "orgId": "256c161b-b921-402b-8c3b-c6c9c14d5d88", "shortName": "ZUSO ART" }, "references": [ { "url": "https://zuso.ai/Advisory/" }, { "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" }, { "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_linux#downloads" }, { "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_mac#downloads" }, { "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_virtual_machine#downloads" } ], "source": { "defect": [ "ZA-2023-02" ], "discovery": "EXTERNAL" }, "title": "Unrestricted upload of file with dangerous type vulnerability in CyberPower PowerPanel Business", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "256c161b-b921-402b-8c3b-c6c9c14d5d88", "assignerShortName": "ZUSO ART", "cveId": "CVE-2023-25132", "datePublished": "2023-04-24T00:00:00.000Z", "dateReserved": "2023-02-02T00:00:00.000Z", "dateUpdated": "2025-02-04T17:25:19.666Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-32047 (GCVE-0-2024-32047)
Vulnerability from cvelistv5
Published
2024-05-15 19:36
Modified
2024-08-02 02:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Hard-coded credentials for the
CyberPower PowerPanel test server can be found in the
production code. This might result in an attacker gaining access to the
testing or production server.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
CyberPower | PowerPanel business |
Version: 0 < 4.9.0 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:cyberpower:powerpanel_business:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "powerpanel_business", "vendor": "cyberpower", "versions": [ { "lessThan": "4.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-32047", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-05-16T18:13:39.475129Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:50:55.367Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:06:43.550Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01" }, { "tags": [ "x_transferred" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerPanel business", "vendor": "CyberPower", "versions": [ { "lessThan": "4.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Amir Preminger and Noam Moshe of Claroty Team82 Research reported these vulnerabilities to CISA." } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Hard-coded credentials for the \nCyberPower PowerPanel test server can be found in the \nproduction code. This might result in an attacker gaining access to the \ntesting or production server.\n\n\u003cbr\u003e" } ], "value": "Hard-coded credentials for the \nCyberPower PowerPanel test server can be found in the \nproduction code. This might result in an attacker gaining access to the \ntesting or production server." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-489", "description": "CWE-489", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-15T19:36:41.936Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01" }, { "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\u003cp\u003eCyberPower has released a new version (v4.10.1 or later version) of PowerPanel business that fixes these vulnerabilities.\u003c/p\u003e\n\u003cp\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads\"\u003ehttps://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads\u003c/a\u003e\u003cbr\u003e\u003c/p\u003e\n\n\u003cbr\u003e" } ], "value": "CyberPower has released a new version (v4.10.1 or later version) of PowerPanel business that fixes these vulnerabilities.\n\n\n https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" } ], "source": { "advisory": "ICSA-24-123-01", "discovery": "EXTERNAL" }, "title": "CyberPower PowerPanel business Active Debug Code", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2024-32047", "datePublished": "2024-05-15T19:36:41.936Z", "dateReserved": "2024-04-29T16:47:22.349Z", "dateUpdated": "2024-08-02T02:06:43.550Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-34025 (GCVE-0-2024-34025)
Vulnerability from cvelistv5
Published
2024-05-15 19:17
Modified
2024-08-02 02:42
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
CyberPower PowerPanel business application code contains a hard-coded set of authentication
credentials. This could result in an attacker bypassing authentication
and gaining administrator privileges.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
CyberPower | PowerPanel business |
Version: 0 < 4.9.0 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:cyberpower:powerpanel_business:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "powerpanel_business", "vendor": "cyberpower", "versions": [ { "lessThan": "4.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-34025", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-05-16T15:23:17.392578Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:41:18.194Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:42:59.906Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01" }, { "tags": [ "x_transferred" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerPanel business", "vendor": "CyberPower", "versions": [ { "lessThan": "4.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Amir Preminger and Noam Moshe of Claroty Team82 Research reported these vulnerabilities to CISA." } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\nCyberPower PowerPanel business application code contains a hard-coded set of authentication \ncredentials. This could result in an attacker bypassing authentication \nand gaining administrator privileges.\n\n" } ], "value": "CyberPower PowerPanel business application code contains a hard-coded set of authentication \ncredentials. This could result in an attacker bypassing authentication \nand gaining administrator privileges." