{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-25T10:34:09.998","vulnerabilities":[{"cve":{"id":"CVE-2018-5401","sourceIdentifier":"cret@cert.org","published":"2018-10-08T15:29:02.870","lastModified":"2024-11-21T04:08:44.713","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Auto-Maskin DCU 210E, RP-210E, and Marine Pro Observer Android App transmit sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors. The devices transmit process control information via unencrypted Modbus communications. Impact: An attacker can exploit this vulnerability to observe information about configurations, settings, what sensors are present and in use, and other information to aid in crafting spoofed messages. Requires access to the network. Affected releases are Auto-Maskin DCU-210E, RP-210E, and Marine Pro Observer Android App. Versions prior to 3.7 on ARMv7."},{"lang":"es","value":"Las aplicaciones de Android Auto-Maskin DCU 210E, RP-210E y Marine Pro Observer transmiten datos sensibles o críticos para la seguridad en texto claro en un canal de comunicación que puede ser rastreado por actores no autorizados. Los dispositivos transmiten la información de control de procesos mediante comunicaciones Modbus no cifradas. Impacto: un atacante puede explotar esta vulnerabilidad para observar información sobre configuraciones, opciones, qué sensores están presentes y en uso, y otro tipo de información para ayudar a manipular mensajes suplantados. Se requiere acceso a la red. Las versiones afectadas son las aplicaciones de Android Auto-Maskin DCU-210E RP-210E y Marine Pro Observer. Versiones anteriores a la 3.7 en ARMv7."}],"metrics":{"cvssMetricV30":[{"source":"cret@cert.org","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":5.2},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":5.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.2,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:N/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"cret@cert.org","type":"Secondary","description":[{"lang":"en","value":"CWE-319"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-319"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:auto-maskin:rp_210e_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"A6276379-86DE-440E-88B1-E2B4AC1A1DD6"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:arm:arm7:*:*:*:*:*:*:*:*","versionEndExcluding":"3.7","matchCriteriaId":"D64AEAAE-5F7C-43B9-AACA-39C927BDB5B4"},{"vulnerable":false,"criteria":"cpe:2.3:h:auto-maskin:rp_210e:-:*:*:*:*:*:*:*","matchCriteriaId":"2B7F66D3-0436-4BF6-A177-C04C59BFAEE5"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:auto-maskin:dcu_210e_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"4121F18D-C67D-402B-85EB-7768BED46A82"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:arm:arm7:*:*:*:*:*:*:*:*","versionEndExcluding":"3.7","matchCriteriaId":"D64AEAAE-5F7C-43B9-AACA-39C927BDB5B4"},{"vulnerable":false,"criteria":"cpe:2.3:h:auto-maskin:dcu_210e:-:*:*:*:*:*:*:*","matchCriteriaId":"378677CF-D35D-4122-B481-3B7FCF6F4D27"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:auto-maskin:marine_pro_observer:-:*:*:*:*:android:*:*","matchCriteriaId":"D9050A5F-13F4-44EC-B1C9-8DB90508AA8D"}]}]}],"references":[{"url":"https://www.kb.cert.org/vuls/id/176301","source":"cret@cert.org","tags":["Third Party Advisory","US Government Resource"]},{"url":"https://www.us-cert.gov/ics/advisories/icsa-20-051-04","source":"cret@cert.org"},{"url":"https://www.kb.cert.org/vuls/id/176301","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]},{"url":"https://www.us-cert.gov/ics/advisories/icsa-20-051-04","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}