Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2020-8708

Summary
Assigner-intel
Assigner Org ID-6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At-13 Aug, 2020 | 02:23
Updated At-04 Aug, 2024 | 10:03
Rejected At-
Credits

Improper authentication for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:intel
Assigner Org ID:6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At:13 Aug, 2020 | 02:23
Updated At:04 Aug, 2024 | 10:03
Rejected At:
▼CVE Numbering Authority (CNA)

Improper authentication for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.

Affected Products
Vendor
n/a
Product
Intel(R) Server Boards, Server Systems and Compute Modules Advisory
Versions
Affected
  • Before version 1.59
Problem Types
TypeCWE IDDescription
textN/AEscalation of Privilege
Type: text
CWE ID: N/A
Description: Escalation of Privilege
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html
x_refsource_MISC
https://security.netapp.com/advisory/ntap-20200814-0002/
x_refsource_CONFIRM
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html
Resource:
x_refsource_MISC
Hyperlink: https://security.netapp.com/advisory/ntap-20200814-0002/
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html
x_refsource_MISC
x_transferred
https://security.netapp.com/advisory/ntap-20200814-0002/
x_refsource_CONFIRM
x_transferred
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://security.netapp.com/advisory/ntap-20200814-0002/
Resource:
x_refsource_CONFIRM
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secure@intel.com
Published At:13 Aug, 2020 | 03:15
Updated At:19 Aug, 2020 | 17:12

Improper authentication for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.18.8HIGH
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Primary2.05.8MEDIUM
AV:A/AC:L/Au:N/C:P/I:P/A:P
Type: Primary
Version: 3.1
Base score: 8.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 5.8
Base severity: MEDIUM
Vector:
AV:A/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

Intel Corporation
intel
>>server_board_s2600wt_firmware>>Versions before 1.59(exclusive)
cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600wt2>>-
cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600wt2r>>-
cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600wtt>>-
cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600wttr>>-
cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r1000wt_firmware>>Versions before 1.59(exclusive)
cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r1208wt2gs>>-
cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r1208wt2gsr>>-
cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r1208wttgs>>-
cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r1208wttgsbpp>>-
cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r1208wttgsr>>-
cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r1304wt2gs>>-
cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r1304wt2gsr>>-
cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r1304wttgs>>-
cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r1304wttgsr>>-
cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r2000wt_firmware>>Versions before 1.59(exclusive)
cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r2208wt2ys>>-
cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r2208wt2ysr>>-
cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r2208wttyc1>>-
cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r2208wttyc1r>>-
cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r2208wttys>>-
cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r2208wttysr>>-
cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r2224wttys>>-
cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r2224wttysr>>-
cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r2308wttys>>-
cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r2308wttysr>>-
cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r2312wttys>>-
cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_system_r2312wttysr>>-
cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600cw>>Versions before 1.59(exclusive)
cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600cw2>>-
cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600cw2r>>-
cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600cw2s>>-
cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600cw2sr>>-
cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600cwt>>-
cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600cwtr>>-
cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600cwts>>-
cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600cwtsr>>-
cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>compute_module_hns2600kp_firmware>>Versions before 1.59(exclusive)
cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>compute_module_hns2600kp>>-
cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>compute_module_hns2600kpf>>-
cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>compute_module_hns2600kpfr>>-
cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>compute_module_hns2600kpr>>-
cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600kp_firmware>>Versions before 1.59(exclusive)
cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600kp>>-
cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600kpf>>-
cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600kpfr>>-
cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600kpr>>-
cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>server_board_s2600kptr>>-
cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>compute_module_hns2600tp_firmware>>Versions before 1.59(exclusive)
cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*
Intel Corporation
intel
>>compute_module_hns2600tp>>-
cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-287Primarynvd@nist.gov
CWE ID: CWE-287
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://security.netapp.com/advisory/ntap-20200814-0002/secure@intel.com
Third Party Advisory
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.htmlsecure@intel.com
Vendor Advisory
Hyperlink: https://security.netapp.com/advisory/ntap-20200814-0002/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html
Source: secure@intel.com
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

149Records found

CVE-2020-26558
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.2||MEDIUM
EPSS-0.02% / 6.28%
||
7 Day CHG~0.00%
Published-24 May, 2021 | 17:22
Updated-04 Nov, 2025 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Bluetooth LE and BR/EDR secure pairing in Bluetooth Core Specification 2.1 through 5.2 may permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (in the Passkey authentication procedure) by reflection of the public key and the authentication evidence of the initiating device, potentially permitting this attacker to complete authenticated pairing with the responding device using the correct Passkey for the pairing session. The attack methodology determines the Passkey value one bit at a time.

Action-Not Available
Vendor-bluetoothn/aFedora ProjectDebian GNU/LinuxLinux Kernel Organization, IncIntel Corporation
Product-ac_9560ax1675ac_9560_firmwareac_3168ac_3165ax201_firmwareac_1550_firmwareac_9260ac_7265ac_8260_firmwareac_3165_firmwareax1650debian_linuxac_9461linux_kernelac_8260ac_8265_firmwareac_9461_firmwareax210_firmwareac_3168_firmwareax1675_firmwareac_7265_firmwareac_1550ax200_firmwareax200ax1650_firmwareac_9260_firmwareac_8265ac_9462ax201ac_9462_firmwarefedoraax210bluetooth_core_specificationn/a
CWE ID-CWE-287
Improper Authentication
CVE-2020-26139
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5.3||MEDIUM
EPSS-2.25% / 84.62%
||
7 Day CHG+1.13%
Published-11 May, 2021 | 19:37
Updated-14 Apr, 2026 | 09:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected clients and makes it easier to exploit other vulnerabilities in connected clients.

