2023-11-14
|
CVE-2023-44373
|
A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router...
|
6ag1206\-2bb00\-7ac2_firmware, 6ag1206\-2bs00\-7ac2_firmware, 6ag1208\-0ba00\-7ac2_firmware, 6ag1216\-4bs00\-7ac2_firmware, 6gk5204\-0ba00\-2gf2_firmware, 6gk5204\-0ba00\-2yf2_firmware, 6gk5204\-2aa00\-2gf2_firmware, 6gk5204\-2aa00\-2yf2_firmware, 6gk5205\-3bb00\-2ab2_firmware, 6gk5205\-3bb00\-2tb2_firmware, 6gk5205\-3bd00\-2ab2_firmware, 6gk5205\-3bd00\-2tb2_firmware, 6gk5205\-3bf00\-2ab2_firmware, 6gk5205\-3bf00\-2tb2_firmware, 6gk5206\-2bb00\-2ac2_firmware, 6gk5206\-2bd00\-2ac2_firmware, 6gk5206\-2bs00\-2ac2_firmware, 6gk5206\-2bs00\-2fc2_firmware, 6gk5206\-2gs00\-2ac2_firmware, 6gk5206\-2gs00\-2fc2_firmware, 6gk5206\-2gs00\-2tc2_firmware, 6gk5206\-2rs00\-2ac2_firmware, 6gk5206\-2rs00\-5ac2_firmware, 6gk5206\-2rs00\-5fc2_firmware, 6gk5208\-0ba00\-2ab2_firmware, 6gk5208\-0ba00\-2ac2_firmware, 6gk5208\-0ba00\-2fc2_firmware, 6gk5208\-0ba00\-2tb2_firmware, 6gk5208\-0ga00\-2ac2_firmware, 6gk5208\-0ga00\-2fc2_firmware, 6gk5208\-0ga00\-2tc2_firmware, 6gk5208\-0ha00\-2as6_firmware, 6gk5208\-0ha00\-2es6_firmware, 6gk5208\-0ha00\-2ts6_firmware, 6gk5208\-0ra00\-2ac2_firmware, 6gk5208\-0ra00\-5ac2_firmware, 6gk5208\-0ua00\-5es6_firmware, 6gk5213\-3bb00\-2ab2_firmware, 6gk5213\-3bb00\-2tb2_firmware, 6gk5213\-3bd00\-2ab2_firmware, 6gk5213\-3bd00\-2tb2_firmware, 6gk5213\-3bf00\-2ab2_firmware, 6gk5213\-3bf00\-2tb2_firmware, 6gk5216\-0ba00\-2ab2_firmware, 6gk5216\-0ba00\-2ac2_firmware, 6gk5216\-0ba00\-2fc2_firmware, 6gk5216\-0ba00\-2tb2_firmware, 6gk5216\-0ha00\-2as6_firmware, 6gk5216\-0ha00\-2es6_firmware, 6gk5216\-0ha00\-2ts6_firmware, 6gk5216\-0ua00\-5es6_firmware, 6gk5216\-3rs00\-2ac2_firmware, 6gk5216\-3rs00\-5ac2_firmware, 6gk5216\-4bs00\-2ac2_firmware, 6gk5216\-4gs00\-2ac2_firmware, 6gk5216\-4gs00\-2fc2_firmware, 6gk5216\-4gs00\-2tc2_firmware, 6gk5224\-0ba00\-2ac2_firmware, 6gk5224\-4gs00\-2ac2_firmware, 6gk5224\-4gs00\-2fc2_firmware, 6gk5224\-4gs00\-2tc2_firmware, 6gk5324\-0ba00\-2ar3_firmware, 6gk5324\-0ba00\-3ar3_firmware, 6gk5326\-2qs00\-3ar3_firmware, 6gk5326\-2qs00\-3rr3_firmware, 6gk5328\-4fs00\-2ar3_firmware, 6gk5328\-4fs00\-2rr3_firmware, 6gk5328\-4fs00\-3ar3_firmware, 6gk5328\-4fs00\-3rr3_firmware, 6gk5328\-4ss00\-2ar3_firmware, 6gk5328\-4ss00\-3ar3_firmware
|
9.1
|
|
2023-11-14
|
CVE-2023-44319
|
A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router...
