Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown
CVE-2024-11022
Disclosure Date: December 06, 2024 (last updated December 21, 2024)
The authentication process to the web server uses a challenge response procedure which
inludes the nonce and additional information. This challenge can be used several times for login and is
therefore vulnerable for a replay attack.
0
Attacker Value
Unknown
CVE-2024-10776
Disclosure Date: December 06, 2024 (last updated December 21, 2024)
Lua apps can be deployed, removed, started, reloaded or stopped without authorization via
AppManager. This allows an attacker to remove legitimate apps creating a DoS attack, read and write
files or load apps that use all features of the product available to a customer.
0
Attacker Value
Unknown
CVE-2024-10774
Disclosure Date: December 06, 2024 (last updated December 21, 2024)
Unauthenticated CROWN APIs allow access to critical functions. This leads to the accessibility of large parts of the web application without authentication.
0
Attacker Value
Unknown
CVE-2024-10773
Disclosure Date: December 06, 2024 (last updated December 21, 2024)
The product is vulnerable to pass-the-hash attacks in combination with hardcoded credentials of hidden user levels. This means that an attacker can log in with the hidden user levels and gain
full access to the device.
0
Attacker Value
Unknown
CVE-2024-10772
Disclosure Date: December 06, 2024 (last updated December 21, 2024)
Since the firmware update is not validated, an attacker can install modified firmware on the
device. This has a high impact on the availabilty, integrity and confidentiality up to the complete compromise of the device.
0
Attacker Value
Unknown
CVE-2024-10771
Disclosure Date: December 06, 2024 (last updated December 21, 2024)
Due to missing input validation during one step of the firmware update process, the product
is vulnerable to remote code execution. With network access and the user level ”Service”, an attacker
can execute arbitrary system commands in the root user’s contexts.
0