The Canon PIXMA TR4550 stores sensitive data, such as the SSID and the Wi-Fi pre-shared key (PSK), unencrypted in its persistent storage (EEPROM). Resetting the product to factory settings does not securely delete this sensitive information. Versions 1.020 and 1.080 are affected.
e18ed4bfb6b147224bfbdafe53ebbbc71e96f5992a0562fc4eba3906334ee60b
WolfVision Cynap versions 1.18g and 1.28j suffer from a hardcoded credential vulnerability.
d6b2f3a38c59dff4dc8014904e4bc9fb7be3b0831749657f9c23488cc4c0a1ff
Due to storing passwords in a recoverable format on Siemens LOGO! 8 PLCs, an attacker can gain access to configured passwords as cleartext.
bf19d9111516d40322d38739d39310498750019c2b579269ac24b9a2f7e683b3
Due to storing passwords in a recoverable format on Siemens LOGO! 8 PLCs, an attacker can gain access to configured passwords as cleartext.
95e944e33b6b49156158226e4700374427c35dfaaa04a226bf39cb8debb11f9a
Due to the use of a hard-coded cryptographic key, an attacker can put the integrity and confidentiality of encrypted data of all Siemens LOGO! 8 PLCs using this key at risk, for instance decrypting network communication during a man-in-the-middle attack.
fd53041141c43f3ef168910c3f5306ea1625eb1f860ca0581cc979bff7758f8c