Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-0010

Insertion of Sensitive Information into Log File vulnerability in ABB QCS 800xA, ABB QCS AC450, ABB Platform Engineering Tools.

An attacker, who already has local access to the QCS nodes, could successfully obtain the password for a system user account. Using this information, the attacker could have the potential to exploit this vulnerability to gain control of system nodes.

This issue affects QCS 800xA: from 1.0;0 through 6.1SP2; QCS AC450: from 1.0;0 through 5.1SP2; Platform Engineering Tools: from 1.0:0 through 2.3.0.

CVE
#vulnerability#windows#pdf#auth

%PDF-1.4 %���� 1 0 obj << /Author (Apala Ray) /CreationDate (D:20230518104106+01’00’) /Creator (PDF-XChange Office Addin) /CreatorTool (PDF-XChange Standard \(9.4 build 363\) [GDI] [Windows 10 Enterprise x64 \(Build 19044\)]) /ModDate (D:20230518104158+01’00’) /Producer (PDF-XChange Standard \(9.4 build 363\) [GDI] [Windows 10 Enterprise x64 \(Build 19044\)]) /Subject (QCS 800xA) /Title (Vulnerability identified in system log files) >> endobj 2 0 obj << /Metadata 3 0 R /Outlines 4 0 R /Pages 5 0 R /Type /Catalog >> endobj 3 0 obj << /Length 3513 /Subtype /XML /Type /Metadata >> stream application/pdf Vulnerability identified in system log files QCS 800xA Apala Ray uuid:92d30e0f-726a-49ce-931f-a35b8abc621a uuid:de3dc655-e966-4467-9b6c-d6bbb759cb1a PDF-XChange Office Addin 2023-05-18T10:41:06+01:00 2023-05-18T10:41:58+01:00 PDF-XChange Standard (9.4 build 363) [GDI] [Windows 10 Enterprise x64 (Build 19044)] PDF-XChange Standard (9.4 build 363) [GDI] [Windows 10 Enterprise x64 (Build 19044)] endstream endobj 4 0 obj << /Count 22 /First 6 0 R /Last 7 0 R >> endobj 5 0 obj << /Count 6 /Kids [8 0 R 9 0 R 10 0 R 11 0 R 12 0 R 13 0 R] /Type /Pages >> endobj 6 0 obj << /A << /D [9 0 R /XYZ 63.75 749 0] /S /GoTo >> /C [0 0 0] /Next 14 0 R /Parent 4 0 R /Title (Purpose) >> endobj 7 0 obj << /A << /D [13 0 R /XYZ 63.75 749 0] /S /GoTo >> /C [0 0 0] /Parent 4 0 R /Prev 15 0 R /Title (Revision history) >> endobj 8 0 obj << /Contents 16 0 R /MediaBox [0 0 595.2 841.92] /Parent 5 0 R /Resources << /Font << /F0 17 0 R /F1 18 0 R /F2 19 0 R >> >> /Type /Page >> endobj 9 0 obj << /Contents 20 0 R /MediaBox [0 0 595.2 841.92] /Parent 5 0 R /Resources << /Font << /F0 17 0 R /F1 18 0 R >> >> /Type /Page >> endobj 10 0 obj << /Annots [21 0 R 22 0 R 23 0 R] /Contents 24 0 R /MediaBox [0 0 595.2 841.92] /Parent 5 0 R /Resources << /Font << /F0 17 0 R /F1 18 0 R >> >> /Type /Page >> endobj 11 0 obj << /Contents 25 0 R /MediaBox [0 0 595.2 841.92] /Parent 5 0 R /Resources << /Font << /F0 17 0 R /F1 18 0 R >> >> /Type /Page >> endobj 12 0 obj << /Annots [26 0 R 27 0 R 28 0 R] /Contents 29 0 R /MediaBox [0 0 595.2 841.92] /Parent 5 0 R /Resources << /Font << /F0 17 0 R /F1 18 0 R >> >> /Type /Page >> endobj 13 0 obj << /Contents 30 0 R /MediaBox [0 0 595.2 