Action-Not Available
Vendor-n/aDebian GNU/LinuxArista Networks, Inc.Cisco Systems, Inc.NetBSDIntel CorporationSiemens AG
Product-meraki_gr10ir829gw-lte-ga-ck9meraki_mr26_firmwarecatalyst_9120aximeraki_mr55_firmwarecatalyst_9105axw1100_firmwaredebian_linuxaironet_2702c-120aironet_3800i_firmwareip_phone_8865webex_board_85scatalyst_9130axiip_phone_8821_firmwareaironet_ap803_firmwareaironet_3800ecatalyst_9115axiir829-2lte-ea-ak9_firmwarecatalyst_9117aironet_2800_firmwareir829gw-lte-ga-zk9_firmwareaironet_1542dproset_ac_8260meraki_mx67cwac_9260webex_room_kitmeraki_gr60_firmwareaironet_ap803catalyst_9105axw_firmwaremeraki_mr84ac_9560_firmwarecatalyst_9130_apmeraki_mr45_firmwarec-260_firmwareproset_ac_9560_firmwareaironet_3800pcatalyst_91241100-8p_firmwareip_phone_8832meraki_mx67wkiller_ac_1550_firmwareaironet_2800imeraki_z3meraki_mr33aironet_3702meraki_mr20_firmwarewebex_room_55meraki_mr74c-230_firmwareesw6300_firmwareaironet_2800catalyst_iw6300_dcwir829-2lte-ea-ak9webex_board_85s_firmwaremeraki_mr20catalyst_9120_ap_firmwareproset_wi-fi_6_ax200_firmwareo-90esw6300meraki_mr62meraki_mr32killer_wi-fi_6_ax1650proset_ac_3168_firmwarec-200_firmwareaironet_3702_firmwarekiller_ac_1550meraki_mr36aironet_1542i_firmwareir829gw-lte-ga-sk9_firmwarewi-fi_6_ax200meraki_mr44_firmwaremeraki_mx68cwmeraki_mr32_firmwareaironet_1532_firmwarekiller_wi-fi_6_ax1650_firmwarec-230proset_ac_9462aironet_1532meraki_mr56_firmware1100-4p_firmwareaironet_1815i_firmwareaironet_1572_firmwaremeraki_mr72_firmwareproset_wi-fi_6_ax201webex_room_70_single_g2meraki_mr30hmeraki_mr72catalyst_9117axi_firmwaremeraki_mr34_firmwaremeraki_mr42_firmwarewebex_board_70proset_ac_8265_firmwaremeraki_mr52proset_ac_9461_firmwarecatalyst_9120_firmwaremeraki_mr74_firmwareproset_ac_31651109-2pcatalyst_iw6300_ac_firmwarewebex_board_55s_firmwaremeraki_mr62_firmwaremeraki_mx64wwi-fi_6_ax201c-75_firmware1109-4paironet_1815_firmwarecatalyst_9115c-75aironet_2702_firmwaremeraki_mr52_firmwarecatalyst_9124axd_firmwarecatalyst_9124_firmwaremeraki_mr44meraki_mr12_firmwareir829-2lte-ea-ek9ac_9560webex_room_55_dualmeraki_mr42e_firmwarec-65_firmwarenetbsdcatalyst_iw6300_acaironet_1542d_firmwareaironet_2800i_firmwarec-2001100-8paironet_1552_firmwarewebex_dx70_firmware1109-2p_firmwareaironet_1800iaironet_1842_firmwareir829-2lte-ea-ek9_firmwaremeraki_mr86_firmwarewebex_board_70_firmwareproset_ac_9462_firmwareaironet_1852meraki_mr66catalyst_9115_ap_firmwareir829gw-lte-na-ak9aironet_iw3702c-100o-105ip_phone_6861_firmwarewebex_room_kit_firmwaremeraki_mr33_firmwarec-130_firmwaremeraki_mr30h_firmwareo-90_firmwareproset_wi-fi_6e_ax210webex_board_70s_firmwaremeraki_mr42meraki_mx65w_firmwareac_8260_firmwareproset_ac_9560aironet_1832proset_ac_9260_firmwarecatalyst_9124axdmeraki_mr42emeraki_mr84_firmwarecatalyst_9120axemeraki_mr76_firmwaremeraki_mr53_firmwarecatalyst_9130axeaironet_1815proset_wireless_7265_\(rev_d\)_firmwareproset_ac_3165_firmwarecatalyst_9130axe_firmwaremeraki_gr10_firmwaremeraki_mr46e_firmwarew-118aironet_1832_firmwareproset_ac_8265proset_ac_8260_firmwarecatalyst_9115_firmwareproset_wireless_7265_\(rev_d\)catalyst_iw6300_dcwi-fi_6_ax200_firmwarecatalyst_9117_ap_firmwaremeraki_z3_firmwaremeraki_mr70_firmware1101-4p_firmwareir829gw-lte-ga-zk9webex_room_70_dual_g2aironet_1702_firmwarewi-fi_6_ax201_firmwarec-110_firmwareproset_wi-fi_6_ax200aironet_1702aironet_3800webex_dx80catalyst_9124axi_firmwareip_phone_8865_firmwaremeraki_mx65wcatalyst_9130webex_room_70_dualaironet_1852_firmwarewebex_board_55scatalyst_9105axicatalyst_9120axi_firmwareip_phone_8861_firmwareir829-2lte-ea-bk9meraki_mx64w_firmwareo-105_firmwareaironet_4800_firmwarecatalyst_9115axe_firmwaremeraki_mr70meraki_mr46_firmwareac_8265_firmwarekiller_wi-fi_6e_ax1675webex_dx70meraki_mr46ecatalyst_9130axi_firmwarecatalyst_9117axicatalyst_9120_apcatalyst_9105axi_firmwareaironet_1800aironet_1842catalyst_9120axe_firmware1109-4p_firmwarecatalyst_iw6300_dcw_firmwareaironet_2800ecatalyst_9130_firmwarekiller_wi-fi_6e_ax1675_firmwaremeraki_mx67w_firmwareac_9260_firmwaremeraki_mr55webex_board_55_firmwarewebex_room_kit_minic-100_firmwareaironet_1810_firmwarewebex_room_70meraki_mr26webex_board_70sw-68_firmwarec-260catalyst_iw6300_dc_firmwareac_8260meraki_mr86webex_room_70_dual_firmwareproset_wi-fi_6_ax201_firmwarew-118_firmwarec-120_firmwareaironet_3800imeraki_mr56aironet_1552haironet_1552meraki_mr53c-130webex_room_70_firmwareaironet_3800_firmwareir829-2lte-ea-bk9_firmwareaironet_1815icatalyst_9120axpmeraki_mr45c-250_firmwarecatalyst_iw6300aironet_1572meraki_mr12meraki_z3c_firmwareaironet_1800_firmware1101-4paironet_1552h_firmwareip_phone_68611100proset_ac_9260meraki_mx68wir829gw-lte-vz-ak9meraki_mr34catalyst_9115_apip_phone_8832_firmwarewebex_room_70_dual_g2_firmwareac_8265proset_ac_3168catalyst_9105_firmwareir829gw-lte-ga-sk9proset_wi-fi_6e_ax210_firmwarecatalyst_9115axeip_phone_8861catalyst_9117_firmwarewebex_room_kit_mini_firmwarewebex_room_70_single_firmwareip_phone_8821c-110webex_room_70_singlecatalyst_9130_ap_firmwareaironet_2800e_firmwarecatalyst_9117_apir829gw-lte-ga-ek9proset_ac_9461meraki_mr53e_firmwaremeraki_mx68cw_firmwareir829gw-lte-ga-ek9_firmwareaironet_3800e_firmwaremeraki_mr76webex_room_55_dual_firmwaremeraki_mr66_firmwarecatalyst_iw6300_firmwarecatalyst_9120axp_firmwarec-235_firmwarewebex_board_55catalyst_9124axic-235meraki_mr46c-65aironet_1810w_firmwareaironet_1800i_firmwarewebex_room_70_single_g2_firmwarecatalyst_9105c-250aironet_1810wcatalyst_9120meraki_z3caironet_4800w-68aironet_iw3702_firmwareaironet_3800p_firmwarewebex_room_55_firmwaremeraki_mx67cw_firmwareir829gw-lte-vz-ak9_firmwaremeraki_mx68w_firmware1100-4paironet_1810meraki_gr60meraki_mr36_firmwaremeraki_mr53eir829gw-lte-na-ak9_firmwarecatalyst_9115axi_firmwareaironet_1542iwebex_dx80_firmwareir829gw-lte-ga-ck9_firmwaren/aSCALANCE W786-2 SFPSCALANCE WAM763-1SCALANCE W1748-1 M12SCALANCE W788-1 RJ45SCALANCE W734-1 RJ45 (USA)SCALANCE W738-1 M12SCALANCE W1788-2 EEC M12SCALANCE W1788-1 M12SCALANCE W1788-2IA M12SCALANCE W774-1 RJ45SCALANCE W786-2 RJ45SCALANCE WUM766-1SCALANCE W788-2 M12SCALANCE WAM766-1 (US)SCALANCE WAM766-1 EEC (US)SCALANCE W778-1 M12 EEC (USA)SCALANCE W788-1 M12SCALANCE W721-1 RJ45SCALANCE W786-2IA RJ45SCALANCE W748-1 RJ45SCALANCE W788-2 RJ45SCALANCE W788-2 M12 EECSCALANCE WUM763-1SCALANCE W734-1 RJ45SCALANCE W1788-2 M12SCALANCE W748-1 M12SCALANCE W786-1 RJ45SCALANCE W774-1 M12 EECSCALANCE W722-1 RJ45SCALANCE W774-1 RJ45 (USA)SCALANCE W778-1 M12SCALANCE WAM766-1 EECSCALANCE WUM766-1 (USA)SCALANCE W778-1 M12 EECSCALANCE WAM766-1SCALANCE W761-1 RJ45
CWE ID-CWE-287
Improper Authentication
CVE-2020-24514
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.11% / 30.11%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 18:48
Updated-04 Aug, 2024 | 15:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authentication in some Intel(R) RealSense(TM) IDs may allow an unauthenticated user to potentially enable escalation of privilege via physical access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-realsense_id_f450realsense_id_f455_firmwarerealsense_id_f450_firmwarerealsense_id_f455Intel(R) RealSense(TM) IDs
CWE ID-CWE-287
Improper Authentication
CVE-2023-52161
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.61% / 69.79%
||
7 Day CHG~0.00%
Published-22 Feb, 2024 | 00:00
Updated-04 Nov, 2025 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Access Point functionality in eapol_auth_key_handle in eapol.c in iNet wireless daemon (IWD) before 2.14 allows attackers to gain unauthorized access to a protected Wi-Fi network. An attacker can complete the EAPOL handshake by skipping Msg2/4 and instead sending Msg4/4 with an all-zero key.

