Skip to content

Commit 82a0237

Browse files
Sync EUVD catalog: Sat Apr 4 00:33:55 UTC 2026
Signed-off-by: AboutCode Automation <automation@aboutcode.org>
1 parent 87d541d commit 82a0237

220 files changed

Lines changed: 12444 additions & 46 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
{
2+
"id": "EUVD-2015-9425",
3+
"enisaUuid": "12b0f05f-49cf-344a-9a1b-a69082df5955",
4+
"description": "Hirschmann HiLCOS devices OpenBAT, WLC, BAT300, BAT54 prior to 8.80 and OpenBAT prior to 9.10 are shipped with identical default SSH and SSL keys that cannot be changed, allowing unauthenticated remote attackers to decrypt or intercept encrypted management communications. Attackers can perform man-in-the-middle attacks, impersonate devices, and expose sensitive information by leveraging the shared default cryptographic keys across multiple devices.",
5+
"datePublished": "Apr 3, 2026, 9:42:51 PM",
6+
"dateUpdated": "Apr 3, 2026, 9:42:51 PM",
7+
"baseScore": 8.2,
8+
"baseScoreVersion": "4.0",
9+
"baseScoreVector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N",
10+
"references": "https://assets.belden.com/m/76d31798e65c9f47/original/Security-Bulletin-SSH-SSL-Default-Keys-HiLCOS-Hirschmann-BSECV-2015-12.pdf\nhttps://www.vulncheck.com/advisories/hirschmann-hilcos-hard-coded-credentials-ssh-ssl-keys\n",
11+
"aliases": "CVE-2015-10148\n",
12+
"assigner": "VulnCheck",
13+
"epss": 0.0,
14+
"enisaIdProduct": [
15+
{
16+
"id": "40bf094d-4ad7-3b5c-8487-2db6aa804d52",
17+
"product": {
18+
"name": "Hirschmann HiLCOS"
19+
},
20+
"product_version": "patch: >= 9.10"
21+
},
22+
{
23+
"id": "6c62b954-12de-308d-8721-12351bd3412e",
24+
"product": {
25+
"name": "Hirschmann HiLCOS"
26+
},
27+
"product_version": "0 \u22648.60"
28+
},
29+
{
30+
"id": "ac653394-0795-325d-90a7-b6e09381a178",
31+
"product": {
32+
"name": "Hirschmann HiLCOS"
33+
},
34+
"product_version": "0 \u22648.80"
35+
},
36+
{
37+
"id": "e4653334-ea42-34d3-93ee-32233d8d6869",
38+
"product": {
39+
"name": "Hirschmann HiLCOS"
40+
},
41+
"product_version": "0 \u22649.00-RU1"
42+
}
43+
],
44+
"enisaIdVendor": [
45+
{
46+
"id": "b385a25b-dfa5-3ed6-b3ca-c05b5a2d37cb",
47+
"vendor": {
48+
"name": "Belden"
49+
}
50+
}
51+
]
52+
}
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
{
2+
"id": "EUVD-2016-10854",
3+
"enisaUuid": "2d547c47-1b2c-3267-94ce-17074ea4908e",
4+
"description": "Hirschmann HiLCOS Classic Platform switches Classic L2E, L2P, L3E, L3P versions prior to 09.0.06 and Classic L2B prior to 05.3.07 contain a credential exposure vulnerability where user passwords are synchronized with SNMPv1/v2 community strings and transmitted in plaintext when the feature is enabled. Attackers with local network access can sniff SNMP traffic or extract configuration data to recover plaintext credentials and gain unauthorized administrative access to the switches.",
5+
"datePublished": "Apr 3, 2026, 9:59:07 PM",
6+
"dateUpdated": "Apr 3, 2026, 9:59:07 PM",
