CVE-2024-50380
- EPSS 0.23%
- Veröffentlicht 02.12.2024 17:15:11
- Zuletzt bearbeitet 02.12.2024 17:15:11
Snap One OVRC cloud uses the MAC address as an identifier to provide information when requested. An attacker can impersonate other devices by supplying enumerated MAC addresses and receive sensitive information about the device.
CVE-2023-25183
- EPSS 0.05%
- Veröffentlicht 22.05.2023 21:15:13
- Zuletzt bearbeitet 21.11.2024 07:49:16
In Snap One OvrC Pro versions prior to 7.2, when logged into the superuser account, a new functionality appears that could allow users to execute arbitrary commands on the hub device.
CVE-2023-28386
- EPSS 0.1%
- Veröffentlicht 22.05.2023 20:15:10
- Zuletzt bearbeitet 09.12.2024 18:15:19
Snap One OvrC Pro devices versions 7.2 and prior do not validate firmware updates correctly. The device only calculates the MD5 hash of the firmware and does not check using a private-public key mechanism. The lack of complete PKI system firmware sig...
CVE-2023-28412
- EPSS 0.1%
- Veröffentlicht 22.05.2023 20:15:10
- Zuletzt bearbeitet 21.11.2024 07:55:00
When supplied with a random MAC address, Snap One OvrC cloud servers will return information about the device. The MAC address of devices can be enumerated in an attack and the OvrC cloud will disclose their information.
CVE-2023-28649
- EPSS 0.06%
- Veröffentlicht 22.05.2023 20:15:10
- Zuletzt bearbeitet 09.12.2024 18:15:20
The Hub in the Snap One OvrC cloud platform is a device used to centralize and manage nested devices connected to it. A vulnerability exists in which an attacker could impersonate a hub and send device requests to claim already claimed devices. The O...
CVE-2023-31193
- EPSS 0.05%
- Veröffentlicht 22.05.2023 20:15:10
- Zuletzt bearbeitet 21.11.2024 08:01:36
Snap One OvrC Pro versions prior to 7.3 use HTTP connections when downloading a program from their servers. Because they do not use HTTPS, OvrC Pro devices are susceptible to exploitation.
CVE-2023-31240
- EPSS 0.07%
- Veröffentlicht 22.05.2023 20:15:10
- Zuletzt bearbeitet 09.12.2024 18:15:20
Snap One OvrC Pro versions prior to 7.2 have their own locally running web server accessible both from the local network and remotely. OvrC cloud contains a hidden superuser account accessible through hard-coded credentials.
- EPSS 0.01%
- Veröffentlicht 22.05.2023 20:15:10
- Zuletzt bearbeitet 09.12.2024 18:15:21
Snap One OvrC cloud servers contain a route an attacker can use to bypass requirements and claim devices outright.
CVE-2023-31245
- EPSS 0.07%
- Veröffentlicht 22.05.2023 20:15:10
- Zuletzt bearbeitet 21.11.2024 08:01:41
Devices using Snap One OvrC cloud are sent to a web address when accessing a web management interface using a HTTP connection. Attackers could impersonate a device and supply malicious information about the device’s web serve...