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-259", "description": "CWE-259", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-15T19:17:37.188Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01" }, { "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\u003cp\u003eCyberPower has released a new version (v4.10.1 or later version) of PowerPanel business that fixes these vulnerabilities.\u003c/p\u003e\n\u003cp\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads\"\u003ehttps://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads\u003c/a\u003e\u003cbr\u003e\u003c/p\u003e\n\n\u003cbr\u003e" } ], "value": "CyberPower has released a new version (v4.10.1 or later version) of PowerPanel business that fixes these vulnerabilities.\n\n\n https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" } ], "source": { "advisory": "ICSA-24-123-01", "discovery": "EXTERNAL" }, "title": "CyberPower PowerPanel business Use of Hard-coded Password", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2024-34025", "datePublished": "2024-05-15T19:17:37.188Z", "dateReserved": "2024-04-29T16:47:22.329Z", "dateUpdated": "2024-08-02T02:42:59.906Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-31410 (GCVE-0-2024-31410)
Vulnerability from cvelistv5
Published
2024-05-15 19:56
Modified
2024-08-02 01:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
The devices which CyberPower PowerPanel manages use identical certificates based on a
hard-coded cryptographic key. This can allow an attacker to impersonate
any client in the system and send malicious data.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
CyberPower | PowerPanel business |
Version: 0 < 4.9.0 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:cyberpower:powerpanel_business:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "powerpanel_business", "vendor": "cyberpower", "versions": [ { "lessThan": "4.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-31410", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-05-16T19:10:08.503295Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:36:22.390Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T01:52:56.912Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01" }, { "tags": [ "x_transferred" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PowerPanel business", "vendor": "CyberPower", "versions": [ { "lessThan": "4.9.0", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Amir Preminger and Noam Moshe of Claroty Team82 Research reported these vulnerabilities to CISA." } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cdiv\u003e\n\n\nThe devices which CyberPower PowerPanel manages use identical certificates based on a \nhard-coded cryptographic key. This can allow an attacker to impersonate \nany client in the system and send malicious data.\n\n\u003cbr\u003e\u003c/div\u003e" } ], "value": "The devices which CyberPower PowerPanel manages use identical certificates based on a \nhard-coded cryptographic key. This can allow an attacker to impersonate \nany client in the system and send malicious data." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-321", "description": "CWE-321", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-15T19:56:00.616Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01" }, { "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\u003cp\u003eCyberPower has released a new version (v4.10.1 or later version) of PowerPanel business that fixes these vulnerabilities.\u003c/p\u003e\n\u003cp\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads\"\u003ehttps://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads\u003c/a\u003e\u003cbr\u003e\u003c/p\u003e\n\n\u003cbr\u003e" } ], "value": "CyberPower has released a new version (v4.10.1 or later version) of PowerPanel business that fixes these vulnerabilities.\n\n\n https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" } ], "source": { "advisory": "ICSA-24-123-01", "discovery": "EXTERNAL" }, "title": "CyberPower PowerPanel business Use of Hard-coded Cryptographic Key", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2024-31410", "datePublished": "2024-05-15T19:56:00.616Z", "dateReserved": "2024-04-29T16:47:22.319Z", "dateUpdated": "2024-08-02T01:52:56.912Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2024-05-15 20:15
Modified
2025-07-30 00:20
Severity ?
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
An attacker with certain MQTT permissions can create malicious messages
to all CyberPower PowerPanel devices. This could result in an attacker injecting
SQL syntax, writing arbitrary files to the system, and executing remote
code.
References
▶ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01 | Third Party Advisory, US Government Resource | |
ics-cert@hq.dhs.gov | https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads | Product | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads | Product |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cyberpower | powerpanel | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cyberpower:powerpanel:*:*:*:*:business:windows:*:*", "matchCriteriaId": "63016483-EF5A-42FE-BBC2-D7E66C24B9B1", "versionEndIncluding": "4.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An attacker with certain MQTT permissions can create malicious messages \nto all CyberPower PowerPanel devices. This could result in an attacker injecting \nSQL syntax, writing arbitrary files to the system, and executing remote \ncode." }, { "lang": "es", "value": "Un atacante con ciertos permisos MQTT puede crear mensajes maliciosos para todos los dispositivos CyberPower PowerPanel. Esto podr\u00eda provocar que un atacante inyecte sintaxis SQL, escriba archivos arbitrarios en el sistema y ejecute c\u00f3digo remoto." } ], "id": "CVE-2024-31856", "lastModified": "2025-07-30T00:20:33.280", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-05-15T20:15:11.710", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Product" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2024-05-15 20:15
Modified
2025-07-30 00:23
Severity ?
