Vulnerabilities > Channel Accessible by Non-Endpoint ('Man-in-the-Middle')

DATE CVE VULNERABILITY TITLE RISK
2024-02-03 CVE-2023-31004 Man-in-the-Middle vulnerability in IBM products
IBM Security Access Manager Container (IBM Security Verify Access Appliance 10.0.0.0 through 10.0.6.1 and IBM Security Verify Access Docker 10.0.0.0 through 10.0.6.1) could allow a remote attacker to gain access to the underlying system using man in the middle techniques.
network
high complexity
ibm CWE-300
critical
9.0
2022-01-19 CVE-2022-22156 Man-in-the-Middle vulnerability in Juniper Junos
An Improper Certificate Validation weakness in the Juniper Networks Junos OS allows an attacker to perform Person-in-the-Middle (PitM) attacks when a system script is fetched from a remote source at a specified HTTPS URL, which may compromise the integrity and confidentiality of the device.
network
high complexity
juniper CWE-300
7.4
2019-12-11 CVE-2019-14899 Man-in-the-Middle vulnerability in multiple products
A vulnerability was discovered in Linux, FreeBSD, OpenBSD, MacOS, iOS, and Android that allows a malicious access point, or an adjacent user, to determine if a connected user is using a VPN, make positive inferences about the websites they are visiting, and determine the correct sequence and acknowledgement numbers in use, allowing the bad actor to inject data into the TCP stream.
low complexity
freebsd linux openbsd apple CWE-300
7.4
2017-11-08 CVE-2017-15086 Man-in-the-Middle vulnerability in Redhat Gluster Storage 3.3
It was discovered that the fix for CVE-2017-12151 was not properly shipped in erratum RHSA-2017:2858 for Red Hat Gluster Storage 3.3 for RHEL 6.
network
high complexity
redhat CWE-300
7.4
2017-11-08 CVE-2017-15085 Man-in-the-Middle vulnerability in Redhat Gluster Storage 3.3
It was discovered that the fix for CVE-2017-12150 was not properly shipped in erratum RHSA-2017:2858 for Red Hat Gluster Storage 3.3 for RHEL 6.
network
high complexity
redhat CWE-300
5.9
2017-08-30 CVE-2017-12735 Man-in-the-Middle vulnerability in Siemens Logo! 8 BM Firmware
A vulnerability has been identified in LOGO! 8 BM (incl.
network
high complexity
siemens CWE-300
7.4