|
6ag1206\-2bb00\-7ac2_firmware, 6ag1206\-2bs00\-7ac2_firmware, 6ag1208\-0ba00\-7ac2_firmware, 6ag1216\-4bs00\-7ac2_firmware, 6gk5204\-0ba00\-2gf2_firmware, 6gk5204\-0ba00\-2yf2_firmware, 6gk5204\-2aa00\-2gf2_firmware, 6gk5204\-2aa00\-2yf2_firmware, 6gk5205\-3bb00\-2ab2_firmware, 6gk5205\-3bb00\-2tb2_firmware, 6gk5205\-3bd00\-2ab2_firmware, 6gk5205\-3bd00\-2tb2_firmware, 6gk5205\-3bf00\-2ab2_firmware, 6gk5205\-3bf00\-2tb2_firmware, 6gk5206\-2bb00\-2ac2_firmware, 6gk5206\-2bd00\-2ac2_firmware, 6gk5206\-2bs00\-2ac2_firmware, 6gk5206\-2bs00\-2fc2_firmware, 6gk5206\-2gs00\-2ac2_firmware, 6gk5206\-2gs00\-2fc2_firmware, 6gk5206\-2gs00\-2tc2_firmware, 6gk5206\-2rs00\-2ac2_firmware, 6gk5206\-2rs00\-5ac2_firmware, 6gk5206\-2rs00\-5fc2_firmware, 6gk5208\-0ba00\-2ab2_firmware, 6gk5208\-0ba00\-2ac2_firmware, 6gk5208\-0ba00\-2fc2_firmware, 6gk5208\-0ba00\-2tb2_firmware, 6gk5208\-0ga00\-2ac2_firmware, 6gk5208\-0ga00\-2fc2_firmware, 6gk5208\-0ga00\-2tc2_firmware, 6gk5208\-0ha00\-2as6_firmware, 6gk5208\-0ha00\-2es6_firmware, 6gk5208\-0ha00\-2ts6_firmware, 6gk5208\-0ra00\-2ac2_firmware, 6gk5208\-0ra00\-5ac2_firmware, 6gk5208\-0ua00\-5es6_firmware, 6gk5213\-3bb00\-2ab2_firmware, 6gk5213\-3bb00\-2tb2_firmware, 6gk5213\-3bd00\-2ab2_firmware, 6gk5213\-3bd00\-2tb2_firmware, 6gk5213\-3bf00\-2ab2_firmware, 6gk5213\-3bf00\-2tb2_firmware, 6gk5216\-0ba00\-2ab2_firmware, 6gk5216\-0ba00\-2ac2_firmware, 6gk5216\-0ba00\-2fc2_firmware, 6gk5216\-0ba00\-2tb2_firmware, 6gk5216\-0ha00\-2as6_firmware, 6gk5216\-0ha00\-2es6_firmware, 6gk5216\-0ha00\-2ts6_firmware, 6gk5216\-0ua00\-5es6_firmware, 6gk5216\-3rs00\-2ac2_firmware, 6gk5216\-3rs00\-5ac2_firmware, 6gk5216\-4bs00\-2ac2_firmware, 6gk5216\-4gs00\-2ac2_firmware, 6gk5216\-4gs00\-2fc2_firmware, 6gk5216\-4gs00\-2tc2_firmware, 6gk5224\-0ba00\-2ac2_firmware, 6gk5224\-4gs00\-2ac2_firmware, 6gk5224\-4gs00\-2fc2_firmware, 6gk5224\-4gs00\-2tc2_firmware, 6gk5324\-0ba00\-2ar3_firmware, 6gk5324\-0ba00\-3ar3_firmware, 6gk5326\-2qs00\-3ar3_firmware, 6gk5326\-2qs00\-3rr3_firmware, 6gk5328\-4fs00\-2ar3_firmware, 6gk5328\-4fs00\-2rr3_firmware, 6gk5328\-4fs00\-3ar3_firmware, 6gk5328\-4fs00\-3rr3_firmware, 6gk5328\-4ss00\-2ar3_firmware, 6gk5328\-4ss00\-3ar3_firmware
|
4.9
|
|
2023-11-14
|
CVE-2023-44374
|
A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router...