7.7 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Summary
The devices which CyberPower PowerPanel manages use identical certificates based on a
hard-coded cryptographic key. This can allow an attacker to impersonate
any client in the system and send malicious data.
References
▶ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01 | Third Party Advisory, US Government Resource | |
ics-cert@hq.dhs.gov | https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads | Product | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads | Product |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cyberpower | powerpanel | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cyberpower:powerpanel:*:*:*:*:business:windows:*:*", "matchCriteriaId": "63016483-EF5A-42FE-BBC2-D7E66C24B9B1", "versionEndIncluding": "4.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The devices which CyberPower PowerPanel manages use identical certificates based on a \nhard-coded cryptographic key. This can allow an attacker to impersonate \nany client in the system and send malicious data." }, { "lang": "es", "value": "Los dispositivos que gestiona CyberPower PowerPanel utilizan certificados id\u00e9nticos basados en una clave criptogr\u00e1fica codificada. Esto puede permitir que un atacante se haga pasar por cualquier cliente del sistema y env\u00ede datos maliciosos." } ], "id": "CVE-2024-31410", "lastModified": "2025-07-30T00:23:54.457", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.1, "impactScore": 4.0, "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-05-15T20:15:11.473", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Product" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-321" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2024-05-15 20:15
Modified
2025-08-07 19:15
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
Certain MQTT wildcards are not blocked on the
CyberPower PowerPanel
system, which might result in an attacker obtaining data from throughout the system after gaining access to any device.
References
▶ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01 | Third Party Advisory, US Government Resource | |
ics-cert@hq.dhs.gov | https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads | Product | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads | Product |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cyberpower | powerpanel | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cyberpower:powerpanel:*:*:*:*:business:windows:*:*", "matchCriteriaId": "63016483-EF5A-42FE-BBC2-D7E66C24B9B1", "versionEndIncluding": "4.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Certain MQTT wildcards are not blocked on the \nCyberPower PowerPanel\n\nsystem, which might result in an attacker obtaining data from throughout the system after gaining access to any device." }, { "lang": "es", "value": "Ciertos comodines MQTT no est\u00e1n bloqueados en el sistema CyberPower PowerPanel, lo que podr\u00eda provocar que un atacante obtenga datos de todo el sistema despu\u00e9s de obtener acceso a cualquier dispositivo." } ], "id": "CVE-2024-31409", "lastModified": "2025-08-07T19:15:28.180", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-05-15T20:15:11.203", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Product" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-863" } ], "source": "ics-cert@hq.dhs.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-05-15 20:15
Modified
2025-08-04 14:12
Severity ?
Summary
CyberPower PowerPanel business application code contains a hard-coded set of authentication
credentials. This could result in an attacker bypassing authentication
and gaining administrator privileges.
References
▶ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01 | Third Party Advisory, US Government Resource | |
ics-cert@hq.dhs.gov | https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads | Product | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads | Product |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cyberpower | powerpanel | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cyberpower:powerpanel:*:*:*:*:business:windows:*:*", "matchCriteriaId": "63016483-EF5A-42FE-BBC2-D7E66C24B9B1", "versionEndIncluding": "4.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "CyberPower PowerPanel business application code contains a hard-coded set of authentication \ncredentials. This could result in an attacker bypassing authentication \nand gaining administrator privileges." }, { "lang": "es", "value": "El c\u00f3digo de la aplicaci\u00f3n empresarial CyberPower PowerPanel contiene un conjunto codificado de credenciales de autenticaci\u00f3n. Esto podr\u00eda provocar que un atacante eluda la autenticaci\u00f3n y obtenga privilegios de administrador." } ], "id": "CVE-2024-34025", "lastModified": "2025-08-04T14:12:56.200", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "ics-cert@hq.dhs.gov", "type": "Secondary" } ] }, "published": "2024-05-15T20:15:13.190", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Product" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-259" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2024-05-15 20:15
Modified
2025-08-04 14:18
Severity ?
