Lucene search

K

Ctrlx Hmi Web Panel Wr2107 Firmware Security Vulnerabilities - January

cve
cve

CVE-2023-41255

The vulnerability allows an unprivileged user with access to the subnet of the TPC-110W device to gain a root shell on the device itself abusing the lack of authenticationof the ‘su’ binary file installed on the device that can be accessed through the ADB (Android Debug Bridge) protocol exposed on ...

8.8CVSS

8.8AI Score

0.001EPSS

2023-10-25 06:17 PM
13
cve
cve

CVE-2023-41372

The vulnerability allows an unprivileged (untrusted) third- party application to arbitrary modify the server settings of the Android Client application, inducing it to connect to an attacker - controlled malicious server.This is possible by forging a valid broadcast intent encrypted with a hardcode...

7.8CVSS

7.3AI Score

0.0004EPSS

2023-10-25 06:17 PM
21
cve
cve

CVE-2023-41960

The vulnerability allows an unprivileged(untrusted) third-party application to interact with a content-provider unsafely exposed by the Android Agent application, potentially modifying sensitive settings of the Android Client application itself.

7.1CVSS

4AI Score

0.0004EPSS

2023-10-25 06:17 PM
15
cve
cve

CVE-2023-43488

The vulnerability allows a low privileged (untrusted) application tomodify a critical system property that should be denied, in order to enable the ADB (Android Debug Bridge) protocol to be exposed on the network, exploiting it to gain a privileged shell on the device without requiring the physical...

7.9CVSS

7.4AI Score

0.0004EPSS

2023-10-25 06:17 PM
14
cve
cve

CVE-2023-45220

The Android Client application, when enrolled with the define method 1(the user manually inserts the server ip address), use HTTP protocol to retrieve sensitive information (ip address and credentials to connect to a remote MQTT broker entity) instead of HTTPS and this feature is not configurable b...

8.8CVSS

8.2AI Score

0.001EPSS

2023-10-25 06:17 PM
14
cve
cve

CVE-2023-45321

The Android Client application, when enrolled with the define method 1 (the user manually inserts the server ip address), use HTTP protocol to retrieve sensitive information (ip address and credentials to connect to a remote MQTT broker entity) instead of HTTPS and this feature is not configurable ...

8.8CVSS

8.3AI Score

0.0005EPSS

2023-10-25 06:17 PM
27
cve
cve

CVE-2023-45844

The vulnerability allows a low privileged user that have access to the device when locked in Kiosk mode to install an arbitrary Android application and leverage it to have access to critical device settings such as the device power management or eventually the device secure settings (ADB debug).

6.8CVSS

7AI Score

0.001EPSS

2023-10-25 06:17 PM
26
cve
cve

CVE-2023-45851

The Android Client application, when enrolled to the AppHub server,connects to an MQTT broker without enforcing any server authentication. This issue allows an attacker to force the Android Client application to connect to a malicious MQTT broker, enabling it to send fake messages to the HMI device

8.8CVSS

8.3AI Score

0.001EPSS

2023-10-25 06:17 PM
13
cve
cve

CVE-2023-46102

The Android Client application, when enrolled to the AppHub server, connects to an MQTTbroker to exchange messages and receive commands to execute on the HMI device.The protocol builds on top of MQTT to implement the remote management of the device is encrypted with a hard-coded DES symmetric key, ...

8.8CVSS

8.7AI Score

0.001EPSS

2023-10-25 06:17 PM
17