Show filters
23 Total Results
Displaying 1-10 of 23
Sort by:
Attacker Value
Moderate

CVE-2019-2215

Disclosure Date: October 11, 2019 (last updated July 26, 2024)
A use-after-free in binder.c allows an elevation of privilege from an application to the Linux Kernel. No user interaction is required to exploit this vulnerability, however exploitation does require either the installation of a malicious local application or a separate vulnerability in a network facing application.Product: AndroidAndroid ID: A-141720095
Attacker Value
Unknown

CVE-2021-37401

Disclosure Date: December 28, 2021 (last updated February 23, 2025)
An attacker may obtain the user credentials from file servers, backup repositories, or ZLD files saved in SD cards. As a result, the PLC user program may be uploaded, altered, and/or downloaded.
Attacker Value
Unknown

CVE-2021-37400

Disclosure Date: December 28, 2021 (last updated February 23, 2025)
An attacker may obtain the user credentials from the communication between the PLC and the software. As a result, the PLC user program may be uploaded, altered, and/or downloaded.
Attacker Value
Unknown

CVE-2021-20991

Disclosure Date: April 15, 2021 (last updated February 22, 2025)
In Fibaro Home Center 2 and Lite devices with firmware version 4.540 and older an authenticated user can run commands as root user using a command injection vulnerability.
Attacker Value
Unknown

CVE-2021-20990

Disclosure Date: April 15, 2021 (last updated February 22, 2025)
In Fibaro Home Center 2 and Lite devices with firmware version 4.600 and older an internal management service is accessible on port 8000 and some API endpoints could be accessed without authentication to trigger a shutdown, a reboot or a reboot into recovery mode.
0
Attacker Value
Unknown

CVE-2021-20992

Disclosure Date: April 15, 2021 (last updated February 22, 2025)
In Fibaro Home Center 2 and Lite devices in all versions provide a web based management interface over unencrypted HTTP protocol. Communication between the user and the device can be eavesdropped to hijack sessions, tokens and passwords.
Attacker Value
Unknown

CVE-2021-20989

Disclosure Date: April 15, 2021 (last updated February 22, 2025)
Fibaro Home Center 2 and Lite devices with firmware version 4.600 and older initiate SSH connections to the Fibaro cloud to provide remote access and remote support capabilities. This connection can be intercepted using DNS spoofing attack and a device initiated remote port-forward channel can be used to connect to the web management interface. Knowledge of authorization credentials to the management interface is required to perform any further actions.
0
Attacker Value
Unknown

CVE-2020-10280

Disclosure Date: June 24, 2020 (last updated February 21, 2025)
The Apache server on port 80 that host the web interface is vulnerable to a DoS by spamming incomplete HTTP headers, effectively blocking the access to the dashboard.
Attacker Value
Unknown

CVE-2020-10279

Disclosure Date: June 24, 2020 (last updated February 21, 2025)
MiR robot controllers (central computation unit) makes use of Ubuntu 16.04.2 an operating system, Thought for desktop uses, this operating system presents insecure defaults for robots. These insecurities include a way for users to escalate their access beyond what they were granted via file creation, access race conditions, insecure home directory configurations and defaults that facilitate Denial of Service (DoS) attacks.
Attacker Value
Unknown

CVE-2020-10274

Disclosure Date: June 24, 2020 (last updated February 21, 2025)
The access tokens for the REST API are directly derived (sha256 and base64 encoding) from the publicly available default credentials from the Control Dashboard (refer to CVE-2020-10270 for related flaws). This flaw in combination with CVE-2020-10273 allows any attacker connected to the robot networks (wired or wireless) to exfiltrate all stored data (e.g. indoor mapping images) and associated metadata from the robot's database.