7+
"baseScore": 8.4,
8+
"baseScoreVersion": "4.0",
9+
"baseScoreVector": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N",
10+
"references": "https://assets.belden.com/m/1d8273c6205dc400/original/Security-Bulletin-Password-Sync-SNMP-v1-v2-BSECV-2016-12.pdf\nhttps://www.kb.cert.org/vuls/id/507216\nhttps://www.vulncheck.com/advisories/hirschmann-hilcos-classic-platform-password-exposure-via-snmp\n",
11+
"aliases": "CVE-2016-15058\n",
12+
"assigner": "VulnCheck",
13+
"epss": 0.0,
14+
"enisaIdProduct": [
15+
{
16+
"id": "0fcd6890-2cc2-39af-b22a-048356ba3156",
17+
"product": {
18+
"name": "Hirschmann HiLCOS Classic Platform"
19+
},
20+
"product_version": "patch: >= 05.3.07"
21+
},
22+
{
23+
"id": "37c10631-9256-331d-bce8-5a10a028d85c",
24+
"product": {
25+
"name": "Hirschmann HiLCOS Classic Platform"
26+
},
27+
"product_version": "0 \u226409.0.05"
28+
},
29+
{
30+
"id": "46a59d14-8744-3af4-a011-f84034519b45",
31+
"product": {
32+
"name": "Hirschmann HiLCOS Classic Platform"
33+
},
34+
"product_version": "patch: >= 09.0.06"
35+
},
36+
{
37+
"id": "e7e033ac-b37d-39f7-8b74-5de230640390",
38+
"product": {
39+
"name": "Hirschmann HiLCOS Classic Platform"
40+
},
41+
"product_version": "0 \u226405.3.06"
42+
}
43+
],
44+
"enisaIdVendor": [
45+
{
46+
"id": "301179f6-8ad5-3f64-87f0-709138a4ff4e",
47+
"vendor": {
48+
"name": "Belden"
49+
}
50+
}
51+
]
52+
}
Lines changed: 52 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,52 @@
1+
{
2+
"id": "EUVD-2017-18953",
3+
"enisaUuid": "e2e82d86-b763-334c-95a2-0cb145fcc505",
4+
"description": "Hirschmann Industrial HiVision versions prior to 06.0.07 and 07.0.03 contains an authentication bypass vulnerability in the master service that allows unauthenticated remote attackers to execute arbitrary commands with administrative privileges. Attackers can invoke exposed interface methods over the remote service to bypass authentication and achieve remote code execution on the underlying operating system.",
5+
"datePublished": "Apr 3, 2026, 9:31:42 PM",
6+
"dateUpdated": "Apr 3, 2026, 9:31:42 PM",
7+
"baseScore": 9.3,
8+
"baseScoreVersion": "4.0",
9+
"baseScoreVector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
10+
"references": "https://assets.belden.com/m/1cb01df62f1f31e3/original/Unauthenticated-Remote-Code-Execution-Security-Bulletin-Hirschmann-BSECV-2017-02.pdf\nhttps://www.vulncheck.com/advisories/hirschmann-industrial-hivision-authentication-bypass-remote-code-execution\nhttps://nvd.nist.gov/vuln/detail/CVE-2017-20237\n",
11+
"aliases": "CVE-2017-20237\n",
12+
"assigner": "VulnCheck",
13+
"epss": 0.0,
14+
"enisaIdProduct": [
15+
{
16+
"id": "56af12b1-8028-3d4a-8dd9-b1f99658895b",
17+
"product": {
18+
"name": "Hirschmann Industrial HiVision"
19+
},
20+
"product_version": "patch: 07.0.03"
21+
},
22+
{
23+
"id": "8b0e52bd-bc1d-30de-a33f-a383c35a61c0",
24+
"product": {
25+
"name": "Hirschmann Industrial HiVision"
26+
},
27+
"product_version": "0 \u226407.0.02"
