2021-10-18
|
CVE-2021-41990
|
The gmp plugin in strongSwan before 5.9.4 has a remote integer overflow via a crafted certificate with an RSASSA-PSS signature. For example, this can be triggered by an unrelated self-signed CA certificate sent by an initiator. Remote code execution cannot occur.
|
Debian_linux, Fedora, 6gk5615\-0aa00\-2aa2_firmware, 6gk5804\-0ap00\-2aa2_firmware, 6gk5812\-1aa00\-2aa2_firmware, 6gk5812\-1ba00\-2aa2_firmware, 6gk5816\-1aa00\-2aa2_firmware, 6gk5816\-1ba00\-2aa2_firmware, 6gk5826\-2ab00\-2ab2_firmware, 6gk5856\-2ea00\-3aa1_firmware, 6gk5856\-2ea00\-3da1_firmware, 6gk5874\-2aa00\-2aa2_firmware, 6gk5874\-3aa00\-2aa2_firmware, 6gk5876\-3aa02\-2ba2_firmware, 6gk5876\-3aa02\-2ea2_firmware, 6gk5876\-4aa00\-2ba2_firmware, 6gk5876\-4aa00\-2da2_firmware, 6gk6108\-4am00\-2ba2_firmware, 6gk6108\-4am00\-2da2_firmware, Strongswan
|
7.5
|
|
|
2022-10-11
|
CVE-2022-31765
|
Affected devices do not properly authorize the change password function of the web interface.
This could allow low privileged users to escalate their privileges.
|
6ag1206\-2bb00\-7ac2_firmware, 6ag1206\-2bs00\-7ac2_firmware, 6ag1208\-0ba00\-7ac2_firmware, 6ag1216\-4bs00\-7ac2_firmware, 6gk5204\-0ba00\-2gf2_firmware, 6gk5204\-0ba00\-2yf2_firmware, 6gk5204\-2aa00\-2gf2_firmware, 6gk5204\-2aa00\-2yf2_firmware, 6gk5205\-3bb00\-2ab2_firmware, 6gk5205\-3bb00\-2tb2_firmware, 6gk5205\-3bd00\-2ab2_firmware, 6gk5205\-3bd00\-2tb2_firmware, 6gk5205\-3bf00\-2ab2_firmware, 6gk5205\-3bf00\-2tb2_firmware, 6gk5206\-2bb00\-2ac2_firmware, 6gk5206\-2bd00\-2ac2_firmware, 6gk5206\-2bs00\-2ac2_firmware, 6gk5206\-2bs00\-2fc2_firmware, 6gk5206\-2gs00\-2ac2_firmware, 6gk5206\-2gs00\-2fc2_firmware, 6gk5206\-2gs00\-2tc2_firmware, 6gk5206\-2rs00\-2ac2_firmware, 6gk5206\-2rs00\-5ac2_firmware, 6gk5206\-2rs00\-5fc2_firmware, 6gk5208\-0ba00\-2ab2_firmware, 6gk5208\-0ba00\-2ac2_firmware, 6gk5208\-0ba00\-2fc2_firmware, 6gk5208\-0ba00\-2tb2_firmware, 6gk5208\-0ga00\-2ac2_firmware, 6gk5208\-0ga00\-2fc2_firmware, 6gk5208\-0ga00\-2tc2_firmware, 6gk5208\-0ha00\-2as6_firmware, 6gk5208\-0ha00\-2es6_firmware, 6gk5208\-0ha00\-2ts6_firmware, 6gk5208\-0ra00\-2ac2_firmware, 6gk5208\-0ra00\-5ac2_firmware, 6gk5208\-0ua00\-5es6_firmware, 6gk5213\-3bb00\-2ab2_firmware, 6gk5213\-3bb00\-2tb2_firmware, 6gk5213\-3bd00\-2ab2_firmware, 6gk5213\-3bd00\-2tb2_firmware, 6gk5213\-3bf00\-2ab2_firmware, 