Show filters
1,625 Total Results
Displaying 391-400 of 1,625
Sort by:
Attacker Value
Unknown

CVE-2022-43557

Disclosure Date: December 05, 2022 (last updated October 27, 2023)
The BD BodyGuard™ infusion pumps specified allow for access through the RS-232 (serial) port interface. If exploited, threat actors with physical access, specialized equipment and knowledge may be able to configure or disable the pump. No electronic protected health information (ePHI), protected health information (PHI) or personally identifiable information (PII) is stored in the pump.
Attacker Value
Unknown

CVE-2022-23467

Disclosure Date: December 05, 2022 (last updated October 08, 2023)
OpenRazer is an open source driver and user-space daemon to control Razer device lighting and other features on GNU/Linux. Using a modified USB device an attacker can leak stack addresses of the `razer_attr_read_dpi_stages`, potentially bypassing KASLR. To exploit this vulnerability an attacker would need to access to a users keyboard or mouse or would need to convince a user to use a modified device. The issue has been patched in v3.5.1. Users are advised to upgrade and should be reminded not to plug in unknown USB devices.
Attacker Value
Unknown

CVE-2022-43442

Disclosure Date: December 05, 2022 (last updated October 08, 2023)
Plaintext storage of a password vulnerability exists in +F FS040U software versions v2.3.4 and earlier, which may allow an attacker to obtain the login password of +F FS040U and log in to the management console.
Attacker Value
Unknown

CVE-2022-3086

Disclosure Date: December 02, 2022 (last updated November 08, 2023)
Cradlepoint IBR600 NCOS versions 6.5.0.160bc2e and prior are vulnerable to shell escape, which enables local attackers with non-superuser credentials to gain full, unrestrictive shell access which may allow an attacker to execute arbitrary code.
Attacker Value
Unknown

CVE-2022-32967

Disclosure Date: November 29, 2022 (last updated October 08, 2023)
RTL8111EP-CG/RTL8111FP-CG DASH function has hard-coded password. An unauthenticated physical attacker can use the hard-coded default password during system reboot triggered by other user, to acquire partial system information such as serial number and server information.
Attacker Value
Unknown

CVE-2022-45888

Disclosure Date: November 25, 2022 (last updated October 08, 2023)
An issue was discovered in the Linux kernel through 6.0.9. drivers/char/xillybus/xillyusb.c has a race condition and use-after-free during physical removal of a USB device.
Attacker Value
Unknown

CVE-2022-35897

Disclosure Date: November 21, 2022 (last updated October 08, 2023)
An stack buffer overflow vulnerability leads to arbitrary code execution issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. If the attacker modifies specific UEFI variables, it can cause a stack overflow, leading to arbitrary code execution. The specific variables are normally locked (read-only) at the OS level and therefore an attack would require direct SPI modification. If an attacker can change the values of at least two variables out of three (SecureBootEnforce, SecureBoot, RestoreBootSettings), it is possible to execute arbitrary code.
Attacker Value
Unknown

CVE-2022-45163

Disclosure Date: November 18, 2022 (last updated October 08, 2023)
An information-disclosure vulnerability exists on select NXP devices when configured in Serial Download Protocol (SDP) mode: i.MX RT 1010, i.MX RT 1015, i.MX RT 1020, i.MX RT 1050, i.MX RT 1060, i.MX 6 Family, i.MX 7Dual/Solo, i.MX 7ULP, i.MX 8M Quad, i.MX 8M Mini, and Vybrid. In a device security-enabled configuration, memory contents could potentially leak to physically proximate attackers via the respective SDP port in cold and warm boot attacks. (The recommended mitigation is to completely disable the SDP mode by programming a one-time programmable eFUSE. Customers can contact NXP for additional information.)
Attacker Value
Unknown

CVE-2022-43096

Disclosure Date: November 17, 2022 (last updated October 08, 2023)
Mediatrix 4102 before v48.5.2718 allows local attackers to gain root access via the UART port.
Attacker Value
Unknown

CVE-2022-20826

Disclosure Date: November 15, 2022 (last updated November 08, 2023)
A vulnerability in the secure boot implementation of Cisco Secure Firewalls 3100 Series that are running Cisco Adaptive Security Appliance (ASA) Software or Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated attacker with physical access to the device to bypass the secure boot functionality. This vulnerability is due to a logic error in the boot process. An attacker could exploit this vulnerability by injecting malicious code into a specific memory location during the boot process of an affected device. A successful exploit could allow the attacker to execute persistent code at boot time and break the chain of trust.