CINXE.COM
Tenable.ot Plugins | Tenable®
<!DOCTYPE html><html lang="en"><head><meta charSet="utf-8"/><title>Tenable.ot Plugins<!-- --> | Tenable®</title><meta name="description" content="Listing all plugins in the Tenable.ot family"/><meta property="og:title" content="Tenable.ot Plugins"/><meta property="og:description" content="Listing all plugins in the Tenable.ot family"/><meta name="twitter:title" content="Tenable.ot Plugins"/><meta name="twitter:description" content="Listing all plugins in the Tenable.ot family"/><meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1"/><meta name="viewport" content="width=device-width, initial-scale=1"/><link rel="apple-touch-icon" sizes="180x180" href="https://www.tenable.com/themes/custom/tenable/images-new/favicons/apple-touch-icon-180x180.png"/><link rel="manifest" href="https://www.tenable.com/themes/custom/tenable/images-new/favicons/manifest.json"/><link rel="icon" href="https://www.tenable.com/themes/custom/tenable/images-new/favicons/favicon.ico" sizes="any"/><link rel="icon" href="https://www.tenable.com/themes/custom/tenable/images-new/favicons/tenable-favicon.svg" type="image/svg+xml"/><meta name="msapplication-config" content="https://www.tenable.com/themes/custom/tenable/images-new/favicons/browserconfig.xml"/><meta name="theme-color" content="#ffffff"/><link rel="canonical" href="https://www.tenable.com/plugins/ot/families/Tenable.ot"/><link rel="alternate" hrefLang="x-default" href="https://www.tenable.com/plugins/ot/families/Tenable.ot"/><link rel="alternate" hrefLang="en" href="https://www.tenable.com/plugins/ot/families/Tenable.ot"/><meta name="next-head-count" content="18"/><script type="text/javascript">window.NREUM||(NREUM={});NREUM.info = {"agent":"","beacon":"bam.nr-data.net","errorBeacon":"bam.nr-data.net","licenseKey":"5febff3e0e","applicationID":"96358297","agentToken":null,"applicationTime":101.374207,"transactionName":"MVBabEEHChVXU0IIXggab11RIBYHW1VBDkMNYEpRHCgBHkJaRU52I2EXF0MKEQFfXkVOahJMSF1uSQIHW1laCFQVGmNeUgsNCk9t","queueTime":0,"ttGuid":"b9cee5781a6cc60a"}; (window.NREUM||(NREUM={})).init={ajax:{deny_list:["bam.nr-data.net"]}};(window.NREUM||(NREUM={})).loader_config={licenseKey:"5febff3e0e",applicationID:"96358297"};;/*! For license information please see nr-loader-rum-1.281.0.min.js.LICENSE.txt */ (()=>{var e,t,r={122:(e,t,r)=>{"use strict";r.d(t,{a:()=>i});var n=r(944);function i(e,t){try{if(!e||"object"!=typeof e)return(0,n.R)(3);if(!t||"object"!=typeof t)return(0,n.R)(4);const r=Object.create(Object.getPrototypeOf(t),Object.getOwnPropertyDescriptors(t)),o=0===Object.keys(r).length?e:r;for(let a in o)if(void 0!==e[a])try{if(null===e[a]){r[a]=null;continue}Array.isArray(e[a])&&Array.isArray(t[a])?r[a]=Array.from(new Set([...e[a],...t[a]])):"object"==typeof e[a]&&"object"==typeof t[a]?r[a]=i(e[a],t[a]):r[a]=e[a]}catch(e){(0,n.R)(1,e)}return r}catch(e){(0,n.R)(2,e)}}},555:(e,t,r)=>{"use strict";r.d(t,{Vp:()=>c,fn:()=>s,x1:()=>u});var n=r(384),i=r(122);const o={beacon:n.NT.beacon,errorBeacon:n.NT.errorBeacon,licenseKey:void 0,applicationID:void 0,sa:void 0,queueTime:void 0,applicationTime:void 0,ttGuid:void 0,user:void 0,account:void 0,product:void 0,extra:void 0,jsAttributes:{},userAttributes:void 0,atts:void 0,transactionName:void 0,tNamePlain:void 0},a={};function s(e){try{const t=c(e);return!!t.licenseKey&&!!t.errorBeacon&&!!t.applicationID}catch(e){return!1}}function c(e){if(!e)throw new Error("All info objects require an agent identifier!");if(!a[e])throw new Error("Info for ".concat(e," was never set"));return a[e]}function u(e,t){if(!e)throw new Error("All info objects require an agent identifier!");a[e]=(0,i.a)(t,o);const r=(0,n.nY)(e);r&&(r.info=a[e])}},217:(e,t,r)=>{"use strict";r.d(t,{D0:()=>h,gD:()=>b,xN:()=>v});r(860).K7.genericEvents;const n="experimental.marks",i="experimental.measures",o="experimental.resources";var a=r(993);const s=e=>{if(!e||"string"!=typeof e)return!1;try{document.createDocumentFragment().querySelector(e)}catch{return!1}return!0};var c=r(614),u=r(944),l=r(384),d=r(122);const f="[data-nr-mask]",g=()=>{const e={feature_flags:[],experimental:{marks:!1,measures:!1,resources:!1},mask_selector:"*",block_selector:"[data-nr-block]",mask_input_options:{color:!1,date:!1,"datetime-local":!1,email:!1,month:!1,number:!1,range:!1,search:!1,tel:!1,text:!1,time:!1,url:!1,week:!1,textarea:!1,select:!1,password:!0}};return{ajax:{deny_list:void 0,block_internal:!0,enabled:!0,autoStart:!0},distributed_tracing:{enabled:void 0,exclude_newrelic_header:void 0,cors_use_newrelic_header:void 0,cors_use_tracecontext_headers:void 0,allowed_origins:void 0},get feature_flags(){return e.feature_flags},set feature_flags(t){e.feature_flags=t},generic_events:{enabled:!0,autoStart:!0},harvest:{interval:30},jserrors:{enabled:!0,autoStart:!0},logging:{enabled:!0,autoStart:!0,level:a.p_.INFO},metrics:{enabled:!0,autoStart:!0},obfuscate:void 0,page_action:{enabled:!0},page_view_event:{enabled:!0,autoStart:!0},page_view_timing:{enabled:!0,autoStart:!0},performance:{get capture_marks(){return e.feature_flags.includes(n)||e.experimental.marks},set capture_marks(t){e.experimental.marks=t},get capture_measures(){return e.feature_flags.includes(i)||e.experimental.measures},set capture_measures(t){e.experimental.measures=t},capture_detail:!0,resources:{get enabled(){return e.feature_flags.includes(o)||e.experimental.resources},set enabled(t){e.experimental.resources=t},asset_types:[],first_party_domains:[],ignore_newrelic:!0}},privacy:{cookies_enabled:!0},proxy:{assets:void 0,beacon:void 0},session:{expiresMs:c.wk,inactiveMs:c.BB},session_replay:{autoStart:!0,enabled:!1,preload:!1,sampling_rate:10,error_sampling_rate:100,collect_fonts:!1,inline_images:!1,fix_stylesheets:!0,mask_all_inputs:!0,get mask_text_selector(){return e.mask_selector},set mask_text_selector(t){s(t)?e.mask_selector="".concat(t,",").concat(f):""===t||null===t?e.mask_selector=f:(0,u.R)(5,t)},get block_class(){return"nr-block"},get ignore_class(){return"nr-ignore"},get mask_text_class(){return"nr-mask"},get block_selector(){return e.block_selector},set block_selector(t){s(t)?e.block_selector+=",".concat(t):""!==t&&(0,u.R)(6,t)},get mask_input_options(){return e.mask_input_options},set mask_input_options(t){t&&"object"==typeof t?e.mask_input_options={...t,password:!0}:(0,u.R)(7,t)}},session_trace:{enabled:!0,autoStart:!0},soft_navigations:{enabled:!0,autoStart:!0},spa:{enabled:!0,autoStart:!0},ssl:void 0,user_actions:{enabled:!0,elementAttributes:["id","className","tagName","type"]}}},p={},m="All configuration objects require an agent identifier!";function h(e){if(!e)throw new Error(m);if(!p[e])throw new Error("Configuration for ".concat(e," was never set"));return p[e]}function v(e,t){if(!e)throw new Error(m);p[e]=(0,d.a)(t,g());const r=(0,l.nY)(e);r&&(r.init=p[e])}function b(e,t){if(!e)throw new Error(m);var r=h(e);if(r){for(var n=t.split("."),i=0;i<n.length-1;i++)if("object"!=typeof(r=r[n[i]]))return;r=r[n[n.length-1]]}return r}},371:(e,t,r)=>{"use strict";r.d(t,{V:()=>f,f:()=>d});var n=r(122),i=r(384),o=r(154),a=r(324);let s=0;const c={buildEnv:a.F3,distMethod:a.Xs,version:a.xv,originTime:o.WN},u={customTransaction:void 0,disabled:!1,isolatedBacklog:!1,loaderType:void 0,maxBytes:3e4,onerror:void 0,ptid:void 0,releaseIds:{},appMetadata:{},session:void 0,denyList:void 0,timeKeeper:void 0,obfuscator:void 0,harvester:void 0},l={};function d(e){if(!e)throw new Error("All runtime objects require an agent identifier!");if(!l[e])throw new Error("Runtime for ".concat(e," was never set"));return l[e]}function f(e,t){if(!e)throw new Error("All runtime objects require an agent identifier!");l[e]={...(0,n.a)(t,u),...c},Object.hasOwnProperty.call(l[e],"harvestCount")||Object.defineProperty(l[e],"harvestCount",{get:()=>++s});const r=(0,i.nY)(e);r&&(r.runtime=l[e])}},324:(e,t,r)=>{"use strict";r.d(t,{F3:()=>i,Xs:()=>o,xv:()=>n});const n="1.281.0",i="PROD",o="CDN"},154:(e,t,r)=>{"use strict";r.d(t,{OF:()=>c,RI:()=>i,WN:()=>l,bv:()=>o,gm:()=>a,mw:()=>s,sb:()=>u});var n=r(863);const i="undefined"!=typeof window&&!!window.document,o="undefined"!=typeof WorkerGlobalScope&&("undefined"!=typeof self&&self instanceof WorkerGlobalScope&&self.navigator instanceof WorkerNavigator||"undefined"!=typeof globalThis&&globalThis instanceof WorkerGlobalScope&&globalThis.navigator instanceof WorkerNavigator),a=i?window:"undefined"!=typeof WorkerGlobalScope&&("undefined"!=typeof self&&self instanceof WorkerGlobalScope&&self||"undefined"!=typeof globalThis&&globalThis instanceof WorkerGlobalScope&&globalThis),s=Boolean("hidden"===a?.document?.visibilityState),c=/iPad|iPhone|iPod/.test(a.navigator?.userAgent),u=c&&"undefined"==typeof SharedWorker,l=((()=>{const e=a.navigator?.userAgent?.match(/Firefox[/\s](\d+\.\d+)/);Array.isArray(e)&&e.length>=2&&e[1]})(),Date.now()-(0,n.t)())},687:(e,t,r)=>{"use strict";r.d(t,{Ak:()=>c,Ze:()=>d,x3:()=>u});var n=r(836),i=r(606),o=r(860),a=r(646);const s={};function c(e,t){const r={staged:!1,priority:o.P3[t]||0};l(e),s[e].get(t)||s[e].set(t,r)}function u(e,t){e&&s[e]&&(s[e].get(t)&&s[e].delete(t),g(e,t,!1),s[e].size&&f(e))}function l(e){if(!e)throw new Error("agentIdentifier required");s[e]||(s[e]=new Map)}function d(e="",t="feature",r=!1){if(l(e),!e||!s[e].get(t)||r)return g(e,t);s[e].get(t).staged=!0,f(e)}function f(e){const t=Array.from(s[e]);t.every((([e,t])=>t.staged))&&(t.sort(((e,t)=>e[1].priority-t[1].priority)),t.forEach((([t])=>{s[e].delete(t),g(e,t)})))}function g(e,t,r=!0){const o=e?n.ee.get(e):n.ee,s=i.i.handlers;if(!o.aborted&&o.backlog&&s){if(r){const e=o.backlog[t],r=s[t];if(r){for(let t=0;e&&t<e.length;++t)p(e[t],r);Object.entries(r).forEach((([e,t])=>{Object.values(t||{}).forEach((t=>{t[0]?.on&&t[0]?.context()instanceof a.y&&t[0].on(e,t[1])}))}))}}o.isolatedBacklog||delete s[t],o.backlog[t]=null,o.emit("drain-"+t,[])}}function p(e,t){var r=e[1];Object.values(t[r]||{}).forEach((t=>{var r=e[0];if(t[0]===r){var n=t[1],i=e[3],o=e[2];n.apply(i,o)}}))}},836:(e,t,r)=>{"use strict";r.d(t,{P:()=>c,ee:()=>u});var n=r(384),i=r(990),o=r(371),a=r(646),s=r(607);const c="nr@context:".concat(s.W),u=function e(t,r){var n={},s={},l={},d=!1;try{d=16===r.length&&(0,o.f)(r).isolatedBacklog}catch(e){}var f={on:p,addEventListener:p,removeEventListener:function(e,t){var r=n[e];if(!r)return;for(var i=0;i<r.length;i++)r[i]===t&&r.splice(i,1)},emit:function(e,r,n,i,o){!1!==o&&(o=!0);if(u.aborted&&!i)return;t&&o&&t.emit(e,r,n);for(var a=g(n),c=m(e),l=c.length,d=0;d<l;d++)c[d].apply(a,r);var p=v()[s[e]];p&&p.push([f,e,r,a]);return a},get:h,listeners:m,context:g,buffer:function(e,t){const r=v();if(t=t||"feature",f.aborted)return;Object.entries(e||{}).forEach((([e,n])=>{s[n]=t,t in r||(r[t]=[])}))},abort:function(){f._aborted=!0,Object.keys(f.backlog).forEach((e=>{delete f.backlog[e]}))},isBuffering:function(e){return!!v()[s[e]]},debugId:r,backlog:d?{}:t&&"object"==typeof t.backlog?t.backlog:{},isolatedBacklog:d};return Object.defineProperty(f,"aborted",{get:()=>{let e=f._aborted||!1;return e||(t&&(e=t.aborted),e)}}),f;function g(e){return e&&e instanceof a.y?e:e?(0,i.I)(e,c,(()=>new a.y(c))):new a.y(c)}function p(e,t){n[e]=m(e).concat(t)}function m(e){return n[e]||[]}function h(t){return l[t]=l[t]||e(f,t)}function v(){return f.backlog}}(void 0,"globalEE"),l=(0,n.Zm)();l.ee||(l.ee=u)},646:(e,t,r)=>{"use strict";r.d(t,{y:()=>n});class n{constructor(e){this.contextId=e}}},908:(e,t,r)=>{"use strict";r.d(t,{d:()=>n,p:()=>i});var n=r(836).ee.get("handle");function i(e,t,r,i,o){o?(o.buffer([e],i),o.emit(e,t,r)):(n.buffer([e],i),n.emit(e,t,r))}},606:(e,t,r)=>{"use strict";r.d(t,{i:()=>o});var n=r(908);o.on=a;var i=o.handlers={};function o(e,t,r,o){a(o||n.d,i,e,t,r)}function a(e,t,r,i,o){o||(o="feature"),e||(e=n.d);var a=t[o]=t[o]||{};(a[r]=a[r]||[]).push([e,i])}},878:(e,t,r)=>{"use strict";function n(e,t){return{capture:e,passive:!1,signal:t}}function i(e,t,r=!1,i){window.addEventListener(e,t,n(r,i))}function o(e,t,r=!1,i){document.addEventListener(e,t,n(r,i))}r.d(t,{DD:()=>o,jT:()=>n,sp:()=>i})},607:(e,t,r)=>{"use strict";r.d(t,{W:()=>n});const n=(0,r(566).bz)()},566:(e,t,r)=>{"use strict";r.d(t,{LA:()=>s,bz:()=>a});var n=r(154);const i="xxxxxxxx-xxxx-4xxx-yxxx-xxxxxxxxxxxx";function o(e,t){return e?15&e[t]:16*Math.random()|0}function a(){const e=n.gm?.crypto||n.gm?.msCrypto;let t,r=0;return e&&e.getRandomValues&&(t=e.getRandomValues(new Uint8Array(30))),i.split("").map((e=>"x"===e?o(t,r++).toString(16):"y"===e?(3&o()|8).toString(16):e)).join("")}function s(e){const t=n.gm?.crypto||n.gm?.msCrypto;let r,i=0;t&&t.getRandomValues&&(r=t.getRandomValues(new Uint8Array(e)));const a=[];for(var s=0;s<e;s++)a.push(o(r,i++).toString(16));return a.join("")}},614:(e,t,r)=>{"use strict";r.d(t,{BB:()=>a,H3:()=>n,g:()=>u,iL:()=>c,tS:()=>s,uh:()=>i,wk:()=>o});const n="NRBA",i="SESSION",o=144e5,a=18e5,s={STARTED:"session-started",PAUSE:"session-pause",RESET:"session-reset",RESUME:"session-resume",UPDATE:"session-update"},c={SAME_TAB:"same-tab",CROSS_TAB:"cross-tab"},u={OFF:0,FULL:1,ERROR:2}},863:(e,t,r)=>{"use strict";function n(){return Math.floor(performance.now())}r.d(t,{t:()=>n})},944:(e,t,r)=>{"use strict";function n(e,t){"function"==typeof console.debug&&console.debug("New Relic Warning: https://github.com/newrelic/newrelic-browser-agent/blob/main/docs/warning-codes.md#".concat(e),t)}r.d(t,{R:()=>n})},284:(e,t,r)=>{"use strict";r.d(t,{t:()=>c,B:()=>s});var n=r(836),i=r(154);const o="newrelic";const a=new Set,s={};function c(e,t){const r=n.ee.get(t);s[t]??={},e&&"object"==typeof e&&(a.has(t)||(r.emit("rumresp",[e]),s[t]=e,a.add(t),function(e={}){try{i.gm.dispatchEvent(new CustomEvent(o,{detail:e}))}catch(e){}}({loaded:!0})))}},990:(e,t,r)=>{"use strict";r.d(t,{I:()=>i});var n=Object.prototype.hasOwnProperty;function i(e,t,r){if(n.call(e,t))return e[t];var i=r();if(Object.defineProperty&&Object.keys)try{return Object.defineProperty(e,t,{value:i,writable:!0,enumerable:!1}),i}catch(e){}return e[t]=i,i}},389:(e,t,r)=>{"use strict";function n(e,t=500,r={}){const n=r?.leading||!1;let i;return(...r)=>{n&&void 0===i&&(e.apply(this,r),i=setTimeout((()=>{i=clearTimeout(i)}),t)),n||(clearTimeout(i),i=setTimeout((()=>{e.apply(this,r)}),t))}}function i(e){let t=!1;return(...r)=>{t||(t=!0,e.apply(this,r))}}r.d(t,{J:()=>i,s:()=>n})},289:(e,t,r)=>{"use strict";r.d(t,{GG:()=>o,sB:()=>a});var n=r(878);function i(){return"undefined"==typeof document||"complete"===document.readyState}function o(e,t){if(i())return e();(0,n.sp)("load",e,t)}function a(e){if(i())return e();(0,n.DD)("DOMContentLoaded",e)}},384:(e,t,r)=>{"use strict";r.d(t,{NT:()=>o,US:()=>l,Zm:()=>a,bQ:()=>c,dV:()=>s,nY:()=>u,pV:()=>d});var n=r(154),i=r(863);const o={beacon:"bam.nr-data.net",errorBeacon:"bam.nr-data.net"};function a(){return n.gm.NREUM||(n.gm.NREUM={}),void 0===n.gm.newrelic&&(n.gm.newrelic=n.gm.NREUM),n.gm.NREUM}function s(){let e=a();return e.o||(e.o={ST:n.gm.setTimeout,SI:n.gm.setImmediate,CT:n.gm.clearTimeout,XHR:n.gm.XMLHttpRequest,REQ:n.gm.Request,EV:n.gm.Event,PR:n.gm.Promise,MO:n.gm.MutationObserver,FETCH:n.gm.fetch,WS:n.gm.WebSocket}),e}function c(e,t){let r=a();r.initializedAgents??={},t.initializedAt={ms:(0,i.t)(),date:new Date},r.initializedAgents[e]=t}function u(e){let t=a();return t.initializedAgents?.[e]}function l(e,t){a()[e]=t}function d(){return function(){let e=a();const t=e.info||{};e.info={beacon:o.beacon,errorBeacon:o.errorBeacon,...t}}(),function(){let e=a();const t=e.init||{};e.init={...t}}(),s(),function(){let e=a();const t=e.loader_config||{};e.loader_config={...t}}(),a()}},843:(e,t,r)=>{"use strict";r.d(t,{u:()=>i});var n=r(878);function i(e,t=!1,r,i){(0,n.DD)("visibilitychange",(function(){if(t)return void("hidden"===document.visibilityState&&e());e(document.visibilityState)}),r,i)}},434:(e,t,r)=>{"use strict";r.d(t,{Jt:()=>o,YM:()=>c});var n=r(836),i=r(607);const o="nr@original:".concat(i.W);var a=Object.prototype.hasOwnProperty,s=!1;function c(e,t){return e||(e=n.ee),r.inPlace=function(e,t,n,i,o){n||(n="");const a="-"===n.charAt(0);for(let s=0;s<t.length;s++){const c=t[s],u=e[c];l(u)||(e[c]=r(u,a?c+n:n,i,c,o))}},r.flag=o,r;function r(t,r,n,s,c){return l(t)?t:(r||(r=""),nrWrapper[o]=t,function(e,t,r){if(Object.defineProperty&&Object.keys)try{return Object.keys(e).forEach((function(r){Object.defineProperty(t,r,{get:function(){return e[r]},set:function(t){return e[r]=t,t}})})),t}catch(e){u([e],r)}for(var n in e)a.call(e,n)&&(t[n]=e[n])}(t,nrWrapper,e),nrWrapper);function nrWrapper(){var o,a,l,d;try{a=this,o=[...arguments],l="function"==typeof n?n(o,a):n||{}}catch(t){u([t,"",[o,a,s],l],e)}i(r+"start",[o,a,s],l,c);try{return d=t.apply(a,o)}catch(e){throw i(r+"err",[o,a,e],l,c),e}finally{i(r+"end",[o,a,d],l,c)}}}function i(r,n,i,o){if(!s||t){var a=s;s=!0;try{e.emit(r,n,i,t,o)}catch(t){u([t,r,n,i],e)}s=a}}}function u(e,t){t||(t=n.ee);try{t.emit("internal-error",e)}catch(e){}}function l(e){return!(e&&"function"==typeof e&&e.apply&&!e[o])}},993:(e,t,r)=>{"use strict";r.d(t,{ET:()=>o,p_:()=>i});var n=r(860);const i={ERROR:"ERROR",WARN:"WARN",INFO:"INFO",DEBUG:"DEBUG",TRACE:"TRACE"},o="log";n.K7.logging},969:(e,t,r)=>{"use strict";r.d(t,{TZ:()=>n,XG:()=>s,rs:()=>i,xV:()=>a,z_:()=>o});const n=r(860).K7.metrics,i="sm",o="cm",a="storeSupportabilityMetrics",s="storeEventMetrics"},630:(e,t,r)=>{"use strict";r.d(t,{T:()=>n});const n=r(860).K7.pageViewEvent},782:(e,t,r)=>{"use strict";r.d(t,{T:()=>n});const n=r(860).K7.pageViewTiming},344:(e,t,r)=>{"use strict";r.d(t,{G4:()=>i});var n=r(614);r(860).K7.sessionReplay;const i={RECORD:"recordReplay",PAUSE:"pauseReplay",REPLAY_RUNNING:"replayRunning",ERROR_DURING_REPLAY:"errorDuringReplay"};n.g.ERROR,n.g.FULL,n.g.OFF},234:(e,t,r)=>{"use strict";r.d(t,{W:()=>o});var n=r(836),i=r(687);class o{constructor(e,t){this.agentIdentifier=e,this.ee=n.ee.get(e),this.featureName=t,this.blocked=!1}deregisterDrain(){(0,i.x3)(this.agentIdentifier,this.featureName)}}},603:(e,t,r)=>{"use strict";r.d(t,{j:()=>K});var n=r(860),i=r(555),o=r(371),a=r(908),s=r(836),c=r(687),u=r(289),l=r(154),d=r(944),f=r(969),g=r(384),p=r(344);const m=["setErrorHandler","finished","addToTrace","addRelease","recordCustomEvent","addPageAction","setCurrentRouteName","setPageViewName","setCustomAttribute","interaction","noticeError","setUserId","setApplicationVersion","start",p.G4.RECORD,p.G4.PAUSE,"log","wrapLogger"],h=["setErrorHandler","finished","addToTrace","addRelease"];var v=r(863),b=r(614),y=r(993);var w=r(646),A=r(434);const R=new Map;function _(e,t,r,n){if("object"!=typeof t||!t||"string"!=typeof r||!r||"function"!=typeof t[r])return(0,d.R)(29);const i=function(e){return(e||s.ee).get("logger")}(e),o=(0,A.YM)(i),a=new w.y(s.P);a.level=n.level,a.customAttributes=n.customAttributes;const c=t[r]?.[A.Jt]||t[r];return R.set(c,a),o.inPlace(t,[r],"wrap-logger-",(()=>R.get(c))),i}function E(){const e=(0,g.pV)();m.forEach((t=>{e[t]=(...r)=>function(t,...r){let n=[];return Object.values(e.initializedAgents).forEach((e=>{e&&e.api?e.exposed&&e.api[t]&&n.push(e.api[t](...r)):(0,d.R)(38,t)})),n.length>1?n:n[0]}(t,...r)}))}const x={};function N(e,t,g=!1){t||(0,c.Ak)(e,"api");const m={};var w=s.ee.get(e),A=w.get("tracer");x[e]=b.g.OFF,w.on(p.G4.REPLAY_RUNNING,(t=>{x[e]=t}));var R="api-",E=R+"ixn-";function N(t,r,n,o){const a=(0,i.Vp)(e);return null===r?delete a.jsAttributes[t]:(0,i.x1)(e,{...a,jsAttributes:{...a.jsAttributes,[t]:r}}),j(R,n,!0,o||null===r?"session":void 0)(t,r)}function k(){}m.log=function(e,{customAttributes:t={},level:r=y.p_.INFO}={}){(0,a.p)(f.xV,["API/log/called"],void 0,n.K7.metrics,w),function(e,t,r={},i=y.p_.INFO){(0,a.p)(f.xV,["API/logging/".concat(i.toLowerCase(),"/called")],void 0,n.K7.metrics,e),(0,a.p)(y.ET,[(0,v.t)(),t,r,i],void 0,n.K7.logging,e)}(w,e,t,r)},m.wrapLogger=(e,t,{customAttributes:r={},level:i=y.p_.INFO}={})=>{(0,a.p)(f.xV,["API/wrapLogger/called"],void 0,n.K7.metrics,w),_(w,e,t,{customAttributes:r,level:i})},h.forEach((e=>{m[e]=j(R,e,!0,"api")})),m.addPageAction=j(R,"addPageAction",!0,n.K7.genericEvents),m.recordCustomEvent=j(R,"recordCustomEvent",!0,n.K7.genericEvents),m.setPageViewName=function(t,r){if("string"==typeof t)return"/"!==t.charAt(0)&&(t="/"+t),(0,o.f)(e).customTransaction=(r||"http://custom.transaction")+t,j(R,"setPageViewName",!0)()},m.setCustomAttribute=function(e,t,r=!1){if("string"==typeof e){if(["string","number","boolean"].includes(typeof t)||null===t)return N(e,t,"setCustomAttribute",r);(0,d.R)(40,typeof t)}else(0,d.R)(39,typeof e)},m.setUserId=function(e){if("string"==typeof e||null===e)return N("enduser.id",e,"setUserId",!0);(0,d.R)(41,typeof e)},m.setApplicationVersion=function(e){if("string"==typeof e||null===e)return N("application.version",e,"setApplicationVersion",!1);(0,d.R)(42,typeof e)},m.start=()=>{try{(0,a.p)(f.xV,["API/start/called"],void 0,n.K7.metrics,w),w.emit("manual-start-all")}catch(e){(0,d.R)(23,e)}},m[p.G4.RECORD]=function(){(0,a.p)(f.xV,["API/recordReplay/called"],void 0,n.K7.metrics,w),(0,a.p)(p.G4.RECORD,[],void 0,n.K7.sessionReplay,w)},m[p.G4.PAUSE]=function(){(0,a.p)(f.xV,["API/pauseReplay/called"],void 0,n.K7.metrics,w),(0,a.p)(p.G4.PAUSE,[],void 0,n.K7.sessionReplay,w)},m.interaction=function(e){return(new k).get("object"==typeof e?e:{})};const T=k.prototype={createTracer:function(e,t){var r={},i=this,o="function"==typeof t;return(0,a.p)(f.xV,["API/createTracer/called"],void 0,n.K7.metrics,w),g||(0,a.p)(E+"tracer",[(0,v.t)(),e,r],i,n.K7.spa,w),function(){if(A.emit((o?"":"no-")+"fn-start",[(0,v.t)(),i,o],r),o)try{return t.apply(this,arguments)}catch(e){const t="string"==typeof e?new Error(e):e;throw A.emit("fn-err",[arguments,this,t],r),t}finally{A.emit("fn-end",[(0,v.t)()],r)}}}};function j(e,t,r,i){return function(){return(0,a.p)(f.xV,["API/"+t+"/called"],void 0,n.K7.metrics,w),i&&(0,a.p)(e+t,[r?(0,v.t)():performance.now(),...arguments],r?null:this,i,w),r?void 0:this}}function I(){r.e(296).then(r.bind(r,778)).then((({setAPI:t})=>{t(e),(0,c.Ze)(e,"api")})).catch((e=>{(0,d.R)(27,e),w.abort()}))}return["actionText","setName","setAttribute","save","ignore","onEnd","getContext","end","get"].forEach((e=>{T[e]=j(E,e,void 0,g?n.K7.softNav:n.K7.spa)})),m.setCurrentRouteName=g?j(E,"routeName",void 0,n.K7.softNav):j(R,"routeName",!0,n.K7.spa),m.noticeError=function(t,r){"string"==typeof t&&(t=new Error(t)),(0,a.p)(f.xV,["API/noticeError/called"],void 0,n.K7.metrics,w),(0,a.p)("err",[t,(0,v.t)(),!1,r,!!x[e]],void 0,n.K7.jserrors,w)},l.RI?(0,u.GG)((()=>I()),!0):I(),m}var k=r(217),T=r(122);const j={accountID:void 0,trustKey:void 0,agentID:void 0,licenseKey:void 0,applicationID:void 0,xpid:void 0},I={};var S=r(284);const O=e=>{const t=e.startsWith("http");e+="/",r.p=t?e:"https://"+e};let P=!1;function K(e,t={},r,n){let{init:a,info:c,loader_config:u,runtime:d={},exposed:f=!0}=t;d.loaderType=r;const p=(0,g.pV)();c||(a=p.init,c=p.info,u=p.loader_config),(0,k.xN)(e.agentIdentifier,a||{}),function(e,t){if(!e)throw new Error("All loader-config objects require an agent identifier!");I[e]=(0,T.a)(t,j);const r=(0,g.nY)(e);r&&(r.loader_config=I[e])}(e.agentIdentifier,u||{}),c.jsAttributes??