Show filters
37 Total Results
Displaying 21-30 of 37
Sort by:
Attacker Value
Unknown

CVE-2020-12355

Disclosure Date: November 12, 2020 (last updated February 22, 2025)
Authentication bypass by capture-replay in RPMB protocol message authentication subsystem in Intel(R) TXE versions before 4.0.30 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
Attacker Value
Unknown

CVE-2018-17932

Disclosure Date: November 02, 2020 (last updated February 22, 2025)
JUUKO K-800 (Firmware versions prior to numbers ending ...9A, ...9B, ...9C, etc.) is vulnerable to a replay attack and command forgery, which could allow attackers to replay commands, control the device, view commands, or cause the device to stop running.
Attacker Value
Unknown

CVE-2018-19025

Disclosure Date: November 02, 2020 (last updated February 22, 2025)
In JUUKO K-808, an attacker could specially craft a packet that encodes an arbitrary command, which could be executed on the K-808 (Firmware versions prior to numbers ending ...9A, ...9B, ...9C, etc.).
Attacker Value
Unknown

CVE-2020-27157

Disclosure Date: October 15, 2020 (last updated February 22, 2025)
Veritas APTARE versions prior to 10.5 included code that bypassed the normal login process when specific authentication credentials were provided to the server. An unauthenticated user could login to the application and gain access to the data and functionality accessible to the targeted user account.
Attacker Value
Unknown

CVE-2020-24722

Disclosure Date: October 07, 2020 (last updated February 22, 2025)
An issue was discovered in the GAEN (aka Google/Apple Exposure Notifications) protocol through 2020-10-05, as used in COVID-19 applications on Android and iOS. The encrypted metadata block with a TX value lacks a checksum, allowing bitflipping to amplify a contamination attack. This can cause metadata deanonymization and risk-score inflation. NOTE: the vendor's position is "We do not believe that TX power authentication would be a useful defense against relay attacks.
Attacker Value
Unknown

CVE-2019-11856

Disclosure Date: August 21, 2020 (last updated February 22, 2025)
A nonce reuse vulnerability exists in the ACEView service of ALEOS before 4.13.0, 4.9.5, and 4.4.9 allowing message replay. Captured traffic to the ACEView service can be replayed to other gateways sharing the same credentials.
Attacker Value
Unknown

CVE-2020-15688

Disclosure Date: July 23, 2020 (last updated February 21, 2025)
The HTTP Digest Authentication in the GoAhead web server before 5.1.2 does not completely protect against replay attacks. This allows an unauthenticated remote attacker to bypass authentication via capture-replay if TLS is not used to protect the underlying communication channel.
Attacker Value
Unknown

CVE-2020-10045

Disclosure Date: July 14, 2020 (last updated February 21, 2025)
A vulnerability has been identified in SICAM MMU (All versions < V2.05), SICAM SGU (All versions), SICAM T (All versions < V2.18). An error in the challenge-response procedure could allow an attacker to replay authentication traffic and gain access to protected areas of the web application.
Attacker Value
Unknown

CVE-2020-4042

Disclosure Date: July 10, 2020 (last updated February 21, 2025)
Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself. The malicious client can replay the Bareos director's cram-md5 challenge to the director itself leading to the director responding to the replayed challenge. The response obtained is then a valid reply to the directors original challenge. This is fixed in version 19.2.8.
Attacker Value
Unknown

CVE-2020-9438

Disclosure Date: June 23, 2020 (last updated February 21, 2025)
Tinxy Door Lock with firmware before 3.2 allow attackers to unlock a door by replaying an Unlock request that occurred when the attacker was previously authorized. In other words, door-access revocation is mishandled.