Action-Not Available
Vendor-n/aIntel Corporation
Product-inet_wireless_daemonn/ainet_wireless_daemon
CWE ID-CWE-287
Improper Authentication
CVE-2023-31189
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5.2||MEDIUM
EPSS-0.07% / 20.75%
||
7 Day CHG~0.00%
Published-14 Feb, 2024 | 13:37
Updated-14 Jan, 2026 | 18:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authentication in some Intel(R) Server Product OpenBMC firmware before version egs-1.09 may allow an authenticated user to enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-openbmcxeon_platinum_8468xeon_gold_6421nxeon_platinum_8468hxeon_gold_6448hxeon_gold_6442yxeon_platinum_8471nxeon_gold_6448yxeon_platinum_8490hxeon_gold_6438y\+xeon_gold_6414uxeon_gold_5433nxeon_gold_6458qxeon_platinum_8454hxeon_platinum_8460hxeon_gold_6444yxeon_platinum_8480\+xeon_gold_6423nxeon_gold_5403nxeon_gold_5423nxeon_gold_6403nxeon_gold_6418hxeon_gold_5411nxeon_gold_5415\+xeon_platinum_8470xeon_silver_4410yxeon_platinum_8452yxeon_platinum_8458pxeon_gold_5412uxeon_gold_6434xeon_platinum_8462y\+xeon_gold_6438nxeon_silver_4410txeon_platinum_8461vxeon_gold_6434hxeon_gold_6426yxeon_gold_6443nxeon_gold_6428nxeon_platinum_8450hxeon_platinum_8470nxeon_gold_6454sxeon_gold_5420\+xeon_gold_5416sxeon_platinum_8460y\+xeon_gold_6430xeon_gold_6416hxeon_gold_5418yxeon_gold_5418nxeon_bronze_3408uxeon_platinum_8444hxeon_gold_6438mxeon_gold_6433nexeon_gold_6433nxeon_platinum_8468vIntel(R) Server Product OpenBMC firmware
CWE ID-CWE-287
Improper Authentication
CVE-2023-28377
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.07% / 21.93%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:04
Updated-30 Aug, 2024 | 16:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authentication in some Intel(R) NUC Kit NUC11PH USB firmware installation software before version 1.1 for Windows may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-usb_firmwarenuc_11_enthusiast_kit_nuc11phki7cnuc_11_enthusiast_mini_pc_nuc11phki7caaIntel(R) NUC Kit NUC11PH USB firmware installation softwareintel_nuc_kit_nuc11ph_usb_firmware_installation_software
CWE ID-CWE-287
Improper Authentication
CVE-2023-22663
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5.9||MEDIUM
EPSS-0.24% / 46.43%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:04
Updated-30 Aug, 2024 | 18:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authentication for some Intel Unison software may allow an authenticated user to potentially enable escalation of privilege via network access.