={},l.bv&&(c.jsAttributes.isWorker=!0),(0,i.x1)(e.agentIdentifier,c);const m=(0,k.D0)(e.agentIdentifier),h=[c.beacon,c.errorBeacon];P||(m.proxy.assets&&(O(m.proxy.assets),h.push(m.proxy.assets)),m.proxy.beacon&&h.push(m.proxy.beacon),E(),(0,g.US)("activatedFeatures",S.B),e.runSoftNavOverSpa&&=!0===m.soft_navigations.enabled&&m.feature_flags.includes("soft_nav")),d.denyList=[...m.ajax.deny_list||[],...m.ajax.block_internal?h:[]],d.ptid=e.agentIdentifier,(0,o.V)(e.agentIdentifier,d),e.ee=s.ee.get(e.agentIdentifier),void 0===e.api&&(e.api=N(e.agentIdentifier,n,e.runSoftNavOverSpa)),void 0===e.exposed&&(e.exposed=f),P=!0}},374:(e,t,r)=>{r.nc=(()=>{try{return document?.currentScript?.nonce}catch(e){}return""})()},860:(e,t,r)=>{"use strict";r.d(t,{$J:()=>u,K7:()=>s,P3:()=>c,XX:()=>i,qY:()=>n,v4:()=>a});const n="events",i="jserrors",o="browser/blobs",a="rum",s={ajax:"ajax",genericEvents:"generic_events",jserrors:i,logging:"logging",metrics:"metrics",pageAction:"page_action",pageViewEvent:"page_view_event",pageViewTiming:"page_view_timing",sessionReplay:"session_replay",sessionTrace:"session_trace",softNav:"soft_navigations",spa:"spa"},c={[s.pageViewEvent]:1,[s.pageViewTiming]:2,[s.metrics]:3,[s.jserrors]:4,[s.spa]:5,[s.ajax]:6,[s.sessionTrace]:7,[s.softNav]:8,[s.sessionReplay]:9,[s.logging]:10,[s.genericEvents]:11},u={[s.pageViewEvent]:a,[s.pageViewTiming]:n,[s.ajax]:n,[s.spa]:n,[s.softNav]:n,[s.metrics]:i,[s.jserrors]:i,[s.sessionTrace]:o,[s.sessionReplay]:o,[s.logging]:"browser/logs",[s.genericEvents]:"ins"}}},n={};function i(e){var t=n[e];if(void 0!==t)return t.exports;var o=n[e]={exports:{}};return r[e](o,o.exports,i),o.exports}i.m=r,i.d=(e,t)=>{for(var r in t)i.o(t,r)&&!i.o(e,r)&&Object.defineProperty(e,r,{enumerable:!0,get:t[r]})},i.f={},i.e=e=>Promise.all(Object.keys(i.f).reduce(((t,r)=>(i.f[r](e,t),t)),[])),i.u=e=>"nr-rum-1.281.0.min.js",i.o=(e,t)=>Object.prototype.hasOwnProperty.call(e,t),e={},t="NRBA-1.281.0.PROD:",i.l=(r,n,o,a)=>{if(e[r])e[r].push(n);else{var s,c;if(void 0!==o)for(var u=document.getElementsByTagName("script"),l=0;l<u.length;l++){var d=u[l];if(d.getAttribute("src")==r||d.getAttribute("data-webpack")==t+o){s=d;break}}if(!s){c=!0;var f={296:"sha512-zqOtfbjYsGTkQScey1O8Hh9fA1+m2RFxLpfv7BWqqTivgQ6iM13v6QJ4d5xykyDwx1GoMFmngC4SKpFn6VciYg=="};(s=document.createElement("script")).charset="utf-8",s.timeout=120,i.nc&&s.setAttribute("nonce",i.nc),s.setAttribute("data-webpack",t+o),s.src=r,0!==s.src.indexOf(window.location.origin+"/")&&(s.crossOrigin="anonymous"),f[a]&&(s.integrity=f[a])}e[r]=[n];var g=(t,n)=>{s.onerror=s.onload=null,clearTimeout(p);var i=e[r];if(delete e[r],s.parentNode&&s.parentNode.removeChild(s),i&&i.forEach((e=>e(n))),t)return t(n)},p=setTimeout(g.bind(null,void 0,{type:"timeout",target:s}),12e4);s.onerror=g.bind(null,s.onerror),s.onload=g.bind(null,s.onload),c&&document.head.appendChild(s)}},i.r=e=>{"undefined"!=typeof Symbol&&Symbol.toStringTag&&Object.defineProperty(e,Symbol.toStringTag,{value:"Module"}),Object.defineProperty(e,"__esModule",{value:!0})},i.p="https://js-agent.newrelic.com/",(()=>{var e={374:0,840:0};i.f.j=(t,r)=>{var n=i.o(e,t)?e[t]:void 0;if(0!==n)if(n)r.push(n[2]);else{var o=new Promise(((r,i)=>n=e[t]=[r,i]));r.push(n[2]=o);var a=i.p+i.u(t),s=new Error;i.l(a,(r=>{if(i.o(e,t)&&(0!==(n=e[t])&&(e[t]=void 0),n)){var o=r&&("load"===r.type?"missing":r.type),a=r&&r.target&&r.target.src;s.message="Loading chunk "+t+" failed.\n("+o+": "+a+")",s.name="ChunkLoadError",s.type=o,s.request=a,n[1](s)}}),"chunk-"+t,t)}};var t=(t,r)=>{var n,o,[a,s,c]=r,u=0;if(a.some((t=>0!==e[t]))){for(n in s)i.o(s,n)&&(i.m[n]=s[n]);if(c)c(i)}for(t&&t(r);u<a.length;u++)o=a[u],i.o(e,o)&&e[o]&&e[o][0](),e[o]=0},r=self["webpackChunk:NRBA-1.281.0.PROD"]=self["webpackChunk:NRBA-1.281.0.PROD"]||[];r.forEach(t.bind(null,0)),r.push=t.bind(null,r.push.bind(r))})(),(()=>{"use strict";i(374);var e=i(944),t=i(344),r=i(566);class n{agentIdentifier;constructor(){this.agentIdentifier=(0,r.LA)(16)}#e(t,...r){if("function"==typeof this.api?.[t])return this.api[t](...r);(0,e.R)(35,t)}addPageAction(e,t){return this.#e("addPageAction",e,t)}recordCustomEvent(e,t){return this.#e("recordCustomEvent",e,t)}setPageViewName(e,t){return this.#e("setPageViewName",e,t)}setCustomAttribute(e,t,r){return this.#e("setCustomAttribute",e,t,r)}noticeError(e,t){return this.#e("noticeError",e,t)}setUserId(e){return this.#e("setUserId",e)}setApplicationVersion(e){return this.#e("setApplicationVersion",e)}setErrorHandler(e){return this.#e("setErrorHandler",e)}addRelease(e,t){return this.#e("addRelease",e,t)}log(e,t){return this.#e("log",e,t)}}class o extends n{#e(t,...r){if("function"==typeof this.api?.[t])return this.api[t](...r);(0,e.R)(35,t)}start(){return this.#e("start")}finished(e){return this.#e("finished",e)}recordReplay(){return this.#e(t.G4.RECORD)}pauseReplay(){return this.#e(t.G4.PAUSE)}addToTrace(e){return this.#e("addToTrace",e)}setCurrentRouteName(e){return this.#e("setCurrentRouteName",e)}interaction(){return this.#e("interaction")}wrapLogger(e,t,r){return this.#e("wrapLogger",e,t,r)}}var a=i(860),s=i(217);const c=Object.values(a.K7);function u(e){const t={};return c.forEach((r=>{t[r]=function(e,t){return!0===(0,s.gD)(t,"".concat(e,".enabled"))}(r,e)})),t}var l=i(603);var d=i(687),f=i(234),g=i(289),p=i(154),m=i(384);const h=e=>p.RI&&!0===(0,s.gD)(e,"privacy.cookies_enabled");function v(e){return!!(0,m.dV)().o.MO&&h(e)&&!0===(0,s.gD)(e,"session_trace.enabled")}var b=i(389);class y extends f.W{constructor(e,t,r=!0){super(e.agentIdentifier,t),this.auto=r,this.abortHandler=void 0,this.featAggregate=void 0,this.onAggregateImported=void 0,!1===e.init[this.featureName].autoStart&&(this.auto=!1),this.auto?(0,d.Ak)(e.agentIdentifier,t):this.ee.on("manual-start-all",(0,b.J)((()=>{(0,d.Ak)(e.agentIdentifier,this.featureName),this.auto=!0,this.importAggregator(e)})))}importAggregator(t,r={}){if(this.featAggregate||!this.auto)return;let n;this.onAggregateImported=new Promise((e=>{n=e}));const o=async()=>{let o;try{if(h(this.agentIdentifier)){const{setupAgentSession:e}=await i.e(296).then(i.bind(i,861));o=e(t)}}catch(t){(0,e.R)(20,t),this.ee.emit("internal-error",[t]),this.featureName===a.K7.sessionReplay&&this.abortHandler?.()}try{if(!this.#t(this.featureName,o))return(0,d.Ze)(this.agentIdentifier,this.featureName),void n(!1);const{lazyFeatureLoader:e}=await i.e(296).then(i.bind(i,103)),{Aggregate:a}=await e(this.featureName,"aggregate");this.featAggregate=new a(t,r),t.runtime.harvester.initializedAggregates.push(this.featAggregate),n(!0)}catch(t){(0,e.R)(34,t),this.abortHandler?.(),(0,d.Ze)(this.agentIdentifier,this.featureName,!0),n(!1),this.ee&&this.ee.abort()}};p.RI?(0,g.GG)((()=>o()),!0):o()}#t(e,t){switch(e){case a.K7.sessionReplay:return v(this.agentIdentifier)&&!!t;case a.K7.sessionTrace:return!!t;default:return!0}}}var w=i(630);class A extends y{static featureName=w.T;constructor(e,t=!0){super(e,w.T,t),this.importAggregator(e)}}var R=i(908),_=i(843),E=i(878),x=i(782),N=i(863);class k extends y{static featureName=x.T;constructor(e,t=!0){super(e,x.T,t),p.RI&&((0,_.u)((()=>(0,R.p)("docHidden",[(0,N.t)()],void 0,x.T,this.ee)),!0),(0,E.sp)("pagehide",(()=>(0,R.p)("winPagehide",[(0,N.t)()],void 0,x.T,this.ee))),this.importAggregator(e))}}var T=i(969);class j extends y{static featureName=T.TZ;constructor(e,t=!0){super(e,T.TZ,t),this.importAggregator(e)}}new class extends o{constructor(t){super(),p.gm?(this.features={},(0,m.bQ)(this.agentIdentifier,this),this.desiredFeatures=new Set(t.features||[]),this.desiredFeatures.add(A),this.runSoftNavOverSpa=[...this.desiredFeatures].some((e=>e.featureName===a.K7.softNav)),(0,l.j)(this,t,t.loaderType||"agent"),this.run()):(0,e.R)(21)}get config(){return{info:this.info,init:this.init,loader_config:this.loader_config,runtime:this.runtime}}run(){try{const t=u(this.agentIdentifier),r=[...this.desiredFeatures];r.sort(((e,t)=>a.P3[e.featureName]-a.P3[t.featureName])),r.forEach((r=>{if(!t[r.featureName]&&r.featureName!==a.K7.pageViewEvent)return;if(this.runSoftNavOverSpa&&r.featureName===a.K7.spa)return;if(!this.runSoftNavOverSpa&&r.featureName===a.K7.softNav)return;const n=function(e){switch(e){case a.K7.ajax:return[a.K7.jserrors];case a.K7.sessionTrace:return[a.K7.ajax,a.K7.pageViewEvent];case a.K7.sessionReplay:return[a.K7.sessionTrace];case a.K7.pageViewTiming:return[a.K7.pageViewEvent];default:return[]}}(r.featureName).filter((e=>!(e in this.features)));n.length>0&&(0,e.R)(36,{targetFeature:r.featureName,missingDependencies:n}),this.features[r.featureName]=new r(this)}))}catch(t){(0,e.R)(22,t);for(const e in this.features)this.features[e].abortHandler?.();const r=(0,m.Zm)();delete r.initializedAgents[this.agentIdentifier]?.api,delete r.initializedAgents[this.agentIdentifier]?.features,delete this.sharedAggregator;return r.ee.get(this.agentIdentifier).abort(),!1}}}({features:[A,k,j],loaderType:"lite"})})()})();</script><link data-next-font="size-adjust" rel="preconnect" href="/" crossorigin="anonymous"/><link nonce="nonce-MWI0ZTcyNjItMDExYS00YTVhLWE0ODYtZTQzNWVmMWUxOTE2" rel="preload" href="/_next/static/css/92f230208c8f5fec.css" as="style"/><link nonce="nonce-MWI0ZTcyNjItMDExYS00YTVhLWE0ODYtZTQzNWVmMWUxOTE2" rel="stylesheet" href="/_next/static/css/92f230208c8f5fec.css" data-n-g=""/><noscript data-n-css="nonce-MWI0ZTcyNjItMDExYS00YTVhLWE0ODYtZTQzNWVmMWUxOTE2"></noscript><script defer="" nonce="nonce-MWI0ZTcyNjItMDExYS00YTVhLWE0ODYtZTQzNWVmMWUxOTE2" nomodule="" src="/_next/static/chunks/polyfills-42372ed130431b0a.js"></script><script src="/_next/static/chunks/webpack-a707e99c69361791.js" nonce="nonce-MWI0ZTcyNjItMDExYS00YTVhLWE0ODYtZTQzNWVmMWUxOTE2" defer=""></script><script src="/_next/static/chunks/framework-945b357d4a851f4b.js" nonce="nonce-MWI0ZTcyNjItMDExYS00YTVhLWE0ODYtZTQzNWVmMWUxOTE2" defer=""></script><script src="/_next/static/chunks/main-61b32c80755bad6c.js" nonce="nonce-MWI0ZTcyNjItMDExYS00YTVhLWE0ODYtZTQzNWVmMWUxOTE2" defer=""></script><script src="/_next/static/chunks/pages/_app-62aa0bf74fd1756c.js" nonce="nonce-MWI0ZTcyNjItMDExYS00YTVhLWE0ODYtZTQzNWVmMWUxOTE2" defer=""></script><script src="/_next/static/chunks/4428-d0f4fdfbf9aa449e.js" nonce="nonce-MWI0ZTcyNjItMDExYS00YTVhLWE0ODYtZTQzNWVmMWUxOTE2" defer=""></script><script src="/_next/static/chunks/pages/plugins/%5Btype%5D/families/%5Bfamily%5D-3b8d334bfb16339c.js" nonce="nonce-MWI0ZTcyNjItMDExYS00YTVhLWE0ODYtZTQzNWVmMWUxOTE2" defer=""></script><script src="/_next/static/TgpC0GgDQiX0eP8wJ615X/_buildManifest.js" nonce="nonce-MWI0ZTcyNjItMDExYS00YTVhLWE0ODYtZTQzNWVmMWUxOTE2" defer=""></script><script src="/_next/static/TgpC0GgDQiX0eP8wJ615X/_ssgManifest.js" nonce="nonce-MWI0ZTcyNjItMDExYS00YTVhLWE0ODYtZTQzNWVmMWUxOTE2" defer=""></script></head><body data-base-url="https://www.tenable.com" data-ga4-tracking-id=""><div id="__next"><div class="app__wrapper"><header class="banner"><div class="nav-wrapper"><ul class="list-inline nav-brand"><li class="list-inline-item"><a href="https://www.tenable.com"><img class="logo" src="https://www.tenable.com/themes/custom/tenable/img/logo.png" alt="Tenable"/></a></li><li class="list-inline-item"><a class="app-name" href="https://www.tenable.com/plugins">Plugins</a></li></ul><ul class="nav-dropdown nav"><li class="d-none d-md-block dropdown nav-item"><a aria-haspopup="true" href="#" class="dropdown-toggle nav-link" aria-expanded="false">Settings</a><div tabindex="-1" role="menu" aria-hidden="true" class="dropdown-menu dropdown-menu-right"><h6 tabindex="-1" class="dropdown-header">Links</h6><a href="https://cloud.tenable.com" role="menuitem" class="dropdown-item">Tenable Cloud<!-- --> <i class="fas fa-external-link-alt external-link"></i></a><a href="https://community.tenable.com/login" role="menuitem" class="dropdown-item">Tenable Community & Support<!-- --> <i class="fas fa-external-link-alt external-link"></i></a><a href="https://university.tenable.com/lms/index.php?r=site/sso&sso_type=saml" role="menuitem" class="dropdown-item">Tenable University<!-- --> <i class="fas fa-external-link-alt external-link"></i></a><div tabindex="-1" class="dropdown-divider"></div><span tabindex="-1" class="dropdown-item-text"><div class="d-flex justify-content-between toggle-btn-group flex-column"><div class="label mb-2">Severity<!-- --> <i class="fas fa-info-circle" id="preferredSeverity"></i></div><div role="group" class="btn-group-sm btn-group"><button type="button" class="toggle-btn btn btn-outline-primary">VPR</button><button type="button" class="toggle-btn btn btn-outline-primary">CVSS v2</button><button type="button" class="toggle-btn btn btn-outline-primary">CVSS v3</button><button type="button" class="toggle-btn btn btn-outline-primary active">CVSS v4</button></div></div></span><div tabindex="-1" class="dropdown-divider"></div><span tabindex="-1" class="dropdown-item-text"><div class="d-flex justify-content-between toggle-btn-group flex-row"><div class="label">Theme</div><div role="group" class="ml-3 btn-group-sm btn-group"><button type="button" class="toggle-btn btn btn-outline-primary active">Light</button><button type="button" class="toggle-btn btn btn-outline-primary">Dark</button><button type="button" class="toggle-btn btn btn-outline-primary">Auto</button></div></div></span><div tabindex="-1" class="dropdown-divider"></div><button type="button" tabindex="0" role="menuitem" class="dropdown-item-link dropdown-item">Help</button></div></li></ul><div class="d-block d-md-none"><button type="button" aria-label="Toggle Overlay" class="btn btn-link nav-toggle"><i class="fas fa-bars fa-2x"></i></button></div></div></header><div class="mobile-nav closed"><ul class="flex-column nav"><li class="mobile-header nav-item"><a href="https://www.tenable.com" class="float-left nav-link"><img class="logo" src="https://www.tenable.com/themes/custom/tenable/img/logo-teal.png" alt="Tenable"/></a><a class="float-right mr-2 nav-link"><i class="fas fa-times fa-lg"></i></a></li><li class="nav-item"><a class="nav-link">Plugins<i class="float-right mt-1 fas fa-chevron-right"></i></a></li><div class="collapse"><div class="mobile-collapse"><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/plugins">Overview</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/plugins/pipeline">Plugins Pipeline</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/plugins/newest">Newest</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/plugins/updated">Updated</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/plugins/search">Search</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/plugins/nessus/families?type=nessus">Nessus Families</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/plugins/was/families?type=was">WAS Families</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/plugins/nnm/families?type=nnm">NNM Families</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/plugins/lce/families?type=lce">LCE Families</a></li><li class="no-capitalize nav-item"><a class="nav-link " href="https://www.tenable.com/plugins/ot/families?type=ot">Tenable OT Security Families</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/plugins/families/about">About Plugin Families</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/plugins/release-notes">Release Notes</a></li></div></div><li class="nav-item"><a class="nav-link">Audits<i class="float-right mt-1 fas fa-chevron-right"></i></a></li><div class="collapse"><div class="mobile-collapse"><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/audits">Overview</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/audits/newest">Newest</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/audits/updated">Updated</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/audits/search">Search Audit Files</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/audits/items/search">Search Items</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/audits/references">References</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/audits/authorities">Authorities</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/audits/documentation">Documentation</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/downloads/download-all-compliance-audit-files">Download All Audit Files</a></li></div></div><li class="nav-item"><a class="nav-link">Indicators<i class="float-right mt-1 fas fa-chevron-right"></i></a></li><div class="collapse"><div class="mobile-collapse"><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/indicators">Overview</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/indicators/search">Search</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/indicators/ioa">Indicators of Attack</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/indicators/ioe">Indicators of Exposure</a></li></div></div><li class="nav-item"><a class="nav-link">CVEs<i class="float-right mt-1 fas fa-chevron-right"></i></a></li><div class="collapse"><div class="mobile-collapse"><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/cve">Overview</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/cve/newest">Newest</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/cve/updated">Updated</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/cve/search">Search</a></li></div></div><li class="nav-item"><a class="nav-link">Attack Path Techniques<i class="float-right mt-1 fas fa-chevron-right"></i></a></li><div class="collapse"><div class="mobile-collapse"><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/attack-path-techniques">Overview</a></li><li class="nav-item"><a class="nav-link " href="https://www.tenable.com/attack-path-techniques/search">Search</a></li></div></div><ul id="links-nav" class="flex-column mt-5 nav"><li class="nav-item"><a class="nav-link">Links<i class="float-right mt-1 fas fa-chevron-right"></i></a></li><div class="collapse"><div class="mobile-collapse"><li class="nav-item"><a href="https://cloud.tenable.com" class="nav-link">Tenable Cloud</a></li><li class="nav-item"><a href="https://community.tenable.com/login" class="nav-link">Tenable Community & Support</a></li><li class="nav-item"><a href="https://university.tenable.com/lms/index.php?r=site/sso&sso_type=saml" class="nav-link">Tenable University</a></li></div></div><li class="nav-item"><a class="nav-link">Settings<i class="float-right mt-1 fas fa-chevron-right"></i></a></li><div class="collapse"><div class="mobile-collapse py-3"><li class="nav-item"><div class="d-flex justify-content-between toggle-btn-group flex-column"><div class="label mb-2">Severity</div><div role="group" class="btn-group-sm btn-group"><button type="button" class="toggle-btn btn btn-outline-primary">VPR</button><button type="button" class="toggle-btn btn btn-outline-primary">CVSS v2</button><button type="button" class="toggle-btn btn btn-outline-primary">CVSS v3</button><button type="button" class="toggle-btn btn btn-outline-primary active">CVSS v4</button></div></div></li><li class="nav-item"><div class="d-flex justify-content-between toggle-btn-group flex-row"><div class="label">Theme</div><div role="group" class="ml-3 btn-group-sm btn-group"><button type="button" class="toggle-btn btn btn-outline-primary active">Light</button><button type="button" class="toggle-btn btn btn-outline-primary">Dark</button><button type="button" class="toggle-btn btn btn-outline-primary">Auto</button></div></div></li></div></div></ul></ul></div><div class="app__container"><div class="app__content"><div class="card callout callout-alert callout-bg-danger mb-4"><div class="card-body"><h5 class="mb-2 text-white">Your browser is no longer supported</h5><p class="text-white">Please update or use another browser for this application to function correctly.</p></div></div><div class="row"><div class="col-3 col-xl-2 d-none d-md-block"><h6 class="side-nav-heading">Detections</h6><ul class="side-nav bg-white sticky-top nav flex-column"><li class="nav-item"><a type="button" class="nav-link">Plugins<i class="float-right mt-1 fas fa-chevron-down"></i></a></li><div class="side-nav-collapse collapse show"><li class="false nav-item"><a href="/plugins" class="nav-link"><span>Overview</span></a></li><li class="false nav-item"><a href="/plugins/pipeline" class="nav-link"><span>Plugins Pipeline</span></a></li><li class="false nav-item"><a href="/plugins/release-notes" class="nav-link"><span>Release Notes</span></a></li><li class="false nav-item"><a href="/plugins/newest" class="nav-link"><span>Newest</span></a></li><li class="false nav-item"><a href="/plugins/updated" class="nav-link"><span>Updated</span></a></li><li class="false nav-item"><a href="/plugins/search" class="nav-link"><span>Search</span></a></li><li class="false nav-item"><a href="/plugins/nessus/families" class="nav-link"><span>Nessus Families</span></a></li><li class="false nav-item"><a href="/plugins/was/families" class="nav-link"><span>WAS Families</span></a></li><li class="false nav-item"><a href="/plugins/nnm/families" class="nav-link"><span>NNM Families</span></a></li><li class="false nav-item"><a href="/plugins/lce/families" class="nav-link"><span>LCE Families</span></a></li><li class="false nav-item"><a href="/plugins/ot/families" class="nav-link"><span>Tenable OT Security Families</span></a></li><li class="false nav-item"><a href="/plugins/families/about" class="nav-link"><span>About Plugin Families</span></a></li></div><li class="nav-item"><a type="button" class="nav-link">Audits<i class="float-right mt-1 fas fa-chevron-right"></i></a></li><div class="side-nav-collapse collapse"><li class="false nav-item"><a href="/audits" class="nav-link"><span>Overview</span></a></li><li class="false nav-item"><a href="/audits/newest" class="nav-link"><span>Newest</span></a></li><li class="false nav-item"><a href="/audits/updated" class="nav-link"><span>Updated</span></a></li><li class="false nav-item"><a href="/audits/search" class="nav-link"><span>Search Audit Files</span></a></li><li class="false nav-item"><a href="/audits/items/search" class="nav-link"><span>Search Items</span></a></li><li class="false nav-item"><a href="/audits/references" class="nav-link"><span>References</span></a></li><li class="false nav-item"><a href="/audits/authorities" class="nav-link"><span>Authorities</span></a></li><li class="false nav-item"><a href="/audits/documentation" class="nav-link"><span>Documentation</span></a></li><li class="nav-item"><a class="nav-link" href="https://www.tenable.com/downloads/download-all-compliance-audit-files">Download All Audit Files</a></li></div><li class="nav-item"><a type="button" class="nav-link">Indicators<i class="float-right mt-1 fas fa-chevron-right"></i></a></li><div class="side-nav-collapse collapse"><li class="false nav-item"><a href="/indicators" class="nav-link"><span>Overview</span></a></li><li class="false nav-item"><a href="/indicators/search" class="nav-link"><span>Search</span></a></li><li class="false nav-item"><a href="/indicators/ioa" class="nav-link"><span>Indicators of Attack</span></a></li><li class="false nav-item"><a href="/indicators/ioe" class="nav-link"><span>Indicators of Exposure</span></a></li></div></ul><h6 class="side-nav-heading">Analytics</h6><ul class="side-nav bg-white sticky-top nav flex-column"><li class="nav-item"><a type="button" class="nav-link">CVEs<i class="float-right mt-1 fas fa-chevron-right"></i></a></li><div class="side-nav-collapse collapse"><li class="false nav-item"><a href="/cve" class="nav-link"><span>Overview</span></a></li><li class="false nav-item"><a href="/cve/newest" class="nav-link"><span>Newest</span></a></li><li class="false nav-item"><a href="/cve/updated" class="nav-link"><span>Updated</span></a></li><li class="false nav-item"><a href="/cve/search" class="nav-link"><span>Search</span></a></li></div><li class="nav-item"><a type="button" class="nav-link">Attack Path Techniques<i class="float-right mt-1 fas fa-chevron-right"></i></a></li><div class="side-nav-collapse collapse"><li class="false nav-item"><a href="/attack-path-techniques" class="nav-link"><span>Overview</span></a></li><li class="false nav-item"><a href="/attack-path-techniques/search" class="nav-link"><span>Search</span></a></li></div></ul></div><div class="col-12 col-md-9 col-xl-10"><h1 class="mb-3 h2">Tenable.ot Family for Tenable OT Security</h1><nav class="d-none d-md-block" aria-label="breadcrumb"><ol class="breadcrumb"><li class="breadcrumb-item"><a href="https://www.tenable.com/plugins">Plugins</a></li><li class="breadcrumb-item"><a href="https://www.tenable.com/plugins/ot/families?type=ot">Tenable OT Security Plugin Families</a></li><li class="active breadcrumb-item" aria-current="page">Tenable.ot</li></ol></nav><nav class="d-md-none" aria-label="breadcrumb"><ol class="breadcrumb"><li class="breadcrumb-item"><a href="https://www.tenable.com/plugins/ot/families?type=ot"><i class="fas fa-chevron-left"></i> <!-- -->Tenable OT Security Plugin Families</a></li></ol></nav><div class="card"><div class="p-3 card-body"><nav class="" aria-label="pagination"><ul class="justify-content-between pagination pagination"><li class="page-item disabled"><a class="page-link page-previous" href="https://www.tenable.com/plugins/ot/families/Tenable.ot?page=0">‹‹ <!-- -->Previous<span class="sr-only"> <!-- -->Previous</span></a></li><li class="page-item disabled"><a class="page-link page-text">Page 1 of 53<!-- --> <span class="d-none d-sm-inline">• <!-- -->2607 Total</span></a></li><li class="page-item"><a class="page-link page-next" href="https://www.tenable.com/plugins/ot/families/Tenable.ot?page=2"><span class="sr-only">Next</span>Next<!-- --> ››</a></li></ul></nav><div class="table-responsive"><table class="results-table table"><thead><tr><th>ID</th><th>Name</th><th>Severity</th></tr></thead><tbody><tr><td><a href="https://www.tenable.com/plugins/ot/502848">502848</a></td><td>Cisco Small Business Series Switches Session Credentials Replay (CVE-2021-34739)</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502847">502847</a></td><td>Cisco Small Business Series Switches Stacked Reload ACL Bypass (CVE-2024-20263)</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502846">502846</a></td><td>Dahua Security Network Video Recorders Improper Input Validation (CVE-2024-39945)</td><td><h6 class="m-1"><span class="badge badge-medium">medium</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502845">502845</a></td><td>Dahua Security Digital Video Recorders Credentials Management Errors (CVE-2013-3612)</td><td><h6 class="m-1"><span class="badge badge-critical">critical</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502844">502844</a></td><td>Dahua Security Network Video Recorders Improper Input Validation (CVE-2024-39948)</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502843">502843</a></td><td>Dahua Security Network Video Recorders Improper Input Validation (CVE-2024-39946)</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502842">502842</a></td><td>Dahua Security NVR NVR50XX, NVR52XX, NVR54XX, and NVR58XX Improper Authentication (CVE-2017-9314)</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502841">502841</a></td><td>Dahua Security Digital Video Recorders Credentials Management Errors (CVE-2013-3615)</td><td><h6 class="m-1"><span class="badge badge-critical">critical</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502840">502840</a></td><td>Dahua Security Digital Video Recorders Permissions, Privileges, and Access Controls (CVE-2013-5754)</td><td><h6 class="m-1"><span class="badge badge-critical">critical</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502839">502839</a></td><td>Dahua Security Network Video Recorders Improper Input Validation (CVE-2024-39947)</td><td><h6 class="m-1"><span class="badge badge-medium">medium</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502838">502838</a></td><td>Dahua Security Digital Video Recorders Improper Authentication (CVE-2013-3613)</td><td><h6 class="m-1"><span class="badge badge-critical">critical</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502837">502837</a></td><td>Dahua Security Network Video Recorders Improper Input Validation (CVE-2024-39949)</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502836">502836</a></td><td>Dahua Security Digital Video Recorders Permissions, Privileges, and Access Controls (CVE-2013-3614)</td><td><h6 class="m-1"><span class="badge badge-critical">critical</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502835">502835</a></td><td>Schneider Electric EcoStruxure Control Expert, EcoStruxure Process Expert, and Modicon M340, M580 and M580 Safety PLCs Improper Enforcement of Message Integrity During Transmission in a Communication Channel (CVE-2023-6408)</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502834">502834</a></td><td>Ubiquiti Networks UniFi Improper Access Control (CVE-2016-7792)</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502833">502833</a></td><td>Wiesemann & Theis ComServer Series Authentication Bypass by Spoofing (CVE-2022-4098)</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502832">502832</a></td><td>Wiesemann & Theis ComServer Series Missing Authentication for Critical Function (CVE-2022-42785)</td><td><h6 class="m-1"><span class="badge badge-critical">critical</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502831">502831</a></td><td>Wiesemann & Theis ComServer Use of Insufficiently Random Values (CVE-2022-42787)</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502830">502830</a></td><td>Wiesemann & Theis ComServer Series Improper Neutralization of Input During Web Page Generation (CVE-2022-42786)</td><td><h6 class="m-1"><span class="badge badge-medium">medium</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502829">502829</a></td><td>Elspec G5 Digital Fault Recorder Path Traversal (CVE-2024-22079)</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502828">502828</a></td><td>Elspec G5 Digital Fault Recorder Inconsistent Interpretation of HTTP Requests (CVE-2024-22081)</td><td><h6 class="m-1"><span class="badge badge-critical">critical</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502827">502827</a></td><td>Elspec G5 Digital Fault Recorder Improper Handling of Insufficient Permissions or Privileges (CVE-2024-22078)</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502826">502826</a></td><td>Elspec G5 Digital Fault Recorder Improper Restriction of XML External Entity Reference (CVE-2024-46603)</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502825">502825</a></td><td>Elspec G5 Digital Fault Recorder Improper Restriction of Operations within the Bounds of a Memory Buffer (CVE-2024-22080)</td><td><h6 class="m-1"><span class="badge badge-critical">critical</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502824">502824</a></td><td>Elspec G5 Digital Fault Recorder Stored Cross-Site Scripting (CVE-2024-46602)</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502823">502823</a></td><td>Elspec G5 Digital Fault Recorder Incorrect Default Permissions (CVE-2024-22085)</td><td><h6 class="m-1"><span class="badge badge-medium">medium</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502822">502822</a></td><td>Elspec G5 Digital Fault Recorder Use of Hard-coded Credentials (CVE-2024-22083)</td><td><h6 class="m-1"><span class="badge badge-medium">medium</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502821">502821</a></td><td>Elspec G5 Digital Fault Recorder Improper Handling of Insufficient Permissions or Privileges (CVE-2024-22077)</td><td><h6 class="m-1"><span class="badge badge-medium">medium</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502820">502820</a></td><td>Elspec G5 Digital Fault Recorder VsFTPd Service Denial of Service (CVE-2021-30047)</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502819">502819</a></td><td>Elspec G5 Digital Fault Recorder Buffer Overflow (CVE-2024-46601)</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502818">502818</a></td><td>Elspec G5 Digital Fault Recorder Cleartext Storage of Sensitive Information (CVE-2024-22084)</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502817">502817</a></td><td>Elspec G5 Digital Fault Recorder Exposure of Information Through Directory Listing (CVE-2024-22082)</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502816">502816</a></td><td>Sprecher Automation SPRECON-E Use of Hard-coded Credentials (CVE-2022-4333)</td><td><h6 class="m-1"><span class="badge badge-critical">critical</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502815">502815</a></td><td>Sprecher Automation SPRECON-E-C/P/T3 Improper Input Validation (CVE-2022-4332)</td><td><h6 class="m-1"><span class="badge badge-medium">medium</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502814">502814</a></td><td>Synology DSM Use of a Broken or Risky Cryptographic Algorithm (CVE-2020-27653)</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502813">502813</a></td><td>Siemens SIMATIC S7-1200 CPUs Cross-Site Request Forgery (CVE-2024-47100)</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502812">502812</a></td><td>Siemens SIPROTEC 5 Files or Directories Accessible to External Parties (CVE-2024-53649)</td><td><h6 class="m-1"><span class="badge badge-medium">medium</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502811">502811</a></td><td>Cisco Products Uncontrolled Resource Consumption (CVE-2023-44487)</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502810">502810</a></td><td>Rockwell Automation End-of-Life Devices Detection</td><td><h6 class="m-1"><span class="badge badge-medium">medium</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502809">502809</a></td><td>Schneider Electric Modicon Improper Input Validation (CVE-2024-11737)</td><td><h6 class="m-1"><span class="badge badge-critical">critical</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502808">502808</a></td><td>Rockwell Automation PowerMonitor 1000 Unprotected Alternate Channel (CVE-2024-12371)</td><td><h6 class="m-1"><span class="badge badge-critical">critical</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502807">502807</a></td><td>Rockwell Automation PowerMonitor 1000 Classic Buffer Overflow (CVE-2024-12373)</td><td><h6 class="m-1"><span class="badge badge-critical">critical</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502806">502806</a></td><td>Rockwell Automation PowerMonitor 1000 Heap-Based Buffer Overflow (CVE-2024-12372)</td><td><h6 class="m-1"><span class="badge badge-critical">critical</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502805">502805</a></td><td>Siemens RUGGEDCOM ROX II Cross-Site Request Forgery (CVE-2020-28398)</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502804">502804</a></td><td>Rockwell Automation Discontinued Devices Detection</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502803">502803</a></td><td>Rockwell Automation Active Devices Detection</td><td><h6 class="m-1"><span class="badge badge-info">info</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502802">502802</a></td><td>Cisco NX-OS 5.2 and 6.1 Denial of Service (CVE-2012-3051)</td><td><h6 class="m-1"><span class="badge badge-medium">medium</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502801">502801</a></td><td>Cisco NX-OS Fibre Channel over Ethernet Denial of Service (CVE-2017-6655)</td><td><h6 class="m-1"><span class="badge badge-medium">medium</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502800">502800</a></td><td>Cisco Unified IP Phone Permissions, Privileges, and Access Controls (CVE-2007-1072)</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr><tr><td><a href="https://www.tenable.com/plugins/ot/502799">502799</a></td><td>Dahua Technology Co., Ltd Digital Video Recorders and IP Cameras Use of Password Hash Instead of Password For Authentication (CVE-2017-7927)</td><td><h6 class="m-1"><span class="badge badge-high">high</span></h6></td></tr></tbody></table></div><nav class="" aria-label="pagination"><ul class="justify-content-between pagination pagination"><li class="page-item disabled"><a class="page-link page-previous" href="https://www.tenable.com/plugins/ot/families/Tenable.ot?page=0">‹‹ <!-- -->Previous<span class="sr-only"> <!-- -->Previous</span></a></li><li class="page-item disabled"><a class="page-link page-text">Page 1 of 53<!-- --> <span class="d-none d-sm-inline">• <!-- -->2607 Total</span></a></li><li class="page-item"><a class="page-link page-next" href="https://www.tenable.com/plugins/ot/families/Tenable.ot?page=2"><span class="sr-only">Next</span>Next<!-- --> ››</a></li></ul></nav></div></div></div></div></div></div><footer class="footer"><div class="container"><ul class="footer-nav"><li class="footer-nav-item"><a href="https://www.tenable.com/">Tenable.com</a></li><li class="footer-nav-item"><a href="https://community.tenable.com">Community & Support</a></li><li class="footer-nav-item"><a href="https://docs.tenable.com">Documentation</a></li><li class="footer-nav-item"><a href="https://university.tenable.com">Education</a></li></ul><ul class="footer-nav footer-nav-secondary"><li class="footer-nav-item">© <!-- -->2025<!-- --> <!-- -->Tenable®, Inc. All Rights Reserved</li><li class="footer-nav-item"><a href="https://www.tenable.com/privacy-policy">Privacy Policy</a></li><li class="footer-nav-item"><a href="https://www.tenable.com/legal">Legal</a></li><li class="footer-nav-item"><a href="https://www.tenable.com/section-508-voluntary-product-accessibility">508 Compliance</a></li></ul></div></footer><div class="Toastify"></div></div></div><script id="__NEXT_DATA__" type="application/json" nonce="nonce-MWI0ZTcyNjItMDExYS00YTVhLWE0ODYtZTQzNWVmMWUxOTE2">{"props":{"pageProps":{"plugins":[{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502848","_score":null,"_source":{"plugin_modification_date":"2025-02-13T00:00:00","references":[{"id_type":"CWE","id":"613","type":"classifiers","url":null},{"id_type":"cve","id":"CVE-2021-34739","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34739"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?85a0d7ba"}],"description":"A vulnerability in the web-based management interface of multiple Cisco Small Business Series Switches could allow an unauthenticated, remote attacker to replay valid user session credentials and gain unauthorized access to the web-based management interface of an affected device. This vulnerability is due to insufficient expiration of session credentials. An attacker could exploit this vulnerability by conducting a man-in-the-middle attack against an affected device to intercept valid session credentials and then replaying the intercepted credentials toward the same device at a later time. A successful exploit could allow the attacker to access the web-based management interface with administrator privileges.\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"Medium","script_id":"502848","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Cisco Small Business Series Switches Session Credentials Replay (CVE-2021-34739)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"Refer to the vendor advisory.","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2025-02-13T00:00:00","cvss":{"cvssv3_score":8.1,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P","cvssv3_temporal_score":null,"rating":null,"cvssv2_vector_base":"AV:N/AC:M/Au:N/C:P/I:P/A:P","cvssv3_vector_base":"AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":6.8,"cvssv3_temporal_vector_base":null,"cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":null,"cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"Medium","cvssv3_risk_factor":"High","cvssv4_risk_factor":null},"vpr_score":"5.9","script_family":"Tenable.ot","xrefs":{"CWE":["613"]},"pluginPublicationDate":"2/13/2025","pluginModificationDate":"2/13/2025","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Medium","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Medium","cvssV3Severity":"High","cvssV4Severity":null,"vprSeverity":"Medium","severity":"Medium"},"sort":[1739404800000,"502848"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502847","_score":null,"_source":{"plugin_modification_date":"2025-02-13T00:00:00","references":[{"id_type":"CWE","id":"284","type":"classifiers","url":null},{"id_type":"cve","id":"CVE-2024-20263","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20263"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?08defa12"}],"description":"A vulnerability with the access control list (ACL) management within a stacked switch configuration of Cisco Business 250 Series Smart Switches and Business 350 Series Managed Switches could allow an unauthenticated, remote attacker to bypass protection offered by a configured ACL on an affected device. This vulnerability is due to incorrect processing of ACLs on a stacked configuration when either the primary or backup switches experience a full stack reload or power cycle. An attacker could exploit this vulnerability by sending crafted traffic through an affected device. A successful exploit could allow the attacker to bypass configured ACLs, causing traffic to be dropped or forwarded in an unexpected manner. The attacker does not have control over the conditions that result in the device being in the vulnerable state. Note: In the vulnerable state, the ACL would be correctly applied on the primary devices but could be incorrectly applied to the backup devices.\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"High","script_id":"502847","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Cisco Small Business Series Switches Stacked Reload ACL Bypass (CVE-2024-20263)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"Refer to the vendor advisory.","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2025-02-13T00:00:00","cvss":{"cvssv3_score":7.2,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":null,"cvssv3_temporal_score":null,"rating":null,"cvssv3_vector_base":"AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L","cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":null,"cvssv3_temporal_vector_base":null,"cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":null,"cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":null,"cvssv3_risk_factor":"High","cvssv4_risk_factor":null},"vpr_score":"3.8","script_family":"Tenable.ot","xrefs":{"CWE":["284"]},"pluginPublicationDate":"2/13/2025","pluginModificationDate":"2/13/2025","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Low","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"High","cvssV3Severity":"High","cvssV4Severity":null,"vprSeverity":"Low","severity":"High"},"sort":[1739404800000,"502847"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502846","_score":null,"_source":{"plugin_modification_date":"2025-02-12T00:00:00","references":[{"id_type":"CWE","id":"20","type":"classifiers","url":null},{"id_type":"cve","id":"CVE-2024-39945","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39945"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.dahuasecurity.com/aboutUs/trustedCenter/details/768"}],"description":"A vulnerability has been found in Dahua products. After obtaining the administrator's username and password, the attacker can send a carefully crafted data packet to the interface with vulnerabilities, causing the device to crash.\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"Medium","script_id":"502846","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Dahua Security Network Video Recorders Improper Input Validation (CVE-2024-39945)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"Refer to the vendor advisory.","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2025-02-12T00:00:00","cvss":{"cvssv3_score":4.9,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":null,"cvssv3_temporal_score":null,"rating":null,"cvssv3_vector_base":"AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H","cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":null,"cvssv3_temporal_vector_base":null,"cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":null,"cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":null,"cvssv3_risk_factor":"Medium","cvssv4_risk_factor":null},"vpr_score":"3.6","script_family":"Tenable.ot","xrefs":{"CWE":["20"]},"pluginPublicationDate":"2/12/2025","pluginModificationDate":"2/12/2025","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Low","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Medium","cvssV3Severity":"Medium","cvssV4Severity":null,"vprSeverity":"Low","severity":"Medium"},"sort":[1739318400000,"502846"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502845","_score":null,"_source":{"plugin_modification_date":"2025-02-12T00:00:00","references":[{"id_type":"CWE","id":"255","type":"classifiers","url":null},{"id_type":"cve","id":"CVE-2013-3612","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3612"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.kb.cert.org/vuls/id/800094"}],"description":"Dahua DVR appliances have a hardcoded password for (1) the root account and (2) an unspecified backdoor account, which makes it easier for remote attackers to obtain administrative access via authorization requests involving (a) ActiveX, (b) a standalone client, or (c) unknown other vectors.\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"Critical","script_id":"502845","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Dahua Security Digital Video Recorders Credentials Management Errors (CVE-2013-3612)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"Refer to the vendor advisory.","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2025-02-12T00:00:00","cvss":{"cvssv3_score":9.8,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C","cvssv3_temporal_score":null,"rating":null,"cvssv2_vector_base":"AV:N/AC:L/Au:N/C:C/I:C/A:C","cvssv3_vector_base":"AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":10,"cvssv3_temporal_vector_base":null,"cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":null,"cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"Critical","cvssv3_risk_factor":"Critical","cvssv4_risk_factor":null},"vpr_score":"6.7","script_family":"Tenable.ot","xrefs":{"CWE":["255"]},"pluginPublicationDate":"2/12/2025","pluginModificationDate":"2/12/2025","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Medium","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Critical","cvssV3Severity":"Critical","cvssV4Severity":null,"vprSeverity":"Medium","severity":"Critical"},"sort":[1739318400000,"502845"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502844","_score":null,"_source":{"plugin_modification_date":"2025-02-12T00:00:00","references":[{"id_type":"CWE","id":"20","type":"classifiers","url":null},{"id_type":"cve","id":"CVE-2024-39948","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39948"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.dahuasecurity.com/aboutUs/trustedCenter/details/768"}],"description":"A vulnerability has been found in Dahua products. Attackers can send carefully crafted data packets to the interface with vulnerabilities, causing the device to crash.