
CVE-2019-15802
https://notcve.org/view.php?id=CVE-2019-15802
14 Nov 2019 — An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. The firmware hashes and encrypts passwords using a hardcoded cryptographic key in sal_util_str_encrypt() in libsal.so.0.0. The parameters (salt, IV, and key data) are used to encrypt and decrypt all passwords using AES256 in CBC mode. With the parameters known, all previously encrypted passwords can be decrypted. This includes the passwords that are part of configuration backups or otherwise embedded as part of the firmware... • https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html • CWE-798: Use of Hard-coded Credentials •

CVE-2019-15803
https://notcve.org/view.php?id=CVE-2019-15803
14 Nov 2019 — An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. Through an undocumented sequence of keypresses, undocumented functionality is triggered. A diagnostics shell is triggered via CTRL-ALT-t, which prompts for the password returned by fds_sys_passDebugPasswd_ret(). The firmware contains access control checks that determine if remote users are allowed to access this functionality. The function that performs this check (fds_sys_remoteDebugEnable_ret in libfds.so) always return T... • https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html • CWE-287: Improper Authentication •

CVE-2019-15804
https://notcve.org/view.php?id=CVE-2019-15804
14 Nov 2019 — An issue was discovered on Zyxel GS1900 devices with firmware before 2.50(AAHH.0)C0. By sending a signal to the CLI process, undocumented functionality is triggered. Specifically, a menu can be triggered by sending the SIGQUIT signal to the CLI application (e.g., through CTRL+\ via SSH). The access control check for this menu does work and prohibits accessing the menu, which contains "Password recovery for specific user" options. The menu is believed to be accessible using a serial console. • https://jasper.la/exploring-zyxel-gs1900-firmware-with-ghidra.html •

CVE-2015-6312
https://notcve.org/view.php?id=CVE-2015-6312
06 Apr 2016 — Cisco TelePresence Server 3.1 on 7010, Mobility Services Engine (MSE) 8710, Multiparty Media 310 and 320, and Virtual Machine (VM) devices allows remote attackers to cause a denial of service (device reload) via malformed STUN packets, aka Bug ID CSCuv01348. Cisco TelePresence Server 3.1 sobre dispositivos 7010, Mobility Services Engine (MSE) 8710, Multiparty Media 310 y 320 y Virtual Machine (VM) permite a atacantes remotos causar una denegación de servicio (recarga de dispositivo) a través de paquetes STU... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-cts2 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2015-6313
https://notcve.org/view.php?id=CVE-2015-6313
06 Apr 2016 — Cisco TelePresence Server 4.1(2.29) through 4.2(4.17) on 7010; Mobility Services Engine (MSE) 8710; Multiparty Media 310, 320, and 820; and Virtual Machine (VM) devices allows remote attackers to cause a denial of service (memory consumption or device reload) via crafted HTTP requests that are not followed by an unspecified negotiation, aka Bug ID CSCuv47565. Cisco TelePresence Server 4.1(2.29) hasta la versión 4.2(4.17) sobre dispositivos 7010; Mobility Services Engine (MSE) 8710; Multiparty Media 310, 320... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-cts1 • CWE-399: Resource Management Errors •

CVE-2016-1346
https://notcve.org/view.php?id=CVE-2016-1346
06 Apr 2016 — The kernel in Cisco TelePresence Server 3.0 through 4.2(4.18) on Mobility Services Engine (MSE) 8710 devices allows remote attackers to cause a denial of service (panic and reboot) via a crafted sequence of IPv6 packets, aka Bug ID CSCuu46673. El kernel en Cisco TelePresence Server 3.0 hasta la versión 4.2(4.18) en dispositivos Mobility Services Engine (MSE) 8710 permite a atacantes remotos causar una denegación de servicio (pánico y reinicio) a través de una secuencia de paquetes IPv6 manipulada, también c... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160406-cts • CWE-399: Resource Management Errors •

CVE-2016-1344
https://notcve.org/view.php?id=CVE-2016-1344
26 Mar 2016 — The IKEv2 implementation in Cisco IOS 15.0 through 15.6 and IOS XE 3.3 through 3.17 allows remote attackers to cause a denial of service (device reload) via fragmented packets, aka Bug ID CSCux38417. La implementación de IKEv2 en Cisco IOS hasta la versión 15.6 y IOS XE 3.3 hasta la versión 3.17 permite a atacantes remotos provocar una denegación de servicio (recarga de dispositivo) a través de paquetes fragmentados, también conocido como Bug ID CSCux38417. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-ios-ikev2 • CWE-399: Resource Management Errors •

CVE-2016-1348
https://notcve.org/view.php?id=CVE-2016-1348
26 Mar 2016 — Cisco IOS 15.0 through 15.5 and IOS XE 3.3 through 3.16 allow remote attackers to cause a denial of service (device reload) via a crafted DHCPv6 Relay message, aka Bug ID CSCus55821. Cisco IOS 15.0 hasta la versión 15.5 y IOS XE 3.3 hasta la versión 3.16 permiten a atacantes remotos provocar una denegación de servicio (recarga de dispositivo) a través de un mensaje DHCPv6 Relay manipulado, también conocido como Bug ID CSCus55821. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-dhcpv6 • CWE-399: Resource Management Errors •

CVE-2016-1349
https://notcve.org/view.php?id=CVE-2016-1349
26 Mar 2016 — The Smart Install client implementation in Cisco IOS 12.2, 15.0, and 15.2 and IOS XE 3.2 through 3.7 allows remote attackers to cause a denial of service (device reload) via crafted image list parameters in a Smart Install packet, aka Bug ID CSCuv45410. La implementación del cliente Smart Install en Cisco IOS 12.2, 15.0 y 15.2 y IOS XE 3.2 hasta la versión 3.7 permite a atacantes remotos provocar una denegación de servicio (recarga de dispositivo) a través de parámetros de lista de imágenes manipulados en u... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-smi • CWE-399: Resource Management Errors •

CVE-2016-1350
https://notcve.org/view.php?id=CVE-2016-1350
26 Mar 2016 — Cisco IOS 15.3 and 15.4, Cisco IOS XE 3.8 through 3.11, and Cisco Unified Communications Manager allow remote attackers to cause a denial of service (device reload) via malformed SIP messages, aka Bug ID CSCuj23293. Cisco IOS 15.3 y 15.4, Cisco IOS XE 3.8 hasta la versión 3.11 y Cisco Unified Communications Manager permiten a atacantes remotos provocar una denegación de servicio (recarga de dispositivo) a través de mensajes SIP mal formados, también conocido como Bug ID CSCuj23293. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160323-sip • CWE-399: Resource Management Errors •