2 results (0.023 seconds)

CVSS: 9.8EPSS: 0%CPEs: 4EXPL: 0

Honeywell HDZP252DI 1.00.HW02.4 and HBW2PER1 1.000.HW01.3 devices allow a video replay attack after ARP cache poisoning has been achieved. Los dispositivos Honeywell HDZP252DI versión 1.00.HW02.4 y HBW2PER1 versión 1.000.HW01.3, permiten un ataque de repetición de vídeo tras el envenenamiento de la caché ARP • https://buildings.honeywell.com/content/dam/hbtbt/en/documents/downloads/Security_Notification_SN_2022-01-26-01_CVE-2021-39363_Command_Injection_HDZP252DI.pdf https://buildings.honeywell.com/us/en/brands/our-brands/security/support-and-resources/product-resources/eol-and-security-notices https://www.honeywell.com/us/en/product-security • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

Honeywell HDZP252DI 1.00.HW02.4 and HBW2PER1 1.000.HW01.3 devices allow command spoofing (for camera control) after ARP cache poisoning has been achieved. Los dispositivos Honeywell HDZP252DI versión 1.00.HW02.4 y HBW2PER1 versión 1.000.HW01.3, permiten una suplantación de comandos (para el control de la cámara) tras el envenenamiento de la caché ARP • https://buildings.honeywell.com/content/dam/hbtbt/en/documents/downloads/Security_Notification_SN_2022-01-26-02_CVE-2021-39364_Video_Replay_HBW2PER1.pdf https://buildings.honeywell.com/us/en/brands/our-brands/security/support-and-resources/product-resources/eol-and-security-notices https://www.honeywell.com/us/en/product-security • CWE-294: Authentication Bypass by Capture-replay •