Summary
CyberPower PowerPanel business
application code contains a hard-coded JWT signing key. This could
result in an attacker forging JWT tokens to bypass authentication.
References
▶ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01 | Third Party Advisory, US Government Resource | |
ics-cert@hq.dhs.gov | https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads | Product | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads | Product |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cyberpower | powerpanel | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cyberpower:powerpanel:*:*:*:*:business:windows:*:*", "matchCriteriaId": "63016483-EF5A-42FE-BBC2-D7E66C24B9B1", "versionEndIncluding": "4.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "CyberPower PowerPanel business \napplication code contains a hard-coded JWT signing key. This could \nresult in an attacker forging JWT tokens to bypass authentication." }, { "lang": "es", "value": "El c\u00f3digo de la aplicaci\u00f3n empresarial CyberPower PowerPanel contiene una clave de firma JWT codificada. Esto podr\u00eda resultar en que un atacante falsifique tokens JWT para eludir la autenticaci\u00f3n." } ], "id": "CVE-2024-33625", "lastModified": "2025-08-04T14:18:02.597", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "ics-cert@hq.dhs.gov", "type": "Secondary" } ] }, "published": "2024-05-15T20:15:12.927", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Product" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-259" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2024-05-15 20:15
Modified
2025-07-30 00:15
Severity ?
Summary
Hard-coded credentials are used by the
CyberPower PowerPanel
platform to authenticate to the
database, other services, and the cloud. This could result in an
attacker gaining access to services with the privileges of a Powerpanel
business application.
References
▶ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01 | Third Party Advisory, US Government Resource | |
ics-cert@hq.dhs.gov | https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads | Product | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads | Product |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cyberpower | powerpanel | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cyberpower:powerpanel:*:*:*:*:business:windows:*:*", "matchCriteriaId": "63016483-EF5A-42FE-BBC2-D7E66C24B9B1", "versionEndIncluding": "4.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Hard-coded credentials are used by the\u00a0\nCyberPower PowerPanel \n\n platform to authenticate to the \ndatabase, other services, and the cloud. This could result in an \nattacker gaining access to services with the privileges of a Powerpanel \nbusiness application." }, { "lang": "es", "value": "La plataforma CyberPower PowerPanel utiliza credenciales codificadas para autenticarse en la base de datos, otros servicios y la nube. Esto podr\u00eda resultar en que un atacante obtenga acceso a servicios con los privilegios de una aplicaci\u00f3n empresarial Powerpanel." } ], "id": "CVE-2024-32053", "lastModified": "2025-07-30T00:15:59.410", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "ics-cert@hq.dhs.gov", "type": "Secondary" } ] }, "published": "2024-05-15T20:15:12.443", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Product" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-798" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2024-05-15 20:15
Modified
2025-07-30 00:16
Severity ?
Summary
Hard-coded credentials for the
CyberPower PowerPanel test server can be found in the
production code. This might result in an attacker gaining access to the
testing or production server.
References
▶ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01 | Third Party Advisory, US Government Resource | |
ics-cert@hq.dhs.gov | https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads | Product | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads | Product |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cyberpower | powerpanel | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cyberpower:powerpanel:*:*:*:*:business:windows:*:*", "matchCriteriaId": "63016483-EF5A-42FE-BBC2-D7E66C24B9B1", "versionEndIncluding": "4.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Hard-coded credentials for the \nCyberPower PowerPanel test server can be found in the \nproduction code. This might result in an attacker gaining access to the \ntesting or production server." }, { "lang": "es", "value": "Las credenciales codificadas para el servidor de prueba CyberPower PowerPanel se pueden encontrar en el c\u00f3digo de producci\u00f3n. Esto podr\u00eda provocar que un atacante obtenga acceso al servidor de prueba o de producci\u00f3n." } ], "id": "CVE-2024-32047", "lastModified": "2025-07-30T00:16:34.260", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "ics-cert@hq.dhs.gov", "type": "Secondary" } ] }, "published": "2024-05-15T20:15:12.197", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Product" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-489" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2023-04-24 10:15
Modified
2024-11-21 07:49
Severity ?