\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"High","script_id":"502844","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Dahua Security Network Video Recorders Improper Input Validation (CVE-2024-39948)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"Refer to the vendor advisory.","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2025-02-12T00:00:00","cvss":{"cvssv3_score":7.5,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":null,"cvssv3_temporal_score":null,"rating":null,"cvssv3_vector_base":"AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":null,"cvssv3_temporal_vector_base":null,"cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":null,"cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":null,"cvssv3_risk_factor":"High","cvssv4_risk_factor":null},"vpr_score":"3.6","script_family":"Tenable.ot","xrefs":{"CWE":["20"]},"pluginPublicationDate":"2/12/2025","pluginModificationDate":"2/12/2025","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Low","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"High","cvssV3Severity":"High","cvssV4Severity":null,"vprSeverity":"Low","severity":"High"},"sort":[1739318400000,"502844"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502843","_score":null,"_source":{"plugin_modification_date":"2025-02-12T00:00:00","references":[{"id_type":"CWE","id":"20","type":"classifiers","url":null},{"id_type":"cve","id":"CVE-2024-39946","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39946"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.dahuasecurity.com/aboutUs/trustedCenter/details/768"}],"description":"A vulnerability has been found in Dahua products.After obtaining the administrator's username and password, the attacker can send a carefully crafted data packet to the interface with vulnerabilities, causing device initialization.\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"High","script_id":"502843","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Dahua Security Network Video Recorders Improper Input Validation (CVE-2024-39946)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"Refer to the vendor advisory.","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2025-02-12T00:00:00","cvss":{"cvssv3_score":7.2,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":null,"cvssv3_temporal_score":null,"rating":null,"cvssv3_vector_base":"AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":null,"cvssv3_temporal_vector_base":null,"cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":null,"cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":null,"cvssv3_risk_factor":"High","cvssv4_risk_factor":null},"vpr_score":"6.7","script_family":"Tenable.ot","xrefs":{"CWE":["20"]},"pluginPublicationDate":"2/12/2025","pluginModificationDate":"2/12/2025","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Medium","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"High","cvssV3Severity":"High","cvssV4Severity":null,"vprSeverity":"Medium","severity":"High"},"sort":[1739318400000,"502843"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502842","_score":null,"_source":{"plugin_modification_date":"2025-02-12T00:00:00","references":[{"id_type":"CWE","id":"287","type":"classifiers","url":null},{"id_type":"cve","id":"CVE-2017-9314","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9314"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?10082f36"}],"description":"Authentication vulnerability found in Dahua NVR models NVR50XX, NVR52XX, NVR54XX, NVR58XX with software before DH_NVR5xxx_Eng_P_V2.616.0000.0.R.20171102. Attacker could exploit this vulnerability to gain access to additional operations by means of forging json message.\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"Medium","script_id":"502842","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Dahua Security NVR NVR50XX, NVR52XX, NVR54XX, and NVR58XX Improper Authentication (CVE-2017-9314)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"Refer to the vendor advisory.","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2025-02-12T00:00:00","cvss":{"cvssv3_score":8.8,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P","cvssv3_temporal_score":null,"rating":null,"cvssv2_vector_base":"AV:N/AC:L/Au:S/C:P/I:P/A:P","cvssv3_vector_base":"AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":6.5,"cvssv3_temporal_vector_base":null,"cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":null,"cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"Medium","cvssv3_risk_factor":"High","cvssv4_risk_factor":null},"vpr_score":"5.9","script_family":"Tenable.ot","xrefs":{"CWE":["287"]},"pluginPublicationDate":"2/12/2025","pluginModificationDate":"2/12/2025","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Medium","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Medium","cvssV3Severity":"High","cvssV4Severity":null,"vprSeverity":"Medium","severity":"Medium"},"sort":[1739318400000,"502842"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502841","_score":null,"_source":{"plugin_modification_date":"2025-02-12T00:00:00","references":[{"id_type":"CWE","id":"255","type":"classifiers","url":null},{"id_type":"cve","id":"CVE-2013-3615","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3615"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.kb.cert.org/vuls/id/800094"}],"description":"Dahua DVR appliances use a password-hash algorithm with a short hash length, which makes it easier for context-dependent attackers to discover cleartext passwords via a brute-force attack.\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"High","script_id":"502841","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Dahua Security Digital Video Recorders Credentials Management Errors (CVE-2013-3615)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"Refer to the vendor advisory.","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2025-02-12T00:00:00","cvss":{"cvssv3_score":9.8,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N","cvssv3_temporal_score":null,"rating":null,"cvssv2_vector_base":"AV:N/AC:L/Au:N/C:C/I:N/A:N","cvssv3_vector_base":"AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":7.8,"cvssv3_temporal_vector_base":null,"cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":null,"cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"High","cvssv3_risk_factor":"Critical","cvssv4_risk_factor":null},"vpr_score":"6.7","script_family":"Tenable.ot","xrefs":{"CWE":["255"]},"pluginPublicationDate":"2/12/2025","pluginModificationDate":"2/12/2025","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Medium","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"High","cvssV3Severity":"Critical","cvssV4Severity":null,"vprSeverity":"Medium","severity":"High"},"sort":[1739318400000,"502841"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502840","_score":null,"_source":{"plugin_modification_date":"2025-02-12T00:00:00","references":[{"id_type":"CWE","id":"264","type":"classifiers","url":null},{"id_type":"cve","id":"CVE-2013-5754","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5754"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.kb.cert.org/vuls/id/800094"}],"description":"The authorization implementation on Dahua DVR appliances accepts a hash string representing the current date for the role of a master password, which makes it easier for remote attackers to obtain administrative access and change the administrator password via requests involving (1) ActiveX, (2) a standalone client, or (3) unspecified other vectors, a different vulnerability than CVE-2013-3612.\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"Critical","script_id":"502840","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Dahua Security Digital Video Recorders Permissions, Privileges, and Access Controls (CVE-2013-5754)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"Refer to the vendor advisory.","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2025-02-12T00:00:00","cvss":{"cvssv3_score":9.8,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C","cvssv3_temporal_score":null,"rating":null,"cvssv2_vector_base":"AV:N/AC:L/Au:N/C:C/I:C/A:C","cvssv3_vector_base":"AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":10,"cvssv3_temporal_vector_base":null,"cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":null,"cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"Critical","cvssv3_risk_factor":"Critical","cvssv4_risk_factor":null},"vpr_score":"5.9","script_family":"Tenable.ot","xrefs":{"CWE":["264"]},"pluginPublicationDate":"2/12/2025","pluginModificationDate":"2/12/2025","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Medium","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Critical","cvssV3Severity":"Critical","cvssV4Severity":null,"vprSeverity":"Medium","severity":"Critical"},"sort":[1739318400000,"502840"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502839","_score":null,"_source":{"plugin_modification_date":"2025-02-12T00:00:00","references":[{"id_type":"CWE","id":"20","type":"classifiers","url":null},{"id_type":"cve","id":"CVE-2024-39947","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39947"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.dahuasecurity.com/aboutUs/trustedCenter/details/768"}],"description":"A vulnerability has been found in Dahua products.After obtaining the ordinary user's username and password, the attacker can send a carefully crafted data packet to the interface with vulnerabilities, causing the device to crash.\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"Medium","script_id":"502839","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Dahua Security Network Video Recorders Improper Input Validation (CVE-2024-39947)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"Refer to the vendor advisory.","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2025-02-12T00:00:00","cvss":{"cvssv3_score":6.5,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":null,"cvssv3_temporal_score":null,"rating":null,"cvssv3_vector_base":"AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":null,"cvssv3_temporal_vector_base":null,"cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":null,"cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":null,"cvssv3_risk_factor":"Medium","cvssv4_risk_factor":null},"vpr_score":"4.4","script_family":"Tenable.ot","xrefs":{"CWE":["20"]},"pluginPublicationDate":"2/12/2025","pluginModificationDate":"2/12/2025","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Medium","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Medium","cvssV3Severity":"Medium","cvssV4Severity":null,"vprSeverity":"Medium","severity":"Medium"},"sort":[1739318400000,"502839"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502838","_score":null,"_source":{"plugin_modification_date":"2025-02-12T00:00:00","references":[{"id_type":"CWE","id":"287","type":"classifiers","url":null},{"id_type":"cve","id":"CVE-2013-3613","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3613"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.kb.cert.org/vuls/id/800094"}],"description":"Dahua DVR appliances do not properly restrict UPnP requests, which makes it easier for remote attackers to obtain access via vectors involving a replay attack against the TELNET port.\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"High","script_id":"502838","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Dahua Security Digital Video Recorders Improper Authentication (CVE-2013-3613)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"Refer to the vendor advisory.","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2025-02-12T00:00:00","cvss":{"cvssv3_score":9.8,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N","cvssv3_temporal_score":null,"rating":null,"cvssv2_vector_base":"AV:N/AC:L/Au:N/C:C/I:N/A:N","cvssv3_vector_base":"AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":7.8,"cvssv3_temporal_vector_base":null,"cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":null,"cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"High","cvssv3_risk_factor":"Critical","cvssv4_risk_factor":null},"vpr_score":"6.7","script_family":"Tenable.ot","xrefs":{"CWE":["287"]},"pluginPublicationDate":"2/12/2025","pluginModificationDate":"2/12/2025","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Medium","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"High","cvssV3Severity":"Critical","cvssV4Severity":null,"vprSeverity":"Medium","severity":"High"},"sort":[1739318400000,"502838"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502837","_score":null,"_source":{"plugin_modification_date":"2025-02-12T00:00:00","references":[{"id_type":"CWE","id":"20","type":"classifiers","url":null},{"id_type":"cve","id":"CVE-2024-39949","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39949"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.dahuasecurity.com/aboutUs/trustedCenter/details/768"}],"description":"A vulnerability has been found in Dahua products. Attackers can send carefully crafted data packets to the interface with vulnerabilities, causing the device to crash.\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"High","script_id":"502837","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Dahua Security Network Video Recorders Improper Input Validation (CVE-2024-39949)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"Refer to the vendor advisory.","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2025-02-12T00:00:00","cvss":{"cvssv3_score":7.5,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":null,"cvssv3_temporal_score":null,"rating":null,"cvssv3_vector_base":"AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":null,"cvssv3_temporal_vector_base":null,"cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":null,"cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":null,"cvssv3_risk_factor":"High","cvssv4_risk_factor":null},"vpr_score":"3.6","script_family":"Tenable.ot","xrefs":{"CWE":["20"]},"pluginPublicationDate":"2/12/2025","pluginModificationDate":"2/12/2025","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Low","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"High","cvssV3Severity":"High","cvssV4Severity":null,"vprSeverity":"Low","severity":"High"},"sort":[1739318400000,"502837"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502836","_score":null,"_source":{"plugin_modification_date":"2025-02-12T00:00:00","references":[{"id_type":"CWE","id":"264","type":"classifiers","url":null},{"id_type":"cve","id":"CVE-2013-3614","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3614"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.kb.cert.org/vuls/id/800094"}],"description":"Dahua DVR appliances have a small value for the maximum password length, which makes it easier for remote attackers to obtain access via a brute-force attack.\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"High","script_id":"502836","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Dahua Security Digital Video Recorders Permissions, Privileges, and Access Controls (CVE-2013-3614)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"Refer to the vendor advisory.","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2025-02-12T00:00:00","cvss":{"cvssv3_score":9.8,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C","cvssv3_temporal_score":null,"rating":null,"cvssv2_vector_base":"AV:N/AC:M/Au:N/C:C/I:C/A:C","cvssv3_vector_base":"AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":9.3,"cvssv3_temporal_vector_base":null,"cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":null,"cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"High","cvssv3_risk_factor":"Critical","cvssv4_risk_factor":null},"vpr_score":"6.7","script_family":"Tenable.ot","xrefs":{"CWE":["264"]},"pluginPublicationDate":"2/12/2025","pluginModificationDate":"2/12/2025","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Medium","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"High","cvssV3Severity":"Critical","cvssV4Severity":null,"vprSeverity":"Medium","severity":"High"},"sort":[1739318400000,"502836"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502835","_score":null,"_source":{"plugin_modification_date":"2025-02-06T00:00:00","references":[{"id_type":"CWE","id":"924","type":"classifiers","url":null},{"id_type":"cve","id":"CVE-2023-6408","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6408"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?5e696d1f"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.cisa.gov/news-events/ics-advisories/icsa-24-331-03"}],"description":"CWE-924: Improper Enforcement of Message Integrity During Transmission in a Communication Channel vulnerability exists that could cause a denial of service and loss of confidentiality, integrity of controllers when conducting a Man in the Middle attack.\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"High","script_id":"502835","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Schneider Electric EcoStruxure Control Expert, EcoStruxure Process Expert, and Modicon M340, M580 and M580 Safety PLCs Improper Enforcement of Message Integrity During Transmission in a Communication Channel (CVE-2023-6408)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"The following text was originally created by the Cybersecurity and Infrastructure Security Agency (CISA). The original can be found at CISA.gov.\n\nSchneider Electric has identified the following remediations and mitigations users can apply to reduce risk:\n\nModicon M340 CPU (part numbers BMXP34*):\n\n- Firmware Version SV3.60 includes a fix for this vulnerability and is available for download.\n- Set up an application password in the project properties.\n- Set up network segmentation and implement a firewall to block all unauthorized access to Port 502/TCP.\n- Configure the access control list following the recommendations of the user manuals: \"Modicon M340 for Ethernet Communications Modules and Processors User Manual\" in chapter \"Messaging Configuration Parameters\":\n- Set up a secure communication according to the following guideline \"Modicon Controllers Platform Cyber Security Reference Manual,\" in chapter \"Set up secured communications\":\n- Consider use of external firewall devices such as EAGLE40-07 from Belden to establish VPN connections for M340 \u0026 M580 architectures. For more details refer to the chapter \"How to protect M580 and M340 architectures with EAGLE40 using VPN\"\n- Ensure the M340 CPU is running with the memory protection activated by configuring the input bit to a physical input, for more details refer to the following guideline \"Modicon Controllers Platform Cyber Security Reference Manual\", \"CPU Memory Protection section\".\n\nModicon M580 CPU (part numbers BMEP* and BMEH* excluding M580 CPU Safety):\n\n- Firmware Versions SV4.20 includes a fix for this vulnerability and is available for download.\n- Set up an application password in the project properties\n- Setup network segmentation and implement a firewall to block all unauthorized access to Port 502/TCP.\n- Configure the access control list following the recommendations of the user manuals: \"Modicon M580, Hardware, Reference Manual\".\n- Set up a secure communication according to the following guideline \"Modicon Controllers Platform Cyber Security Reference Manual,\" in chapter \"Set up secured communications\":\n- Use a BMENOC module and follow the instructions to configure IPSEC feature as described in the guideline \"Modicon M580\n- BMENOC03.1 Ethernet Communications Schneider Electric Security Notification Module, Installation and Configuration Guide\" in the chapter \"Configuring IPSEC communications\":\n- Use a BMENUA0100 module and follow the instructions to configure IPSEC feature as described in the chapter \"Configuring the BMENUA0100 Cybersecurity Settings\".\n- Consider use of external firewall devices such as EAGLE40-07 from Belden to establish VPN connections for M340 \u0026 M580 architectures. For more details refer to the chapter \"How to protect M580 and M340 architectures with EAGLE40 using VPN\".\n- Ensure the M580 CPU is running with the memory protection activated by configuring the input bit to a physical input, for more details refer to the following guideline \"Modicon Controllers Platform Cyber Security Reference Manual\", \"CPU Memory Protection section\".\n- The CPU memory protection cannot be configured with M580 Hot Standby CPUs. In such cases, use IPsec encrypted communication .\n\nModicon M580 CPU Safety (part numbers BMEP58S and BMEH58S):\n\n- Firmware SV4.21 includes a fix for CVE-2023-6408 and is available for download. Important: users needs to use version of EcoStruxure Control Expert v16.0 HF001 minimum to connect with the latest version of M580 CPU Safety.\n- If users choose not to apply the remediation, they are encouraged to immediately apply the following mitigations to reduce the risk of exploit:\n- Set up an application password in the project properties.\n- Setup network segmentation and implement a firewall to block all unauthorized access to Port 502/TCP.\n- Configure the Access Control List following the recommendations of \"Modicon M580, Hardware, Reference Manual\"\n- Set up a secure communication according to the following guideline \"Modicon Controllers Platform Cyber Security Reference Manual,\" in chapter \"Set up secured communications\".\n- Use a BMENOC module and follow the instructions to configure IPSEC feature as described in the guideline \"Modicon M580\n- BMENOC03.1 Ethernet Communications Schneider Electric Security Notification Module, Installation and Configuration Guide\" in the chapter \"Configuring IPSEC communications\": https://www.se.com/ww/en/download/document/HRB62665/\n- Use a BMENUA0100 module and follow the instructions to configure IPSEC feature as described in the chapter \"Configuring the BMENUA0100 Cybersecurity Settings\"\n- Consider use of external firewall devices such as EAGLE40-07 from Belden to establish VPN connections for M340 \u0026 M580 architectures. For more details refer to the chapter \"How to protect M580 and M340 architectures with EAGLE40 using VPN\"\n- Ensure the M580 CPU is running with the memory protection activated by configuring the input bit to a physical input, for more details refer to the following guideline \"Modicon Controllers Platform Cyber Security Reference Manual\", \"CPU Memory Protection section\"\n- NOTE: The CPU memory protection cannot be configured with M580 Hot Standby CPUs. In such cases, use IPsec encrypted communication.\n- To further reduce the attack surface on Modicon M580 CPU Safety: Ensure the CPU is running in Safety mode and maintenance input is configured to maintain this Safety mode during operation – refer to the document Modicon M580 - Safety System Planning Guide - in the chapter \"Operating Mode Transitions\".\n- Schneider Electric is establishing a remediation plan for all future versions of EcoStruxure Process Expert that will include a fix for CVE-2023-6409 and CVE-2023-27975. They will update SEVD-2024-317-04 when the remediation is available.\nUntil then, users should immediately apply the above mitigations to reduce the risk of exploit.\n\nModicon MC80 (part numbers BMKC80):\n\n- Set up an application password in the project properties.\n- Set up network segmentation and implement a firewall to block all unauthorized access to Port 502/TCP.\n- Configure the access control list following the recommendations of \"Modicon MC80 Programmable Logic Controller (PLC) manual\" in the chapter \"Access Control List (ACL)\" a secure communication according to \"Modicon Controller Systems Cybersecurity, User Guide\" in chapter \"Set Up Encrypted Communication\".\n- (CVE-2023-6408) Schneider Electric Modicon Momentum Unity M1E Processor (171CBU*) All versions: Setup an application password in the project properties\n - Setup network segmentation and implement a firewall to block all unauthorized access to Port 502/TCP\n - Setup a secure communication according to the following guideline \"Modicon Controller Systems Cybersecurity, User Guide\" in chapter \"Set Up Encrypted Communication\":\n\nEcoStruxure Control Expert:\n\n- Version 16.0 includes a fix for these vulnerabilities and is available for download. Reboot the computer after installation is completed.\n- Enable encryption on application project and store application files in secure location with restricted access only for legitimate users.\n- Schneider Electric recommends using McAfee Application and Change Control software for application control. Refer to the Cybersecurity Application Note.\n- Follow workstation, network and site-hardening guidelines in the Recommended Cybersecurity Best Practices.\n\nEcoStruxure Process Expert:\n\n- Version 15.3 HF008 includes the fix for these vulnerabilities and is available for download.\n- EcoStruxure Process Expert manages application files within its database in secure way. Do not export \u0026 store them outside the application.\n- Schneider Electric recommends using McAfee Application and Change Control software for application control. Refer to the Cybersecurity Application Note.\n- Follow workstation, network and site-hardening guidelines in the Recommended Cybersecurity Best Practices.\n\nFor more information refer to the Schneider Electric Recommended Cybersecurity Best Practices and the associated Schneider Electric Security Notification SEVD-2024-044-01 in PDF and CSAF.","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2025-02-05T00:00:00","cvss":{"cvssv3_score":8.1,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C","cvssv3_temporal_score":7.1,"rating":null,"cvssv2_vector_base":"AV:N/AC:H/Au:N/C:C/I:C/A:C","cvssv3_vector_base":"AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H","cvssv4_vector":null,"cvssv2_temporal_score":5.6,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":7.6,"cvssv3_temporal_vector_base":"E:U/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:U/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"High","cvssv3_risk_factor":"High","cvssv4_risk_factor":null},"vpr_score":"6.7","script_family":"Tenable.ot","xrefs":{"CWE":["924"]},"pluginPublicationDate":"2/5/2025","pluginModificationDate":"2/6/2025","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Medium","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"High","cvssV3Severity":"High","cvssV4Severity":null,"vprSeverity":"Medium","severity":"High"},"sort":[1738713600000,"502835"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502834","_score":null,"_source":{"plugin_modification_date":"2025-01-31T00:00:00","references":[{"id_type":"CWE","id":"284","type":"classifiers","url":null},{"id_type":"cve","id":"CVE-2016-7792","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7792"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.securityfocus.com/bid/93270"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?150ddc85"}],"description":"Ubiquiti Networks UniFi 5.2.7 does not restrict access to the database, which allows remote attackers to modify the database by directly connecting to it.\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"High","script_id":"502834","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Ubiquiti Networks UniFi Improper Access Control (CVE-2016-7792)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"Refer to the vendor advisory.","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2025-01-30T00:00:00","cvss":{"cvssv3_score":8.8,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:A/AC:L/Au:N/C:C/I:C/A:C","cvssv3_temporal_score":7.9,"rating":null,"cvssv2_vector_base":"AV:A/AC:L/Au:N/C:C/I:C/A:C","cvssv3_vector_base":"AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","cvssv4_vector":null,"cvssv2_temporal_score":6.5,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":8.3,"cvssv3_temporal_vector_base":"E:P/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:P/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"High","cvssv3_risk_factor":"High","cvssv4_risk_factor":null},"vpr_score":"6.7","script_family":"Tenable.ot","xrefs":{"CWE":["284"]},"pluginPublicationDate":"1/30/2025","pluginModificationDate":"1/31/2025","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Medium","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"High","cvssV3Severity":"High","cvssV4Severity":null,"vprSeverity":"Medium","severity":"High"},"sort":[1738195200000,"502834"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502833","_score":null,"_source":{"plugin_modification_date":"2025-01-31T00:00:00","references":[{"id_type":"CWE","id":"290","type":"classifiers","url":null},{"id_type":"cve","id":"CVE-2022-4098","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4098"},{"id_type":null,"id":null,"type":"unknown","url":"https://cert.vde.com/en/advisories/VDE-2022-057/"}],"description":"Multiple Wiesemann\u0026Theis products of the ComServer Series are prone to an authentication bypass through IP spoofing. After a user logged in to the WBM of the Com-Server an unauthenticated attacker in the same subnet can obtain the session ID and through IP spoofing change arbitrary settings by crafting modified HTTP Get requests. This may result in a complete takeover of the device.\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"High","script_id":"502833","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Wiesemann \u0026 Theis ComServer Series Authentication Bypass by Spoofing (CVE-2022-4098)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"Refer to the vendor advisory.","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2025-01-30T00:00:00","cvss":{"cvssv3_score":8,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:A/AC:L/Au:N/C:C/I:C/A:C","cvssv3_temporal_score":7,"rating":null,"cvssv2_vector_base":"AV:A/AC:L/Au:N/C:C/I:C/A:C","cvssv3_vector_base":"AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","cvssv4_vector":null,"cvssv2_temporal_score":6.1,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":8.3,"cvssv3_temporal_vector_base":"E:U/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:U/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"High","cvssv3_risk_factor":"High","cvssv4_risk_factor":null},"vpr_score":"5.9","script_family":"Tenable.ot","xrefs":{"CWE":["290"]},"pluginPublicationDate":"1/30/2025","pluginModificationDate":"1/31/2025","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Medium","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"High","cvssV3Severity":"High","cvssV4Severity":null,"vprSeverity":"Medium","severity":"High"},"sort":[1738195200000,"502833"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502832","_score":null,"_source":{"plugin_modification_date":"2025-01-31T00:00:00","references":[{"id_type":"CWE","id":"306","type":"classifiers","url":null},{"id_type":"cve","id":"CVE-2022-42785","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42785"},{"id_type":null,"id":null,"type":"unknown","url":"https://cert.vde.com/de/advisories/VDE-2022-043/"}],"description":"Multiple W\u0026T products of the ComServer Series are prone to an authentication bypass. An unathenticated remote attacker, can log in without knowledge of the password by crafting a modified HTTP GET Request.\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"Critical","script_id":"502832","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Wiesemann \u0026 Theis ComServer Series Missing Authentication for Critical Function (CVE-2022-42785)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"Refer to the vendor advisory.","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2025-01-30T00:00:00","cvss":{"cvssv3_score":9.8,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C","cvssv3_temporal_score":8.5,"rating":null,"cvssv2_vector_base":"AV:N/AC:L/Au:N/C:C/I:C/A:C","cvssv3_vector_base":"AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","cvssv4_vector":null,"cvssv2_temporal_score":7.4,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":10,"cvssv3_temporal_vector_base":"E:U/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:U/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"Critical","cvssv3_risk_factor":"Critical","cvssv4_risk_factor":null},"vpr_score":"5.9","script_family":"Tenable.ot","xrefs":{"CWE":["306"]},"pluginPublicationDate":"1/30/2025","pluginModificationDate":"1/31/2025","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Medium","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Critical","cvssV3Severity":"Critical","cvssV4Severity":null,"vprSeverity":"Medium","severity":"Critical"},"sort":[1738195200000,"502832"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502831","_score":null,"_source":{"plugin_modification_date":"2025-01-31T00:00:00","references":[{"id_type":"CWE","id":"330","type":"classifiers","url":null},{"id_type":"cve","id":"CVE-2022-42787","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42787"},{"id_type":null,"id":null,"type":"unknown","url":"https://cert.vde.com/de/advisories/VDE-2022-043"}],"description":"Multiple W\u0026T products of the Comserver Series use a small number space for allocating sessions ids. After login of an user an unathenticated remote attacker can brute force the users session id and get access to his account on the the device. As the user needs to log in for the attack to be successful a user interaction is required.\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"Critical","script_id":"502831","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Wiesemann \u0026 Theis ComServer Use of Insufficiently Random Values (CVE-2022-42787)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"Refer to the vendor advisory.","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2025-01-30T00:00:00","cvss":{"cvssv3_score":8.8,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C","cvssv3_temporal_score":7.7,"rating":null,"cvssv2_vector_base":"AV:N/AC:L/Au:N/C:C/I:C/A:C","cvssv3_vector_base":"AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","cvssv4_vector":null,"cvssv2_temporal_score":7.4,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":10,"cvssv3_temporal_vector_base":"E:U/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:U/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"Critical","cvssv3_risk_factor":"High","cvssv4_risk_factor":null},"vpr_score":"5.9","script_family":"Tenable.ot","xrefs":{"CWE":["330"]},"pluginPublicationDate":"1/30/2025","pluginModificationDate":"1/31/2025","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Medium","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Critical","cvssV3Severity":"High","cvssV4Severity":null,"vprSeverity":"Medium","severity":"Critical"},"sort":[1738195200000,"502831"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502830","_score":null,"_source":{"plugin_modification_date":"2025-01-31T00:00:00","references":[{"id_type":"CWE","id":"79","type":"classifiers","url":null},{"id_type":"cve","id":"CVE-2022-42786","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42786"},{"id_type":null,"id":null,"type":"unknown","url":"https://cert.vde.com/de/advisories/VDE-2022-043/"}],"description":"Multiple W\u0026T Products of the ComServer Series are prone to an XSS attack. An authenticated remote Attacker can execute arbitrary web scripts or HTML via a crafted payload injected into the title of the configuration webpage\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"Medium","script_id":"502830","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Wiesemann \u0026 Theis ComServer Series Improper Neutralization of Input During Web Page Generation (CVE-2022-42786)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"Refer to the vendor advisory.","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2025-01-30T00:00:00","cvss":{"cvssv3_score":5.4,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:N","cvssv3_temporal_score":4.7,"rating":null,"cvssv2_vector_base":"AV:N/AC:L/Au:S/C:P/I:P/A:N","cvssv3_vector_base":"AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","cvssv4_vector":null,"cvssv2_temporal_score":4.1,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":5.5,"cvssv3_temporal_vector_base":"E:U/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:U/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"Medium","cvssv3_risk_factor":"Medium","cvssv4_risk_factor":null},"vpr_score":"3.0","script_family":"Tenable.ot","xrefs":{"CWE":["79"]},"pluginPublicationDate":"1/30/2025","pluginModificationDate":"1/31/2025","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Low","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Medium","cvssV3Severity":"Medium","cvssV4Severity":null,"vprSeverity":"Low","severity":"Medium"},"sort":[1738195200000,"502830"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502829","_score":null,"_source":{"plugin_modification_date":"2025-01-28T00:00:00","references":[{"id_type":"CWE","id":"24","type":"classifiers","url":null},{"id_type":"cve","id":"CVE-2024-22079","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22079"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.elspec-ltd.com/support/security-advisories/"}],"description":"An issue was discovered in Elspec G5 digital fault recorder. Directory traversal can occur via the system logs download mechanism.\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"High","script_id":"502829","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Elspec G5 Digital Fault Recorder Path Traversal (CVE-2024-22079)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"Refer to the vendor advisory.","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2025-01-27T00:00:00","cvss":{"cvssv3_score":7.5,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":null,"cvssv3_temporal_score":6.5,"rating":null,"cvssv3_vector_base":"AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":null,"cvssv3_temporal_vector_base":"E:U/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:U/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":null,"cvssv3_risk_factor":"High","cvssv4_risk_factor":null},"vpr_score":"3.6","script_family":"Tenable.ot","xrefs":{"CWE":["24"]},"pluginPublicationDate":"1/27/2025","pluginModificationDate":"1/28/2025","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Low","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"High","cvssV3Severity":"High","cvssV4Severity":null,"vprSeverity":"Low","severity":"High"},"sort":[1737936000000,"502829"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502828","_score":null,"_source":{"plugin_modification_date":"2025-01-28T00:00:00","references":[{"id_type":"CWE","id":"444","type":"classifiers","url":null},{"id_type":"cve","id":"CVE-2024-22081","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22081"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.elspec-ltd.com/support/security-advisories/"}],"description":"An issue was discovered in Elspec G5 digital fault recorder. Unauthenticated memory corruption can occur in the HTTP header parsing mechanism.\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"Critical","script_id":"502828","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Elspec G5 Digital Fault Recorder Inconsistent Interpretation of HTTP Requests (CVE-2024-22081)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"Refer to the vendor advisory.","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2025-01-27T00:00:00","cvss":{"cvssv3_score":9.8,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":null,"cvssv3_temporal_score":8.5,"rating":null,"cvssv3_vector_base":"AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":null,"cvssv3_temporal_vector_base":"E:U/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:U/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":null,"cvssv3_risk_factor":"Critical","cvssv4_risk_factor":null},"vpr_score":"5.9","script_family":"Tenable.ot","xrefs":{"CWE":["444"]},"pluginPublicationDate":"1/27/2025","pluginModificationDate":"1/28/2025","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Medium","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Critical","cvssV3Severity":"Critical","cvssV4Severity":null,"vprSeverity":"Medium","severity":"Critical"},"sort":[1737936000000,"502828"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502827","_score":null,"_source":{"plugin_modification_date":"2025-01-28T00:00:00","references":[{"id_type":"CWE","id":"280","type":"classifiers","url":null},{"id_type":"cve","id":"CVE-2024-22078","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22078"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.elspec-ltd.com/support/security-advisories/"}],"description":"An issue was discovered in Elspec G5 digital fault recorder. Privilege escalation can occur via world writable files. The network configuration script has weak filesystem permissions. This results in write access for all authenticated users and the possibility to escalate from user privileges to administrative privileges.\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"High","script_id":"502827","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Elspec G5 Digital Fault Recorder Improper Handling of Insufficient Permissions or Privileges (CVE-2024-22078)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"Refer to the vendor advisory.","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2025-01-27T00:00:00","cvss":{"cvssv3_score":8.8,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":null,"cvssv3_temporal_score":7.7,"rating":null,"cvssv3_vector_base":"AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":null,"cvssv3_temporal_vector_base":"E:U/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:U/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":null,"cvssv3_risk_factor":"High","cvssv4_risk_factor":null},"vpr_score":"5.9","script_family":"Tenable.ot","xrefs":{"CWE":["280"]},"pluginPublicationDate":"1/27/2025","pluginModificationDate":"1/28/2025","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Medium","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"High","cvssV3Severity":"High","cvssV4Severity":null,"vprSeverity":"Medium","severity":"High"},"sort":[1737936000000,"502827"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502826","_score":null,"_source":{"plugin_modification_date":"2025-01-28T00:00:00","references":[{"id_type":"CWE","id":"611","type":"classifiers","url":null},{"id_type":"cve","id":"CVE-2024-46603","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46603"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.elspec-ltd.com/support/security-advisories/"}],"description":"An issue was discovered in Elspec G5 digital fault recorder. An XML External Entity (XXE) vulnerability may allow an attacker to cause a Denial of Service (DoS) via a crafted XML payload.\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"High","script_id":"502826","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Elspec G5 Digital Fault Recorder Improper Restriction of XML External Entity Reference (CVE-2024-46603)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"Refer to the vendor advisory.","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2025-01-27T00:00:00","cvss":{"cvssv3_score":7.5,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":null,"cvssv3_temporal_score":6.5,"rating":null,"cvssv3_vector_base":"AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":null,"cvssv3_temporal_vector_base":"E:U/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:U/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":null,"cvssv3_risk_factor":"High","cvssv4_risk_factor":null},"vpr_score":"3.6","script_family":"Tenable.ot","xrefs":{"CWE":["611"]},"pluginPublicationDate":"1/27/2025","pluginModificationDate":"1/28/2025","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Low","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"High","cvssV3Severity":"High","cvssV4Severity":null,"vprSeverity":"Low","severity":"High"},"sort":[1737936000000,"502826"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502825","_score":null,"_source":{"plugin_modification_date":"2025-01-28T00:00:00","references":[{"id_type":"CWE","id":"119","type":"classifiers","url":null},{"id_type":"cve","id":"CVE-2024-22080","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22080"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.elspec-ltd.com/support/security-advisories/"}],"description":"An issue was discovered in Elspec G5 digital fault recorder. Unauthenticated memory corruption can occur during XML body parsing.\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"Critical","script_id":"502825","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Elspec G5 Digital Fault Recorder Improper Restriction of Operations within the Bounds of a Memory Buffer (CVE-2024-22080)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"Refer to the vendor advisory.","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2025-01-27T00:00:00","cvss":{"cvssv3_score":9.8,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":null,"cvssv3_temporal_score":8.5,"rating":null,"cvssv3_vector_base":"AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":null,"cvssv3_temporal_vector_base":"E:U/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:U/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":null,"cvssv3_risk_factor":"Critical","cvssv4_risk_factor":null},"vpr_score":"5.9","script_family":"Tenable.ot","xrefs":{"CWE":["119"]},"pluginPublicationDate":"1/27/2025","pluginModificationDate":"1/28/2025","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Medium","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Critical","cvssV3Severity":"Critical","cvssV4Severity":null,"vprSeverity":"Medium","severity":"Critical"},"sort":[1737936000000,"502825"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502824","_score":null,"_source":{"plugin_modification_date":"2025-01-28T00:00:00","references":[{"id_type":"CWE","id":"79","type":"classifiers","url":null},{"id_type":"cve","id":"CVE-2024-46602","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46602"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.elspec-ltd.com/support/security-advisories/"}],"description":"An issue was discovered in Elspec G5 digital fault recorder. A stored cross-site scripting (XSS) vulnerability may allow an attacker to execute arbitrary web scripts or HTML.\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"High","script_id":"502824","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Elspec G5 Digital Fault Recorder Stored Cross-Site Scripting (CVE-2024-46602)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"Refer to the vendor advisory.","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2025-01-27T00:00:00","cvss":{"cvssv3_score":7.5,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":null,"cvssv3_temporal_score":6.5,"rating":null,"cvssv3_vector_base":"AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":null,"cvssv3_temporal_vector_base":"E:U/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:U/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":null,"cvssv3_risk_factor":"High","cvssv4_risk_factor":null},"vpr_score":"3.6","script_family":"Tenable.ot","xrefs":{"CWE":["79"]},"pluginPublicationDate":"1/27/2025","pluginModificationDate":"1/28/2025","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Low","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"High","cvssV3Severity":"High","cvssV4Severity":null,"vprSeverity":"Low","severity":"High"},"sort":[1737936000000,"502824"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502823","_score":null,"_source":{"plugin_modification_date":"2025-01-28T00:00:00","references":[{"id_type":"CWE","id":"276","type":"classifiers","url":null},{"id_type":"cve","id":"CVE-2024-22085","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22085"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.elspec-ltd.com/support/security-advisories/"}],"description":"An issue was discovered in Elspec G5 digital fault recorder. The shadow file is world readable\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"Medium","script_id":"502823","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Elspec G5 Digital Fault Recorder Incorrect Default Permissions (CVE-2024-22085)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"Refer to the vendor advisory.","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2025-01-27T00:00:00","cvss":{"cvssv3_score":6.2,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":null,"cvssv3_temporal_score":5.4,"rating":null,"cvssv3_vector_base":"AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":null,"cvssv3_temporal_vector_base":"E:U/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:U/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":null,"cvssv3_risk_factor":"Medium","cvssv4_risk_factor":null},"vpr_score":"3.6","script_family":"Tenable.ot","xrefs":{"CWE":["276"]},"pluginPublicationDate":"1/27/2025","pluginModificationDate":"1/28/2025","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Low","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Medium","cvssV3Severity":"Medium","cvssV4Severity":null,"vprSeverity":"Low","severity":"Medium"},"sort":[1737936000000,"502823"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502822","_score":null,"_source":{"plugin_modification_date":"2025-01-28T00:00:00","references":[{"id_type":"CWE","id":"798","type":"classifiers","url":null},{"id_type":"cve","id":"CVE-2024-22083","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22083"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.elspec-ltd.com/support/security-advisories/"}],"description":"An issue was discovered in Elspec G5 digital fault recorder. A hardcoded backdoor session ID exists that can be used for further access to the device, including reconfiguration tasks.\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"Medium","script_id":"502822","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Elspec G5 Digital Fault Recorder Use of Hard-coded Credentials (CVE-2024-22083)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"Refer to the vendor advisory.","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2025-01-27T00:00:00","cvss":{"cvssv3_score":6.5,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":null,"cvssv3_temporal_score":5.7,"rating":null,"cvssv3_vector_base":"AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L/E:U/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L","cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":null,"cvssv3_temporal_vector_base":"E:U/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:U/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":null,"cvssv3_risk_factor":"Medium","cvssv4_risk_factor":null},"vpr_score":"2.5","script_family":"Tenable.ot","xrefs":{"CWE":["798"]},"pluginPublicationDate":"1/27/2025","pluginModificationDate":"1/28/2025","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Low","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Medium","cvssV3Severity":"Medium","cvssV4Severity":null,"vprSeverity":"Low","severity":"Medium"},"sort":[1737936000000,"502822"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502821","_score":null,"_source":{"plugin_modification_date":"2025-01-28T00:00:00","references":[{"id_type":"CWE","id":"280","type":"classifiers","url":null},{"id_type":"cve","id":"CVE-2024-22077","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22077"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.elspec-ltd.com/support/security-advisories/"}],"description":"An issue was discovered in Elspec G5 digital fault recorder. The SQLite database file has weak permissions.\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"Medium","script_id":"502821","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Elspec G5 Digital Fault Recorder Improper Handling of Insufficient Permissions or Privileges (CVE-2024-22077)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"Refer to the vendor advisory.","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2025-01-27T00:00:00","cvss":{"cvssv3_score":5.3,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":null,"cvssv3_temporal_score":4.6,"rating":null,"cvssv3_vector_base":"AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":null,"cvssv3_temporal_vector_base":"E:U/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:U/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":null,"cvssv3_risk_factor":"Medium","cvssv4_risk_factor":null},"vpr_score":"1.4","script_family":"Tenable.ot","xrefs":{"CWE":["280"]},"pluginPublicationDate":"1/27/2025","pluginModificationDate":"1/28/2025","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Low","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Medium","cvssV3Severity":"Medium","cvssV4Severity":null,"vprSeverity":"Low","severity":"Medium"},"sort":[1737936000000,"502821"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502820","_score":null,"_source":{"plugin_modification_date":"2025-01-28T00:00:00","references":[{"id_type":"CWE","id":"787","type":"classifiers","url":null},{"id_type":"cve","id":"CVE-2021-30047","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30047"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.elspec-ltd.com/support/security-advisories/"}],"description":"Outdated vsftpd service with known DoS issue.\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"High","script_id":"502820","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Elspec G5 Digital Fault Recorder VsFTPd Service Denial of Service (CVE-2021-30047)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"Refer to the vendor advisory.","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2025-01-27T00:00:00","cvss":{"cvssv3_score":7.5,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C","cvssv3_temporal_score":6.7,"rating":null,"cvssv2_vector_base":"AV:N/AC:L/Au:N/C:N/I:N/A:C","cvssv3_vector_base":"AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","cvssv4_vector":null,"cvssv2_temporal_score":6.1,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":7.8,"cvssv3_temporal_vector_base":"E:P/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:P/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"High","cvssv3_risk_factor":"High","cvssv4_risk_factor":null},"vpr_score":"4.4","script_family":"Tenable.ot","xrefs":{"CWE":["787"]},"pluginPublicationDate":"1/27/2025","pluginModificationDate":"1/28/2025","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Medium","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"High","cvssV3Severity":"High","cvssV4Severity":null,"vprSeverity":"Medium","severity":"High"},"sort":[1737936000000,"502820"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502819","_score":null,"_source":{"plugin_modification_date":"2025-01-28T00:00:00","references":[{"id_type":"CWE","id":"120","type":"classifiers","url":null},{"id_type":"cve","id":"CVE-2024-46601","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46601"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.elspec-ltd.com/support/security-advisories/"}],"description":"An issue was discovered in Elspec G5 digital fault recorder. A buffer overflow vulnerability may allow an attacker to execute arbitrary code on the operating system.\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"High","script_id":"502819","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Elspec G5 Digital Fault Recorder Buffer Overflow (CVE-2024-46601)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"Refer to the vendor advisory.","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2025-01-27T00:00:00","cvss":{"cvssv3_score":7.5,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":null,"cvssv3_temporal_score":6.5,"rating":null,"cvssv3_vector_base":"AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":null,"cvssv3_temporal_vector_base":"E:U/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:U/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":null,"cvssv3_risk_factor":"High","cvssv4_risk_factor":null},"vpr_score":"3.6","script_family":"Tenable.ot","xrefs":{"CWE":["120"]},"pluginPublicationDate":"1/27/2025","pluginModificationDate":"1/28/2025","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Low","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"High","cvssV3Severity":"High","cvssV4Severity":null,"vprSeverity":"Low","severity":"High"},"sort":[1737936000000,"502819"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502818","_score":null,"_source":{"plugin_modification_date":"2025-01-28T00:00:00","references":[{"id_type":"CWE","id":"312","type":"classifiers","url":null},{"id_type":"cve","id":"CVE-2024-22084","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22084"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.elspec-ltd.com/support/security-advisories/"}],"description":"An issue was discovered in Elspec G5 digital fault recorder. Cleartext passwords and hashes are exposed through log files\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"High","script_id":"502818","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Elspec G5 Digital Fault Recorder Cleartext Storage of Sensitive Information (CVE-2024-22084)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"Refer to the vendor advisory.","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2025-01-27T00:00:00","cvss":{"cvssv3_score":7.5,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":null,"cvssv3_temporal_score":6.5,"rating":null,"cvssv3_vector_base":"AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":null,"cvssv3_temporal_vector_base":"E:U/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:U/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":null,"cvssv3_risk_factor":"High","cvssv4_risk_factor":null},"vpr_score":"3.6","script_family":"Tenable.ot","xrefs":{"CWE":["312"]},"pluginPublicationDate":"1/27/2025","pluginModificationDate":"1/28/2025","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Low","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"High","cvssV3Severity":"High","cvssV4Severity":null,"vprSeverity":"Low","severity":"High"},"sort":[1737936000000,"502818"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502817","_score":null,"_source":{"plugin_modification_date":"2025-01-28T00:00:00","references":[{"id_type":"CWE","id":"548","type":"classifiers","url":null},{"id_type":"cve","id":"CVE-2024-22082","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22082"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.elspec-ltd.com/support/security-advisories/"}],"description":"An issue was discovered in Elspec G5 digital fault recorder. Unauthenticated directory listing can occur: the web interface cay be abused by an attacker get a better understanding of the operating system.\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"High","script_id":"502817","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Elspec G5 Digital Fault Recorder Exposure of Information Through Directory Listing (CVE-2024-22082)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"Refer to the vendor advisory.","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2025-01-27T00:00:00","cvss":{"cvssv3_score":7.5,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":null,"cvssv3_temporal_score":6.5,"rating":null,"cvssv3_vector_base":"AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":null,"cvssv3_temporal_vector_base":"E:U/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:U/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":null,"cvssv3_risk_factor":"High","cvssv4_risk_factor":null},"vpr_score":"3.6","script_family":"Tenable.ot","xrefs":{"CWE":["548"]},"pluginPublicationDate":"1/27/2025","pluginModificationDate":"1/28/2025","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Low","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"High","cvssV3Severity":"High","cvssV4Severity":null,"vprSeverity":"Low","severity":"High"},"sort":[1737936000000,"502817"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502816","_score":null,"_source":{"plugin_modification_date":"2025-01-24T00:00:00","references":[{"id_type":"CWE","id":"798","type":"classifiers","url":null},{"id_type":"cve","id":"CVE-2022-4333","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4333"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?beebbba8"}],"description":"Hardcoded Credentials in multiple SPRECON-E CPU variants of Sprecher Automation allows an remote attacker to take over the device. These accounts should be deactivated according to Sprecher's hardening guidelines.\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"Critical","script_id":"502816","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Sprecher Automation SPRECON-E Use of Hard-coded Credentials (CVE-2022-4333)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"It is recommended to check if maintenance access is disabled. Additionally, access to devices’ configuration files that are stored on engineering PC systems shall be limited and monitored. Overall, SPRECON hardening guidelines are always recommended to be implemented in case this has not been done so far.","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2025-01-23T00:00:00","cvss":{"cvssv3_score":9.8,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C","cvssv3_temporal_score":8.5,"rating":null,"cvssv2_vector_base":"AV:N/AC:L/Au:N/C:C/I:C/A:C","cvssv3_vector_base":"AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","cvssv4_vector":null,"cvssv2_temporal_score":7.4,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":10,"cvssv3_temporal_vector_base":"E:U/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:U/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"Critical","cvssv3_risk_factor":"Critical","cvssv4_risk_factor":null},"vpr_score":"5.9","script_family":"Tenable.ot","xrefs":{"CWE":["798"]},"pluginPublicationDate":"1/23/2025","pluginModificationDate":"1/24/2025","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Medium","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Critical","cvssV3Severity":"Critical","cvssV4Severity":null,"vprSeverity":"Medium","severity":"Critical"},"sort":[1737590400000,"502816"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502815","_score":null,"_source":{"plugin_modification_date":"2025-01-24T00:00:00","references":[{"id_type":"CWE","id":"20","type":"classifiers","url":null},{"id_type":"cve","id":"CVE-2022-4332","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4332"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?c0541169"}],"description":"In Sprecher Automation SPRECON-E-C/P/T3 CPU in variant PU244x a vulnerable firmware verification has been identified. Through physical access and hardware manipulation, an attacker might be able to bypass hardware-based code verification and thus inject and execute arbitrary code and gain full access of the device.\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"High","script_id":"502815","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Sprecher Automation SPRECON-E-C/P/T3 Improper Input Validation (CVE-2022-4332)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"The access vector is bound to physical device access. Hence, it is recommended to emphasize physical security controls. See general recommendations.\nBesides this, it needs to be taken into account that necessary hardware manipulation to fully exploit this vulnerability requires to put the device out of operation for several time; i.e. device status monitoring as usually applied in substation automation is an important measure to also detect potential attacks.","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2025-01-23T00:00:00","cvss":{"cvssv3_score":6.8,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C","cvssv3_temporal_score":5.9,"rating":null,"cvssv2_vector_base":"AV:L/AC:L/Au:N/C:C/I:C/A:C","cvssv3_vector_base":"AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","cvssv4_vector":null,"cvssv2_temporal_score":5.3,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":7.2,"cvssv3_temporal_vector_base":"E:U/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:U/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"High","cvssv3_risk_factor":"Medium","cvssv4_risk_factor":null},"vpr_score":"5.9","script_family":"Tenable.ot","xrefs":{"CWE":["20"]},"pluginPublicationDate":"1/23/2025","pluginModificationDate":"1/24/2025","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Medium","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"High","cvssV3Severity":"Medium","cvssV4Severity":null,"vprSeverity":"Medium","severity":"High"},"sort":[1737590400000,"502815"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502814","_score":null,"_source":{"plugin_modification_date":"2025-01-23T00:00:00","references":[{"id_type":"CWE","id":"327","type":"classifiers","url":null},{"id_type":"cve","id":"CVE-2020-27653","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27653"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.synology.com/security/advisory/Synology_SA_20_14"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?e65a4948"}],"description":"Algorithm downgrade vulnerability in QuickConnect in Synology DiskStation Manager (DSM) before 6.2.3_25426 allows man-in-the-middle attackers to spoof servers and obtain sensitive information via unspecified vectors.\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"Medium","script_id":"502814","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Synology DSM Use of a Broken or Risky Cryptographic Algorithm (CVE-2020-27653)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"Refer to the vendor advisory.","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2025-01-22T00:00:00","cvss":{"cvssv3_score":8.3,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P","cvssv3_temporal_score":7.5,"rating":null,"cvssv2_vector_base":"AV:N/AC:H/Au:N/C:P/I:P/A:P","cvssv3_vector_base":"AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H","cvssv4_vector":null,"cvssv2_temporal_score":4,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":5.1,"cvssv3_temporal_vector_base":"E:P/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:P/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"Medium","cvssv3_risk_factor":"High","cvssv4_risk_factor":null},"vpr_score":"7.3","script_family":"Tenable.ot","xrefs":{"CWE":["327"]},"pluginPublicationDate":"1/22/2025","pluginModificationDate":"1/23/2025","locale":"en","availableLocales":["en"],"vpr_risk_factor":"High","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Medium","cvssV3Severity":"High","cvssV4Severity":null,"vprSeverity":"High","severity":"Medium"},"sort":[1737504000000,"502814"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502813","_score":null,"_source":{"plugin_modification_date":"2025-01-23T00:00:00","references":[{"id_type":"CWE","id":"352","type":"classifiers","url":null},{"id_type":"ICSA","id":"25-021-02","type":"advisory","url":null},{"id_type":"cve","id":"CVE-2024-47100","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47100"},{"id_type":null,"id":null,"type":"unknown","url":"https://cert-portal.siemens.com/productcert/html/ssa-717113.html"},{"id_type":null,"id":null,"type":"unknown","url":"https://support.industry.siemens.com/cs/ww/en/view/109976907/"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.cisa.gov/news-events/ics-advisories/icsa-25-021-02"}],"description":"The web interface of the affected devices is vulnerable to Cross-Site Request Forgery (CSRF) attacks. This could allow an unauthenticated attacker to change the CPU mode by tricking a legitimate and authenticated user with sufficient permissions on the target CPU to click on a malicious link.