Vulnerabilities > UI > ER X Firmware > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-04-28 | CVE-2023-2379 | Improper Resource Shutdown or Release vulnerability in UI Er-X-Sfp Firmware and Er-X Firmware A vulnerability classified as critical has been found in Ubiquiti EdgeRouter X up to 2.0.9-hotfix.6. | 7.5 |
2023-04-28 | CVE-2023-2376 | Unspecified vulnerability in UI Er-X-Sfp Firmware and Er-X Firmware A vulnerability was found in Ubiquiti EdgeRouter X up to 2.0.9-hotfix.6. | 8.8 |
2023-04-28 | CVE-2023-2377 | Unspecified vulnerability in UI Er-X-Sfp Firmware and Er-X Firmware A vulnerability was found in Ubiquiti EdgeRouter X up to 2.0.9-hotfix.6. | 8.8 |
2023-04-28 | CVE-2023-2378 | Unspecified vulnerability in UI Er-X-Sfp Firmware and Er-X Firmware A vulnerability was found in Ubiquiti EdgeRouter X up to 2.0.9-hotfix.6. | 8.8 |
2023-04-28 | CVE-2023-2374 | Unspecified vulnerability in UI Er-X-Sfp Firmware and Er-X Firmware A vulnerability has been found in Ubiquiti EdgeRouter X up to 2.0.9-hotfix.6 and classified as critical. | 8.8 |
2023-04-28 | CVE-2023-2375 | Unspecified vulnerability in UI Er-X-Sfp Firmware and Er-X Firmware A vulnerability was found in Ubiquiti EdgeRouter X up to 2.0.9-hotfix.6 and classified as critical. | 8.8 |
2023-02-09 | CVE-2023-23912 | Code Injection vulnerability in UI products A vulnerability, found in EdgeRouters Version 2.0.9-hotfix.5 and earlier and UniFi Security Gateways (USG) Version 4.4.56 and earlier with their DHCPv6 prefix delegation set to dhcpv6-stateless or dhcpv6-stateful, allows a malicious actor directly connected to the WAN interface of an affected device to create a remote code execution vulnerability. | 8.8 |
2019-09-25 | CVE-2019-16889 | Allocation of Resources Without Limits or Throttling vulnerability in UI products Ubiquiti EdgeMAX devices before 2.0.3 allow remote attackers to cause a denial of service (disk consumption) because *.cache files in /var/run/beaker/container_file/ are created when providing a valid length payload of 249 characters or fewer to the beaker.session.id cookie in a GET header. | 7.5 |