28+
},
29+
{
30+
"id": "8cb6cf09-6138-3a3b-81b0-d0ec479b3e02",
31+
"product": {
32+
"name": "Hirschmann Industrial HiVision"
33+
},
34+
"product_version": "0 \u226406.0.06"
35+
},
36+
{
37+
"id": "b55b0aa1-10d1-3464-b89b-efdd87f52686",
38+
"product": {
39+
"name": "Hirschmann Industrial HiVision"
40+
},
41+
"product_version": "patch: 06.0.07"
42+
}
43+
],
44+
"enisaIdVendor": [
45+
{
46+
"id": "1f8618a6-1161-3530-99b5-630b839d30c1",
47+
"vendor": {
48+
"name": "Belden"
49+
}
50+
}
51+
]
52+
}
Lines changed: 59 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,59 @@
1+
{
2+
"id": "EUVD-2017-18955",
3+
"enisaUuid": "dfe82a67-0715-38c3-be83-dded8b54950a",
4+
"description": "Hirschmann HiLCOS products OpenBAT, BAT450, WLC, BAT867 contains a firewall filtering vulnerability that fails to correctly filter IPv4 multicast and broadcast traffic when management IP address filtering is disabled, allowing configured filter rules to be bypassed. Attackers with network access can inject or observe multicast and broadcast packets that should have been blocked by the firewall.",
5+
"datePublished": "Apr 3, 2026, 10:47:07 PM",
6+
"dateUpdated": "Apr 3, 2026, 10:47:07 PM",
7+
"baseScore": 5.9,
8+
"baseScoreVersion": "4.0",
9+
"baseScoreVector": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N",
10+
"references": "https://assets.belden.com/m/11a07596f0bf1018/original/Security-Bulletin-IPv4-Multicast-HiLCOS-Layer-2-Firewall-BSECV-2017-03.pdf\nhttps://www.vulncheck.com/advisories/hirschmann-hilcos-layer-2-firewall-multicast-broadcast-traffic-bypass\n",
11+
"aliases": "CVE-2017-20233\n",
12+
"assigner": "VulnCheck",
13+
"epss": 0.0,
14+
"enisaIdProduct": [
15+
{
16+
"id": "0db70f42-a11a-37c5-925b-d6e0243f9373",
17+
"product": {
18+
"name": "Hirschmann HiLCOS OpenBAT, BAT450, WLC"
19+
},
20+
"product_version": "0 \u22649.10.5126-REL"
21+
},
22+
{
23+
"id": "2866af21-9419-3311-92f6-bd9f65581ed7",
24+
"product": {
25+
"name": "Hirschmann HiLCOS BAT867"
26+
},
27+
"product_version": "0"
28+
},
29+
{
30+
"id": "7a0a1466-c3af-3cda-9ace-bfbcd9729856",
31+
"product": {
32+
"name": "Hirschmann HiLCOS BAT867"
33+
},
34+
"product_version": "0 \u22649.14.5500-REL"
35+
},
36+
{
37+
"id": "a3d54613-f8c9-3b93-9fb7-95c9150c40e5",
38+
"product": {
39+
"name": "Hirschmann HiLCOS OpenBAT, BAT450, WLC"
40+
},
41+
"product_version": "0 \u22649.12.5500-REL"
42+
},
43+
{
44+
"id": "f2abfbe0-10cc-3232-b01e-56537a1d2654",
45+
"product": {
46+
"name": "Hirschmann HiLCOS OpenBAT, BAT450, WLC"
47+
},
48+
"product_version": ""
49+
}
50+
],
51+
"enisaIdVendor": [
52+
{
53+
"id": "f80e5ded-c1d3-3669-a448-c3cb5807667d",
54+
"vendor": {
55+
"name": "Belden"
56+
}
57+
}
58+
]
59+
}
Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,45 @@
1+
{
2+
"id": "EUVD-2017-18957",
3+
"enisaUuid": "e0f92bef-6e02-306b-a07c-59894b76a61e",
4+
