Логотип exploitDog
bind:CVE-2021-33478
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-33478

Количество 3

Количество 3

nvd логотип

CVE-2021-33478

больше 4 лет назад

The TrustZone implementation in certain Broadcom MediaxChange firmware could allow an unauthenticated, physically proximate attacker to achieve arbitrary code execution in the TrustZone Trusted Execution Environment (TEE) of an affected device. This, for example, affects certain Cisco IP Phone and Wireless IP Phone products before 2021-07-07. Exploitation is possible only when the attacker can disassemble the device in order to control the voltage/current for chip pins.

CVSS3: 6.8
EPSS: Низкий
github логотип

GHSA-vh28-q6j2-63w7

больше 3 лет назад

The TrustZone implementation in certain Broadcom MediaxChange firmware could allow an unauthenticated, physically proximate attacker to achieve arbitrary code execution in the TrustZone Trusted Execution Environment (TEE) of an affected device. This, for example, affects certain Cisco IP Phone and Wireless IP Phone products before 2021-07-07. Exploitation is possible only when the attacker can disassemble the device in order to control the voltage/current for chip pins.

EPSS: Низкий
fstec логотип

BDU:2021-04066

больше 4 лет назад

Уязвимость реализации технологии TrustZone микропрограммного обеспечения IP-телефонов Cisco IP Phone серии 8800, позволяющая нарушителю выполнить произвольный код

CVSS3: 6.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-33478

The TrustZone implementation in certain Broadcom MediaxChange firmware could allow an unauthenticated, physically proximate attacker to achieve arbitrary code execution in the TrustZone Trusted Execution Environment (TEE) of an affected device. This, for example, affects certain Cisco IP Phone and Wireless IP Phone products before 2021-07-07. Exploitation is possible only when the attacker can disassemble the device in order to control the voltage/current for chip pins.

CVSS3: 6.8
0%
Низкий
больше 4 лет назад
github логотип
GHSA-vh28-q6j2-63w7

The TrustZone implementation in certain Broadcom MediaxChange firmware could allow an unauthenticated, physically proximate attacker to achieve arbitrary code execution in the TrustZone Trusted Execution Environment (TEE) of an affected device. This, for example, affects certain Cisco IP Phone and Wireless IP Phone products before 2021-07-07. Exploitation is possible only when the attacker can disassemble the device in order to control the voltage/current for chip pins.

0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2021-04066

Уязвимость реализации технологии TrustZone микропрограммного обеспечения IP-телефонов Cisco IP Phone серии 8800, позволяющая нарушителю выполнить произвольный код

CVSS3: 6.8
0%
Низкий
больше 4 лет назад

Уязвимостей на страницу