Action-Not Available
Vendor-n/aIntel CorporationApple Inc.Google LLCMicrosoft Corporation
Product-androidwindowsunison_softwareiphone_osIntel Unison software
CWE ID-CWE-287
Improper Authentication
CVE-2023-32661
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.7||MEDIUM
EPSS-0.11% / 29.88%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 19:04
Updated-30 Aug, 2024 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authentication in some Intel(R) NUC Kits NUC7PJYH and NUC7CJYH Realtek* SD Card Reader Driver installation software before version 10.0.19041.29098 may allow an authenticated user to potentially enable escalation of privilege via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-nuc_kit_nuc7cjyhnuc_kit_nuc7pjyhrealtek_sd_card_reader_driverIntel(R) NUC Kits NUC7PJYH and NUC7CJYH Realtek* SD Card Reader Driver installation softwareintel_nuc_kits_nuc7pjyh_and_nuc7cjyh_realtek_sd_card_reader_driver_installation_software
CWE ID-CWE-287
Improper Authentication
CVE-2019-11170
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-7.8||HIGH
EPSS-0.04% / 13.30%
||
7 Day CHG~0.00%
Published-14 Nov, 2019 | 16:36
Updated-04 Aug, 2024 | 22:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Authentication bypass in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure, escalation of privilege and/or denial of service via local access.

