Show filters
1,622 Total Results
Displaying 81-90 of 1,622
Sort by:
Attacker Value
Unknown

CVE-2023-24063

Disclosure Date: August 08, 2024 (last updated August 20, 2024)
Diebold Nixdorf Vynamic Security Suite (VSS) before 3.3.0 SR10 fails to validate /etc/mtab during the Pre-Boot Authorization (PBA) process. This can be exploited by a physical attacker who is able to manipulate the contents of the system's hard disk.
Attacker Value
Unknown

CVE-2023-24062

Disclosure Date: August 08, 2024 (last updated August 20, 2024)
Diebold Nixdorf Vynamic Security Suite (VSS) before 3.3.0 SR12, 4.0.0 SR04, 4.1.0 SR02, and 4.2.0 SR01 fails to validate the directory structure of the root file system during the Pre-Boot Authorization (PBA) process. This can be exploited by a physical attacker who is able to manipulate the contents of the system's hard disk.
Attacker Value
Unknown

CVE-2024-33895

Disclosure Date: August 02, 2024 (last updated September 04, 2024)
Cosy+ devices running a firmware 21.x below 21.2s10 or a firmware 22.x below 22.1s3 use a unique key to encrypt the configuration parameters. This is fixed in version 21.2s10 and 22.1s3, the key is now unique per device.
Attacker Value
Unknown

CVE-2024-3082

Disclosure Date: July 31, 2024 (last updated September 30, 2024)
A “CWE-256: Plaintext Storage of a Password” affecting the administrative account allows an attacker with physical access to the machine to retrieve the password in cleartext unless specific security measures at other layers (e.g., full-disk encryption) have been enabled.
Attacker Value
Unknown

CVE-2024-31200

Disclosure Date: July 31, 2024 (last updated August 13, 2024)
A “CWE-201: Insertion of Sensitive Information Into Sent Data” affecting the administrative account allows an attacker with physical access to the machine to retrieve the password in cleartext when an administrative session is open in the browser.
Attacker Value
Unknown

CVE-2024-40822

Disclosure Date: July 29, 2024 (last updated August 16, 2024)
This issue was addressed by restricting options offered on a locked device. This issue is fixed in watchOS 10.6, macOS Sonoma 14.6, iOS 17.6 and iPadOS 17.6, iOS 16.7.9 and iPadOS 16.7.9. An attacker with physical access to a device may be able to access contacts from the lock screen.
Attacker Value
Unknown

CVE-2024-40818

Disclosure Date: July 29, 2024 (last updated August 16, 2024)
This issue was addressed by restricting options offered on a locked device. This issue is fixed in iOS 16.7.9 and iPadOS 16.7.9, macOS Ventura 13.6.8, iOS 17.6 and iPadOS 17.6, watchOS 10.6, macOS Sonoma 14.6. An attacker with physical access may be able to use Siri to access sensitive user data.
Attacker Value
Unknown

CVE-2024-40813

Disclosure Date: July 29, 2024 (last updated August 16, 2024)
A lock screen issue was addressed with improved state management. This issue is fixed in watchOS 10.6, iOS 17.6 and iPadOS 17.6. An attacker with physical access may be able to use Siri to access sensitive user data.
Attacker Value
Unknown

CVE-2024-41691

Disclosure Date: July 26, 2024 (last updated August 06, 2024)
This vulnerability exists in SyroTech SY-GPON-1110-WDONT Router due to storing of FTP credentials in plaintext within the SquashFS-root filesystem associated with the router's firmware. An attacker with physical access could exploit this by extracting the firmware and reverse engineer the binary data to access the plaintext FTP credentials from the vulnerable system. Successful exploitation of this vulnerability could allow the attacker to gain unauthorized access to the FTP server associated with the targeted system.
Attacker Value
Unknown

CVE-2024-41690

Disclosure Date: July 26, 2024 (last updated August 06, 2024)
This vulnerability exists in SyroTech SY-GPON-1110-WDONT Router due to storing of default username and password credentials in plaintext within the router's firmware/ database. An attacker with physical access could exploit this by extracting the firmware and reverse engineer the binary data to access the plaintext default credentials on the vulnerable system. Successful exploitation of this vulnerability could allow the attacker to gain unauthorized access to the targeted system.