|
6ag1206\-2bb00\-7ac2_firmware, 6ag1206\-2bs00\-7ac2_firmware, 6ag1208\-0ba00\-7ac2_firmware, 6ag1216\-4bs00\-7ac2_firmware, 6gk5204\-0ba00\-2gf2_firmware, 6gk5204\-0ba00\-2yf2_firmware, 6gk5204\-2aa00\-2gf2_firmware, 6gk5204\-2aa00\-2yf2_firmware, 6gk5205\-3bb00\-2ab2_firmware, 6gk5205\-3bb00\-2tb2_firmware, 6gk5205\-3bd00\-2ab2_firmware, 6gk5205\-3bd00\-2tb2_firmware, 6gk5205\-3bf00\-2ab2_firmware, 6gk5205\-3bf00\-2tb2_firmware, 6gk5206\-2bb00\-2ac2_firmware, 6gk5206\-2bd00\-2ac2_firmware, 6gk5206\-2bs00\-2ac2_firmware, 6gk5206\-2bs00\-2fc2_firmware, 6gk5206\-2gs00\-2ac2_firmware, 6gk5206\-2gs00\-2fc2_firmware, 6gk5206\-2gs00\-2tc2_firmware, 6gk5206\-2rs00\-2ac2_firmware, 6gk5206\-2rs00\-5ac2_firmware, 6gk5206\-2rs00\-5fc2_firmware, 6gk5208\-0ba00\-2ab2_firmware, 6gk5208\-0ba00\-2ac2_firmware, 6gk5208\-0ba00\-2fc2_firmware, 6gk5208\-0ba00\-2tb2_firmware, 6gk5208\-0ga00\-2ac2_firmware, 6gk5208\-0ga00\-2fc2_firmware, 6gk5208\-0ga00\-2tc2_firmware, 6gk5208\-0ha00\-2as6_firmware, 6gk5208\-0ha00\-2es6_firmware, 6gk5208\-0ha00\-2ts6_firmware, 6gk5208\-0ra00\-2ac2_firmware, 6gk5208\-0ra00\-5ac2_firmware, 6gk5208\-0ua00\-5es6_firmware, 6gk5213\-3bb00\-2ab2_firmware, 6gk5213\-3bb00\-2tb2_firmware, 6gk5213\-3bd00\-2ab2_firmware, 6gk5213\-3bd00\-2tb2_firmware, 6gk5213\-3bf00\-2ab2_firmware, 6gk5213\-3bf00\-2tb2_firmware, 6gk5216\-0ba00\-2ab2_firmware, 6gk5216\-0ba00\-2ac2_firmware, 6gk5216\-0ba00\-2fc2_firmware, 6gk5216\-0ba00\-2tb2_firmware, 6gk5216\-0ha00\-2as6_firmware, 6gk5216\-0ha00\-2es6_firmware, 6gk5216\-0ha00\-2ts6_firmware, 6gk5216\-0ua00\-5es6_firmware, 6gk5216\-3rs00\-2ac2_firmware, 6gk5216\-3rs00\-5ac2_firmware, 6gk5216\-4bs00\-2ac2_firmware, 6gk5216\-4gs00\-2ac2_firmware, 6gk5216\-4gs00\-2fc2_firmware, 6gk5216\-4gs00\-2tc2_firmware, 6gk5224\-0ba00\-2ac2_firmware, 6gk5224\-4gs00\-2ac2_firmware, 6gk5224\-4gs00\-2fc2_firmware, 6gk5224\-4gs00\-2tc2_firmware, 6gk5324\-0ba00\-2ar3_firmware, 6gk5324\-0ba00\-3ar3_firmware, 6gk5326\-2qs00\-3ar3_firmware, 6gk5326\-2qs00\-3rr3_firmware, 6gk5328\-4fs00\-2ar3_firmware, 6gk5328\-4fs00\-2rr3_firmware, 6gk5328\-4fs00\-3ar3_firmware, 6gk5328\-4fs00\-3rr3_firmware, 6gk5328\-4ss00\-2ar3_firmware, 6gk5328\-4ss00\-3ar3_firmware
|
8.8
|
|
2023-11-14
|
CVE-2023-44320
|
A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V7.2.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V7.2.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V7.2.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V7.2.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V7.2.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V7.2.2), SCALANCE M816-1...
|
6ag1206\-2bb00\-7ac2_firmware, 6ag1206\-2bs00\-7ac2_firmware, 6ag1208\-0ba00\-7ac2_firmware, 6ag1216\-4bs00\-7ac2_firmware, 6gk5204\-0ba00\-2gf2_firmware, 6gk5204\-0ba00\-2yf2_firmware, 6gk5204\-2aa00\-2gf2_firmware, 6gk5204\-2aa00\-2yf2_firmware, 6gk5205\-3bb00\-2ab2_firmware, 6gk5205\-3bb00\-2tb2_firmware, 6gk5205\-3bd00\-2ab2_firmware, 6gk5205\-3bd00\-2tb2_firmware, 6gk5205\-3bf00\-2ab2_firmware, 6gk5205\-3bf00\-2tb2_firmware, 6gk5206\-2bb00\-2ac2_firmware, 6gk5206\-2bd00\-2ac2_firmware, 6gk5206\-2bs00\-2ac2_firmware, 6gk5206\-2bs00\-2fc2_firmware, 6gk5206\-2gs00\-2ac2_firmware, 6gk5206\-2gs00\-2fc2_firmware, 6gk5206\-2gs00\-2tc2_firmware, 6gk5206\-2rs00\-2ac2_firmware, 6gk5206\-2rs00\-5ac2_firmware, 6gk5206\-2rs00\-5fc2_firmware, 6gk5208\-0ba00\-2ab2_firmware, 6gk5208\-0ba00\-2ac2_firmware, 6gk5208\-0ba00\-2fc2_firmware, 6gk5208\-0ba00\-2tb2_firmware, 6gk5208\-0ga00\-2ac2_firmware, 6gk5208\-0ga00\-2fc2_firmware, 6gk5208\-0ga00\-2tc2_firmware, 6gk5208\-0ha00\-2as6_firmware, 6gk5208\-0ha00\-2es6_firmware, 6gk5208\-0ha00\-2ts6_firmware, 6gk5208\-0ra00\-2ac2_firmware, 6gk5208\-0ra00\-5ac2_firmware, 6gk5208\-0ua00\-5es6_firmware, 6gk5213\-3bb00\-2ab2_firmware, 6gk5213\-3bb00\-2tb2_firmware, 6gk5213\-3bd00\-2ab2_firmware, 6gk5213\-3bd00\-2tb2_firmware, 6gk5213\-3bf00\-2ab2_firmware, 6gk5213\-3bf00\-2tb2_firmware, 6gk5216\-0ba00\-2ab2_firmware, 6gk5216\-0ba00\-2ac2_firmware, 6gk5216\-0ba00\-2fc2_firmware, 6gk5216\-0ba00\-2tb2_firmware, 6gk5216\-0ha00\-2as6_firmware, 6gk5216\-0ha00\-2es6_firmware, 6gk5216\-0ha00\-2ts6_firmware, 6gk5216\-0ua00\-5es6_firmware, 6gk5216\-3rs00\-2ac2_firmware, 6gk5216\-3rs00\-5ac2_firmware, 6gk5216\-4bs00\-2ac2_firmware, 6gk5216\-4gs00\-2ac2_firmware, 6gk5216\-4gs00\-2fc2_firmware, 6gk5216\-4gs00\-2tc2_firmware, 6gk5224\-0ba00\-2ac2_firmware, 6gk5224\-4gs00\-2ac2_firmware, 6gk5224\-4gs00\-2fc2_firmware, 6gk5224\-4gs00\-2tc2_firmware, 6gk5324\-0ba00\-2ar3_firmware, 6gk5324\-0ba00\-3ar3_firmware, 6gk5326\-2qs00\-3ar3_firmware, 6gk5326\-2qs00\-3rr3_firmware, 6gk5328\-4fs00\-2ar3_firmware, 6gk5328\-4fs00\-2rr3_firmware, 6gk5328\-4fs00\-3ar3_firmware, 6gk5328\-4fs00\-3rr3_firmware, 6gk5328\-4ss00\-2ar3_firmware, 6gk5328\-4ss00\-3ar3_firmware
|
4.3
|
|
2023-11-14
|
CVE-2023-44321
|
Affected devices do not properly validate the length of inputs when performing certain configuration changes in the web interface allowing an authenticated attacker to cause a denial of service condition. The device needs to be restarted for the web interface to become available again.
