βΌ CVE-2023-40708 βΌ
π Read
via "National Vulnerability Database".
The File Transfer Protocol (FTP) port is open by default in the SNAP PAC S1 Firmware version R10.3b. This could allow an adversary to access some device files.π Read
via "National Vulnerability Database".
βΌ CVE-2023-40710 βΌ
π Read
via "National Vulnerability Database".
An adversary could cause a continuous restart loop to the entire device by sending a large quantity of HTTP GET requests if the controller has the built-in web server enabled but does not have the built-in web server completely set up and configured for theΓ SNAP PAC S1 Firmware version R10.3bπ Read
via "National Vulnerability Database".
βΌ CVE-2023-34972 βΌ
π Read
via "National Vulnerability Database".
A cleartext transmission of sensitive information vulnerability has been reported to affect QNAP operating systems. If exploited, the vulnerability possibly allows local network clients to read the contents of unexpected sensitive data via unspecified vectors.We have already fixed the vulnerability in the following versions:QTS 5.0.1.2425 build 20230609 and laterQTS 5.1.0.2444 build 20230629 and laterQuTS hero h5.1.0.2424 build 20230609 and laterπ Read
via "National Vulnerability Database".
βΌ CVE-2023-40709 βΌ
π Read
via "National Vulnerability Database".
An adversary could crash the entire device by sending a large quantity of ICMP requests if the controller has the built-in web server enabled but does not have the built-in web server completely set up and configured for theΓ SNAP PAC S1 Firmware version R10.3bπ Read
via "National Vulnerability Database".
π΄ Ransomware With an Identity Crisis Targets Small Businesses, Individuals π΄
π Read
via "Dark Reading".
TZW is the latest version of Adhubllka, which has been active since 2019 but has gone largely unreported due to its lower ransom demands.π Read
via "Dark Reading".
Dark Reading
Ransomware With an Identity Crisis Targets Small Businesses, Individuals
TZW is the latest version of Adhubllka, which has been active since 2019 but has gone largely unreported due to its lower ransom demands.
β S3 Ep149: How many cryptographers does it take to change a light bulb? β
π Read
via "Naked Security".
Latest episode - listen now! Full transcript inside...π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
βΌ CVE-2023-40895 βΌ
π Read
via "National Vulnerability Database".
Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter list at /goform/SetVirtualServerCfg.π Read
via "National Vulnerability Database".
βΌ CVE-2023-4420 βΌ
π Read
via "National Vulnerability Database".
A remote unprivileged attacker can intercept the communication via e.g. Man-In-The-Middle, due to the absence of Transport Layer Security (TLS) in the SICK LMS5xx. This lack of encryption in the communication channel can lead to the unauthorized disclosure of sensitive information. The attacker can exploit this weakness to eavesdrop on the communication between the LMS5xx and the Client, and potentially manipulate the data being transmitted.π Read
via "National Vulnerability Database".
βΌ CVE-2023-40899 βΌ
π Read
via "National Vulnerability Database".
Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter macFilterType and parameter deviceList at /goform/setMacFilterCfg.π Read
via "National Vulnerability Database".
βΌ CVE-2023-40893 βΌ
π Read
via "National Vulnerability Database".
Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter time at /goform/PowerSaveSet.π Read
via "National Vulnerability Database".
βΌ CVE-2023-40900 βΌ
π Read
via "National Vulnerability Database".
Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter list at /goform/SetNetControlList.π Read
via "National Vulnerability Database".
βΌ CVE-2023-4419 βΌ
π Read
via "National Vulnerability Database".
The LMS5xx uses hard-coded credentials, which potentially allow low-skilledunauthorized remote attackers to reconfigure settings and /or disrupt the functionality of the device.π Read
via "National Vulnerability Database".
βΌ CVE-2023-40896 βΌ
π Read
via "National Vulnerability Database".
Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter list and bindnum at /goform/SetIpMacBind.π Read
via "National Vulnerability Database".
βΌ CVE-2023-40902 βΌ
π Read
via "National Vulnerability Database".
Tenda AC10 v4 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via parameter list and bindnum at /goform/SetIpMacBind.π Read
via "National Vulnerability Database".
βΌ CVE-2023-40897 βΌ
π Read
via "National Vulnerability Database".
Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter mac at /goform/GetParentControlInfo.π Read
via "National Vulnerability Database".
βΌ CVE-2023-40894 βΌ
π Read
via "National Vulnerability Database".
Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter list at /goform/SetStaticRouteCfg.π Read
via "National Vulnerability Database".
βΌ CVE-2023-40892 βΌ
π Read
via "National Vulnerability Database".
Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter schedStartTime and schedEndTime at /goform/openSchedWifi.π Read
via "National Vulnerability Database".
βΌ CVE-2023-40904 βΌ
π Read
via "National Vulnerability Database".
Tenda AC10 v4 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via parameter macFilterType and parameter deviceList at /goform/setMacFilterCfg.π Read
via "National Vulnerability Database".
βΌ CVE-2023-31412 βΌ
π Read
via "National Vulnerability Database".
The LMS5xx uses weak hash generation methods, resulting in the creation of insecure hashs. If an attacker manages to retrieve the hash, it could lead to collision attacks and the potential retrieval of the password.π Read
via "National Vulnerability Database".
βΌ CVE-2023-40891 βΌ
π Read
via "National Vulnerability Database".
Tenda AC8 v4 US_AC8V4.0si_V16.03.34.06_cn was discovered to contain a stack overflow via parameter firewallEn at /goform/SetFirewallCfg.π Read
via "National Vulnerability Database".
βΌ CVE-2023-40901 βΌ
π Read
via "National Vulnerability Database".
Tenda AC10 v4 US_AC10V4.0si_V16.03.10.13_cn was discovered to contain a stack overflow via parameter macFilterType and parameter deviceList at url /goform/setMacFilterCfg.π Read
via "National Vulnerability Database".