Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): firmware
- Search Type: Search All
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2023-46382 |
LOYTEC LINX-212 firmware 6.2.4 and LVIS-3ME12-A1 firmware 6.2.2 and LIOB-586 firmware 6.2.3 devices use cleartext HTTP for login. Published: November 04, 2023; 7:15:08 PM -0400 |
V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-46381 |
LOYTEC LINX-212 firmware 6.2.4 and LVIS-3ME12-A1 firmware 6.2.2 and LIOB-586 firmware 6.2.3 devices lack authentication for the preinstalled version of LWEB-802 via an lweb802_pre/ URI. An unauthenticated attacker can edit any project (or create a new project) and control its GUI. Published: November 04, 2023; 7:15:07 PM -0400 |
V3.1: 8.2 HIGH V2.0:(not available) |
CVE-2023-46380 |
LOYTEC LINX-212 firmware 6.2.4 and LVIS-3ME12-A1 firmware 6.2.2 and LIOB-586 firmware 6.2.3 devices send password-change requests via cleartext HTTP. Published: November 04, 2023; 7:15:07 PM -0400 |
V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-5035 |
A vulnerability has been identified in PT-G503 Series firmware versions prior to v5.2, where the Secure attribute for sensitive cookies in HTTPS sessions is not set, which could cause the cookie to be transmitted in plaintext over an HTTP session. The vulnerability may lead to security risks, potentially exposing user session data to unauthorized access and manipulation. Published: November 02, 2023; 1:15:11 PM -0400 |
V3.1: 5.3 MEDIUM V2.0:(not available) |
CVE-2022-3007 |
The vulnerability exists in Syska SW100 Smartwatch due to an improper implementation and/or configuration of Nordic Device Firmware Update (DFU) which is used for performing Over-The-Air (OTA) firmware updates on the Bluetooth Low Energy (BLE) devices. An unauthenticated attacker could exploit this vulnerability by setting arbitrary values to handle on the vulnerable device over Bluetooth. Successful exploitation of this vulnerability could allow the attacker to perform firmware update, device reboot or data manipulation on the target device. Published: October 31, 2023; 8:15:08 AM -0400 |
V3.1: 8.1 HIGH V2.0:(not available) |
CVE-2022-3429 |
A denial-of-service vulnerability was found in the firmware used in Lenovo printers, where users send illegal or malformed strings to an open port, triggering a denial of service that causes a display error and prevents the printer from functioning properly. Published: October 27, 2023; 3:15:41 PM -0400 |
V3.1: 6.5 MEDIUM V2.0:(not available) |
CVE-2022-34886 |
A remote code execution vulnerability was found in the firmware used in some Lenovo printers, which can be caused by a remote user pushing an illegal string to the server-side interface via a script, resulting in a stack overflow. Published: October 27, 2023; 3:15:40 PM -0400 |
V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2023-5746 |
A vulnerability regarding use of externally-controlled format string is found in the cgi component. This allows remote attackers to execute arbitrary code via unspecified vectors. The following models with Synology Camera Firmware versions before 1.0.5-0185 may be affected: BC500 and TC500. Published: October 25, 2023; 2:17:44 PM -0400 |
V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2023-4692 |
An out-of-bounds write flaw was found in grub2's NTFS filesystem driver. This issue may allow an attacker to present a specially crafted NTFS filesystem image, leading to grub's heap metadata corruption. In some circumstances, the attack may also corrupt the UEFI firmware heap metadata. As a result, arbitrary code execution and secure boot protection bypass may be achieved. Published: October 25, 2023; 2:17:41 PM -0400 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2022-27813 |
Motorola MTM5000 series firmwares lack properly configured memory protection of pages shared between the OMAP-L138 ARM and DSP cores. The SoC provides two memory protection units, MPU1 and MPU2, to enforce the trust boundary between the two cores. Since both units are left unconfigured by the firmwares, an adversary with control over either core can trivially gain code execution on the other, by overwriting code located in shared RAM or DDR2 memory regions. Published: October 19, 2023; 6:15:10 AM -0400 |
V3.1: 8.2 HIGH V2.0:(not available) |
CVE-2022-26943 |
The Motorola MTM5000 series firmwares generate TETRA authentication challenges using a PRNG using a tick count register as its sole entropy source. Low boottime entropy and limited re-seeding of the pool renders the authentication challenge vulnerable to two attacks. First, due to the limited boottime pool entropy, an adversary can derive the contents of the entropy pool by an exhaustive search of possible values, based on an observed authentication challenge. Second, an adversary can use knowledge of the entropy pool to predict authentication challenges. As such, the unit is vulnerable to CVE-2022-24400. Published: October 19, 2023; 6:15:09 AM -0400 |
V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2022-26942 |
The Motorola MTM5000 series firmwares lack pointer validation on arguments passed to trusted execution environment (TEE) modules. Two modules are used, one responsible for KVL key management and the other for TETRA cryptographic functionality. In both modules, an adversary with non-secure supervisor level code execution can exploit the issue in order to gain secure supervisor code execution within the TEE. This constitutes a full break of the TEE module, exposing the device key as well as any TETRA cryptographic keys and the confidential TETRA cryptographic primitives. Published: October 19, 2023; 6:15:09 AM -0400 |
V3.1: 8.2 HIGH V2.0:(not available) |
CVE-2022-26941 |
A format string vulnerability exists in Motorola MTM5000 series firmware AT command handler for the AT+CTGL command. An attacker-controllable string is improperly handled, allowing for a write-anything-anywhere scenario. This can be leveraged to obtain arbitrary code execution inside the teds_app binary, which runs with root privileges. Published: October 19, 2023; 6:15:09 AM -0400 |
V3.1: 8.8 HIGH V2.0:(not available) |
CVE-2023-36857 |
Baker Hughes – Bently Nevada 3500 System TDI Firmware version 5.05 contains a replay vulnerability which could allow an attacker to replay older captured packets of traffic to the device to gain access. Published: October 18, 2023; 8:15:16 PM -0400 |
V3.1: 6.5 MEDIUM V2.0:(not available) |
CVE-2023-34441 |
Baker Hughes – Bently Nevada 3500 System TDI Firmware version 5.05 contains a cleartext transmission vulnerability which could allow an attacker to steal the authentication secret from communication traffic to the device and reuse it for arbitrary requests. Published: October 18, 2023; 8:15:16 PM -0400 |
V3.1: 8.2 HIGH V2.0:(not available) |
CVE-2023-34437 |
Baker Hughes – Bently Nevada 3500 System TDI Firmware version 5.05 contains a vulnerability in their password retrieval functionality which could allow an attacker to access passwords stored on the device. Published: October 18, 2023; 8:15:16 PM -0400 |
V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-26300 |
A potential security vulnerability has been identified in the system BIOS for certain HP PC products which might allow escalation of privilege. HP is releasing firmware updates to mitigate the potential vulnerability. Published: October 18, 2023; 3:15:08 PM -0400 |
V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2023-5409 |
HP is aware of a potential security vulnerability in HP t430 and t638 Thin Client PCs. These models may be susceptible to a physical attack, allowing an untrusted source to tamper with the system firmware using a publicly disclosed private key. HP is providing recommended guidance for customers to reduce exposure to the potential vulnerability. Published: October 13, 2023; 1:15:09 PM -0400 |
V3.1: 6.8 MEDIUM V2.0:(not available) |
CVE-2023-35652 |
In ProtocolEmergencyCallListIndAdapter::Init of protocolcalladapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation. Published: October 11, 2023; 4:15:10 PM -0400 |
V3.1: 7.5 HIGH V2.0:(not available) |
CVE-2023-35648 |
In ProtocolMiscLceIndAdapter::GetConfLevel() of protocolmiscadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation. Published: October 11, 2023; 4:15:10 PM -0400 |
V3.1: 9.8 CRITICAL V2.0:(not available) |