Vulnerabilities > Ecos > Secure Boot Stick Firmware
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-06-17 | CVE-2018-12337 | Information Exposure vulnerability in Ecos Secure Boot Stick Firmware 5.6.5 Reliance on Security Through Obscurity vulnerability in ECOS Secure Boot Stick (aka SBS) 5.6.5 allows an attacker to partially extract confidential configurations via user-space emulation. | 4.6 |
2018-06-17 | CVE-2018-12336 | Information Exposure vulnerability in Ecos Secure Boot Stick Firmware 5.6.5 Undocumented Factory Backdoor in ECOS Secure Boot Stick (aka SBS) 5.6.5 allows the vendor to extract confidential information via remote root SSH access. | 9.8 |
2018-06-17 | CVE-2018-12334 | Unspecified vulnerability in Ecos Secure Boot Stick Firmware 5.6.5 Protection Mechanism Failure in ECOS Secure Boot Stick (aka SBS) 5.6.5 allows an attacker to compromise authentication and encryption keys via a virtualization attack. | 7.5 |
2018-06-17 | CVE-2018-12333 | Insufficient Verification of Data Authenticity vulnerability in Ecos Secure Boot Stick Firmware 5.6.5 Insufficient Verification of Data Authenticity vulnerability in ECOS Secure Boot Stick (aka SBS) 5.6.5 allows an attacker to manipulate security relevant configurations and execute malicious code. | 8.1 |
2018-06-17 | CVE-2018-12332 | Incomplete Cleanup vulnerability in Ecos Secure Boot Stick Firmware 5.6.5 Incomplete Cleanup vulnerability in ECOS Secure Boot Stick (aka SBS) 5.6.5 allows an attacker to compromise authentication and encryption keys via a compromised host PC after a reset. | 4.2 |
2018-06-17 | CVE-2018-12330 | Unspecified vulnerability in Ecos Secure Boot Stick Firmware 5.6.5 Protection Mechanism Failure in ECOS Secure Boot Stick (aka SBS) 5.6.5 allows an attacker to compromise authentication and encryption keys via compromised firmware. | 8.1 |
2018-06-17 | CVE-2018-12329 | Information Exposure vulnerability in Ecos Secure Boot Stick Firmware 5.6.5 Protection Mechanism Failure in ECOS Secure Boot Stick (aka SBS) 5.6.5 allows a local attacker to duplicate an authentication factor via cloning. | 5.9 |