Логотип exploitDog
bind:CVE-2019-10706
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-10706

Количество 2

Количество 2

nvd логотип

CVE-2019-10706

больше 5 лет назад

Western Digital SanDisk SanDisk X300, X300s, X400, and X600 devices: The firmware update authentication method relies on a symmetric HMAC digest. The key used to validate this digest is present in a protected area of the device, and if extracted could be used to install arbitrary firmware to other devices.

CVSS3: 6.3
EPSS: Низкий
github логотип

GHSA-24jw-qhh7-33q6

около 3 лет назад

Western Digital SanDisk SanDisk X300, X300s, X400, and X600 devices: The firmware update authentication method relies on a symmetric HMAC digest. The key used to validate this digest is present in a protected area of the device, and if extracted could be used to install arbitrary firmware to other devices.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-10706

Western Digital SanDisk SanDisk X300, X300s, X400, and X600 devices: The firmware update authentication method relies on a symmetric HMAC digest. The key used to validate this digest is present in a protected area of the device, and if extracted could be used to install arbitrary firmware to other devices.

CVSS3: 6.3
0%
Низкий
больше 5 лет назад
github логотип
GHSA-24jw-qhh7-33q6

Western Digital SanDisk SanDisk X300, X300s, X400, and X600 devices: The firmware update authentication method relies on a symmetric HMAC digest. The key used to validate this digest is present in a protected area of the device, and if extracted could be used to install arbitrary firmware to other devices.

0%
Низкий
около 3 лет назад

Уязвимостей на страницу