6gk5213\-3bf00\-2tb2_firmware, 6gk5216\-0ba00\-2ab2_firmware, 6gk5216\-0ba00\-2ac2_firmware, 6gk5216\-0ba00\-2fc2_firmware, 6gk5216\-0ba00\-2tb2_firmware, 6gk5216\-0ha00\-2as6_firmware, 6gk5216\-0ha00\-2es6_firmware, 6gk5216\-0ha00\-2ts6_firmware, 6gk5216\-0ua00\-5es6_firmware, 6gk5216\-3rs00\-2ac2_firmware, 6gk5216\-3rs00\-5ac2_firmware, 6gk5216\-4bs00\-2ac2_firmware, 6gk5216\-4gs00\-2ac2_firmware, 6gk5216\-4gs00\-2fc2_firmware, 6gk5216\-4gs00\-2tc2_firmware, 6gk5224\-0ba00\-2ac2_firmware, 6gk5224\-4gs00\-2ac2_firmware, 6gk5224\-4gs00\-2fc2_firmware, 6gk5224\-4gs00\-2tc2_firmware, 6gk5324\-0ba00\-2ar3_firmware, 6gk5324\-0ba00\-3ar3_firmware, 6gk5326\-2qs00\-3ar3_firmware, 6gk5326\-2qs00\-3rr3_firmware, 6gk5328\-4fs00\-2ar3_firmware, 6gk5328\-4fs00\-2rr3_firmware, 6gk5328\-4fs00\-3ar3_firmware, 6gk5328\-4fs00\-3rr3_firmware, 6gk5328\-4ss00\-2ar3_firmware, 6gk5328\-4ss00\-3ar3_firmware, 6gk5408\-4gp00\-2am2_firmware, 6gk5408\-4gq00\-2am2_firmware, 6gk5408\-8gr00\-2am2_firmware, 6gk5408\-8gs00\-2am2_firmware, 6gk5416\-4gr00\-2am2_firmware, 6gk5416\-4gs00\-2am2_firmware, 6gk5524\-8gr00\-2ar2_firmware, 6gk5524\-8gr00\-3ar2_firmware, 6gk5524\-8gr00\-4ar2_firmware, 6gk5524\-8gs00\-2ar2_firmware, 6gk5524\-8gs00\-3ar2_firmware, 6gk5524\-8gs00\-4ar2_firmware, 6gk5526\-8gr00\-2ar2_firmware, 6gk5526\-8gr00\-3ar2_firmware, 6gk5526\-8gr00\-4ar2_firmware, 6gk5526\-8gs00\-2ar2_firmware, 6gk5526\-8gs00\-3ar2_firmware, 6gk5526\-8gs00\-4ar2_firmware, 6gk5528\-0aa00\-2ar2_firmware, 6gk5528\-0aa00\-2hr2_firmware, 6gk5528\-0ar00\-2ar2_firmware, 6gk5528\-0ar00\-2hr2_firmware, 6gk5552\-0aa00\-2ar2_firmware, 6gk5552\-0aa00\-2hr2_firmware, 6gk5552\-0ar00\-2ar2_firmware, 6gk5552\-0ar00\-2hr2_firmware, 6gk5622\-2gs00\-2ac2_firmware, 6gk5632\-2gs00\-2ac2_firmware, 6gk5636\-2gs00\-2ac2_firmware, 6gk5642\-2gs00\-2ac2_firmware, 6gk5646\-2gs00\-2ac2_firmware, 6gk5721\-1fc00\-0aa0_firmware, 6gk5721\-1fc00\-0ab0_firmware, 6gk5722\-1fc00\-0aa0_firmware, 6gk5722\-1fc00\-0ab0_firmware, 6gk5722\-1fc00\-0ac0_firmware, 6gk5734\-1fx00\-0aa0_firmware, 6gk5734\-1fx00\-0aa6_firmware, 6gk5734\-1fx00\-0ab0_firmware, 6gk5734\-1fx00\-0ab6_firmware, 6gk5738\-1gy00\-0aa0_firmware, 6gk5738\-1gy00\-0ab0_firmware, 6gk5748\-1fc00\-0aa0_firmware, 6gk5748\-1fc00\-0ab0_firmware, 6gk5748\-1gd00\-0aa0_firmware, 6gk5748\-1gd00\-0ab0_firmware, 6gk5748\-1gy01\-0aa0_firmware, 6gk5748\-1gy01\-0ta0_firmware, 6gk5761\-1fc00\-0aa0_firmware, 6gk5761\-1fc00\-0ab0_firmware, 6gk5763\-1al00\-3aa0_firmware, 6gk5763\-1al00\-3da0_firmware, 6gk5763\-1al00\-7da0_firmware, 6gk5766\-1ge00\-3da0_firmware, 6gk5766\-1ge00\-3db0_firmware, 6gk5766\-1ge00\-7da0_firmware, 6gk5766\-1ge00\-7db0_firmware, 6gk5766\-1ge00\-7ta0_firmware, 6gk5766\-1ge00\-7tb0_firmware, 6gk5766\-1je00\-3da0_firmware, 6gk5766\-1je00\-7da0_firmware, 6gk5766\-1je00\-7ta0_firmware, 6gk5774\-1fx00\-0aa0_firmware, 6gk5774\-1fx00\-0aa6_firmware, 6gk5774\-1fx00\-0ab0_firmware, 6gk5774\-1fx00\-0ab6_firmware, 6gk5774\-1fx00\-0ac0_firmware, 6gk5774\-1fy00\-0ta0_firmware, 6gk5774\-1fy00\-0tb0_firmware, 6gk5778\-1gy00\-0aa0_firmware, 6gk5778\-1gy00\-0ab0_firmware, 6gk5778\-1gy00\-0ta0_firmware, 6gk5778\-1gy00\-0tb0_firmware, 6gk5786\-1fc00\-0aa0_firmware, 6gk5786\-1fc00\-0ab0_firmware, 6gk5786\-2fc00\-0aa0_firmware, 6gk5786\-2fc00\-0ab0_firmware, 6gk5786\-2fc00\-0ac0_firmware, 6gk5786\-2fe00\-0aa0_firmware, 6gk5786\-2fe00\-0ab0_firmware, 6gk5786\-2hc00\-0aa0_firmware, 6gk5786\-2hc00\-0ab0_firmware, 6gk5788\-1fc00\-0aa0_firmware, 6gk5788\-1fc00\-0ab0_firmware, 6gk5788\-1gd00\-0aa0_firmware, 6gk5788\-1gd00\-0ab0_firmware, 6gk5788\-1gy01\-0aa0_firmware, 6gk5788\-2fc00\-0aa0_firmware, 6gk5788\-2fc00\-0ab0_firmware, 6gk5788\-2fc00\-0ac0_firmware, 6gk5788\-2gd00\-0aa0_firmware, 6gk5788\-2gd00\-0ab0_firmware, 6gk5788\-2gd00\-0ta0_firmware, 6gk5788\-2gd00\-0tb0_firmware, 6gk5788\-2gd00\-0tc0_firmware, 6gk5788\-2gy01\-0aa0_firmware, 6gk5788\-2gy01\-0ta0_firmware, 6gk5788\-2hy01\-0aa0_firmware, 6gk5804\-0ap00\-2aa2_firmware, 6gk5812\-1aa00\-2aa2_firmware, 6gk5812\-1ba00\-2aa2_firmware, 6gk5816\-1aa00\-2aa2_firmware, 6gk5816\-1ba00\-2aa2_firmware, 6gk5826\-2ab00\-2ab2_firmware, 6gk5853\-2ea00\-2da1_firmware, 6gk5856\-2ea00\-3aa1_firmware, 6gk5856\-2ea00\-3da1_firmware, 6gk5874\-2aa00\-2aa2_firmware, 6gk5874\-3aa00\-2aa2_firmware, 6gk5876\-3aa02\-2ba2_firmware, 6gk5876\-3aa02\-2ea2_firmware, 6gk5876\-4aa00\-2ba2_firmware, 6gk5876\-4aa00\-2da2_firmware, 6gk6108\-4am00\-2ba2_firmware, 6gk6108\-4am00\-2da2_firmware
|
N/A
|
|
|
2023-12-12
|
CVE-2023-49691
|
A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V8.0), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V8.0), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V8.0), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V8.0), SCALANCE M816-1 ADSL-Router...
