βΌ CVE-2023-34971 βΌ
π Read
via "National Vulnerability Database".
An inadequate encryption strength vulnerability has been reported to affect QNAP operating systems. If exploited, the vulnerability possibly allows local network clients to decrypt the data using brute force attacks via unspecified vectors.We have already fixed the vulnerability in the following versions:QTS 5.0.1.2425 build 20230609 and laterQTS 5.1.0.2444 build 20230629 and laterQTS 4.5.4.2467 build 20230718 and laterQuTS hero h5.1.0.2424 build 20230609 and laterQuTS hero h4.5.4.2476 build 20230728 and laterπ Read
via "National Vulnerability Database".
βΌ CVE-2022-46884 βΌ
π Read
via "National Vulnerability Database".
A potential use-after-free vulnerability existed in SVG Images if the Refresh Driver was destroyed at an inopportune time. This could have lead to memory corruption or a potentially exploitable crash.*Note*: This advisory was added on December 13th, 2022 after discovering it was inadvertently left out of the original advisory. The fix was included in the original release of Firefox 106. This vulnerability affects Firefox < 106.π Read
via "National Vulnerability Database".
βΌ CVE-2023-40706 βΌ
π Read
via "National Vulnerability Database".
There is no limit on the number of login attempts in the web server for the SNAP PAC S1 Firmware version R10.3b. This could allow for a brute-force attack on the built-in web server login.π Read
via "National Vulnerability Database".
βΌ CVE-2023-40707 βΌ
π Read
via "National Vulnerability Database".
There are no requirements for setting a complex password in the built-in web server of the SNAP PAC S1 Firmware version R10.3b, which could allow for a successful brute force attack if users don't set up complex credentials.π Read
via "National Vulnerability Database".
βΌ CVE-2023-40708 βΌ
π Read
via "National Vulnerability Database".
The File Transfer Protocol (FTP) port is open by default in the SNAP PAC S1 Firmware version R10.3b. This could allow an adversary to access some device files.π Read
via "National Vulnerability Database".
βΌ CVE-2023-40710 βΌ
π Read
via "National Vulnerability Database".
An adversary could cause a continuous restart loop to the entire device by sending a large quantity of HTTP GET requests if the controller has the built-in web server enabled but does not have the built-in web server completely set up and configured for theΓ SNAP PAC S1 Firmware version R10.3bπ Read
via "National Vulnerability Database".
βΌ CVE-2023-34972 βΌ
π Read
via "National Vulnerability Database".
A cleartext transmission of sensitive information vulnerability has been reported to affect QNAP operating systems. If exploited, the vulnerability possibly allows local network clients to read the contents of unexpected sensitive data via unspecified vectors.We have already fixed the vulnerability in the following versions:QTS 5.0.1.2425 build 20230609 and laterQTS 5.1.0.2444 build 20230629 and laterQuTS hero h5.1.0.2424 build 20230609 and laterπ Read
via "National Vulnerability Database".
βΌ CVE-2023-40709 βΌ
π Read
via "National Vulnerability Database".
An adversary could crash the entire device by sending a large quantity of ICMP requests if the controller has the built-in web server enabled but does not have the built-in web server completely set up and configured for theΓ SNAP PAC S1 Firmware version R10.3bπ Read
via "National Vulnerability Database".
π΄ Ransomware With an Identity Crisis Targets Small Businesses, Individuals π΄
π Read
via "Dark Reading".
TZW is the latest version of Adhubllka, which has been active since 2019 but has gone largely unreported due to its lower ransom demands.π Read
via "Dark Reading".
Dark Reading
Ransomware With an Identity Crisis Targets Small Businesses, Individuals
TZW is the latest version of Adhubllka, which has been active since 2019 but has gone largely unreported due to its lower ransom demands.
β S3 Ep149: How many cryptographers does it take to change a light bulb? β
π Read
via "Naked Security".
Latest episode - listen now! Full transcript inside...π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
βΌ CVE-2023-40895 βΌ
π Read
via "National Vulnerability Database".
Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter list at /goform/SetVirtualServerCfg.π Read
via "National Vulnerability Database".
βΌ CVE-2023-4420 βΌ
π Read
via "National Vulnerability Database".
A remote unprivileged attacker can intercept the communication via e.g. Man-In-The-Middle, due to the absence of Transport Layer Security (TLS) in the SICK LMS5xx. This lack of encryption in the communication channel can lead to the unauthorized disclosure of sensitive information. The attacker can exploit this weakness to eavesdrop on the communication between the LMS5xx and the Client, and potentially manipulate the data being transmitted.π Read
via "National Vulnerability Database".
βΌ CVE-2023-40899 βΌ
π Read
via "National Vulnerability Database".
Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter macFilterType and parameter deviceList at /goform/setMacFilterCfg.π Read
via "National Vulnerability Database".
βΌ CVE-2023-40893 βΌ
π Read
via "National Vulnerability Database".
Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter time at /goform/PowerSaveSet.π Read
via "National Vulnerability Database".
βΌ CVE-2023-40900 βΌ
π Read
via "National Vulnerability Database".
Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter list at /goform/SetNetControlList.π Read
via "National Vulnerability Database".
βΌ CVE-2023-4419 βΌ
π Read
via "National Vulnerability Database".
The LMS5xx uses hard-coded credentials, which potentially allow low-skilledunauthorized remote attackers to reconfigure settings and /or disrupt the functionality of the device.π Read
via "National Vulnerability Database".
βΌ CVE-2023-40896 βΌ
π Read
via "National Vulnerability Database".
Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter list and bindnum at /goform/SetIpMacBind.π Read
via "National Vulnerability Database".
βΌ CVE-2023-40902 βΌ
π Read
via "National Vulnerability Database".
Tenda AC10 v4 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via parameter list and bindnum at /goform/SetIpMacBind.π Read
via "National Vulnerability Database".
βΌ CVE-2023-40897 βΌ
π Read
via "National Vulnerability Database".
Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter mac at /goform/GetParentControlInfo.π Read
via "National Vulnerability Database".
βΌ CVE-2023-40894 βΌ
π Read
via "National Vulnerability Database".
Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter list at /goform/SetStaticRouteCfg.π Read
via "National Vulnerability Database".
βΌ CVE-2023-40892 βΌ
π Read
via "National Vulnerability Database".
Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter schedStartTime and schedEndTime at /goform/openSchedWifi.π Read
via "National Vulnerability Database".