A misconfiguration vulnerability in urvpn_client of Milesight UR32L v32.3.0.5 allows for a man-in-the-middle attack, leading to increased privileges
Reporter | Title | Published | Views | Family All 8 |
---|---|---|---|---|
![]() | Milesight UR32L urvpn_client Certificate Validation vulnerability | 6 Jul 202300:00 | – | talos |
![]() | Milesight UR32L urvpn_client function misconfiguration vulnerability | 10 Jul 202300:00 | – | cnvd |
![]() | CVE-2023-23546 | 6 Jul 202314:53 | – | vulnrichment |
![]() | CVE-2023-23546 | 6 Jul 202314:53 | – | cvelist |
![]() | CVE-2023-23546 | 6 Jul 202315:15 | – | nvd |
![]() | Privilege escalation | 6 Jul 202315:15 | – | prion |
![]() | Taking over Milesight UR32L routers behind a VPN: 22 vulnerabilities and a full chain | 6 Jul 202315:38 | – | talosblog |
![]() | The many vulnerabilities Talos discovered in SOHO and industrial wireless routers post-VPNFilter | 2 Aug 202312:00 | – | talosblog |
[
{
"vendor": "Milesight",
"product": "UR32L",
"versions": [
{
"version": "v32.3.0.5",
"status": "affected"
}
]
}
]
Source | Link |
---|---|
talosintelligence | www.talosintelligence.com/vulnerability_reports/TALOS-2023-1705 |
talosintelligence | www.talosintelligence.com/vulnerability_reports/TALOS-2023-1705 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo