CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

Search Vulnerabilities

 Software

Searching vulnerabilities affecting “belden”

27 vulnerabilities found for “belden”

Page 1 of 2

CVE-2021-30064
CRITICAL9.8

On Schneider Electric ConneXium Tofino Firewall TCSEFEA23F3F22 before 03.23, TCSEFEA23F3F20/21, and Belden Tofino Xenon Security Appliance, an SSH login can succeed with hardcoded default credentials (if the device is in the uncommissioned state).

belden / tofino_xenon_security_appliance_firmware+12
Network
Published Apr 3, 2022
Page 1 of 2
CVE-2021-30066
MEDIUM6.8

On Schneider Electric ConneXium Tofino Firewall TCSEFEA23F3F22 before 03.23, TCSEFEA23F3F20/21, and Belden Tofino Xenon Security Appliance, an arbitrary firmware image can be loaded because firmware signature verification (for a USB stick) can be bypassed. NOTE: this issue exists because of an incomplete fix of CVE-2017-11400.

belden / tofino_xenon_security_appliance_firmware+12
Physical
Published Apr 3, 2022
CVE-2021-30061
MEDIUM6.8

On Schneider Electric ConneXium Tofino Firewall TCSEFEA23F3F22 before 03.23, TCSEFEA23F3F20/21, and Belden Tofino Xenon Security Appliance, physically proximate attackers can execute code via a crafted file on a USB stick.

belden / tofino_xenon_security_appliance_firmware+12
Physical
Published Apr 3, 2022
CVE-2021-30062
HIGH7.5

On Schneider Electric ConneXium Tofino OPCLSM TCSEFM0000 before 03.23 and Belden Tofino Xenon Security Appliance, crafted OPC packets can bypass the OPC enforcer.

belden / tofino_xenon_security_appliance_firmware+10
Network
Published Apr 3, 2022
CVE-2021-30065
HIGH7.5

On Schneider Electric ConneXium Tofino Firewall TCSEFEA23F3F22 before 03.23, TCSEFEA23F3F20/21, and Belden Tofino Xenon Security Appliance, crafted ModBus packets can bypass the ModBus enforcer. NOTE: this issue exists because of an incomplete fix of CVE-2017-11401.

belden / tofino_xenon_security_appliance_firmware+12
Network
Published Apr 3, 2022
CVE-2021-30063
HIGH7.5

On Schneider Electric ConneXium Tofino OPCLSM TCSEFM0000 before 03.23 and Belden Tofino Xenon Security Appliance, crafted OPC packets can cause an OPC enforcer denial of service.

belden / tofino_xenon_security_appliance_firmware+10
Network
Published Apr 3, 2022
CVE-2021-27734
CRITICAL9.8

Hirschmann HiOS 07.1.01, 07.1.02, and 08.1.00 through 08.5.xx and HiSecOS 03.3.00 through 03.5.01 allow remote attackers to change the credentials of existing users.

belden / hirschmann_hios+3
Network
Published May 17, 2021
CVE-2020-9307
MEDIUM6.5

Hirschmann OS2, RSP, and RSPE devices before HiOS 08.3.00 allow a denial of service. An unauthenticated, adjacent attacker can cause an infinite loop on one of the HSR ring ports of the device. This effectively breaks the redundancy of the HSR ring. If the attacker can perform the same attack on a second device, the ring is broken into two parts (thus disrupting communication between devices in the different parts).

belden / hirschmann_hios+1
Adjacent
Published Feb 11, 2021
CVE-2020-6994
CRITICAL9.8

A buffer overflow vulnerability was found in some devices of Hirschmann Automation and Control HiOS and HiSecOS. The vulnerability is due to improper parsing of URL arguments. An attacker could exploit this vulnerability by specially crafting HTTP requests to overflow an internal buffer. The following devices using HiOS Version 07.0.02 and lower are affected: RSP, RSPE, RSPS, RSPL, MSP, EES, EES, EESX, GRS, OS, RED. The following devices using HiSecOS Version 03.2.00 and lower are affected: EAGLE20/30.

belden / hirschmann_hios+1
Network
Published Apr 3, 2020
CVE-2019-12257
HIGH8.8

Wind River VxWorks 6.6 through 6.9 has a Buffer Overflow in the DHCP client component. There is an IPNET security vulnerability: Heap overflow in DHCP Offer/ACK parsing inside ipdhcpc.

sonicwall / sonicos+28
Adjacent
Published Aug 9, 2019
CVE-2019-12256
CRITICAL9.8

Wind River VxWorks 6.9 and vx7 has a Buffer Overflow in the IPv4 component. There is an IPNET security vulnerability: Stack overflow in the parsing of IPv4 packets’ IP options.

windriver / vxworks+30
Network
Published Aug 9, 2019
CVE-2019-12265
MEDIUM5.3

Wind River VxWorks 6.5, 6.6, 6.7, 6.8, 6.9.3 and 6.9.4 has a Memory Leak in the IGMPv3 client component. There is an IPNET security vulnerability: IGMP Information leak via IGMPv3 specific membership report.

windriver / vxworks+32
Network
Published Aug 9, 2019
CVE-2019-12263
HIGH8.1

Wind River VxWorks 6.9.4 and vx7 has a Buffer Overflow in the TCP component (issue 4 of 4). There is an IPNET security vulnerability: TCP Urgent Pointer state confusion due to race condition.

windriver / vxworks+31
Network
Published Aug 9, 2019
CVE-2019-12259
HIGH7.5

Wind River VxWorks 6.6, 6.7, 6.8, 6.9 and vx7 has an array index error in the IGMPv3 client component. There is an IPNET security vulnerability: DoS via NULL dereference in IGMP parsing.

windriver / vxworks+32
Network
Published Aug 9, 2019
CVE-2019-12264
HIGH7.1

Wind River VxWorks 6.6, 6.7, 6.8, 6.9.3, 6.9.4, and Vx7 has Incorrect Access Control in IPv4 assignment by the ipdhcpc DHCP client component.

windriver / vxworks+14
Adjacent
Published Aug 5, 2019
CVE-2018-5461
MEDIUM6.5

An Inadequate Encryption Strength issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. An inadequate encryption strength vulnerability in the web interface has been identified, which may allow an attacker to obtain sensitive information through a successful man-in-the-middle attack.

belden / hirschmann_rs20-0900mmm2tdau+133
Network
Published Mar 6, 2018
CVE-2018-5465
HIGH8.8

A Session Fixation issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. A session fixation vulnerability in the web interface has been identified, which may allow an attacker to hijack web sessions.

belden / hirschmann_rs20-0900mmm2tdau+133
Network
Published Mar 6, 2018
CVE-2018-5471
MEDIUM5.9

A Cleartext Transmission of Sensitive Information issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. A cleartext transmission of sensitive information vulnerability in the web interface has been identified, which may allow an attacker to obtain sensitive information through a successful man-in-the-middle attack.

belden / hirschmann_rs20-0900mmm2tdau+133
Network
Published Mar 6, 2018
CVE-2018-5467
MEDIUM6.5

An Information Exposure Through Query Strings in GET Request issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. An information exposure through query strings vulnerability in the web interface has been identified, which may allow an attacker to impersonate a legitimate user.

belden / hirschmann_rs20-0900mmm2tdau+133
Network
Published Mar 6, 2018
CVE-2018-5469
CRITICAL9.8

An Improper Restriction of Excessive Authentication Attempts issue was discovered in Belden Hirschmann RS, RSR, RSB, MACH100, MACH1000, MACH4000, MS, and OCTOPUS Classic Platform Switches. An improper restriction of excessive authentication vulnerability in the web interface has been identified, which may allow an attacker to brute force authentication.

belden / hirschmann_rs20-0900mmm2tdau+133
Network
Published Mar 6, 2018