Product:

Feverwarn_firmware

(Machinesense)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 6
Date Id Summary Products Score Patch Annotated
2024-02-01 CVE-2023-49115 MachineSense devices use unauthenticated MQTT messaging to monitor devices and remote viewing of sensor data by users. Feverwarn_firmware 7.5
2024-02-01 CVE-2023-49610 MachineSense FeverWarn Raspberry Pi-based devices lack input sanitization, which could allow an attacker on an adjacent network to send a message running commands or could overflow the stack. Feverwarn_firmware 8.1
2024-02-01 CVE-2023-46706 Multiple MachineSense devices have credentials unable to be changed by the user or administrator. Feverwarn_firmware 9.8
2024-02-01 CVE-2023-47867 MachineSense FeverWarn devices are configured as Wi-Fi hosts in a way that attackers within range could connect to the device's web services and compromise the device. Feverwarn_firmware 8.8
2024-02-01 CVE-2023-49617 The MachineSense application programmable interface (API) is improperly protected and can be accessed without authentication. A remote attacker could retrieve and modify sensitive information without any authentication. Feverwarn_firmware 9.1
2024-02-01 CVE-2023-6221 The cloud provider MachineSense uses for integration and deployment for multiple MachineSense devices, such as the programmable logic controller (PLC), PumpSense, PowerAnalyzer, FeverWarn, and others is insufficiently protected against unauthorized access. An attacker with access to the internal procedures could view source code, secret credentials, and more. Feverwarn_firmware 6.5