Логотип exploitDog
bind:CVE-2022-36385
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-36385

Количество 2

Количество 2

nvd логотип

CVE-2022-36385

больше 3 лет назад

A threat actor with momentary access to the device can plug in a USB drive and perform a malicious firmware update, resulting in permanent changes to device functionality. No authentication or controls are in place to prevent a threat actor from maliciously modifying firmware and performing a drive-by attack to load the firmware on any CMS8000 device.

CVSS3: 6.8
EPSS: Низкий
github логотип

GHSA-gvx4-5vjq-6x82

больше 3 лет назад

A threat actor with momentary access to the device can plug in a USB drive and perform a malicious firmware update, resulting in permanent changes to device functionality. No authentication or controls are in place to prevent a threat actor from maliciously modifying firmware and performing a drive-by attack to load the firmware on any CMS8000 device.

CVSS3: 6.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-36385

A threat actor with momentary access to the device can plug in a USB drive and perform a malicious firmware update, resulting in permanent changes to device functionality. No authentication or controls are in place to prevent a threat actor from maliciously modifying firmware and performing a drive-by attack to load the firmware on any CMS8000 device.

CVSS3: 6.8
0%
Низкий
больше 3 лет назад
github логотип
GHSA-gvx4-5vjq-6x82

A threat actor with momentary access to the device can plug in a USB drive and perform a malicious firmware update, resulting in permanent changes to device functionality. No authentication or controls are in place to prevent a threat actor from maliciously modifying firmware and performing a drive-by attack to load the firmware on any CMS8000 device.

CVSS3: 6.8
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу