Robert Gützkow

3 exploits Active since Jul 2021
CVE-2021-36799 NOMISEC HIGH WORKING POC
KNX Engineering Tool Software 5 < 5.7.6 - Hard-coded Credentials
KNX ETS5 through 5.7.6 uses the hard-coded password ETS5Password, with a salt value of Ivan Medvedev, allowing local users to read project information. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
33 stars
CVSS 8.8
CVE-2021-37740 NOMISEC HIGH WORKING POC
MDT Scn-ip000.03 Firmware < 3.0.4 - Denial of Service
A denial of service vulnerability exists in MDT's firmware for the KNXnet/IP Secure router SCN-IP100.03 and KNX IP interface SCN-IP000.03 before v3.0.4, that allows a remote attacker to turn the device unresponsive to all requests on the KNXnet/IP Secure layer, until the device is rebooted, via a SESSION_REQUEST frame with a modified total length field.
6 stars
CVSS 7.5
CVE-2021-43575 WRITEUP MEDIUM WORKING POC
KNX ETS6 <6.0.0 - Info Disclosure
KNX ETS6 through 6.0.0 uses the hard-coded password ETS5Password, with a salt value of Ivan Medvedev, allowing local users to read project information, a similar issue to CVE-2021-36799. NOTE: The vendor disputes this because it is not the responsibility of the ETS to securely store cryptographic key material when it is not being exported
CVSS 5.5