841.92] /Parent 5 0 R /Resources << /Font << /F0 17 0 R /F1 18 0 R >> >> /Type /Page >> endobj 14 0 obj << /A << /D [9 0 R /XYZ 63.75 445.25 0] /S /GoTo >> /C [0 0 0] /Next 31 0 R /Parent 4 0 R /Prev 6 0 R /Title (Affected products) >> endobj 15 0 obj << /A << /D [12 0 R /XYZ 63.75 176.75 0] /S /GoTo >> /C [0 0 0] /Next 7 0 R /Parent 4 0 R /Prev 32 0 R /Title (Support) >> endobj 16 0 obj << /Filter /FlateDecode /Length 2974 >> stream x�uXMs�F��W�qf�@� �An��Ty�6�،�R� ���(�~��g���A����~��{( JU50>� 4TF�*(�k u�˺i�`w���ڕ�� �R�WH���9��?�Ui=m�N��I�i�Y����]4�h]V���q�� �� 7ږ�ϡI[6fA�����V�!� � ����R���嵆Α’�u�A�\��M��s� J�+5~t�/�`m*ǐ�T%Ӕ��5��g &�۠�ESz�C������3 ��?���7�����MD�4� 9��2�����[�++�2�f=�V�ү���U6���p�3r멕g:{F��pn�F�+���ɨ6 ��� kd#(C��Q�;�{�pP�n(�|{;�u-f�D_t��"ˊ�߰�]�y��i��(�Ȥ��X�q�=�b�+��B�aӘ>_�J޽k ��o�j S\��Q3 ��=y�%ê�D<�P{�1p��;E��N�u��׀�eYL��j�� ,�k"��|p ���N��F��� ���FB��R� K�d>L�UQRr��p�jF ׹�C���g,�1ԫ��*�_�!d���t;$*�u\������|�&�P�ڰ�ٰ�+�� �!�ȉ�z��C"�o�(�#K�� b�X���.y&޸a�W��xi��R -��re�-&A��oc=��4[�/��]��1�u���A�pcv; ��n��TꗔV���ڧөa��N ��v:6L��3�<���-)�Iݲ���-c�8�%汳�dL1��<��C�yf�W:n�D���W�MD�88�i� �B���KQBː��&#������ �Ձ\�3 ae�W6�� �@�����t���9��h�NE “��B1��MF���`�$�����(6�J�_.�g;6��d"’}�ar3�L\S+�k����� N@Qc�,e��`��JczĖ�&Y��K���$�YQ��|��[&[���W]� f�I�2��*��?�v�%)4�ڬ=��˺\�1 >��uf܅�5p9}9�6 ��gb��-17�8,W�N����� R]H( ���j�Fntl�n�~U���99F��)n�����6���bXU�U�M�;’��\��U�J�}��a�.�W�z�G������_�Qn!�_q�s�֗(j’�-&1NN�"�l�S��H<>B޷�3�W-��L=�,�gbEϽ�K]�E�����0�W�ܦ ��/��x�4��h��H��Ì)�Ƚhȅ5�[[]ǯ�> O=�c����Wx(^|����F�#�RU�݁��h�`�7���~P���x�>A���v��M��֊���⭬��EZ%���GYUb+��Az%�}/M �(%�tZ�KW�_>Ik��MFK�QKg�j���ܔ��lP��t�������, �ŇO�p���,*-~��5�{ڬpgp(G�Ž���)p������deŝl�ؾ�#ʠ��S~F[�����BK]��ܗ��+���T�Rq�Ɗ�QΈ��8�QȈ0���ea�(��t��#W֊���Tb�Q�Zt�0FL�( cŗn_��"7vઊ%���<��W��A+��A�o��q��)'p���Ը5Q��i�"�^k���_)��e���dQy���/��F|����w�Wt�w���g��9�( �į���)������~���_�Е��)�FL�u�~���ӥۇ�����(���`f�Z�=���’����� �����V��-����>���P8 ��)������.$�B<�VUf��aF���4^t����x/UZ�=v���sg��9�c� �/RW�c�N�xb�� �:z�h1�’M0���Q��ap1�-�xy�੟q�q�[p�s���o��L��a:�~x;�B�|/���N�J��<\Ȩ k�<޺=�m�����>9�p��ܓ�5b��g��’1��e���Pa����q��_Hu����!�#.<���8��j1?K���8v8��u$o�� i���$���S���H����^�N��m��� R����x�1Q�.�`8�Wv#��qI#����� R��˞}� ��� �AvNx��}��zm�Y” �U���h�m�$�� �IR��4�8v@�������1\�G>.��&eڱ��o+� Z�m��۹å\��*�{�aڅ|U _���p�{� ݈�����;N���g8��� ��Jh��u�/�m�~���v���]�sb.�i}� c�ic��؞Ј|’-����n�#@˟I${���������n��&�0���}�}��f��}���’Q5��@�� �dƾ�p�8etL�����c~µ��`�3�r�a����`��Ke������D���3���cv�Ġq]i�8���\_�������v�’�����@U��� �:�h’_��|\"� �:%�7x7���3��o��ԑ����� ���� �֎xq�NN�’�`��}7����fK�7$���� ő5K�ȫ(�$��,���.=�>z��{��z��8����*���u���?.L-���R�� �*�a���;6���Ӎ��蝱o�(��T.Ϯ��~{���.�����G�Ke+�D�u�� B�t#��w’�]�衃u�QVJ ��_���� vÕ 5�h��J?�h�p��i���B���@�3G.W�~��F��p��(cK[z�|��b��z�n��3��򇓘ΦVS��4�BW �?#1������d �\����#��g�P.�JEm��]����7k� Ӹ����U������6�����u������.�yT��’4��U+�����?1.���� �|ʫ3��)�[JӠm�H��

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907