"description": "GarrettCom Magnum 6K and 10K managed switches contain an authentication bypass vulnerability that allows unauthenticated attackers to gain unauthorized access by exploiting a hardcoded string in the authentication mechanism. Attackers can bypass login controls to access administrative functions and sensitive switch configuration without valid credentials.",
5+
"datePublished": "Apr 3, 2026, 10:49:58 PM",
6+
"dateUpdated": "Apr 3, 2026, 10:49:58 PM",
7+
"baseScore": 9.3,
8+
"baseScoreVersion": "4.0",
9+
"baseScoreVector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
10+
"references": "https://assets.belden.com/m/114be964b4651983/original/Security-Bulletin-MNS-6K-10K-GarrettCom-BSECV-2017-08.pdf\nhttps://www.vulncheck.com/advisories/garrettcom-magnum-6k-and-10k-authentication-bypass-via-hardcoded-string\n",
11+
"aliases": "CVE-2017-20234\n",
12+
"assigner": "VulnCheck",
13+
"epss": 0.0,
14+
"enisaIdProduct": [
15+
{
16+
"id": "19466332-e9a9-3ba5-8b47-e026d842268c",
17+
"product": {
18+
"name": "GarrettCom Magnum 6K and 10K Managed Switches"
19+
},
20+
"product_version": "0 \u22644.6.0"
21+
},
22+
{
23+
"id": "62e2005f-27dd-3de5-a473-97cf2a3e552e",
24+
"product": {
25+
"name": "GarrettCom Magnum 6K and 10K Managed Switches"
26+
},
27+
"product_version": "0 \u22644.7.6"
28+
},
29+
{
30+
"id": "d8e7997d-290a-3f6b-8254-424cabcc1b96",
31+
"product": {
32+
"name": "GarrettCom Magnum 6K and 10K Managed Switches"
33+
},
34+
"product_version": "patch: 4.7.7"
35+
}
36+
],
37+
"enisaIdVendor": [
38+
{
39+
"id": "432609c8-53f2-3a08-9763-1a3a0d315413",
40+
"vendor": {
41+
"name": "Belden"
42+
}
43+
}
44+
]
45+
}
Lines changed: 59 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,59 @@
1+
{
2+
"id": "EUVD-2017-18960",
3+
"enisaUuid": "34a9c3bd-dbdf-39af-a65a-0fdbce158c17",
4+
"description": "ProSoft Technology ICX35-HWC version 1.3 and prior cellular gateways contain an authentication bypass vulnerability in the web user interface that allows unauthenticated attackers to gain access to administrative functions without valid credentials. Attackers can bypass the authentication mechanism in affected firmware versions to obtain full administrative access to device configuration and settings.",
5+
"datePublished": "Apr 3, 2026, 10:51:42 PM",
6+
"dateUpdated": "Apr 3, 2026, 10:51:42 PM",
7+
"baseScore": 8.7,
8+
"baseScoreVersion": "4.0",
9+
"baseScoreVector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N",
10+
"references": "https://assets.belden.com/m/1281cac2c9e90abf/original/Security-Bulletin-Authentication-Security-ProSoft-ICX35-BSECV-2017-09.pdf\nhttps://www.vulncheck.com/advisories/prosoft-technology-icx35-hwc-authentication-bypass\n",
11+
"aliases": "CVE-2017-20235\n",
12+
"assigner": "VulnCheck",
13+
"epss": 0.0,
14+
"enisaIdProduct": [
15+
{
16+
"id": "48139ba7-99e9-3f2c-8060-43d2ea101a63",
17+
"product": {
18+
"name": "ICX35-HWC Cellular Gateway"
19+
},
20+
"product_version": "0 \u22641.0"
21+
},
22+
{
23+
"id": "63f82a17-b2c6-3761-a14f-3e47ab19a845",
24+
"product": {
25+
"name": "ICX35-HWC Cellular Gateway"
26+
},
27+
"product_version": "0 \u22641.1"
28+
},
29+
{
30+
"id": "9f220e18-2a25-3bb0-90f5-203d6c20cd3f",
31+
"product": {
32+
"name": "ICX35-HWC Cellular Gateway"
33+
},
34+
"product_version": "0 \u22641.1d"
35+
},
36+
{
37+
"id": "b5fa7b51-561f-3be2-b609-75c9865ba129",
38+
"product": {
39+
"name": "ICX35-HWC Cellular Gateway"
40+
},
41+
"product_version": "0 \u22641.2.x"
42+
},
43+
{
44+
"id": "bc7a3c06-e4f5-3baa-ae37-e635a5ccb310",
45+
"product": {
46+
"name": "ICX35-HWC Cellular Gateway"
47+
},
48+
"product_version": "patch: 1.3"
49+
}
50+
],
51+
"enisaIdVendor": [
52+
{
53+
"id": "f3234d1e-3b9f-3ee3-9f2e-f19d5a57d51e",
54+
"vendor": {
55+
"name": "ProSoft Technology"
56+
}
57+
}
58+
]
59+
}
Lines changed: 59 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,59 @@
1+
{
2+
"id": "EUVD-2017-18961",
3+
"enisaUuid": "e353e856-7866-338a-a74b-837e6d64e293",
4+
"description": "ProSoft Technology ICX35-HWC versions 1.3 and prior cellular gateways contain an input validation vulnerability in the web user interface that allows remote attackers to inject and execute system commands by submitting malicious input through unvalidated fields. Attackers can exploit this vulnerability to gain root privileges and execute arbitrary commands on the device through the accessible web interface.",
5+
"datePublished": "Apr 3, 2026, 10:54:00 PM",
6+
"dateUpdated": "Apr 3, 2026, 10:54:00 PM",
7+
"baseScore": 9.3,
8+
"baseScoreVersion": "4.0",
9+
"baseScoreVector": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
10+
"references": "https://assets.belden.com/m/1116a05ab702b2ba/original/Security-Bulletin-User-Interface-ProSoft-ICX35-BSECV-2017-10.pdf\nhttps://www.vulncheck.com/advisories/prosoft-technology-icx35-hwc-command-injection-via-web-interface\n",
11+
"aliases": "CVE-2017-20236\n",
12+
"assigner": "VulnCheck",
13+
"epss": 0.0,
14+
"enisaIdProduct": [
15+
{
16+
"id": "0baf7040-3083-3888-9fb0-27d42b0952ff",
17+
"product": {
18+
"name": "ICX35-HWC Cellular Gateway"
19+
},
20+
"product_version": "0 \u22641.1"
21+
},
22+
{
23+
"id": "17470f67-b46c-3d1a-803d-bd1b2e7bbc49",
24+
"product": {
25+
"name": "ICX35-HWC Cellular Gateway"
26+
},
27+
"product_version": "0 \u22641.2.x"
28+
},
29+
{
30+
"id": "260926e5-393e-38f9-89ab-b94236be4777",
31+
"product": {
32+
"name": "ICX35-HWC Cellular Gateway"
33+
},
34+
"product_version": "patch: 1.3"
35+
},
36+
{
37+
"id": "791992a3-659f-30e8-9d31-ee8a48f64bd0",
38+
"product": {
39+
"name": "ICX35-HWC Cellular Gateway"
40+
},
41+
"product_version": "0 \u22641.0"
42+
},
43+
{
44+
"id": "85365c6c-dcd6-3051-bff9-fcc74aaf7cc9",
45+
"product": {
46+
"name": "ICX35-HWC Cellular Gateway"
47+
},
48+
"product_version": "0 \u22641.1d"
49+
}
50+
],
51+
"enisaIdVendor": [
52+
{
53+
"id": "13c8f38a-58cf-3f79-92a9-dcded932fc0f",
54+
"vendor": {
55+
"name": "ProSoft Technology"
56+
}
57+
}
58+
]
59+
}

0 commit comments

Comments
 (0)