Page 3 of 17 results (0.004 seconds)

CVSS: 10.0EPSS: 0%CPEs: 28EXPL: 0

An unauthenticated attacker can update the hostname with a specially crafted name that will allow for shell commands to be executed during the core collection process. This vulnerability impacts products based on HID Mercury Intelligent Controllers LP1501, LP1502, LP2500, LP4502, and EP4502 which contain firmware versions prior to 1.302 for the LP series and 1.296 for the EP series. An attacker with this level of access on the device can monitor all communications sent to and from this device, modify onboard relays, change configuration files, or cause the device to become unstable. The injected commands only get executed during start up or when unsafe calls regarding the hostname are used. This allows the attacker to gain remote access to the device and can make their persistence permanent by modifying the filesystem. • https://www.corporate.carrier.com/product-security/advisories-resources • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') CWE-693: Protection Mechanism Failure •

CVSS: 9.6EPSS: 0%CPEs: 4EXPL: 0

HID OMNIKEY 5427 and OMNIKEY 5127 readers are vulnerable to CSRF when using the EEM driver (Ethernet Emulation Mode). By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to upload a configuration file to the device. An attacker could exploit this vulnerability to perform cross-site scripting attacks, Web cache poisoning, and other malicious activities. Los lectores HID OMNIKEY 5427 y OMNIKEY 5127, son vulnerables a un ataque de tipo CSRF cuando es usado el controlador EEM (Ethernet Emulation Mode). Al persuadir a un usuario autenticado para que visite un sitio Web malicioso, un atacante remoto podría enviar una petición HTTP malformada para cargar un archivo de configuración en el dispositivo. • https://exchange.xforce.ibmcloud.com/vulnerabilities/198443 https://www.hidglobal.com/sites/default/files/resource_files/hid-psa-2020-01-omnikey-csrf-security-advisory-paper.pdf • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 5.9EPSS: 0%CPEs: 2EXPL: 3

An issue was discovered in the HID Global DigitalPersona (formerly Crossmatch) U.are.U 4500 Fingerprint Reader Windows Biometric Framework driver 5.0.0.5. It has a statically coded initialization vector to encrypt a user's fingerprint image, resulting in weak encryption of that. This, in combination with retrieving an encrypted fingerprint image and encryption key (through another vulnerability), allows an attacker to obtain a user's fingerprint image. Se detectó un problema en el controlador versión 5.0.0.5 del Framework Biometric de Windows del U.are.U 4500 Fingerprint Reader de HID Global DigitalPersona (anteriormente Crossmatch). Tiene un vector de inicialización codificado estáticamente para cifrar la imagen de la huella digital de un usuario, resultando en un cifrado débil de esta. • https://github.com/sungjungk/fp-scanner-hacking https://www.youtube.com/watch?v=Grirez2xeas https://www.youtube.com/watch?v=wEXJDyEOatM • CWE-330: Use of Insufficiently Random Values •

CVSS: 8.4EPSS: 0%CPEs: 1EXPL: 0

EasyLobby Solo contains default administrative credentials. An attacker could exploit this vulnerability to gain full access to the application. EasyLobby Solo contiene credenciales de administrador por defecto. Un atacante remoto podría explotar esta vulnerabilidad para obtener acceso total a la aplicación. • https://exchange.xforce.ibmcloud.com/vulnerabilities/149652 • CWE-798: Use of Hard-coded Credentials •

CVSS: 8.4EPSS: 0%CPEs: 1EXPL: 0

EasyLobby Solo could allow a local attacker to gain elevated privileges on the system. By visiting the kiosk and typing "esc" to exit the program, an attacker could exploit this vulnerability to perform unauthorized actions on the computer. EasyLobby Solo podría permitir que un atacante local obtenga privilegios elevados en el sistema. Al visitar el quiosco y escribir "esc" para salir del programa, un atacante podría explotar esta vulnerabilidad para realizar acciones no autorizadas en el ordenador. • https://exchange.xforce.ibmcloud.com/vulnerabilities/149651 • CWE-862: Missing Authorization •