CVE-2022-3027
- EPSS 0.05%
- Veröffentlicht 13.09.2022 15:15:09
- Zuletzt bearbeitet 21.11.2024 07:18:39
The CMS8000 device does not properly control or sanitize the SSID name of a new Wi-Fi access point. A threat actor could create an SSID with a malicious name, including non-standard characters that, when the device attempts connecting to the maliciou...
CVE-2022-36385
- EPSS 0.07%
- Veröffentlicht 13.09.2022 15:15:08
- Zuletzt bearbeitet 21.11.2024 07:12:55
A threat actor with momentary access to the device can plug in a USB drive and perform a malicious firmware update, resulting in permanent changes to device functionality. No authentication or controls are in place to prevent a threat actor from mali...
CVE-2022-38069
- EPSS 0.07%
- Veröffentlicht 13.09.2022 15:15:08
- Zuletzt bearbeitet 21.11.2024 07:15:43
Multiple globally default credentials exist across all CMS8000 devices, that once exposed, allow a threat actor with momentary physical access to gain privileged access to any device. Privileged credential access enables the extraction of sensitive p...
CVE-2022-38100
- EPSS 0.21%
- Veröffentlicht 13.09.2022 15:15:08
- Zuletzt bearbeitet 21.11.2024 07:15:47
The CMS800 device fails while attempting to parse malformed network data sent by a threat actor. A threat actor with network access can remotely issue a specially formatted UDP request that will cause the entire device to crash and require a physical...
CVE-2022-38453
- EPSS 0.03%
- Veröffentlicht 13.09.2022 15:15:08
- Zuletzt bearbeitet 21.11.2024 07:16:30
Multiple binary application files on the CMS8000 device are compiled with 'not stripped' and 'debug_info' compilation settings. These compiler settings greatly decrease the level of effort for a threat actor to reverse engineer sensitive code and ide...