Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Belden | Hirschmann HiLCOS OpenBAT | 3.80-REL | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2017-20237 | 9.8 CRITICAL | Hirschmann Industrial HiVision Authentication Bypass Remote Code Execution |
| CVE-2018-25237 | 9.8 CRITICAL | Hirschmann HiSecOS Buffer Overflow via HTTPS Login |
| CVE-2018-25236 | 9.8 CRITICAL | Hirschmann HiOS HiSecOS Authentication Bypass via HTTP Management |
| CVE-2017-20234 | 9.8 CRITICAL | GarrettCom Magnum 6K and 10K Authentication Bypass via Hardcoded String |
| CVE-2016-15058 | 8.1 HIGH | Hirschmann HiLCOS Classic Platform Password Exposure via SNMP |
| CVE-2020-37216 | 7.5 HIGH | Hirschmann HiOS EtherNet/IP Stack Denial of Service |
| CVE-2015-10148 | 7.5 HIGH | Hirschmann HiLCOS Hard-coded Credentials SSH SSL Keys |
| CVE-2022-4987 | 7.3 HIGH | Hirschmann Industrial HiVision External Application Path Hijacking Leading to Arbitrary Co |
| CVE-2017-20238 | 7.1 HIGH | Hirschmann Industrial HiVision Improper Authorization Privilege Escalation |
| CVE-2017-20233 | 5.4 MEDIUM | Hirschmann HiLCOS Layer-2 Firewall Multicast Broadcast Traffic Bypass |
No comments yet