Latest siemens scalance sc626-2c Vulnerabilities

Affected devices use a weak encryption scheme to encrypt the debug zip file. This could allow an authenticated attacker to decrypt the contents of the file and retrieve debug information about the sys...
Siemens Ruggedcom Rm1224 Lte\(4g\) Eu Firmware
Siemens Ruggedcom Rm1224 Lte\(4g\) Eu
Siemens Ruggedcom Rm1224 Lte\(4g\) Nam Firmware
Siemens Ruggedcom Rm1224 Lte\(4g\) Nam
Siemens Scalance M804pb Firmware
Siemens Scalance M804pb
and 196 more
Affected devices store the CLI user passwords encrypted in flash memory. Attackers with physical access to the device could retrieve the file and decrypt the CLI user passwords.
Siemens Ruggedcom Rm1224 Lte\(4g\) Eu Firmware
Siemens Ruggedcom Rm1224 Lte\(4g\) Eu
Siemens Ruggedcom Rm1224 Lte\(4g\) Nam Firmware
Siemens Ruggedcom Rm1224 Lte\(4g\) Nam
Siemens Scalance M804pb Firmware
Siemens Scalance M804pb
and 196 more
Affected devices do not check the TFTP blocksize correctly. This could allow an authenticated attacker to read from an uninitialized buffer that potentially contains previously allocated data.
Siemens Ruggedcom Rm1224 Lte\(4g\) Eu Firmware
Siemens Ruggedcom Rm1224 Lte\(4g\) Eu
Siemens Ruggedcom Rm1224 Lte\(4g\) Nam Firmware
Siemens Ruggedcom Rm1224 Lte\(4g\) Nam
Siemens Scalance M804pb Firmware
Siemens Scalance M804pb
and 398 more
A malicious server can serve excessive amounts of `Set-Cookie:` headers in a HTTP response to curl and curl < 7.84.0 stores all of them. A sufficiently large amount of (big) cookies make subsequent HT...
debian/curl
Apple macOS Ventura<13
Haxx Curl>=7.71.0<7.84.0
Fedoraproject Fedora=35
Debian Debian Linux=11.0
NetApp Clustered Data ONTAP
and 47 more
A vulnerability was found in curl. This issue occurs because the number of acceptable "links" in the "decompression chain" was unbounded, allowing a malicious server to insert a virtually unlimited nu...
redhat/jbcs-httpd24-curl<0:7.86.0-2.el8
redhat/jbcs-httpd24-curl<0:7.86.0-2.el7
redhat/curl<0:7.61.1-22.el8_6.4
redhat/curl<0:7.61.1-18.el8_4.3
redhat/curl<0:7.76.1-14.el9_0.5
debian/curl<=7.64.0-4+deb10u2
and 57 more
A use-after-free in Busybox 1.35-x's awk applet leads to denial of service and possibly code execution when processing a crafted awk pattern in the copyvar function.
Busybox Busybox=1.35.0
Siemens Scalance Sc622-2c Firmware<3.0
Siemens Scalance Sc622-2c
Siemens Scalance Sc626-2c Firmware<3.0
Siemens Scalance Sc626-2c
Siemens Scalance Sc632-2c Firmware<3.0
and 7 more

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203