Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-p2j3-fm26-85wv

Опубликовано: 30 янв. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 7.7
CVSS3: 7.5

Описание

The affected product sends out remote access requests to a hard-coded IP address, bypassing existing device network settings to do so. This could serve as a backdoor and lead to a malicious actor being able to upload and overwrite files on the device.

The affected product sends out remote access requests to a hard-coded IP address, bypassing existing device network settings to do so. This could serve as a backdoor and lead to a malicious actor being able to upload and overwrite files on the device.

EPSS

Процентиль: 54%
0.00319
Низкий

7.7 High

CVSS4

7.5 High

CVSS3

Дефекты

CWE-912

Связанные уязвимости

CVSS3: 7.5
nvd
около 1 года назад

The "monitor" binary in the firmware of the affected product attempts to mount to a hard-coded, routable IP address, bypassing existing device network settings to do so. The function also enables the network interface of the device if it is disabled. The function is triggered by attempting to update the device from the user menu. This could serve as a backdoor to the device, and could lead to a malicious actor being able to upload and overwrite files on the device.

CVSS3: 7.5
fstec
около 1 года назад

Уязвимость микропрограммного обеспечения медицинских устройств мониторинга состояния пациента CMS8000 Patient Monitor и Epsimed MN-120, связанная с отправкой запросов на жестко закодированный внешний IP-адрес, позволяющая нарушителю обойти ограничения безопасности и загружать и перезаписывать файлы на устройстве

EPSS

Процентиль: 54%
0.00319
Низкий

7.7 High

CVSS4

7.5 High

CVSS3

Дефекты

CWE-912