Remote Attackers Can Now Reach Protected Network Devices via NAT Slipstreaming. A known NAT slipstreaming attack allows remote attackers to access internal network devices by fooling the network’s NAT and bypassing firewalls through a victim's click on a malicious link. The attack exploits the victim's browser and ALG connection-tracking mechanism to gain access to unexposed endpoints, including industrial controllers
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | New Attack Could Let Remote Hackers Target Devices On Internal Networks | 27 Jan 202112:58 | – | thn |
![]() | CVE-2020-16043 | 8 Jan 202119:15 | – | cve |
![]() | CVE-2021-23961 | 26 Feb 202103:15 | – | cve |
![]() | Design/Logic Flaw | 8 Jan 202119:15 | – | prion |
![]() | Design/Logic Flaw | 26 Feb 202103:15 | – | prion |
![]() | Authorization Bypass | 11 Jan 202119:49 | – | veracode |
![]() | Information Disclosure | 27 Jan 202119:32 | – | veracode |
![]() | CVE-2020-16043 | 8 Jan 202119:15 | – | nvd |
![]() | CVE-2021-23961 | 26 Feb 202103:15 | – | nvd |
![]() | UBUNTU-CVE-2020-16043 | 8 Jan 202119:15 | – | osv |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo