Описание
JUUKO K-800 (Firmware versions prior to numbers ending ...9A, ...9B, ...9C, etc.) is vulnerable to a replay attack and command forgery, which could allow attackers to replay commands, control the device, view commands, or cause the device to stop running.
Ссылки
- Third Party AdvisoryUS Government Resource
- Third Party AdvisoryUS Government Resource
Уязвимые конфигурации
Конфигурация 1
Одновременно
cpe:2.3:o:juuko:k-800_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:juuko:k-800:-:*:*:*:*:*:*:*
EPSS
Процентиль: 46%
0.00235
Низкий
9.8 Critical
CVSS3
10 Critical
CVSS2
Дефекты
CWE-294
Связанные уязвимости
github
больше 3 лет назад
JUUKO K-800 (Firmware versions prior to numbers ending ...9A, ...9B, ...9C, etc.) is vulnerable to a replay attack and command forgery, which could allow attackers to replay commands, control the device, view commands, or cause the device to stop running.
EPSS
Процентиль: 46%
0.00235
Низкий
9.8 Critical
CVSS3
10 Critical
CVSS2
Дефекты
CWE-294