\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"High","script_id":"502813","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Siemens SIMATIC S7-1200 CPUs Cross-Site Request Forgery (CVE-2024-47100)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"Refer to the vendor advisory.","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2025-01-22T00:00:00","cvss":{"cvssv3_score":7.1,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:C","cvssv3_temporal_score":6.4,"rating":null,"cvssv2_vector_base":"AV:N/AC:L/Au:N/C:N/I:P/A:C","cvssv3_vector_base":"AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H/E:P/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H","cvssv4_vector":null,"cvssv2_temporal_score":6.3,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":8.5,"cvssv3_temporal_vector_base":"E:P/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:P/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"High","cvssv3_risk_factor":"High","cvssv4_risk_factor":null},"vpr_score":"5.0","script_family":"Tenable.ot","xrefs":{"CWE":["352"],"ICSA":["25-021-02"]},"pluginPublicationDate":"1/22/2025","pluginModificationDate":"1/23/2025","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Medium","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"High","cvssV3Severity":"High","cvssV4Severity":null,"vprSeverity":"Medium","severity":"High"},"sort":[1737504000000,"502813"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502812","_score":null,"_source":{"plugin_modification_date":"2025-01-23T00:00:00","references":[{"id_type":"CWE","id":"552","type":"classifiers","url":null},{"id_type":"ICSA","id":"25-016-04","type":"advisory","url":null},{"id_type":"cve","id":"CVE-2024-53649","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53649"},{"id_type":null,"id":null,"type":"unknown","url":"https://cert-portal.siemens.com/productcert/html/ssa-194557.html"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.cisa.gov/news-events/ics-advisories/icsa-25-016-04"}],"description":"Affected devices do not properly limit the path accessible via their webserver. This could allow an authenticated remote attacker to read arbitrary files from the filesystem of affected devices.\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"Medium","script_id":"502812","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Siemens SIPROTEC 5 Files or Directories Accessible to External Parties (CVE-2024-53649)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"Refer to the vendor advisory.","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2025-01-20T00:00:00","cvss":{"cvssv3_score":6.5,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:N/AC:L/Au:S/C:C/I:N/A:N","cvssv3_temporal_score":5.7,"rating":null,"cvssv2_vector_base":"AV:N/AC:L/Au:S/C:C/I:N/A:N","cvssv3_vector_base":"AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","cvssv4_vector":null,"cvssv2_temporal_score":5,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":6.8,"cvssv3_temporal_vector_base":"E:U/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:U/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"Medium","cvssv3_risk_factor":"Medium","cvssv4_risk_factor":null},"vpr_score":"4.4","script_family":"Tenable.ot","xrefs":{"CWE":["552"],"ICSA":["25-016-04"]},"pluginPublicationDate":"1/20/2025","pluginModificationDate":"1/23/2025","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Medium","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Medium","cvssV3Severity":"Medium","cvssV4Severity":null,"vprSeverity":"Medium","severity":"Medium"},"sort":[1737331200000,"502812"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502811","_score":null,"_source":{"plugin_modification_date":"2025-01-06T00:00:00","references":[{"id_type":"CWE","id":"400","type":"classifiers","url":null},{"id_type":"CISA-KNOWN-EXPLOITED","id":"2023/10/31","type":"advisory","url":null},{"id_type":"CEA-ID","id":"CEA-2024-0004","type":"unknown","url":null},{"id_type":"cve","id":"CVE-2023-44487","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.openwall.com/lists/oss-security/2023/10/13/4"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.openwall.com/lists/oss-security/2023/10/13/9"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.openwall.com/lists/oss-security/2023/10/18/4"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.openwall.com/lists/oss-security/2023/10/18/8"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.openwall.com/lists/oss-security/2023/10/19/6"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.openwall.com/lists/oss-security/2023/10/20/8"},{"id_type":null,"id":null,"type":"unknown","url":"https://access.redhat.com/security/cve/cve-2023-44487"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?a1b880e9"},{"id_type":null,"id":null,"type":"unknown","url":"https://aws.amazon.com/security/security-bulletins/AWS-2023-011/"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?f8fe5c87"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?b5406717"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?be45f645"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?0537e63f"},{"id_type":null,"id":null,"type":"unknown","url":"https://blog.vespa.ai/cve-2023-44487/"},{"id_type":null,"id":null,"type":"unknown","url":"https://bugzilla.proxmox.com/show_bug.cgi?id=4988"},{"id_type":null,"id":null,"type":"unknown","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2242803"},{"id_type":null,"id":null,"type":"unknown","url":"https://bugzilla.suse.com/show_bug.cgi?id=1216123"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?ce3e9a68"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?c32c8c53"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?4c3cd3ed"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?ca8a93f5"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?d3d71903"},{"id_type":null,"id":null,"type":"unknown","url":"https://edg.io/lp/blog/resets-leaks-ddos-and-the-tale-of-a-hidden-cve"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?0c741aa8"},{"id_type":null,"id":null,"type":"unknown","url":"https://gist.github.com/adulau/7c2bfb8e9cdbe4b35a5e131c66a0c088"},{"id_type":null,"id":null,"type":"unknown","url":"https://github.com/Azure/AKS/issues/3947"},{"id_type":null,"id":null,"type":"unknown","url":"https://github.com/Kong/kong/discussions/11741"},{"id_type":null,"id":null,"type":"unknown","url":"https://github.com/advisories/GHSA-qppj-fm5r-hxr3"},{"id_type":null,"id":null,"type":"unknown","url":"https://github.com/advisories/GHSA-vx74-f528-fxqg"},{"id_type":null,"id":null,"type":"unknown","url":"https://github.com/advisories/GHSA-xpw8-rcwv-8f8p"},{"id_type":null,"id":null,"type":"unknown","url":"https://github.com/akka/akka-http/issues/4323"},{"id_type":null,"id":null,"type":"unknown","url":"https://github.com/alibaba/tengine/issues/1872"},{"id_type":null,"id":null,"type":"unknown","url":"https://github.com/apache/apisix/issues/10320"},{"id_type":null,"id":null,"type":"unknown","url":"https://github.com/apache/httpd-site/pull/10"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?549338dd"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?f3ee5f37"},{"id_type":null,"id":null,"type":"unknown","url":"https://github.com/apache/trafficserver/pull/10564"},{"id_type":null,"id":null,"type":"unknown","url":"https://github.com/arkrwn/PoC/tree/main/CVE-2023-44487"},{"id_type":null,"id":null,"type":"unknown","url":"https://github.com/bcdannyboy/CVE-2023-44487"},{"id_type":null,"id":null,"type":"unknown","url":"https://github.com/caddyserver/caddy/issues/5877"},{"id_type":null,"id":null,"type":"unknown","url":"https://github.com/caddyserver/caddy/releases/tag/v2.7.5"},{"id_type":null,"id":null,"type":"unknown","url":"https://github.com/dotnet/announcements/issues/277"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?085650ec"},{"id_type":null,"id":null,"type":"unknown","url":"https://github.com/eclipse/jetty.project/issues/10679"},{"id_type":null,"id":null,"type":"unknown","url":"https://github.com/envoyproxy/envoy/pull/30055"},{"id_type":null,"id":null,"type":"unknown","url":"https://github.com/etcd-io/etcd/issues/16740"},{"id_type":null,"id":null,"type":"unknown","url":"https://github.com/facebook/proxygen/pull/466"},{"id_type":null,"id":null,"type":"unknown","url":"https://github.com/golang/go/issues/63417"},{"id_type":null,"id":null,"type":"unknown","url":"https://github.com/grpc/grpc-go/pull/6703"},{"id_type":null,"id":null,"type":"unknown","url":"https://github.com/h2o/h2o/pull/3291"},{"id_type":null,"id":null,"type":"unknown","url":"https://github.com/h2o/h2o/security/advisories/GHSA-2m7v-gc89-fjqf"},{"id_type":null,"id":null,"type":"unknown","url":"https://github.com/haproxy/haproxy/issues/2312"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?207c3e1e"},{"id_type":null,"id":null,"type":"unknown","url":"https://github.com/junkurihara/rust-rpxy/issues/97"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?671e538e"},{"id_type":null,"id":null,"type":"unknown","url":"https://github.com/kazu-yamamoto/http2/issues/93"},{"id_type":null,"id":null,"type":"unknown","url":"https://github.com/kubernetes/kubernetes/pull/121120"},{"id_type":null,"id":null,"type":"unknown","url":"https://github.com/line/armeria/pull/5232"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?bca769b8"},{"id_type":null,"id":null,"type":"unknown","url":"https://github.com/micrictor/http2-rst-stream"},{"id_type":null,"id":null,"type":"unknown","url":"https://github.com/microsoft/CBL-Mariner/pull/6381"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?278c058f"},{"id_type":null,"id":null,"type":"unknown","url":"https://github.com/nghttp2/nghttp2/pull/1961"},{"id_type":null,"id":null,"type":"unknown","url":"https://github.com/nghttp2/nghttp2/releases/tag/v1.57.0"},{"id_type":null,"id":null,"type":"unknown","url":"https://github.com/ninenines/cowboy/issues/1615"},{"id_type":null,"id":null,"type":"unknown","url":"https://github.com/nodejs/node/pull/50121"},{"id_type":null,"id":null,"type":"unknown","url":"https://github.com/openresty/openresty/issues/930"},{"id_type":null,"id":null,"type":"unknown","url":"https://github.com/opensearch-project/data-prepper/issues/3474"},{"id_type":null,"id":null,"type":"unknown","url":"https://github.com/oqtane/oqtane.framework/discussions/3367"},{"id_type":null,"id":null,"type":"unknown","url":"https://github.com/projectcontour/contour/pull/5826"},{"id_type":null,"id":null,"type":"unknown","url":"https://github.com/tempesta-tech/tempesta/issues/1986"},{"id_type":null,"id":null,"type":"unknown","url":"https://github.com/varnishcache/varnish-cache/issues/3996"},{"id_type":null,"id":null,"type":"unknown","url":"https://groups.google.com/g/golang-announce/c/iNNxDTCjZvo"},{"id_type":null,"id":null,"type":"unknown","url":"https://istio.io/latest/news/security/istio-security-2023-004/"},{"id_type":null,"id":null,"type":"unknown","url":"https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/"},{"id_type":null,"id":null,"type":"unknown","url":"https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q"},{"id_type":null,"id":null,"type":"unknown","url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html"},{"id_type":null,"id":null,"type":"unknown","url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html"},{"id_type":null,"id":null,"type":"unknown","url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00024.html"},{"id_type":null,"id":null,"type":"unknown","url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00045.html"},{"id_type":null,"id":null,"type":"unknown","url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00047.html"},{"id_type":null,"id":null,"type":"unknown","url":"https://lists.debian.org/debian-lts-announce/2023/11/msg00001.html"},{"id_type":null,"id":null,"type":"unknown","url":"https://lists.debian.org/debian-lts-announce/2023/11/msg00012.html"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?703bea4f"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?0254b09d"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?fbc56a4b"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?e0f24fac"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?2f775382"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?198681ed"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?6bd76af3"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?f4925e56"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?5925ba24"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?15e705b5"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?719403b9"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?5bdf5fa7"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?f9b3ddfe"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?444699b3"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?72609613"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?848a1968"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?dc340493"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?c0580f4a"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?599d9cfc"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?0d77e313"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?750d74ff"},{"id_type":null,"id":null,"type":"unknown","url":"https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?737d31e0"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?ff833d1d"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?46ac6821"},{"id_type":null,"id":null,"type":"unknown","url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-44487"},{"id_type":null,"id":null,"type":"unknown","url":"https://my.f5.com/manage/s/article/K000137106"},{"id_type":null,"id":null,"type":"unknown","url":"https://netty.io/news/2023/10/10/4-1-100-Final.html"},{"id_type":null,"id":null,"type":"unknown","url":"https://news.ycombinator.com/item?id=37830987"},{"id_type":null,"id":null,"type":"unknown","url":"https://news.ycombinator.com/item?id=37830998"},{"id_type":null,"id":null,"type":"unknown","url":"https://news.ycombinator.com/item?id=37831062"},{"id_type":null,"id":null,"type":"unknown","url":"https://news.ycombinator.com/item?id=37837043"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?429494b7"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?b59b862f"},{"id_type":null,"id":null,"type":"unknown","url":"https://security.gentoo.org/glsa/202311-09"},{"id_type":null,"id":null,"type":"unknown","url":"https://security.netapp.com/advisory/ntap-20231016-0001/"},{"id_type":null,"id":null,"type":"unknown","url":"https://security.netapp.com/advisory/ntap-20240426-0007/"},{"id_type":null,"id":null,"type":"unknown","url":"https://security.netapp.com/advisory/ntap-20240621-0006/"},{"id_type":null,"id":null,"type":"unknown","url":"https://security.netapp.com/advisory/ntap-20240621-0007/"},{"id_type":null,"id":null,"type":"unknown","url":"https://security.paloaltonetworks.com/CVE-2023-44487"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?a0ff880f"},{"id_type":null,"id":null,"type":"unknown","url":"https://ubuntu.com/security/CVE-2023-44487"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?f85f1cd0"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?2ae59881"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?fa341e67"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.debian.org/security/2023/dsa-5521"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.debian.org/security/2023/dsa-5522"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.debian.org/security/2023/dsa-5540"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.debian.org/security/2023/dsa-5549"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.debian.org/security/2023/dsa-5558"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.debian.org/security/2023/dsa-5570"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?6afb6e5c"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?2cf47e27"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?bfa2ac7e"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.openwall.com/lists/oss-security/2023/10/10/6"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.phoronix.com/news/HTTP2-Rapid-Reset-Attack"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.theregister.com/2023/10/10/http2_rapid_reset_zeroday/"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?75d84160"}],"description":"The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"High","script_id":"502811","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Cisco Products Uncontrolled Resource Consumption (CVE-2023-44487)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"Refer to the vendor advisory.","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2025-01-06T00:00:00","cvss":{"cvssv3_score":7.5,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C","cvssv3_temporal_score":7,"rating":null,"cvssv2_vector_base":"AV:N/AC:L/Au:N/C:N/I:N/A:C","cvssv3_vector_base":"AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","cvssv4_vector":null,"cvssv2_temporal_score":6.4,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":7.8,"cvssv3_temporal_vector_base":"E:F/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:F/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"High","cvssv3_risk_factor":"High","cvssv4_risk_factor":null},"vpr_score":"6.7","script_family":"Tenable.ot","xrefs":{"CWE":["400"]},"pluginPublicationDate":"1/6/2025","pluginModificationDate":"1/6/2025","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Medium","cisaKnownExploitedDate":["10/31/2023"],"configurationMessages":[],"cvssV2Severity":"High","cvssV3Severity":"High","cvssV4Severity":null,"vprSeverity":"Medium","severity":"High"},"sort":[1736121600000,"502811"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502810","_score":null,"_source":{"plugin_modification_date":"2025-02-10T00:00:00","references":[{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?e6be68ee"}],"description":"The current plugin identifies Rockwell devices that are end-of-life, i.e., still supported but have a discontinued date announced. Rockwell Lifecycle Statuses:\n - Active: Most current offering within a product category. \n - Active Mature: Product is fully supported, but a newer product or family exists. Gain value by migrating. \n - End of Life: Discontinued date announced - actively execute migrations and last time buys. Product generally orderable until the discontinued date. \n - Discontinued: Product no longer manufactured or procured. Repair/exchange services may be available.","risk_factor":"Medium","script_id":"502810","available_languages":["en_US"],"synopsis":"Detection of Rockwell devices that are still supported but have a discontinued date announced.","script_name":"Rockwell Automation End-of-Life Devices Detection","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"Plan and initiate the transition to an actively supported product before the discontinuation date.","plugin_type":"local","sensor":"tenable_ot","plugin_publication_date":"2025-01-06T00:00:00","cvss":{"cvssv3_score":null,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":null,"cvssv3_temporal_score":null,"cvssv4_vector_base":null,"rating":null,"cvssv2_vector_base":null,"cvssv3_vector_base":null,"cvssv3_environmental_score":null,"cvssv3_vector":null,"cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv4_version":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv2_score":null,"cvssv3_temporal_vector_base":null,"cvssv3_version":null,"cvssv3_temporal_vector":null,"cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":null,"cvssv3_risk_factor":null,"cvssv4_risk_factor":null},"script_family":"Tenable.ot","xrefs":{},"pluginPublicationDate":"1/6/2025","pluginModificationDate":"2/10/2025","locale":"en","availableLocales":["en"],"vpr_risk_factor":null,"cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Medium","cvssV3Severity":null,"cvssV4Severity":null,"vprSeverity":null,"severity":"Medium"},"sort":[1736121600000,"502810"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502809","_score":null,"_source":{"plugin_modification_date":"2024-12-20T00:00:00","references":[{"id_type":"CWE","id":"20","type":"classifiers","url":null},{"id_type":"ICSA","id":"24-352-04","type":"advisory","url":null},{"id_type":"cve","id":"CVE-2024-11737","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11737"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?54857258"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.cisa.gov/news-events/ics-advisories/icsa-24-352-04"}],"description":"An improper input validation vulnerability exists that could lead to a denial-of-service and a loss of confidentiality and integrity in the controller when an unauthenticated crafted Modbus packet is sent to the device.\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"Critical","script_id":"502809","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Schneider Electric Modicon Improper Input Validation (CVE-2024-11737)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"Refer to the vendor advisory.","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2024-12-19T00:00:00","cvss":{"cvssv3_score":9.8,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":null,"cvssv3_temporal_score":8.5,"rating":null,"cvssv3_vector_base":"AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":null,"cvssv3_temporal_vector_base":"E:U/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:U/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":null,"cvssv3_risk_factor":"Critical","cvssv4_risk_factor":null},"vpr_score":"5.9","script_family":"Tenable.ot","xrefs":{"CWE":["20"],"ICSA":["24-352-04"]},"pluginPublicationDate":"12/19/2024","pluginModificationDate":"12/20/2024","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Medium","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Critical","cvssV3Severity":"Critical","cvssV4Severity":null,"vprSeverity":"Medium","severity":"Critical"},"sort":[1734566400000,"502809"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502808","_score":null,"_source":{"plugin_modification_date":"2024-12-20T00:00:00","references":[{"id_type":"CWE","id":"420","type":"classifiers","url":null},{"id_type":"ICSA","id":"24-352-03","type":"advisory","url":null},{"id_type":"cve","id":"CVE-2024-12371","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12371"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?019d53f7"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.cisa.gov/news-events/ics-advisories/icsa-24-352-03"}],"description":"A device takeover vulnerability exists in the affected product. This vulnerability allows configuration of a new Policyholder user without any authentication via API. Policyholder user is the most privileged user that can perform edit operations, creating admin users and performing factory reset.\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"Critical","script_id":"502808","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Rockwell Automation PowerMonitor 1000 Unprotected Alternate Channel (CVE-2024-12371)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"Rockwell Automation has corrected these problems in firmware revision 4.020 and recommends users upgrade to the latest version available","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2024-12-19T00:00:00","cvss":{"cvssv3_score":9.8,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":null,"cvssv3_temporal_score":8.5,"rating":null,"cvssv3_vector_base":"AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":null,"cvssv3_temporal_vector_base":"E:U/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:U/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":null,"cvssv3_risk_factor":"Critical","cvssv4_risk_factor":null},"vpr_score":"6.7","script_family":"Tenable.ot","xrefs":{"CWE":["420"],"ICSA":["24-352-03"]},"pluginPublicationDate":"12/19/2024","pluginModificationDate":"12/20/2024","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Medium","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Critical","cvssV3Severity":"Critical","cvssV4Severity":null,"vprSeverity":"Medium","severity":"Critical"},"sort":[1734566400000,"502808"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502807","_score":null,"_source":{"plugin_modification_date":"2024-12-20T00:00:00","references":[{"id_type":"CWE","id":"120","type":"classifiers","url":null},{"id_type":"ICSA","id":"24-352-03","type":"advisory","url":null},{"id_type":"cve","id":"CVE-2024-12373","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12373"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?019d53f7"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.cisa.gov/news-events/ics-advisories/icsa-24-352-03"}],"description":"A denial-of-service vulnerability exists in the affected product. The vulnerability results in a buffer overflow, potentially causing denial-of-service condition.