Lucene search

K

Wr21 Firmware Security Vulnerabilities

cve
cve

CVE-2023-46102

The Android Client application, when enrolled to the AppHub server, connects to an MQTT broker to exchange messages and receive commands to execute on the HMI device. The protocol builds on top of MQTT to implement the remote management of the device is encrypted with a hard-coded DES symmetric...

8.8CVSS

8.7AI Score

0.001EPSS

2023-10-25 06:17 PM
15
cve
cve

CVE-2023-45851

The Android Client application, when enrolled to the AppHub server,connects to an MQTT broker without enforcing any server authentication. This issue allows an attacker to force the Android Client application to connect to a malicious MQTT broker, enabling it to send fake messages to the HMI...

8.8CVSS

8.3AI Score

0.001EPSS

2023-10-25 06:17 PM
8
cve
cve

CVE-2023-45844

The vulnerability allows a low privileged user that have access to the device when locked in Kiosk mode to install an arbitrary Android application and leverage it to have access to critical device settings such as the device power management or eventually the device secure settings (ADB...

6.8CVSS

7AI Score

0.001EPSS

2023-10-25 06:17 PM
20
cve
cve

CVE-2023-45220

The Android Client application, when enrolled with the define method 1(the user manually inserts the server ip address), use HTTP protocol to retrieve sensitive information (ip address and credentials to connect to a remote MQTT broker entity) instead of HTTPS and this feature is not configurable.....

8.8CVSS

8.2AI Score

0.001EPSS

2023-10-25 06:17 PM
11
cve
cve

CVE-2023-45321

The Android Client application, when enrolled with the define method 1 (the user manually inserts the server ip address), use HTTP protocol to retrieve sensitive information (ip address and credentials to connect to a remote MQTT broker entity) instead of HTTPS and this feature is not...

8.8CVSS

8.3AI Score

0.0005EPSS

2023-10-25 06:17 PM
10
cve
cve

CVE-2023-43488

The vulnerability allows a low privileged (untrusted) application to modify a critical system property that should be denied, in order to enable the ADB (Android Debug Bridge) protocol to be exposed on the network, exploiting it to gain a privileged shell on the device without requiring the...

7.9CVSS

7.4AI Score

0.0004EPSS

2023-10-25 06:17 PM
11
cve
cve

CVE-2023-41960

The vulnerability allows an unprivileged(untrusted) third-party application to interact with a content-provider unsafely exposed by the Android Agent application, potentially modifying sensitive settings of the Android Client application...

7.1CVSS

4AI Score

0.0004EPSS

2023-10-25 06:17 PM
10
cve
cve

CVE-2023-41372

The vulnerability allows an unprivileged (untrusted) third- party application to arbitrary modify the server settings of the Android Client application, inducing it to connect to an attacker - controlled malicious server.This is possible by forging a valid broadcast intent encrypted with a...

7.8CVSS

7.3AI Score

0.0004EPSS

2023-10-25 06:17 PM
9
cve
cve

CVE-2023-41255

The vulnerability allows an unprivileged user with access to the subnet of the TPC-110W device to gain a root shell on the device itself abusing the lack of authentication of the ‘su’ binary file installed on the device that can be accessed through the ADB (Android Debug Bridge) protocol exposed...

8.8CVSS

8.8AI Score

0.001EPSS

2023-10-25 06:17 PM
9
cve
cve

CVE-2023-4299

Digi RealPort Protocol is vulnerable to a replay attack that may allow an attacker to bypass authentication to access connected...

9CVSS

8.1AI Score

0.001EPSS

2023-08-31 09:15 PM
25
cve
cve

CVE-2021-37187

An issue was discovered on Digi TransPort devices through 2021-07-21. An authenticated attacker may read a password file (with reversible passwords) from the device, which allows decoding of other users'...

6.5CVSS

6.5AI Score

0.001EPSS

2021-12-10 01:15 PM
21
cve
cve

CVE-2021-37189

An issue was discovered on Digi TransPort Gateway devices through 5.2.13.4. They do not set the Secure attribute for sensitive cookies in HTTPS sessions, which could cause the user agent to send those cookies in cleartext over an HTTP...

7.5CVSS

7.4AI Score

0.002EPSS

2021-12-10 01:15 PM
14
2
cve
cve

CVE-2021-35978

An issue was discovered in Digi TransPort DR64, SR44 VC74, and WR. The ZING protocol allows arbitrary remote command execution with SUPER privileges. This allows an attacker (with knowledge of the protocol) to execute arbitrary code on the controller including overwriting firmware, adding/removing....

9.8CVSS

9.8AI Score

0.005EPSS

2021-12-10 01:15 PM
17
cve
cve

CVE-2021-37188

An issue was discovered on Digi TransPort devices through 2021-07-21. An authenticated attacker may load customized firmware (because the bootloader does not verify that it is authentic), changing the behavior of the...

8.8CVSS

8.6AI Score

0.001EPSS

2021-12-10 01:15 PM
17
cve
cve

CVE-2021-36767

In Digi RealPort through 4.10.490, authentication relies on a challenge-response mechanism that gives access to the server password, making the protection ineffective. An attacker may send an unauthenticated request to the server. The server will reply with a weakly-hashed version of the server's.....

9.8CVSS

9.5AI Score

0.002EPSS

2021-10-08 03:15 PM
36
cve
cve

CVE-2021-35979

An issue was discovered in Digi RealPort through 4.8.488.0. The 'encrypted' mode is vulnerable to man-in-the-middle attacks and does not perform...

8.1CVSS

7.9AI Score

0.001EPSS

2021-10-08 03:15 PM
25
cve
cve

CVE-2021-35977

An issue was discovered in Digi RealPort for Windows through 4.8.488.0. A buffer overflow exists in the handling of ADDP discovery response messages. This could result in arbitrary code...

9.8CVSS

9.8AI Score

0.003EPSS

2021-10-08 03:15 PM
29
cve
cve

CVE-2020-8822

Digi TransPort WR21 5.2.2.3, WR44 5.1.6.4, and WR44v2 5.1.6.9 devices allow stored XSS in the web...

4.8CVSS

4.9AI Score

0.001EPSS

2020-02-10 02:15 AM
71