Vulnerabilities > Helmholz > REX 100 Firmware
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2024-10-15 | CVE-2024-45271 | An unauthenticated local attacker can gain admin privileges by deploying a config file due to improper input validation. | 7.8 |
2024-10-15 | CVE-2024-45273 | Inadequate Encryption Strength vulnerability in multiple products An unauthenticated local attacker can decrypt the devices config file and therefore compromise the device due to a weak implementation of the encryption used. | 7.8 |
2024-10-15 | CVE-2024-45274 | Missing Authentication for Critical Function vulnerability in multiple products An unauthenticated remote attacker can execute OS commands via UDP on the device due to missing authentication. | 9.8 |
2024-10-15 | CVE-2024-45275 | Use of Hard-coded Credentials vulnerability in multiple products The devices contain two hard coded user accounts with hardcoded passwords that allow an unauthenticated remote attacker for full control of the affected devices. | 9.8 |
2024-10-15 | CVE-2024-45276 | Missing Authentication for Critical Function vulnerability in multiple products An unauthenticated remote attacker can get read access to files in the "/tmp" directory due to missing authentication. | 7.5 |