Beck IPC GmbH IPC@CHIP telnet service does not delay or disconnect users from the service when bad passwords are entered, which makes it easier for remote attackers to conduct brute force password guessing attacks.
References
Link | Resource |
---|---|
http://cert.uni-stuttgart.de/archive/bugtraq/2001/06/msg00010.html | Broken Link |
http://www.iss.net/security_center/static/6605.php | Broken Link Vendor Advisory |
http://www.kb.cert.org/vuls/id/198979 | Third Party Advisory US Government Resource |
http://www.securityfocus.com/archive/1/186418 | Broken Link Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/2771 | Broken Link Exploit Patch Third Party Advisory VDB Entry Vendor Advisory |
http://cert.uni-stuttgart.de/archive/bugtraq/2001/06/msg00010.html | Broken Link |
http://www.iss.net/security_center/static/6605.php | Broken Link Vendor Advisory |
http://www.kb.cert.org/vuls/id/198979 | Third Party Advisory US Government Resource |
http://www.securityfocus.com/archive/1/186418 | Broken Link Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/2771 | Broken Link Exploit Patch Third Party Advisory VDB Entry Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
20 Nov 2024, 23:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://cert.uni-stuttgart.de/archive/bugtraq/2001/06/msg00010.html - Broken Link | |
References | () http://www.iss.net/security_center/static/6605.php - Broken Link, Vendor Advisory | |
References | () http://www.kb.cert.org/vuls/id/198979 - Third Party Advisory, US Government Resource | |
References | () http://www.securityfocus.com/archive/1/186418 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/2771 - Broken Link, Exploit, Patch, Third Party Advisory, VDB Entry, Vendor Advisory |
09 Feb 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
References | (BUGTRAQ) http://www.securityfocus.com/archive/1/186418 - Broken Link, Third Party Advisory, VDB Entry | |
References | (CERT-VN) http://www.kb.cert.org/vuls/id/198979 - Third Party Advisory, US Government Resource | |
References | (BID) http://www.securityfocus.com/bid/2771 - Broken Link, Exploit, Patch, Third Party Advisory, VDB Entry, Vendor Advisory | |
References | (XF) http://www.iss.net/security_center/static/6605.php - Broken Link, Vendor Advisory | |
References | (BUGTRAQ) http://cert.uni-stuttgart.de/archive/bugtraq/2001/06/msg00010.html - Broken Link | |
CWE | CWE-307 | |
CPE | cpe:2.3:o:anybus:ipc\@chip_firmware:-:*:*:*:*:*:*:* cpe:2.3:h:anybus:ipc\@chip:-:*:*:*:*:*:*:* |
|
First Time |
Anybus ipc\@chip Firmware
Anybus Anybus ipc\@chip |
|
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 9.8 |
Information
Published : 2001-05-24 04:00
Updated : 2025-04-03 01:03
NVD link : CVE-2001-1339
Mitre link : CVE-2001-1339
CVE.ORG link : CVE-2001-1339
JSON object : View
Products Affected
anybus
- ipc\@chip_firmware
- ipc\@chip
CWE
CWE-307
Improper Restriction of Excessive Authentication Attempts