Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Feverwarn_firmware
(Machinesense)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 6 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2024-02-01 | CVE-2023-49115 | MachineSense devices use unauthenticated MQTT messaging to monitor devices and remote viewing of sensor data by users. | Feverwarn_firmware | 7.5 | ||
2024-02-01 | CVE-2023-49610 | MachineSense FeverWarn Raspberry Pi-based devices lack input sanitization, which could allow an attacker on an adjacent network to send a message running commands or could overflow the stack. | Feverwarn_firmware | 8.1 | ||
2024-02-01 | CVE-2023-46706 | Multiple MachineSense devices have credentials unable to be changed by the user or administrator. | Feverwarn_firmware | 9.8 | ||
2024-02-01 | CVE-2023-47867 | MachineSense FeverWarn devices are configured as Wi-Fi hosts in a way that attackers within range could connect to the device's web services and compromise the device. | Feverwarn_firmware | 8.8 | ||
2024-02-01 | CVE-2023-49617 | The MachineSense application programmable interface (API) is improperly protected and can be accessed without authentication. A remote attacker could retrieve and modify sensitive information without any authentication. | Feverwarn_firmware | 9.1 | ||
2024-02-01 | CVE-2023-6221 | The cloud provider MachineSense uses for integration and deployment for multiple MachineSense devices, such as the programmable logic controller (PLC), PumpSense, PowerAnalyzer, FeverWarn, and others is insufficiently protected against unauthorized access. An attacker with access to the internal procedures could view source code, secret credentials, and more. | Feverwarn_firmware | 6.5 |