|
6ag1206\-2bb00\-7ac2_firmware, 6ag1206\-2bs00\-7ac2_firmware, 6ag1208\-0ba00\-7ac2_firmware, 6ag1216\-4bs00\-7ac2_firmware, 6gk5204\-0ba00\-2gf2_firmware, 6gk5204\-0ba00\-2yf2_firmware, 6gk5204\-2aa00\-2gf2_firmware, 6gk5204\-2aa00\-2yf2_firmware, 6gk5205\-3bb00\-2ab2_firmware, 6gk5205\-3bb00\-2tb2_firmware, 6gk5205\-3bd00\-2ab2_firmware, 6gk5205\-3bd00\-2tb2_firmware, 6gk5205\-3bf00\-2ab2_firmware, 6gk5205\-3bf00\-2tb2_firmware, 6gk5206\-2bb00\-2ac2_firmware, 6gk5206\-2bd00\-2ac2_firmware, 6gk5206\-2bs00\-2ac2_firmware, 6gk5206\-2bs00\-2fc2_firmware, 6gk5206\-2gs00\-2ac2_firmware, 6gk5206\-2gs00\-2fc2_firmware, 6gk5206\-2gs00\-2tc2_firmware, 6gk5206\-2rs00\-2ac2_firmware, 6gk5206\-2rs00\-5ac2_firmware, 6gk5206\-2rs00\-5fc2_firmware, 6gk5208\-0ba00\-2ab2_firmware, 6gk5208\-0ba00\-2ac2_firmware, 6gk5208\-0ba00\-2fc2_firmware, 6gk5208\-0ba00\-2tb2_firmware, 6gk5208\-0ga00\-2ac2_firmware, 6gk5208\-0ga00\-2fc2_firmware, 6gk5208\-0ga00\-2tc2_firmware, 6gk5208\-0ha00\-2as6_firmware, 6gk5208\-0ha00\-2es6_firmware, 6gk5208\-0ha00\-2ts6_firmware, 6gk5208\-0ra00\-2ac2_firmware, 6gk5208\-0ra00\-5ac2_firmware, 6gk5208\-0ua00\-5es6_firmware, 6gk5213\-3bb00\-2ab2_firmware, 6gk5213\-3bb00\-2tb2_firmware, 6gk5213\-3bd00\-2ab2_firmware, 6gk5213\-3bd00\-2tb2_firmware, 6gk5213\-3bf00\-2ab2_firmware, 6gk5213\-3bf00\-2tb2_firmware, 6gk5216\-0ba00\-2ab2_firmware, 6gk5216\-0ba00\-2ac2_firmware, 6gk5216\-0ba00\-2fc2_firmware, 6gk5216\-0ba00\-2tb2_firmware, 6gk5216\-0ha00\-2as6_firmware, 6gk5216\-0ha00\-2es6_firmware, 6gk5216\-0ha00\-2ts6_firmware, 6gk5216\-0ua00\-5es6_firmware, 6gk5216\-3rs00\-2ac2_firmware, 6gk5216\-3rs00\-5ac2_firmware, 6gk5216\-4bs00\-2ac2_firmware, 6gk5216\-4gs00\-2ac2_firmware, 6gk5216\-4gs00\-2fc2_firmware, 6gk5216\-4gs00\-2tc2_firmware, 6gk5224\-0ba00\-2ac2_firmware, 6gk5224\-4gs00\-2ac2_firmware, 6gk5224\-4gs00\-2fc2_firmware, 6gk5224\-4gs00\-2tc2_firmware, 6gk5324\-0ba00\-2ar3_firmware, 6gk5324\-0ba00\-3ar3_firmware, 6gk5326\-2qs00\-3ar3_firmware, 6gk5326\-2qs00\-3rr3_firmware, 6gk5328\-4fs00\-2ar3_firmware, 6gk5328\-4fs00\-2rr3_firmware, 6gk5328\-4fs00\-3ar3_firmware, 6gk5328\-4fs00\-3rr3_firmware, 6gk5328\-4ss00\-2ar3_firmware, 6gk5328\-4ss00\-3ar3_firmware
|
6.5
|
|
2023-11-14
|
CVE-2023-44322
|
A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router...
|
6ag1206\-2bb00\-7ac2_firmware, 6ag1206\-2bs00\-7ac2_firmware, 6ag1208\-0ba00\-7ac2_firmware, 6ag1216\-4bs00\-7ac2_firmware, 6gk5204\-0ba00\-2gf2_firmware, 6gk5204\-0ba00\-2yf2_firmware, 6gk5204\-2aa00\-2gf2_firmware, 6gk5204\-2aa00\-2yf2_firmware, 6gk5205\-3bb00\-2ab2_firmware, 6gk5205\-3bb00\-2tb2_firmware, 6gk5205\-3bd00\-2ab2_firmware, 6gk5205\-3bd00\-2tb2_firmware, 6gk5205\-3bf00\-2ab2_firmware, 6gk5205\-3bf00\-2tb2_firmware, 6gk5206\-2bb00\-2ac2_firmware, 6gk5206\-2bd00\-2ac2_firmware, 6gk5206\-2bs00\-2ac2_firmware, 6gk5206\-2bs00\-2fc2_firmware, 6gk5206\-2gs00\-2ac2_firmware, 6gk5206\-2gs00\-2fc2_firmware, 6gk5206\-2gs00\-2tc2_firmware, 6gk5206\-2rs00\-2ac2_firmware, 6gk5206\-2rs00\-5ac2_firmware, 6gk5206\-2rs00\-5fc2_firmware, 6gk5208\-0ba00\-2ab2_firmware, 6gk5208\-0ba00\-2ac2_firmware, 6gk5208\-0ba00\-2fc2_firmware, 6gk5208\-0ba00\-2tb2_firmware, 6gk5208\-0ga00\-2ac2_firmware, 6gk5208\-0ga00\-2fc2_firmware, 6gk5208\-0ga00\-2tc2_firmware, 6gk5208\-0ha00\-2as6_firmware, 6gk5208\-0ha00\-2es6_firmware, 6gk5208\-0ha00\-2ts6_firmware, 6gk5208\-0ra00\-2ac2_firmware, 6gk5208\-0ra00\-5ac2_firmware, 6gk5208\-0ua00\-5es6_firmware, 6gk5213\-3bb00\-2ab2_firmware, 6gk5213\-3bb00\-2tb2_firmware, 6gk5213\-3bd00\-2ab2_firmware, 6gk5213\-3bd00\-2tb2_firmware, 6gk5213\-3bf00\-2ab2_firmware, 6gk5213\-3bf00\-2tb2_firmware, 6gk5216\-0ba00\-2ab2_firmware, 6gk5216\-0ba00\-2ac2_firmware, 6gk5216\-0ba00\-2fc2_firmware, 6gk5216\-0ba00\-2tb2_firmware, 6gk5216\-0ha00\-2as6_firmware, 6gk5216\-0ha00\-2es6_firmware, 6gk5216\-0ha00\-2ts6_firmware, 6gk5216\-0ua00\-5es6_firmware, 6gk5216\-3rs00\-2ac2_firmware, 6gk5216\-3rs00\-5ac2_firmware, 6gk5216\-4bs00\-2ac2_firmware, 6gk5216\-4gs00\-2ac2_firmware, 6gk5216\-4gs00\-2fc2_firmware, 6gk5216\-4gs00\-2tc2_firmware, 6gk5224\-0ba00\-2ac2_firmware, 6gk5224\-4gs00\-2ac2_firmware, 6gk5224\-4gs00\-2fc2_firmware, 6gk5224\-4gs00\-2tc2_firmware, 6gk5324\-0ba00\-2ar3_firmware, 6gk5324\-0ba00\-3ar3_firmware, 6gk5326\-2qs00\-3ar3_firmware, 6gk5326\-2qs00\-3rr3_firmware, 6gk5328\-4fs00\-2ar3_firmware, 6gk5328\-4fs00\-2rr3_firmware, 6gk5328\-4fs00\-3ar3_firmware, 6gk5328\-4fs00\-3rr3_firmware, 6gk5328\-4ss00\-2ar3_firmware, 6gk5328\-4ss00\-3ar3_firmware
|
5.9
|
|
2023-11-14
|
CVE-2023-44318
|
Affected devices use a hardcoded key to obfuscate the configuration backup that an administrator can export from the device. This could allow an authenticated attacker with administrative privileges or an attacker that obtains a configuration backup to extract configuration information from the exported file.
|
6ag1206\-2bb00\-7ac2_firmware, 6ag1206\-2bs00\-7ac2_firmware, 6ag1208\-0ba00\-7ac2_firmware, 6ag1216\-4bs00\-7ac2_firmware, 6gk5204\-0ba00\-2gf2_firmware, 6gk5204\-0ba00\-2yf2_firmware, 6gk5204\-2aa00\-2gf2_firmware, 6gk5204\-2aa00\-2yf2_firmware, 6gk5205\-3bb00\-2ab2_firmware, 6gk5205\-3bb00\-2tb2_firmware, 6gk5205\-3bd00\-2ab2_firmware, 6gk5205\-3bd00\-2tb2_firmware, 6gk5205\-3bf00\-2ab2_firmware, 6gk5205\-3bf00\-2tb2_firmware, 6gk5206\-2bb00\-2ac2_firmware, 6gk5206\-2bd00\-2ac2_firmware, 6gk5206\-2bs00\-2ac2_firmware, 6gk5206\-2bs00\-2fc2_firmware, 6gk5206\-2gs00\-2ac2_firmware, 6gk5206\-2gs00\-2fc2_firmware, 6gk5206\-2gs00\-2tc2_firmware, 6gk5206\-2rs00\-2ac2_firmware, 6gk5206\-2rs00\-5ac2_firmware, 6gk5206\-2rs00\-5fc2_firmware, 6gk5208\-0ba00\-2ab2_firmware, 6gk5208\-0ba00\-2ac2_firmware, 6gk5208\-0ba00\-2fc2_firmware, 6gk5208\-0ba00\-2tb2_firmware, 6gk5208\-0ga00\-2ac2_firmware, 6gk5208\-0ga00\-2fc2_firmware, 6gk5208\-0ga00\-2tc2_firmware, 6gk5208\-0ha00\-2as6_firmware, 6gk5208\-0ha00\-2es6_firmware, 6gk5208\-0ha00\-2ts6_firmware, 6gk5208\-0ra00\-2ac2_firmware, 6gk5208\-0ra00\-5ac2_firmware, 6gk5208\-0ua00\-5es6_firmware, 6gk5213\-3bb00\-2ab2_firmware, 6gk5213\-3bb00\-2tb2_firmware, 6gk5213\-3bd00\-2ab2_firmware, 6gk5213\-3bd00\-2tb2_firmware, 6gk5213\-3bf00\-2ab2_firmware, 6gk5213\-3bf00\-2tb2_firmware, 6gk5216\-0ba00\-2ab2_firmware, 6gk5216\-0ba00\-2ac2_firmware, 6gk5216\-0ba00\-2fc2_firmware, 6gk5216\-0ba00\-2tb2_firmware, 6gk5216\-0ha00\-2as6_firmware, 6gk5216\-0ha00\-2es6_firmware, 6gk5216\-0ha00\-2ts6_firmware, 6gk5216\-0ua00\-5es6_firmware, 6gk5216\-3rs00\-2ac2_firmware, 6gk5216\-3rs00\-5ac2_firmware, 6gk5216\-4bs00\-2ac2_firmware, 6gk5216\-4gs00\-2ac2_firmware, 6gk5216\-4gs00\-2fc2_firmware, 6gk5216\-4gs00\-2tc2_firmware, 6gk5224\-0ba00\-2ac2_firmware, 6gk5224\-4gs00\-2ac2_firmware, 6gk5224\-4gs00\-2fc2_firmware, 6gk5224\-4gs00\-2tc2_firmware, 6gk5324\-0ba00\-2ar3_firmware, 6gk5324\-0ba00\-3ar3_firmware, 6gk5326\-2qs00\-3ar3_firmware, 6gk5326\-2qs00\-3rr3_firmware, 6gk5328\-4fs00\-2ar3_firmware, 6gk5328\-4fs00\-2rr3_firmware, 6gk5328\-4fs00\-3ar3_firmware, 6gk5328\-4fs00\-3rr3_firmware, 6gk5328\-4ss00\-2ar3_firmware, 6gk5328\-4ss00\-3ar3_firmware
|
4.9
|
|