Page 2 of 45 results (0.006 seconds)

CVSS: 9.0EPSS: 0%CPEs: 36EXPL: 0

10 Sep 2024 — A low privileged remote attacker can trigger the execution of arbitrary OS commands as root due to improper neutralization of special elements in the variable EMAIL_NOTIFICATION.TO in mGuard devices. A low privileged remote attacker can trigger the execution of arbitrary OS commands as root due to improper neutralization of special elements in the variable EMAIL_NOTIFICATION.TO in mGuard devices. • https://cert.vde.com/en/advisories/VDE-2024-039 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.0EPSS: 0%CPEs: 36EXPL: 0

10 Sep 2024 — A low privileged remote attacker can trigger the execution of arbitrary OS commands as root due to improper neutralization of special elements in the variable PROXY_HTTP_PORT in mGuard devices. A low privileged remote attacker can trigger the execution of arbitrary OS commands as root due to improper neutralization of special elements in the variable PROXY_HTTP_PORT in mGuard devices. • https://cert.vde.com/en/advisories/VDE-2024-039 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.0EPSS: 0%CPEs: 36EXPL: 0

10 Sep 2024 — An low privileged remote attacker can execute OS commands with root privileges due to improper neutralization of special elements in user data. • https://cert.vde.com/en/advisories/VDE-2024-039 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 6.8EPSS: 0%CPEs: 36EXPL: 0

10 Sep 2024 — A low privileged remote attacker can get access to CSRF tokens of higher privileged users which can be abused to mount CSRF attacks. A low privileged remote attacker can get access to CSRF tokens of higher privileged users which can be abused to mount CSRF attacks. • https://cert.vde.com/en/advisories/VDE-2024-039 • CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer •

CVSS: 5.3EPSS: 0%CPEs: 36EXPL: 0

10 Sep 2024 — An unauthenticated remote attacker can exploit the behavior of the pathfinder TCP encapsulation service by establishing a high number of TCP connections to the pathfinder TCP encapsulation service. The impact is limited to blocking of valid IPsec VPN peers. An unauthenticated remote attacker can exploit the behavior of the pathfinder TCP encapsulation service by establishing a high number of TCP connections to the pathfinder TCP encapsulation service. The impact is limited to blocking of valid IPsec VPN pee... • https://cert.vde.com/en/advisories/VDE-2024-052 • CWE-770: Allocation of Resources Without Limits or Throttling •

CVSS: 9.0EPSS: 0%CPEs: 4EXPL: 1

13 Aug 2024 — A remote unauthenticated attacker can use the firmware update feature on the LAN interface of the device to reset the password for the predefined, low-privileged user “user-app” to the default password. • https://github.com/zetraxz/CVE-2024-6788 • CWE-1188: Initialization of a Resource with an Insecure Default •

CVSS: 5.9EPSS: 0%CPEs: 4EXPL: 0

13 Aug 2024 — An unauthenticated remote attacker can use this vulnerability to change the device configuration due to a file writeable for short time after system startup. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Phoenix Contact CHARX SEC-3100 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the firewall. The issue results from incorrect ordering and synchronization of services during startup. An attack... • https://cert.vde.com/en/advisories/VDE-2024-022 • CWE-552: Files or Directories Accessible to External Parties •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

14 May 2024 — Potential buffer overflow in unsafe UEFI variable handling in Phoenix SecureCore™ for Intel Gemini Lake.This issue affects: SecureCore™ for Intel Gemini Lake: from 4.1.0.1 before 4.1.0.567. Posible desbordamiento del búfer en el manejo inseguro de variables UEFI en Phoenix SecureCore™ para Intel Gemini Lake. Este problema afecta a: SecureCore™ para Intel Gemini Lake: desde 4.1.0.1 anterior a 4.1.0.567. • https://www.phoenix.com/security-notifications/cve-2024-1598 • CWE-121: Stack-based Buffer Overflow •

CVSS: 7.5EPSS: 0%CPEs: 9EXPL: 1

14 May 2024 — Potential buffer overflow in unsafe UEFI variable handling in Phoenix SecureCore™ for select Intel platforms This issue affects: Phoenix SecureCore™ for Intel Kaby Lake: from 4.0.1.1 before 4.0.1.998; Phoenix SecureCore™ for Intel Coffee Lake: from 4.1.0.1 before 4.1.0.562; Phoenix SecureCore™ for Intel Ice Lake: from 4.2.0.1 before 4.2.0.323; Phoenix SecureCore™ for Intel Comet Lake: from 4.2.1.1 before 4.2.1.287; Phoenix SecureCore™ for Intel Tiger Lake: from 4.3.0.1 before 4.3.0.236; Phoenix SecureCore™ ... • https://github.com/tadash10/Detect-CVE-2024-0762 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

14 May 2024 — Exposed IOCTL with Insufficient Access Control in Phoenix WinFlash Driver on Windows allows Privilege Escalation which allows for modification of system firmware.This issue affects WinFlash Driver: before 4.5.0.0. IOCTL expuesto con control de acceso insuficiente en el controlador Phoenix WinFlash en Windows permite una escalada de privilegios que permite la modificación del firmware del sistema. Este problema afecta al controlador WinFlash: anterior a 4.5.0.0. • https://blogs.vmware.com/security/2023/10/hunting-vulnerable-kernel-drivers.html • CWE-732: Incorrect Permission Assignment for Critical Resource CWE-782: Exposed IOCTL with Insufficient Access Control •