9.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Unrestricted upload of file with dangerous type vulnerability in default.cmd file in PowerPanel Business Local/Remote for Windows v4.8.6 and earlier, PowerPanel Business Management for Windows v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 32bit v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 64bit v4.8.6 and earlier, PowerPanel Business Management for Linux 32bit v4.8.6 and earlier, PowerPanel Business Management for Linux 64bit v4.8.6 and earlier, PowerPanel Business Local/Remote for MacOS v4.8.6 and earlier, and PowerPanel Business Management for MacOS v4.8.6 and earlier allows remote attackers to execute operation system commands via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
ART@zuso.ai | https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_linux#downloads | Product | |
ART@zuso.ai | https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_mac#downloads | Product | |
ART@zuso.ai | https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_virtual_machine#downloads | Product | |
ART@zuso.ai | https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads | Product | |
ART@zuso.ai | https://zuso.ai/Advisory/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_linux#downloads | Product | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_mac#downloads | Product | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_virtual_machine#downloads | Product | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads | Product | |
af854a3a-2127-422b-91ae-364da2661108 | https://zuso.ai/Advisory/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cyberpower | powerpanel | * | |
cyberpower | powerpanel | * | |
cyberpower | powerpanel | * | |
cyberpower | powerpanel | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cyberpower:powerpanel:*:*:*:*:business:linux:*:*", "matchCriteriaId": "231B7053-0BD9-4C08-8028-72F30768EF48", "versionEndIncluding": "4.8.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cyberpower:powerpanel:*:*:*:*:business:macos:*:*", "matchCriteriaId": "B38A1026-EED6-4606-B61A-F6FDCBF3BB4C", "versionEndIncluding": "4.8.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cyberpower:powerpanel:*:*:*:*:business:virtual_machine:*:*", "matchCriteriaId": "4DD5C6C4-2DBD-4C67-A10C-43A293ABD1A7", "versionEndIncluding": "4.8.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cyberpower:powerpanel:*:*:*:*:business:windows:*:*", "matchCriteriaId": "CA11A0E7-FAC1-4BF1-85D4-7370EAC1E0C2", "versionEndIncluding": "4.8.6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unrestricted upload of file with dangerous type vulnerability in default.cmd file in PowerPanel Business Local/Remote for Windows v4.8.6 and earlier, PowerPanel Business Management for Windows v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 32bit v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 64bit v4.8.6 and earlier, PowerPanel Business Management for Linux 32bit v4.8.6 and earlier, PowerPanel Business Management for Linux 64bit v4.8.6 and earlier, PowerPanel Business Local/Remote for MacOS v4.8.6 and earlier, and PowerPanel Business Management for MacOS v4.8.6 and earlier allows remote attackers to execute operation system commands via unspecified vectors." } ], "id": "CVE-2023-25132", "lastModified": "2024-11-21T07:49:10.350", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 6.0, "source": "ART@zuso.ai", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-04-24T10:15:07.237", "references": [ { "source": "ART@zuso.ai", "tags": [ "Product" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_linux#downloads" }, { "source": "ART@zuso.ai", "tags": [ "Product" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_mac#downloads" }, { "source": "ART@zuso.ai", "tags": [ "Product" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_virtual_machine#downloads" }, { "source": "ART@zuso.ai", "tags": [ "Product" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" }, { "source": "ART@zuso.ai", "tags": [ "Third Party Advisory" ], "url": "https://zuso.ai/Advisory/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_linux#downloads" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_mac#downloads" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_virtual_machine#downloads" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://zuso.ai/Advisory/" } ], "sourceIdentifier": "ART@zuso.ai", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-434" } ], "source": "ART@zuso.ai", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-434" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-05-15 20:15
Modified
2025-07-30 00:19
Severity ?
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
The key used to encrypt passwords stored in the database can be found in
the
CyberPower PowerPanel
application code, allowing the passwords to be recovered.
