Verizon

Wireless Network Extender

4 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.58%
  • Veröffentlicht 18.07.2013 16:51:40
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Uboot bootloader on the Verizon Wireless Network Extender SCS-26UC4 allows physically proximate attackers to obtain root access by connecting a crafted HDMI cable and using a sys session to modify the ramboot environment variable.

  • EPSS 0.19%
  • Veröffentlicht 18.07.2013 16:51:40
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Uboot bootloader on the Verizon Wireless Network Extender SCS-2U01 allows physically proximate attackers to bypass the intended boot process and obtain a login prompt by connecting a crafted HDMI cable and sending a SysReq interrupt.

  • EPSS 0.26%
  • Veröffentlicht 18.07.2013 16:51:40
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Verizon Wireless Network Extender SCS-2U01 has a hardcoded password for the root account, which makes it easier for physically proximate attackers to obtain administrative access by leveraging a login prompt.

  • EPSS 0.9%
  • Veröffentlicht 18.07.2013 16:51:40
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Verizon Wireless Network Extender SCS-26UC4 and SCS-2U01 does not use CAVE authentication, which makes it easier for remote attackers to obtain ESN and MIN values from arbitrary phones, and conduct cloning attacks, by sniffing the network for reg...