Show filters
12 Total Results
Displaying 1-10 of 12
Sort by:
Attacker Value
Unknown
CVE-2025-0593
Disclosure Date: February 14, 2025 (last updated February 15, 2025)
The vulnerability may allow a remote low priviledged attacker to run arbitrary shell commands by using lower-level functions to interact with the device.
0
Attacker Value
Unknown
CVE-2025-0592
Disclosure Date: February 14, 2025 (last updated February 15, 2025)
The vulnerability may allow a remote low priviledged attacker to run arbitrary shell commands by manipulating the firmware file and uploading it to the device.
0
Attacker Value
Unknown
CVE-2025-0867
Disclosure Date: February 14, 2025 (last updated February 15, 2025)
The standard user uses the run as function to start the MEAC applications with administrative privileges. To ensure that the system can startup on its own, the credentials of the administrator were stored. Consequently, the EPC2 user can execute any command with administrative privileges. This allows a privilege escalation to the administrative level.
0
Attacker Value
Unknown
CVE-2024-11022
Disclosure Date: December 06, 2024 (last updated December 21, 2024)
The authentication process to the web server uses a challenge response procedure which
inludes the nonce and additional information. This challenge can be used several times for login and is
therefore vulnerable for a replay attack.
0
Attacker Value
Unknown
CVE-2024-10776
Disclosure Date: December 06, 2024 (last updated December 21, 2024)
Lua apps can be deployed, removed, started, reloaded or stopped without authorization via
AppManager. This allows an attacker to remove legitimate apps creating a DoS attack, read and write
files or load apps that use all features of the product available to a customer.
0
Attacker Value
Unknown
CVE-2024-10774
Disclosure Date: December 06, 2024 (last updated December 21, 2024)
Unauthenticated CROWN APIs allow access to critical functions. This leads to the accessibility of large parts of the web application without authentication.
0
Attacker Value
Unknown
CVE-2024-10773
Disclosure Date: December 06, 2024 (last updated December 21, 2024)
The product is vulnerable to pass-the-hash attacks in combination with hardcoded credentials of hidden user levels. This means that an attacker can log in with the hidden user levels and gain
full access to the device.
0
Attacker Value
Unknown
CVE-2024-10772
Disclosure Date: December 06, 2024 (last updated December 21, 2024)
Since the firmware update is not validated, an attacker can install modified firmware on the
device. This has a high impact on the availabilty, integrity and confidentiality up to the complete compromise of the device.
0
Attacker Value
Unknown
CVE-2024-10771
Disclosure Date: December 06, 2024 (last updated December 21, 2024)
Due to missing input validation during one step of the firmware update process, the product
is vulnerable to remote code execution. With network access and the user level ”Service”, an attacker
can execute arbitrary system commands in the root user’s contexts.
0
Attacker Value
Unknown
CVE-2024-11075
Disclosure Date: November 19, 2024 (last updated November 20, 2024)
A vulnerability in the Incoming Goods Suite allows a user with unprivileged access to the underlying system (e.g. local or via SSH) a privilege escalation to the administrative level due to the usage of component vendor Docker images running with root permissions. Exploiting this misconfiguration leads to the fact that an attacker can gain administrative control. over the whole system.
0