Zebra ZTC Industrial ZT400 and ZTC Desktop GK420d
Executive SummaryCVSS v3 5.4ALERT: Vulnerable to exploitation with adjacent access/low attack complexityManufacturer: Zebra TechnologiesDevices: ZTC Industrial ZT410, ZTC Desktop GK420dIssue: Potential Authentication Bypass via Alternate Path or Channel Risk AssessmentSuccessful exploitation of this vulnerability could permit an unauthorized individual to manipulate credentials by sending specifically…
BLUFFS: Bluetooth Forward and Future Secrecy Attacks andDefenses
ABSTRACTBluetooth is a pervasive technology for wireless communication.Billions of devices use it in sensitive applications and to exchangeprivate data. The security of Bluetooth depends on the Bluetoothstandard and its two security mechanisms: pairing and session establishment. No prior work, including the standard itself, analyzed the…
Everlasting ROBOT: the Marvin Attack
Abstract. In this paper we show that Bleichenbacher-style attacks onRSA decryption are not only still possible, but also that vulnerable implementations are common. We have successfully attacked multiple implementations using only timing of decryption operation and shown thatmany others are vulnerable. To perform the attack…
Siemens SIMATIC PCS neo
SIMATIC PCS neo: Versions before V4.13.2 Vulnerability Overview3.2.1 MISSING AUTHENTICATION FOR CRITICAL FUNCTION CWE-306Affected products’ PUD Manager fails to authenticate users properly within its web service. This allows an unauthenticated attacker from an adjacent network to generate a privileged token and upload additional documents.CVE-2023-46096 has…
Ubuntu Security Notice USN-6502-1
Packages Details Ivan D Barrera, Christopher Bednarz, Mustafa Ismail, and Shiraz Saleemdiscovered that the InfiniBand RDMA driver in the Linux kernel did notproperly check for zero-length STAG or MR registration. A remote attackercould possibly use this to execute arbitrary code. (CVE-2023-25775) Yu Hao discovered that…
Mitsubishi Electric MELSEC and MELIPC Series (Update G)
1. EXECUTIVE SUMMARY 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow a remote attacker to cause a denial-of-service condition. Recovery requires a system reset. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following versions of MELSEC series CPU modules and MELIPC Series Industrial Computers…
Hitachi Energy eSOMS
1. EXECUTIVE SUMMARY 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to disclose sensitive information related to eSOMS application configuration. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following Hitachi Energy products are affected: 3.2 Vulnerability Overview 3.2.1 GENERATION OF ERROR MESSAGE CONTAINING…
Johnson Controls Quantum HD Unity
1. EXECUTIVE SUMMARY 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an unauthorized user to access debug features that were accidentally exposed. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following Johnson Controls Quantum HD Unity products are affected: 3.2 Vulnerability Overview 3.2.1 ACTIVE DEBUG…
Cisco Firepower Management Center Software Log API Denial of Service Vulnerability
Summary Affected Products Workarounds Fixed Software Source:
Cisco Firepower Threat Defense Software for Cisco Firepower 2100 Series Firewalls Inspection Rules Denial of Service Vulnerability
Summary Affected Products Indicators of Compromise Workarounds Fixed Software Source:
Stay connected