Show filters
89 Total Results
Displaying 21-30 of 89
Sort by:
Attacker Value
Unknown

CVE-2023-36611

Disclosure Date: July 03, 2023 (last updated October 08, 2023)
The affected TBox RTUs allow low privilege users to access software security tokens of higher privilege. This could allow an attacker with “user” privileges to access files requiring higher privileges by establishing an SSH session and providing the other tokens.
Attacker Value
Unknown

CVE-2023-36610

Disclosure Date: July 03, 2023 (last updated November 08, 2023)
​The affected TBox RTUs generate software security tokens using insufficient entropy. The random seed used to generate the software tokens is not initialized correctly, and other parts of the token are generated using predictable time-based values. An attacker with this knowledge could successfully brute force the token and authenticate themselves.
Attacker Value
Unknown

CVE-2023-36609

Disclosure Date: July 03, 2023 (last updated October 08, 2023)
The affected TBox RTUs run OpenVPN with root privileges and can run user defined configuration scripts. An attacker could set up a local OpenVPN server and push a malicious script onto the TBox host to acquire root privileges.
Attacker Value
Unknown

CVE-2023-36608

Disclosure Date: July 03, 2023 (last updated October 08, 2023)
The affected TBox RTUs store hashed passwords using MD5 encryption, which is an insecure encryption algorithm.
Attacker Value
Unknown

CVE-2023-36607

Disclosure Date: June 29, 2023 (last updated October 08, 2023)
The affected TBox RTUs are missing authorization for running some API commands. An attacker running these commands could reveal sensitive information such as software versions and web server file contents.
Attacker Value
Unknown

CVE-2023-25645

Disclosure Date: June 16, 2023 (last updated October 08, 2023)
There is a permission and access control vulnerability in some ZTE AndroidTV STBs. Due to improper permission settings, non-privileged application can perform functions that are protected with signature/privilege-level permissions. Exploitation of this vulnerability could clear personal data and applications on the user's device, affecting device operation.
Attacker Value
Unknown

CVE-2023-2673

Disclosure Date: June 13, 2023 (last updated October 08, 2023)
Improper Input Validation vulnerability in PHOENIX CONTACT FL/TC MGUARD Family in multiple versions may allow UDP packets to bypass the filter rules and access the solely connected device behind the MGUARD which can be used for flooding attacks.
Attacker Value
Unknown

CVE-2023-31994

Disclosure Date: May 23, 2023 (last updated October 08, 2023)
Certain Hanwha products are vulnerable to Denial of Service (DoS). ck vector is: When an empty UDP packet is sent to the listening service, the service thread results in a non-functional service (DoS) via WS Discovery and Hanwha proprietary discovery services. This affects IP Camera ANE-L7012R 1.41.01 and IP Camera XNV-9082R 2.10.02.
Attacker Value
Unknown

CVE-2023-30768

Disclosure Date: May 12, 2023 (last updated October 08, 2023)
Improper access control in the Intel(R) Server Board S2600WTT belonging to the Intel(R) Server Board S2600WT Family with the BIOS version 0016 may allow a privileged user to potentially enable escalation of privilege via local access.
Attacker Value
Unknown

CVE-2022-38773

Disclosure Date: January 10, 2023 (last updated February 24, 2025)
Affected devices do not contain an Immutable Root of Trust in Hardware. With this the integrity of the code executed on the device can not be validated during load-time. An attacker with physical access to the device could use this to replace the boot image of the device and execute arbitrary code.