Browse all 4 CVE security advisories affecting SICUNET. AI-powered Chinese analysis, POCs, and references for each vulnerability.
SICUNET operates as a network management platform primarily focused on enterprise infrastructure monitoring and control. Historically, the platform has been susceptible to multiple remote code execution vulnerabilities, cross-site scripting flaws, and privilege escalation issues, as evidenced by its four recorded CVEs. These vulnerabilities often stem from insufficient input validation and improper access controls in web interfaces and administrative functions. While no major public security incidents have been widely documented, the consistent pattern of vulnerabilities suggests potential risks for organizations relying on the platform for critical network operations, particularly in environments with exposed internet-facing components.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2017-20040 | SICUNET Access Controller Password Storage cleartext storage — Access ControllerCWE-312 | 5.9 | Medium | 2022-06-11 |
| CVE-2017-20039 | SICUNET Access Controller hard-coded password — Access ControllerCWE-259 | 9.8 | Critical | 2022-06-11 |
| CVE-2017-20038 | SICUNET Access Controller card_scan_decoder.php privileges management — Access ControllerCWE-269 | 6.3 | Medium | 2022-06-11 |
| CVE-2017-20037 | SICUNET Access Controller privileges management — Access ControllerCWE-269 | 6.3 | Medium | 2022-06-11 |
This page lists every published CVE security advisory associated with SICUNET. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.