Vulnerabilities > Improper Authentication

DATE CVE VULNERABILITY TITLE RISK
2020-04-20 CVE-2020-1803 Improper Authentication vulnerability in Huawei Honor V20 Firmware
Huawei smartphones Honor V20 with versions earlier than 10.0.0.179(C636E3R4P3),versions earlier than 10.0.0.180(C185E3R3P3),versions earlier than 10.0.0.180(C432E10R3P4) have an information disclosure vulnerability.
high complexity
huawei CWE-287
5.3
2020-04-20 CVE-2017-18850 Improper Authentication vulnerability in Netgear products
Certain NETGEAR devices are affected by authentication bypass.
local
low complexity
netgear CWE-287
8.4
2020-04-19 CVE-2019-20786 Improper Authentication vulnerability in Pion Dtls
handleIncomingPacket in conn.go in Pion DTLS before 1.5.2 lacks a check for application data with epoch 0, which allows remote attackers to inject arbitrary unencrypted data after handshake completion.
network
low complexity
pion CWE-287
critical
9.8
2020-04-15 CVE-2020-7276 Improper Authentication vulnerability in Mcafee Endpoint Security
Authentication bypass vulnerability in MfeUpgradeTool in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 April 2020 Update allows administrator users to access policy settings via running this tool.
local
low complexity
mcafee CWE-287
6.7
2020-04-13 CVE-2020-8148 Improper Authentication vulnerability in UI Cloud KEY Gen2 and Cloud KEY Gen2 Plus
UniFi Cloud Key firmware < 1.1.6 contains a vulnerability that enables an attacker being able to change a device hostname by sending a malicious API request.
network
low complexity
ui CWE-287
5.3
2020-04-10 CVE-2020-1801 Improper Authentication vulnerability in Huawei Mate 30 Firmware and Mate 30 PRO Firmware
There is an improper authentication vulnerability in several smartphones.
local
low complexity
huawei CWE-287
5.5
2020-04-08 CVE-2020-1637 Improper Authentication vulnerability in Juniper Junos
A vulnerability in Juniper Networks SRX Series device configured as a Junos OS Enforcer device may allow a user to access network resources that are not permitted by a UAC policy.
network
low complexity
juniper CWE-287
6.5
2020-04-08 CVE-2020-1618 Improper Authentication vulnerability in Juniper Junos
On Juniper Networks EX and QFX Series, an authentication bypass vulnerability may allow a user connected to the console port to login as root without any password.
low complexity
juniper CWE-287
6.8
2020-04-08 CVE-2018-21062 Improper Authentication vulnerability in Google Android
An issue was discovered on Samsung mobile devices with N(7.x) and O(8.x) software.
low complexity
google CWE-287
4.6
2020-04-08 CVE-2018-21038 Improper Authentication vulnerability in Google Android
An issue was discovered on Samsung mobile devices with N(7.x) software.
network
low complexity
google CWE-287
critical
9.8