Show filters
1,622 Total Results
Displaying 211-220 of 1,622
Sort by:
Attacker Value
Unknown
CVE-2023-20521
Disclosure Date: November 14, 2023 (last updated June 18, 2024)
TOCTOU in the ASP Bootloader may allow an attacker with physical access to tamper with SPI ROM records after memory content verification, potentially leading to loss of confidentiality or a denial of service.
0
Attacker Value
Unknown
CVE-2021-46758
Disclosure Date: November 14, 2023 (last updated November 23, 2023)
Insufficient validation of SPI flash addresses in the ASP (AMD Secure Processor) bootloader may allow an attacker to read data in memory mapped beyond SPI flash resulting in a potential loss of availability and integrity.
0
Attacker Value
Unknown
CVE-2023-47262
Disclosure Date: November 14, 2023 (last updated December 13, 2023)
The startup process and device configurations of the Abbott ID NOW device, before v7.1, can be interrupted and/or modified via physical access to an internal serial port. Direct physical access is required to exploit.
0
Attacker Value
Unknown
CVE-2023-47616
Disclosure Date: November 09, 2023 (last updated November 17, 2023)
A CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow an attacker with physical access to the target system to get access to a sensitive data on the targeted system.
0
Attacker Value
Unknown
CVE-2023-47612
Disclosure Date: November 09, 2023 (last updated November 17, 2023)
A CWE-552: Files or Directories Accessible to External Parties vulnerability exists in Telit Cinterion BGS5, Telit Cinterion EHS5/6/8, Telit Cinterion PDS5/6/8, Telit Cinterion ELS61/81, Telit Cinterion PLS62 that could allow an attacker with physical access to the target system to obtain a read/write access to any files and directories on the targeted system, including hidden files and directories.
0
Attacker Value
Unknown
CVE-2023-42554
Disclosure Date: November 07, 2023 (last updated November 16, 2023)
Improper Authentication vulnerabiity in Samsung Pass prior to version 4.3.00.17 allows physical attackers to bypass authentication.
0
Attacker Value
Unknown
CVE-2023-42533
Disclosure Date: November 07, 2023 (last updated November 14, 2023)
Improper Input Validation with USB Gadget Interface prior to SMR Nov-2023 Release 1 allows a physical attacker to execute arbitrary code in Kernel.
0
Attacker Value
Unknown
CVE-2023-4535
Disclosure Date: November 06, 2023 (last updated April 25, 2024)
An out-of-bounds read vulnerability was found in OpenSC packages within the MyEID driver when handling symmetric key encryption. Exploiting this flaw requires an attacker to have physical access to the computer and a specially crafted USB device or smart card. This flaw allows the attacker to manipulate APDU responses and potentially gain unauthorized access to sensitive data, compromising the system's security.
0
Attacker Value
Unknown
CVE-2023-40661
Disclosure Date: November 06, 2023 (last updated April 25, 2024)
Several memory vulnerabilities were identified within the OpenSC packages, particularly in the card enrollment process using pkcs15-init when a user or administrator enrolls cards. To take advantage of these flaws, an attacker must have physical access to the computer system and employ a custom-crafted USB device or smart card to manipulate responses to APDUs. This manipulation can potentially allow
compromise key generation, certificate loading, and other card management operations during enrollment.
0
Attacker Value
Unknown
CVE-2023-40660
Disclosure Date: November 06, 2023 (last updated April 25, 2024)
A flaw was found in OpenSC packages that allow a potential PIN bypass. When a token/card is authenticated by one process, it can perform cryptographic operations in other processes when an empty zero-length pin is passed. This issue poses a security risk, particularly for OS logon/screen unlock and for small, permanently connected tokens to computers. Additionally, the token can internally track login status. This flaw allows an attacker to gain unauthorized access, carry out malicious actions, or compromise the system without the user's awareness.
0