2 results (0.008 seconds)

CVSS: 7.6EPSS: 0%CPEs: 109EXPL: 0

An attacker with physical access to the affected Moxa UC Series devices can initiate a restart of the device and gain access to its BIOS. Command line options can then be altered, allowing the attacker to access the terminal. From the terminal, the attacker can modify the device’s authentication files to create a new user and gain full access to the system. • https://www.cisa.gov/uscert/ics/advisories/icsa-22-333-04 •

CVSS: 7.6EPSS: 0%CPEs: 107EXPL: 0

Cradlepoint IBR600 NCOS versions 6.5.0.160bc2e and prior are vulnerable to shell escape, which enables local attackers with non-superuser credentials to gain full, unrestrictive shell access which may allow an attacker to execute arbitrary code. Cradlepoint IBR600 NCOS versiones 6.5.0.160bc2e y anteriores son vulnerables al escape del shell, lo que permite a atacantes locales con credenciales que no sean de superusuario obtener acceso completo y sin restricciones al shell, lo que puede permitir a un atacante ejecutar código arbitrario. • https://www.cisa.gov/uscert/ics/advisories/icsa-22-321-02 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •