Lucene search

K
MersiveSolstice Pod Firmware

5 matches found

CVE
CVE
added 2020/12/23 4:15 p.m.59 views

CVE-2020-35587

In Solstice Pod before 3.0.3, the firmware can easily be decompiled/disassembled. The decompiled/disassembled files contain non-obfuscated code. NOTE: it is unclear whether lack of obfuscation is directly associated with a negative impact, or instead only facilitates an attack technique

7.5CVSS7.5AI score0.00715EPSS
CVE
CVE
added 2020/12/23 3:15 p.m.31 views

CVE-2020-35584

In Solstice Pod before 3.0.3, the web services allow users to connect to them over unencrypted channels via the Browser Look-in feature. An attacker suitably positioned to view a legitimate user's network traffic could record and monitor their interactions with the web services and obtain any infor...

5.9CVSS5.5AI score0.00176EPSS
CVE
CVE
added 2020/12/23 3:15 p.m.29 views

CVE-2020-35586

In Solstice Pod before 3.3.0 (or Open4.3), the Administrator password can be enumerated using brute-force attacks via the /Config/service/initModel?password= Solstice Open Control API because there is no complexity requirement (e.g., it might be all digits or all lowercase letters).

7.5CVSS7.6AI score0.00343EPSS
CVE
CVE
added 2020/11/11 3:15 p.m.26 views

CVE-2020-27523

Solstice-Pod up to 5.0.2 WEBRTC server mishandles the format-string specifiers %x; %p; %c and %s in the screen_key, display_name, browser_name, and operation_system parameter during the authentication process. This may crash the server and force Solstice-Pod to reboot, which leads to a denial of se...

7.5CVSS7.5AI score0.01338EPSS
CVE
CVE
added 2020/12/23 3:15 p.m.25 views

CVE-2020-35585

In Solstice Pod before 3.3.0 (or Open4.3), the screen key can be enumerated using brute-force attacks via the /lookin/info Solstice Open Control API because there are only 1.7 million possibilities.

7.5CVSS7.5AI score0.00343EPSS