Show filters
7 Total Results
Displaying 1-7 of 7
Sort by:
Attacker Value
Unknown

CVE-2023-1968

Disclosure Date: April 28, 2023 (last updated October 08, 2023)
Instruments with Illumina Universal Copy Service v2.x are vulnerable due to binding to an unrestricted IP address. An unauthenticated malicious actor could use UCS to listen on all IP addresses, including those capable of accepting remote communications.
Attacker Value
Unknown

CVE-2023-1966

Disclosure Date: April 28, 2023 (last updated October 08, 2023)
Instruments with Illumina Universal Copy Service v1.x and v2.x contain an unnecessary privileges vulnerability. An unauthenticated malicious actor could upload and execute code remotely at the operating system level, which could allow an attacker to change settings, configurations, software, or access sensitive data on the affected product.
Attacker Value
Unknown

CVE-2022-1524

Disclosure Date: June 24, 2022 (last updated October 07, 2023)
LRM version 2.4 and lower does not implement TLS encryption. A malicious actor can MITM attack sensitive data in-transit, including credentials.
Attacker Value
Unknown

CVE-2022-1521

Disclosure Date: June 24, 2022 (last updated October 07, 2023)
LRM does not implement authentication or authorization by default. A malicious actor can inject, replay, modify, and/or intercept sensitive data.
Attacker Value
Unknown

CVE-2022-1519

Disclosure Date: June 24, 2022 (last updated October 07, 2023)
LRM does not restrict the types of files that can be uploaded to the affected product. A malicious actor can upload any file type, including executable code that allows for a remote code exploit.
Attacker Value
Unknown

CVE-2022-1518

Disclosure Date: June 24, 2022 (last updated October 07, 2023)
LRM contains a directory traversal vulnerability that can allow a malicious actor to upload outside the intended directory structure.
Attacker Value
Unknown

CVE-2022-1517

Disclosure Date: June 24, 2022 (last updated October 07, 2023)
LRM utilizes elevated privileges. An unauthenticated malicious actor can upload and execute code remotely at the operating system level, which can allow an attacker to change settings, configurations, software, or access sensitive data on the affected produc. An attacker could also exploit this vulnerability to access APIs not intended for general use and interact through the network.