\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"Critical","script_id":"502807","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Rockwell Automation PowerMonitor 1000 Classic Buffer Overflow (CVE-2024-12373)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"Rockwell Automation has corrected these problems in firmware revision 4.020 and recommends users upgrade to the latest version available","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2024-12-19T00:00:00","cvss":{"cvssv3_score":9.8,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":null,"cvssv3_temporal_score":8.5,"rating":null,"cvssv3_vector_base":"AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":null,"cvssv3_temporal_vector_base":"E:U/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:U/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":null,"cvssv3_risk_factor":"Critical","cvssv4_risk_factor":null},"vpr_score":"5.9","script_family":"Tenable.ot","xrefs":{"CWE":["120"],"ICSA":["24-352-03"]},"pluginPublicationDate":"12/19/2024","pluginModificationDate":"12/20/2024","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Medium","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Critical","cvssV3Severity":"Critical","cvssV4Severity":null,"vprSeverity":"Medium","severity":"Critical"},"sort":[1734566400000,"502807"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502806","_score":null,"_source":{"plugin_modification_date":"2024-12-20T00:00:00","references":[{"id_type":"CWE","id":"122","type":"classifiers","url":null},{"id_type":"ICSA","id":"24-352-03","type":"advisory","url":null},{"id_type":"cve","id":"CVE-2024-12372","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12372"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?019d53f7"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.cisa.gov/news-events/ics-advisories/icsa-24-352-03"}],"description":"A denial-of-service and possible remote code execution vulnerability exists in the affected product. The vulnerability results in corruption of the heap memory which may compromise the integrity of the system, potentially allowing for remote code execution or a denial-of-service attack.\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"Critical","script_id":"502806","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Rockwell Automation PowerMonitor 1000 Heap-Based Buffer Overflow (CVE-2024-12372)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"Rockwell Automation has corrected these problems in firmware revision 4.020 and recommends users upgrade to the latest version available","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2024-12-19T00:00:00","cvss":{"cvssv3_score":9.8,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":null,"cvssv3_temporal_score":8.5,"rating":null,"cvssv3_vector_base":"AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":null,"cvssv3_temporal_vector_base":"E:U/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:U/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":null,"cvssv3_risk_factor":"Critical","cvssv4_risk_factor":null},"vpr_score":"5.9","script_family":"Tenable.ot","xrefs":{"CWE":["122"],"ICSA":["24-352-03"]},"pluginPublicationDate":"12/19/2024","pluginModificationDate":"12/20/2024","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Medium","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Critical","cvssV3Severity":"Critical","cvssV4Severity":null,"vprSeverity":"Medium","severity":"Critical"},"sort":[1734566400000,"502806"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502805","_score":null,"_source":{"plugin_modification_date":"2024-12-19T00:00:00","references":[{"id_type":"CWE","id":"352","type":"classifiers","url":null},{"id_type":"ICSA","id":"24-347-03","type":"advisory","url":null},{"id_type":"cve","id":"CVE-2020-28398","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28398"},{"id_type":null,"id":null,"type":"unknown","url":"https://cert-portal.siemens.com/productcert/html/ssa-384652.html"},{"id_type":null,"id":null,"type":"unknown","url":"https://support.industry.siemens.com/cs/ww/en/view/109821187/"},{"id_type":null,"id":null,"type":"unknown","url":"https://www.cisa.gov/news-events/ics-advisories/icsa-24-347-03"}],"description":"The CLI feature in the web interface of affected devices is vulnerable to cross-site request forgery (CSRF). This could allow an attacker to read or modify the device configuration by tricking an authenticated legitimate user into accessing a malicious link.\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"Critical","script_id":"502805","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Siemens RUGGEDCOM ROX II Cross-Site Request Forgery (CVE-2020-28398)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"Only access links from trusted sources while authenticated in web interface of the affected devices.","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2024-12-18T00:00:00","cvss":{"cvssv3_score":8.8,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C","cvssv3_temporal_score":7.9,"rating":null,"cvssv2_vector_base":"AV:N/AC:L/Au:N/C:C/I:C/A:C","cvssv3_vector_base":"AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","cvssv4_vector":null,"cvssv2_temporal_score":7.4,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":10,"cvssv3_temporal_vector_base":"E:P/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:P/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"Critical","cvssv3_risk_factor":"High","cvssv4_risk_factor":null},"vpr_score":"5.9","script_family":"Tenable.ot","xrefs":{"CWE":["352"],"ICSA":["24-347-03"]},"pluginPublicationDate":"12/18/2024","pluginModificationDate":"12/19/2024","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Medium","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Critical","cvssV3Severity":"High","cvssV4Severity":null,"vprSeverity":"Medium","severity":"Critical"},"sort":[1734480000000,"502805"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502804","_score":null,"_source":{"plugin_modification_date":"2025-02-10T00:00:00","references":[{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?e6be68ee"}],"description":"The current plugin identifies Rockwell devices that are currently discontinued. Rockwell Lifecycle Statuses:\n - Active: Most current offering within a product category. \n - Active Mature: Product is fully supported, but a newer product or family exists. Gain value by migrating. \n - End of Life: Discontinued date announced - actively execute migrations and last time buys. Product generally orderable until the discontinued date. \n - Discontinued: Product no longer manufactured or procured. Repair/exchange services may be available.","risk_factor":"High","script_id":"502804","available_languages":["en_US"],"synopsis":"Detection of Rockwell devices that are discontinued and no longer supported.","script_name":"Rockwell Automation Discontinued Devices Detection","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"Migrate to a product that is actively supported.","plugin_type":"local","sensor":"tenable_ot","plugin_publication_date":"2024-12-16T00:00:00","cvss":{"cvssv3_score":null,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":null,"cvssv3_temporal_score":null,"cvssv4_vector_base":null,"rating":null,"cvssv2_vector_base":null,"cvssv3_vector_base":null,"cvssv3_environmental_score":null,"cvssv3_vector":null,"cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv4_version":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv2_score":null,"cvssv3_temporal_vector_base":null,"cvssv3_version":null,"cvssv3_temporal_vector":null,"cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":null,"cvssv3_risk_factor":null,"cvssv4_risk_factor":null},"script_family":"Tenable.ot","xrefs":{},"pluginPublicationDate":"12/16/2024","pluginModificationDate":"2/10/2025","locale":"en","availableLocales":["en"],"vpr_risk_factor":null,"cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"High","cvssV3Severity":null,"cvssV4Severity":null,"vprSeverity":null,"severity":"High"},"sort":[1734307200000,"502804"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502803","_score":null,"_source":{"plugin_modification_date":"2025-02-10T00:00:00","references":[{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?e6be68ee"}],"description":"The current plugin identifies Rockwell devices that are still under active support. Rockwell Lifecycle Statuses:\n - Active: Most current offering within a product category. \n - Active Mature: Product is fully supported, but a newer product or family exists. Gain value by migrating. \n - End of Life: Discontinued date announced - actively execute migrations and last time buys. Product generally orderable until the discontinued date. \n - Discontinued: Product no longer manufactured or procured. Repair/exchange services may be available.","risk_factor":"Info","script_id":"502803","available_languages":["en_US"],"synopsis":"Detection of active Rockwell devices.","script_name":"Rockwell Automation Active Devices Detection","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":null,"plugin_type":"local","sensor":"tenable_ot","plugin_publication_date":"2024-12-16T00:00:00","cvss":{"cvssv3_score":null,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":null,"cvssv3_temporal_score":null,"cvssv4_vector_base":null,"rating":null,"cvssv2_vector_base":null,"cvssv3_vector_base":null,"cvssv3_environmental_score":null,"cvssv3_vector":null,"cvssv4_vector":null,"cvssv2_temporal_score":null,"source":null,"cvssv4_version":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv2_score":null,"cvssv3_temporal_vector_base":null,"cvssv3_version":null,"cvssv3_temporal_vector":null,"cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":null,"cvssv3_risk_factor":null,"cvssv4_risk_factor":null},"script_family":"Tenable.ot","xrefs":{},"pluginPublicationDate":"12/16/2024","pluginModificationDate":"2/10/2025","locale":"en","availableLocales":["en"],"vpr_risk_factor":null,"cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Info","cvssV3Severity":null,"cvssV4Severity":null,"vprSeverity":null,"severity":"Info"},"sort":[1734307200000,"502803"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502802","_score":null,"_source":{"plugin_modification_date":"2024-12-05T00:00:00","references":[{"id_type":"cve","id":"CVE-2012-3051","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3051"},{"id_type":null,"id":null,"type":"unknown","url":"http://secunia.com/advisories/50671"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?099e8ec2"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.securityfocus.com/bid/55600"}],"description":"Cisco NX-OS 5.2 and 6.1 on Nexus 7000 series switches allows remote attackers to cause a denial of service (process crash or packet loss) via a large number of ARP packets, aka Bug ID CSCtr44822.\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"Medium","script_id":"502802","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Cisco NX-OS 5.2 and 6.1 Denial of Service (CVE-2012-3051)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"Refer to the vendor advisory.","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2024-12-04T00:00:00","cvss":{"cvssv3_score":null,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:A/AC:L/Au:N/C:N/I:N/A:C","cvssv3_temporal_score":null,"rating":null,"cvssv2_vector_base":"AV:A/AC:L/Au:N/C:N/I:N/A:C","cvssv3_environmental_score":null,"cvssv3_vector":null,"cvssv4_vector":null,"cvssv2_temporal_score":4.5,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":6.1,"cvssv3_temporal_vector_base":null,"cvssv4_threat_score":null,"cvssv3_temporal_vector":null,"cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"Medium","cvssv3_risk_factor":null,"cvssv4_risk_factor":null},"vpr_score":"3.6","script_family":"Tenable.ot","xrefs":{},"pluginPublicationDate":"12/4/2024","pluginModificationDate":"12/5/2024","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Low","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Medium","cvssV3Severity":null,"cvssV4Severity":null,"vprSeverity":"Low","severity":"Medium"},"sort":[1733270400000,"502802"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502801","_score":null,"_source":{"plugin_modification_date":"2024-12-05T00:00:00","references":[{"id_type":"CWE","id":"119","type":"classifiers","url":null},{"id_type":"cve","id":"CVE-2017-6655","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6655"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.securityfocus.com/bid/98991"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.securitytracker.com/id/1038628"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.nessus.org/u?0e150b33"}],"description":"A vulnerability in the Fibre Channel over Ethernet (FCoE) protocol implementation in Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition when an FCoE-related process unexpectedly reloads. This vulnerability affects Cisco NX-OS Software on the following Cisco devices when they are configured for FCoE: Multilayer Director Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches. More Information: CSCvc91729.\nKnown Affected Releases: 8.3(0)CV(0.833). Known Fixed Releases:\n8.3(0)ISH(0.62) 8.3(0)CV(0.944) 8.1(1) 8.1(0.8)S0 7.3(2)D1(0.47).\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"Low","script_id":"502801","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Cisco NX-OS Fibre Channel over Ethernet Denial of Service (CVE-2017-6655)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"Refer to the vendor advisory.","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2024-12-04T00:00:00","cvss":{"cvssv3_score":6.5,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:A/AC:L/Au:N/C:N/I:N/A:P","cvssv3_temporal_score":5.7,"rating":null,"cvssv2_vector_base":"AV:A/AC:L/Au:N/C:N/I:N/A:P","cvssv3_vector_base":"AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","cvssv4_vector":null,"cvssv2_temporal_score":2.4,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":3.3,"cvssv3_temporal_vector_base":"E:U/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:U/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"Low","cvssv3_risk_factor":"Medium","cvssv4_risk_factor":null},"vpr_score":"3.6","script_family":"Tenable.ot","xrefs":{"CWE":["119"]},"pluginPublicationDate":"12/4/2024","pluginModificationDate":"12/5/2024","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Low","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"Low","cvssV3Severity":"Medium","cvssV4Severity":null,"vprSeverity":"Low","severity":"Low"},"sort":[1733270400000,"502801"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502800","_score":null,"_source":{"plugin_modification_date":"2024-12-05T00:00:00","references":[{"id_type":"CWE","id":"264","type":"classifiers","url":null},{"id_type":"cve","id":"CVE-2007-1072","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1072"},{"id_type":null,"id":null,"type":"unknown","url":"http://secunia.com/advisories/24262"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.cisco.com/warp/public/707/cisco-air-20070221-phone.shtml"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.cisco.com/warp/public/707/cisco-sa-20070221-phone.shtml"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.securityfocus.com/bid/22647"}],"description":"The command line interface (CLI) in Cisco Unified IP Phone 7906G, 7911G, 7941G, 7961G, 7970G, and 7971G, with firmware 8.0(4)SR1 and earlier allows local users to obtain privileges or cause a denial of service via unspecified vectors. NOTE: this issue can be leveraged remotely via CVE-2007-1063.\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"High","script_id":"502800","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Cisco Unified IP Phone Permissions, Privileges, and Access Controls (CVE-2007-1072)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"Refer to the vendor advisory.","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2024-12-04T00:00:00","cvss":{"cvssv3_score":null,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C","cvssv3_temporal_score":null,"rating":null,"cvssv2_vector_base":"AV:L/AC:L/Au:N/C:C/I:C/A:C","cvssv3_environmental_score":null,"cvssv3_vector":null,"cvssv4_vector":null,"cvssv2_temporal_score":5.3,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":7.2,"cvssv3_temporal_vector_base":null,"cvssv4_threat_score":null,"cvssv3_temporal_vector":null,"cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"High","cvssv3_risk_factor":null,"cvssv4_risk_factor":null},"vpr_score":"5.9","script_family":"Tenable.ot","xrefs":{"CWE":["264"]},"pluginPublicationDate":"12/4/2024","pluginModificationDate":"12/5/2024","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Medium","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"High","cvssV3Severity":null,"cvssV4Severity":null,"vprSeverity":"Medium","severity":"High"},"sort":[1733270400000,"502800"]},{"_index":"1730140894687_plugin_en_us_ot","_type":"_doc","_id":"502799","_score":null,"_source":{"plugin_modification_date":"2025-02-12T00:00:00","references":[{"id_type":"CWE","id":"798","type":"classifiers","url":null},{"id_type":"CWE","id":"836","type":"classifiers","url":null},{"id_type":"ICSA","id":"17-124-02","type":"advisory","url":null},{"id_type":"cve","id":"CVE-2017-7927","type":"vulnerability","url":"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7927"},{"id_type":null,"id":null,"type":"unknown","url":"http://us.dahuasecurity.com/en/us/Security-Bulletin_030617.php"},{"id_type":null,"id":null,"type":"unknown","url":"http://www.securityfocus.com/bid/98312"},{"id_type":null,"id":null,"type":"unknown","url":"https://ics-cert.us-cert.gov/advisories/ICSA-17-124-02"}],"description":"A Use of Password Hash Instead of Password for Authentication issue was discovered in Dahua DH-IPC-HDBW23A0RN-ZS, DH-IPC-HDBW13A0SN, DH- IPC-HDW1XXX, DH-IPC-HDW2XXX, DH-IPC-HDW4XXX, DH-IPC-HFW1XXX, DH-IPC- HFW2XXX, DH-IPC-HFW4XXX, DH-SD6CXX, DH-NVR1XXX, DH-HCVR4XXX, DH- HCVR5XXX, DHI-HCVR51A04HE-S3, DHI-HCVR51A08HE-S3, and DHI- HCVR58A32S-S2 devices. The use of password hash instead of password for authentication vulnerability was identified, which could allow a malicious user to bypass authentication without obtaining the actual password.\n\nThis plugin only works with Tenable.ot.\nPlease visit https://www.tenable.com/products/tenable-ot for more information.","risk_factor":"High","script_id":"502799","available_languages":["en_US"],"synopsis":"The remote OT asset is affected by a vulnerability.","script_name":"Dahua Technology Co., Ltd Digital Video Recorders and IP Cameras Use of Password Hash Instead of Password For Authentication (CVE-2017-7927)","language_code":"en_US","supported_sensors":[{"label":"Tenable OT Security","value":"ot_security"}],"solution":"The following text was originally created by the Cybersecurity and Infrastructure Security Agency (CISA). The original can be found at CISA.gov.\n\nDahua has released updated firmware to mitigate these vulnerabilities.\n\nUpdated software can be obtained from Dahua technical support or an authorized Dahua distributor.\n\nIn addition, Dahua released the following security notifications for users:\n\n- Cyber Vulnerability Affecting Certain Dahua IP Cameras and Recorders (March 6)\n- Cybersecurity Statement – March 6, 2017\n- Cybersecurity Vulnerability Update – March 8, 2017\n- Cyber Vulnerability Affecting Certain Dahua IP Cameras and Recorders (April 3)\n\nDahua’s original notification specifies 11 affected models, but after initial testing, Dahua has identified additional series and models in the following security notification:\n\n- Security Notification DHCC-201703-01","plugin_type":"remote","sensor":"tenable_ot","plugin_publication_date":"2024-12-04T00:00:00","cvss":{"cvssv3_score":7.3,"cvssv4_score":null,"cvssv3_environmental_vector":null,"cvssv2_vector":"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P","cvssv3_temporal_score":6.4,"rating":null,"cvssv2_vector_base":"AV:N/AC:L/Au:N/C:P/I:P/A:P","cvssv3_vector_base":"AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C","cvssv3_environmental_score":null,"cvssv3_vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","cvssv4_vector":null,"cvssv2_temporal_score":5.5,"source":null,"cvssv2_environmental_score":null,"cvssv2_temporal_vector":null,"cvssv4_threat_vector":null,"cvssv2_score":7.5,"cvssv3_temporal_vector_base":"E:U/RL:O/RC:C","cvssv3_version":"3.0","cvssv4_threat_score":null,"cvssv3_temporal_vector":"CVSS:3.0/E:U/RL:O/RC:C","cvssv2_temporal_vector_base":null,"cvssv2_environmental_vector":null,"cvssv2_risk_factor":"High","cvssv3_risk_factor":"High","cvssv4_risk_factor":null},"vpr_score":"3.4","script_family":"Tenable.ot","xrefs":{"CWE":["798","836"],"ICSA":["17-124-02"]},"pluginPublicationDate":"12/4/2024","pluginModificationDate":"2/12/2025","locale":"en","availableLocales":["en"],"vpr_risk_factor":"Low","cisaKnownExploitedDate":null,"configurationMessages":[],"cvssV2Severity":"High","cvssV3Severity":"High","cvssV4Severity":null,"vprSeverity":"Low","severity":"High"},"sort":[1733270400000,"502799"]}],"total":2607,"type":"ot","family":"Tenable.ot","page":1,"apiUrl":"https://www.tenable.com/plugins/api/v1/ot/families/Tenable.ot?page=1"},"cookies":{},"user":null,"flash":null,"env":{"baseUrl":"https://www.tenable.com","host":"www.tenable.com","ga4TrackingId":""},"isUnsupportedBrowser":true,"__N_SSP":true},"page":"/plugins/[type]/families/[family]","query":{"type":"ot","family":"Tenable.ot"},"buildId":"TgpC0GgDQiX0eP8wJ615X","isFallback":false,"isExperimentalCompile":false,"gssp":true,"appGip":true,"locale":"en","locales":["en","de","es","fr","ja","ko","zh-CN","zh-TW"],"defaultLocale":"en","domainLocales":[{"domain":"www.tenable.com","defaultLocale":"en"},{"domain":"de.tenable.com","defaultLocale":"de"},{"domain":"es-la.tenable.com","defaultLocale":"es"},{"domain":"fr.tenable.com","defaultLocale":"fr"},{"domain":"jp.tenable.com","defaultLocale":"ja"},{"domain":"kr.tenable.com","defaultLocale":"ko"},{"domain":"www.tenablecloud.cn","defaultLocale":"zh-CN"},{"domain":"zh-tw.tenable.com","defaultLocale":"zh-TW"}],"scriptLoader":[]}</script></body></html>