Show filters
14 Total Results
Displaying 1-10 of 14
Sort by:
Attacker Value
Unknown
CVE-2021-33081
Disclosure Date: September 20, 2022 (last updated October 08, 2023)
Protection mechanism failure in firmware for some Intel(R) SSD DC Products may allow a privileged user to potentially enable information disclosure via local access.
0
Attacker Value
Unknown
CVE-2021-33079
Disclosure Date: September 20, 2022 (last updated October 08, 2023)
Protection mechanism failure in firmware for some Intel(R) SSD DC Products may allow a privileged user to potentially enable information disclosure via local access.
0
Attacker Value
Unknown
CVE-2021-33076
Disclosure Date: September 20, 2022 (last updated October 08, 2023)
Improper authentication in firmware for some Intel(R) SSD DC Products may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
0
Attacker Value
Unknown
CVE-2021-0148
Disclosure Date: November 17, 2021 (last updated February 23, 2025)
Insertion of information into log file in firmware for some Intel(R) SSD DC may allow a privileged user to potentially enable information disclosure via local access.
0
Attacker Value
Unknown
CVE-2019-16274
Disclosure Date: January 06, 2020 (last updated February 21, 2025)
DTEN D5 before 1.3 and D7 before 1.3 devices transfer customer data files via unencrypted HTTP.
0
Attacker Value
Unknown
CVE-2019-16272
Disclosure Date: January 06, 2020 (last updated February 21, 2025)
On DTEN D5 and D7 before 1.3.4 devices, factory settings allows for firmware reflash and Android Debug Bridge (adb) enablement.
0
Attacker Value
Unknown
CVE-2019-16273
Disclosure Date: January 06, 2020 (last updated November 27, 2024)
DTEN D5 and D7 before 1.3.4 devices allow unauthenticated root shell access through Android Debug Bridge (adb), leading to arbitrary code execution and system administration. Also, this provides a covert ability to capture screen data from the Zoom Client on Windows by executing commands on the Android OS.
0
Attacker Value
Unknown
CVE-2019-16271
Disclosure Date: June 20, 2019 (last updated February 21, 2025)
DTEN D5 and D7 before 1.3.2 devices allows remote attackers to read saved whiteboard image PDF documents via storage/emulated/0/Notes/PDF on TCP port 8080 without authentication.
0
Attacker Value
Unknown
CVE-2018-20785
Disclosure Date: February 23, 2019 (last updated November 27, 2024)
Secure boot bypass and memory extraction can be achieved on Neato Botvac Connected 2.2.0 devices. During startup, the AM335x secure boot feature decrypts and executes firmware. Secure boot can be bypassed by starting with certain commands to the USB serial port. Although a power cycle occurs, this does not completely reset the chip: memory contents are still in place. Also, it restarts into a boot menu that enables XMODEM upload and execution of an unsigned QNX IFS system image, thereby completing the bypass of secure boot. Moreover, the attacker can craft custom IFS data and write it to unused memory to extract all memory contents that had previously been present. This includes the original firmware and sensitive information such as Wi-Fi credentials.
0
Attacker Value
Unknown
CVE-2018-17178
Disclosure Date: September 18, 2018 (last updated November 27, 2024)
An issue was discovered on Neato Botvac Connected 2.2.0 devices. They execute unauthenticated manual drive commands (sent to /bin/webserver on port 8081) if they already have an active session. Commands like forward, back, arc-left, arc-right, pivot-left, and pivot-right are executed even though the web socket replies with { "message" : "invalid authorization header" }. Without an active session, commands are still interpreted, but (except for eco-on and eco-off) have no effect, since without active driving, a driving direction does not change anything.
0