References
▶ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01 | Third Party Advisory, US Government Resource | |
ics-cert@hq.dhs.gov | https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads | Product | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads | Product |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cyberpower | powerpanel | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cyberpower:powerpanel:*:*:*:*:business:windows:*:*", "matchCriteriaId": "63016483-EF5A-42FE-BBC2-D7E66C24B9B1", "versionEndIncluding": "4.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The key used to encrypt passwords stored in the database can be found in\n the \nCyberPower PowerPanel\n\napplication code, allowing the passwords to be recovered." }, { "lang": "es", "value": "La clave utilizada para cifrar las contrase\u00f1as almacenadas en la base de datos se puede encontrar en el c\u00f3digo de la aplicaci\u00f3n CyberPower PowerPanel, lo que permite recuperar las contrase\u00f1as." } ], "id": "CVE-2024-32042", "lastModified": "2025-07-30T00:19:33.853", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-05-15T20:15:11.950", "references": [ { "source": "ics-cert@hq.dhs.gov", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Product" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-123-01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-257" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2023-04-24 10:15
Modified
2024-11-21 07:49
Severity ?
9.4 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Use of default password vulnerability in PowerPanel Business Local/Remote for Windows v4.8.6 and earlier, PowerPanel Business Management for Windows v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 32bit v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 64bit v4.8.6 and earlier, PowerPanel Business Management for Linux 32bit v4.8.6 and earlier, PowerPanel Business Management for Linux 64bit v4.8.6 and earlier, PowerPanel Business Local/Remote for MacOS v4.8.6 and earlier, and PowerPanel Business Management for MacOS v4.8.6 and earlier allows remote attackers to log in to the server directly to perform administrative functions. Upon installation or upon first login, the application does not ask the user to change the 'admin' password.
References
▶ | URL | Tags | |
---|---|---|---|
ART@zuso.ai | https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_linux#downloads | Product | |
ART@zuso.ai | https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_mac#downloads | Product | |
ART@zuso.ai | https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_virtual_machine#downloads | Product | |
ART@zuso.ai | https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads | Product | |
ART@zuso.ai | https://zuso.ai/Advisory/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_linux#downloads | Product | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_mac#downloads | Product | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_virtual_machine#downloads | Product | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads | Product | |
af854a3a-2127-422b-91ae-364da2661108 | https://zuso.ai/Advisory/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cyberpower | powerpanel | * | |
cyberpower | powerpanel | * | |
cyberpower | powerpanel | * | |
cyberpower | powerpanel | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cyberpower:powerpanel:*:*:*:*:business:linux:*:*", "matchCriteriaId": "231B7053-0BD9-4C08-8028-72F30768EF48", "versionEndIncluding": "4.8.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cyberpower:powerpanel:*:*:*:*:business:macos:*:*", "matchCriteriaId": "B38A1026-EED6-4606-B61A-F6FDCBF3BB4C", "versionEndIncluding": "4.8.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cyberpower:powerpanel:*:*:*:*:business:virtual_machine:*:*", "matchCriteriaId": "4DD5C6C4-2DBD-4C67-A10C-43A293ABD1A7", "versionEndIncluding": "4.8.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cyberpower:powerpanel:*:*:*:*:business:windows:*:*", "matchCriteriaId": "CA11A0E7-FAC1-4BF1-85D4-7370EAC1E0C2", "versionEndIncluding": "4.8.6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use of default password vulnerability in PowerPanel Business Local/Remote for Windows v4.8.6 and earlier, PowerPanel Business Management for Windows v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 32bit v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 64bit v4.8.6 and earlier, PowerPanel Business Management for Linux 32bit v4.8.6 and earlier, PowerPanel Business Management for Linux 64bit v4.8.6 and earlier, PowerPanel Business Local/Remote for MacOS v4.8.6 and earlier, and PowerPanel Business Management for MacOS v4.8.6 and earlier allows remote attackers to log in to the server directly to perform administrative functions. Upon installation or upon first login, the application does not ask the user to change the \u0027admin\u0027 password." } ], "id": "CVE-2023-25131", "lastModified": "2024-11-21T07:49:10.220", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.4, "baseSeverity": "CRITICAL", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.5, "source": "ART@zuso.ai", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-04-24T10:15:07.173", "references": [ { "source": "ART@zuso.ai", "tags": [ "Product" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_linux#downloads" }, { "source": "ART@zuso.ai", "tags": [ "Product" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_mac#downloads" }, { "source": "ART@zuso.ai", "tags": [ "Product" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_virtual_machine#downloads" }, { "source": "ART@zuso.ai", "tags": [ "Product" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" }, { "source": "ART@zuso.ai", "tags": [ "Third Party Advisory" ], "url": "https://zuso.ai/Advisory/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_linux#downloads" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_mac#downloads" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_virtual_machine#downloads" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://zuso.ai/Advisory/" } ], "sourceIdentifier": "ART@zuso.ai", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-1393" } ], "source": "ART@zuso.ai", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-287" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-04-24 11:15
Modified
2024-11-21 07:49
Severity ?
