Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown

CVE-2024-11022

Disclosure Date: December 06, 2024 (last updated December 21, 2024)
The authentication process to the web server uses a challenge response procedure which inludes the nonce and additional information. This challenge can be used several times for login and is therefore vulnerable for a replay attack.
0
Attacker Value
Unknown

CVE-2024-10776

Disclosure Date: December 06, 2024 (last updated December 21, 2024)
Lua apps can be deployed, removed, started, reloaded or stopped without authorization via AppManager. This allows an attacker to remove legitimate apps creating a DoS attack, read and write files or load apps that use all features of the product available to a customer.
0
Attacker Value
Unknown

CVE-2024-10774

Disclosure Date: December 06, 2024 (last updated December 21, 2024)
Unauthenticated CROWN APIs allow access to critical functions. This leads to the accessibility of large parts of the web application without authentication.
0
Attacker Value
Unknown

CVE-2024-10773

Disclosure Date: December 06, 2024 (last updated December 21, 2024)
The product is vulnerable to pass-the-hash attacks in combination with hardcoded credentials of hidden user levels. This means that an attacker can log in with the hidden user levels and gain full access to the device.
0
Attacker Value
Unknown

CVE-2024-10772

Disclosure Date: December 06, 2024 (last updated December 21, 2024)
Since the firmware update is not validated, an attacker can install modified firmware on the device. This has a high impact on the availabilty, integrity and confidentiality up to the complete compromise of the device.
0
Attacker Value
Unknown

CVE-2024-10771

Disclosure Date: December 06, 2024 (last updated December 21, 2024)
Due to missing input validation during one step of the firmware update process, the product is vulnerable to remote code execution. With network access and the user level ”Service”, an attacker can execute arbitrary system commands in the root user’s contexts.
0