VDE-2020-045
Mai 14, 2025, 2:53 nachm.
The reported vulnerability allows an attacker who has network access to the device to execute code with specially crafted packets.
VDE-2020-046
Mai 14, 2025, 2:28 nachm.
For mGuard devices with integrated switch on the LAN side, single switch ports can be disabled by device configuration. After a reboot these ports get functional independent from their configuration …
VDE-2020-049
Dez. 17, 2020, 10:00 vorm.
Multiple vulnerabilities have been identified in PLCnext Control devices. Please consult the aforementioned CVE-IDs.
VDE-2020-047
Mai 14, 2025, 2:28 nachm.
Uncontrolled Resource Consumption can be exploited to cause the HMI to become unresponsive and not accurately update the display content (Denial of Service).
VDE-2020-022
Mai 14, 2025, 3:00 nachm.
The firmware release has a dynamic token for each request submitted to the server, which makes repeating requests and analysis complex enough. Nevertheless, it's possible and during the analysis it …
VDE-2020-021
April 11, 2025, 9:00 vorm.
The affected device has a web-based user interface with a role-based access system. Users with different roles have different write and read privileges. The access system is based on dynamic …
VDE-2020-037
Mai 22, 2025, 3:03 nachm.
The default installation path and its permissions for the TwinCAT runtime allow a local user to replace or modify executables other users of the same system might execute. The issue …
VDE-2020-031
Mai 14, 2025, 3:00 nachm.
For further Information please refer to WIBU Advisories directly at https://wibu.com/support/security-advisories.html and the aforementioned CVE-IDs.