9.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Improper privilege management vulnerability in default.cmd file in PowerPanel Business Local/Remote for Windows v4.8.6 and earlier, PowerPanel Business Management for Windows v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 32bit v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 64bit v4.8.6 and earlier, PowerPanel Business Management for Linux 32bit v4.8.6 and earlier, PowerPanel Business Management for Linux 64bit v4.8.6 and earlier, PowerPanel Business Local/Remote for MacOS v4.8.6 and earlier, and PowerPanel Business Management for MacOS v4.8.6 and earlier allows remote attackers to execute operation system commands via unspecified vectors.
References
▶ | URL | Tags | |
---|---|---|---|
ART@zuso.ai | https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_linux#downloads | Product | |
ART@zuso.ai | https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_mac#downloads | Product | |
ART@zuso.ai | https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_virtual_machine#downloads | Product | |
ART@zuso.ai | https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads | Product | |
ART@zuso.ai | https://zuso.ai/Advisory/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_linux#downloads | Product | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_mac#downloads | Product | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_virtual_machine#downloads | Product | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads | Product | |
af854a3a-2127-422b-91ae-364da2661108 | https://zuso.ai/Advisory/ | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cyberpower | powerpanel | * | |
cyberpower | powerpanel | * | |
cyberpower | powerpanel | * | |
cyberpower | powerpanel | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cyberpower:powerpanel:*:*:*:*:business:linux:*:*", "matchCriteriaId": "231B7053-0BD9-4C08-8028-72F30768EF48", "versionEndIncluding": "4.8.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cyberpower:powerpanel:*:*:*:*:business:macos:*:*", "matchCriteriaId": "B38A1026-EED6-4606-B61A-F6FDCBF3BB4C", "versionEndIncluding": "4.8.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cyberpower:powerpanel:*:*:*:*:business:virtual_machine:*:*", "matchCriteriaId": "4DD5C6C4-2DBD-4C67-A10C-43A293ABD1A7", "versionEndIncluding": "4.8.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:cyberpower:powerpanel:*:*:*:*:business:windows:*:*", "matchCriteriaId": "CA11A0E7-FAC1-4BF1-85D4-7370EAC1E0C2", "versionEndIncluding": "4.8.6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper privilege management vulnerability in default.cmd file in PowerPanel Business Local/Remote for Windows v4.8.6 and earlier, PowerPanel Business Management for Windows v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 32bit v4.8.6 and earlier, PowerPanel Business Local/Remote for Linux 64bit v4.8.6 and earlier, PowerPanel Business Management for Linux 32bit v4.8.6 and earlier, PowerPanel Business Management for Linux 64bit v4.8.6 and earlier, PowerPanel Business Local/Remote for MacOS v4.8.6 and earlier, and PowerPanel Business Management for MacOS v4.8.6 and earlier allows remote attackers to execute operation system commands via unspecified vectors." } ], "id": "CVE-2023-25133", "lastModified": "2024-11-21T07:49:10.470", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 6.0, "source": "ART@zuso.ai", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-04-24T11:15:07.097", "references": [ { "source": "ART@zuso.ai", "tags": [ "Product" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_linux#downloads" }, { "source": "ART@zuso.ai", "tags": [ "Product" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_mac#downloads" }, { "source": "ART@zuso.ai", "tags": [ "Product" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_virtual_machine#downloads" }, { "source": "ART@zuso.ai", "tags": [ "Product" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" }, { "source": "ART@zuso.ai", "tags": [ "Third Party Advisory" ], "url": "https://zuso.ai/Advisory/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_linux#downloads" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_mac#downloads" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_virtual_machine#downloads" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.cyberpower.com/global/en/product/sku/powerpanel_business_for_windows#downloads" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://zuso.ai/Advisory/" } ], "sourceIdentifier": "ART@zuso.ai", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "ART@zuso.ai", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }