Page 3 of 24 results (0.005 seconds)

CVSS: 9.0EPSS: 2%CPEs: 1EXPL: 0

This vulnerability allows remote attackers to execute arbitrary code on affected installations of installations of Marvell QConvergeConsole 5.5.0.64. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the isHPSmartComponent method of the GWTTestServiceImpl class. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. • https://www.marvell.com/content/dam/marvell/en/public-collateral/fibre-channel/marvell-fibre-channel-security-advisory-2020-07.pdf https://www.zerodayinitiative.com/advisories/ZDI-20-970 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.0EPSS: 2%CPEs: 1EXPL: 0

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Marvell QConvergeConsole 5.5.0.64. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the writeObjectToConfigFile method of the GWTTestServiceImpl class. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. • https://www.marvell.com/content/dam/marvell/en/public-collateral/fibre-channel/marvell-fibre-channel-security-advisory-2020-07.pdf https://www.zerodayinitiative.com/advisories/ZDI-20-974 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 9.0EPSS: 2%CPEs: 1EXPL: 0

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Marvell QConvergeConsole 5.5.0.64. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the decryptFile method of the GWTTestServiceImpl class. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. • https://www.marvell.com/content/dam/marvell/en/public-collateral/fibre-channel/marvell-fibre-channel-security-advisory-2020-07.pdf https://www.zerodayinitiative.com/advisories/ZDI-20-976 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

An issue was discovered in Marvell 88W8688 Wi-Fi firmware before version p52, as used on Tesla Model S/X vehicles manufactured before March 2018, via the Parrot Faurecia Automotive FC6050W module. A stack overflow could lead to denial of service or arbitrary code execution. Se descubrió un problema en el firmware de Marvell 88W8688 Wi-Fi versiones anteriores a p52, como es usado en los vehículos Tesla Model S/X fabricados antes de marzo de 2018, por medio del módulo Parrot Faurecia Automotive FC6050W. Un desbordamiento de pila podría conllevar a una denegación de servicio o una ejecución de código arbitrario. • https://www.marvell.com/documents/ioaj5dntk2ubykssa78s • CWE-787: Out-of-bounds Write •

CVSS: 9.8EPSS: 2%CPEs: 2EXPL: 0

An issue was discovered in Marvell 88W8688 Wi-Fi firmware before version p52, as used on Tesla Model S/X vehicles manufactured before March 2018, via the Parrot Faurecia Automotive FC6050W module. A heap-based buffer overflow allows remote attackers to cause a denial of service or execute arbitrary code via malformed Wi-Fi packets. Se descubrió un problema en el firmware de Marvell 88W8688 Wi-Fi versiones anteriores a p52, como es usado en los vehículos Tesla Model S/X fabricados antes de marzo de 2018, por medio del módulo Parrot Faurecia Automotive FC6050W. Un desbordamiento de búfer en la región heap de la memoria permite a atacantes remotos causar una denegación de servicio o ejecutar código arbitrario por medio de paquetes de Wi-Fi malformados. • https://keenlab.tencent.com/en/2020/01/02/exploiting-wifi-stack-on-tesla-model-s https://www.marvell.com/documents/ioaj5dntk2ubykssa78s • CWE-787: Out-of-bounds Write •