Product:

Morphowave_compact_firmware

(Idemia)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 7
Date Id Summary Products Score Patch Annotated
2023-12-15 CVE-2023-33222 When handling contactless cards, usage of a specific function to get additional information from the card which doesn't check the boundary on the data received while reading. This allows a stack-based buffer overflow that could lead to a potential Remote Code Execution on the targeted device Morphowave_compact_firmware, Morphowave_sp_firmware, Morphowave_xp_firmware, Sigma_extreme_firmware, Sigma_lite\+_firmware, Sigma_lite_firmware, Sigma_wide_firmware, Visionpass_firmware 9.8
2023-12-15 CVE-2023-33217 By abusing a design flaw in the firmware upgrade mechanism of the impacted terminal it's possible to cause a permanent denial of service for the terminal. the only way to recover the terminal is by sending back the terminal to the manufacturer Morphowave_compact_firmware, Morphowave_sp_firmware, Morphowave_xp_firmware, Sigma_extreme_firmware, Sigma_lite\+_firmware, Sigma_lite_firmware, Sigma_wide_firmware, Visionpass_firmware 7.5
2023-12-15 CVE-2023-33220 During the retrofit validation process, the firmware doesn't properly check the boundaries while copying some attributes to check. This allows a stack-based buffer overflow that could lead to a potential Remote Code Execution on the targeted device Morphowave_compact_firmware, Morphowave_sp_firmware, Morphowave_xp_firmware, Sigma_extreme_firmware, Sigma_lite\+_firmware, Sigma_lite_firmware, Sigma_wide_firmware, Visionpass_firmware 9.8
2023-12-15 CVE-2023-33218 The Parameter Zone Read and Parameter Zone Write command handlers allow performing a Stack buffer overflow. This could potentially lead to a Remote Code execution on the targeted device. Morphowave_compact_firmware, Morphowave_sp_firmware, Morphowave_xp_firmware, Sigma_extreme_firmware, Sigma_lite\+_firmware, Sigma_lite_firmware, Sigma_wide_firmware, Visionpass_firmware 9.8
2023-12-15 CVE-2023-33219 The handler of the retrofit validation command doesn't properly check the boundaries when performing certain validation operations. This allows a stack-based buffer overflow that could lead to a potential Remote Code Execution on the targeted device Morphowave_compact_firmware, Morphowave_sp_firmware, Morphowave_xp_firmware, Sigma_extreme_firmware, Sigma_lite\+_firmware, Sigma_lite_firmware, Sigma_wide_firmware, Visionpass_firmware 9.8
2023-12-15 CVE-2023-33221 When reading DesFire keys, the function that reads the card isn't properly checking the boundaries when copying internally the data received. This allows a heap based buffer overflow that could lead to a potential Remote Code Execution on the targeted device. This is especially problematic if you use Default DESFire key. Morphowave_compact_firmware, Morphowave_sp_firmware, Morphowave_xp_firmware, Sigma_extreme_firmware, Sigma_lite\+_firmware, Sigma_lite_firmware, Sigma_wide_firmware, Visionpass_firmware 9.8
2023-11-28 CVE-2023-4667 The web interface of the PAC Device allows the device administrator user profile to store malicious scripts in some fields. The stored malicious script is then executed when the GUI is opened by any users of the webserver administration interface.  The root cause of the vulnerability is inadequate input validation and output encoding in the web administration interface component of the firmware. This could lead to  unauthorized access and data leakage Morphowave_compact_firmware, Morphowave_sp_firmware, Sgima_lite_\&_lite\+_firmware, Sigma_extreme_firmware, Sigma_wide_firmware, Visionpass_firmware 4.8