|
6gk5615\-0aa00\-2aa2_firmware, 6gk5615\-0aa01\-2aa2_firmware, 6gk5804\-0ap00\-2aa2_firmware, 6gk5812\-1aa00\-2aa2_firmware, 6gk5812\-1ba00\-2aa2_firmware, 6gk5816\-1aa00\-2aa2_firmware, 6gk5816\-1ba00\-2aa2_firmware, 6gk5826\-2ab00\-2ab2_firmware, 6gk5853\-2ea00\-2da1_firmware, 6gk5856\-2ea00\-3aa1_firmware, 6gk5856\-2ea00\-3da1_firmware, 6gk5874\-2aa00\-2aa2_firmware, 6gk5874\-3aa00\-2aa2_firmware, 6gk5876\-3aa02\-2ba2_firmware, 6gk5876\-3aa02\-2ea2_firmware, 6gk5876\-4aa00\-2ba2_firmware, 6gk5876\-4aa00\-2da2_firmware, 6gk5876\-4aa10\-2ba2_firmware, 6gk6108\-4am00\-2ba2_firmware, 6gk6108\-4am00\-2da2_firmware
|
6.7
|
|
|
2023-12-12
|
CVE-2023-49692
|
A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (6GK6108-4AM00-2BA2) (All versions < V7.2.2), RUGGEDCOM RM1224 LTE(4G) NAM (6GK6108-4AM00-2DA2) (All versions < V7.2.2), SCALANCE M804PB (6GK5804-0AP00-2AA2) (All versions < V7.2.2), SCALANCE M812-1 ADSL-Router (6GK5812-1AA00-2AA2) (All versions < V7.2.2), SCALANCE M812-1 ADSL-Router (6GK5812-1BA00-2AA2) (All versions < V7.2.2), SCALANCE M816-1 ADSL-Router (6GK5816-1AA00-2AA2) (All versions < V7.2.2), SCALANCE M816-1...
|
6gk5615\-0aa00\-2aa2_firmware, 6gk5615\-0aa01\-2aa2_firmware, 6gk5804\-0ap00\-2aa2_firmware, 6gk5812\-1aa00\-2aa2_firmware, 6gk5812\-1ba00\-2aa2_firmware, 6gk5816\-1aa00\-2aa2_firmware, 6gk5816\-1ba00\-2aa2_firmware, 6gk5826\-2ab00\-2ab2_firmware, 6gk5853\-2ea00\-2da1_firmware, 6gk5856\-2ea00\-3aa1_firmware, 6gk5856\-2ea00\-3da1_firmware, 6gk5874\-2aa00\-2aa2_firmware, 6gk5874\-3aa00\-2aa2_firmware, 6gk5876\-3aa02\-2ba2_firmware, 6gk5876\-3aa02\-2ea2_firmware, 6gk5876\-4aa00\-2ba2_firmware, 6gk5876\-4aa00\-2da2_firmware, 6gk5876\-4aa10\-2ba2_firmware, 6gk6108\-4am00\-2ba2_firmware, 6gk6108\-4am00\-2da2_firmware
|
6.7
|
|
|