Action-Not Available
Vendor-n/aIntel Corporation
Product-hpcr1304wftysrbbs2600bpbhns2600bpb24rhpcr2208wf0zsrr1304wftysrhpcr2208wftzsrr2208wftzsrr2208wf0zsrr1208wftysr1304wf0ysr2224wfqzshns2600bpqbbs2600stqhpcr2312wftzsrhns2600bpbrhpcr2224wftzsrhns2600bpblchpcr2208wftzsrxbbs2600stbr2208wf0zsr2208wftzshns2600bpsrr1208wftysrr2208wftzsrxbbs2600stbrhns2600bpbrxr2312wf0nphns2600bpblcrs2600stbr2224wftzsrr2208wfqzsrr2224wftzsbbs2600bpqrbbs2600stqrr2208wfqzsbbs2600bpshns2600bpshpcr2312wf0nprhns2600bpq24rhns2600bpb24hns2600bps24hns2600bpq24hns2600bpblc24r2312wfqzshpcr1208wftysrs9256wk1hlchpchns2600bpsrbbs2600bpsrr2312wf0nprs2600stbrs2600wftrhns2600bpbhpcr2208wfqzsrs9248wk2hlcr1304wftysbbs2600bpbrs9248wk2hachpcr1208wfqysrhns2600bpblc24rs2600wf0rs2600stqrs9232wk1hlcs2600stqs9232wk2hacr2308wftzss9248wk1hlcs2600wfqrhpcr2308wftzsrr1208wfqysrhpchns2600bpbrr2312wftzsrr2308wftzsrhpcr1304wf0ysrhpchns2600bpqrs2600wf0hns2600bps24rs9232wk2hlchns2600bpqrs2600wfqbbs2600bpqr1304wf0ysrbaseboard_management_controller_firmwares2600wfthns2600bpb24rxr2312wftzsIntel(R) BMC
CWE ID-CWE-287
Improper Authentication
CVE-2018-12192
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.8||MEDIUM
EPSS-0.07% / 21.07%
||
7 Day CHG~0.00%
Published-14 Mar, 2019 | 20:00
Updated-16 Sep, 2024 | 18:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Logic bug in Kernel subsystem in Intel CSME before version 11.8.60, 11.11.60, 11.22.60 or 12.0.20, or Intel(R) Server Platform Services before version SPS_E5_04.00.04.393.0 may allow an unauthenticated user to potentially bypass MEBx authentication via physical access.

Action-Not Available
Vendor-Intel Corporation
Product-server_platform_services_firmwareconverged_security_management_engine_firmwareIntel(R) CSME, Server Platform Services, Trusted Execution Engine and Intel(R) Active Management Technology
CWE ID-CWE-287
Improper Authentication
CVE-2019-19598
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-0.52% / 66.78%
||
7 Day CHG~0.00%
Published-05 Dec, 2019 | 03:07
Updated-05 Aug, 2024 | 02:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

D-Link DAP-1860 devices before v1.04b03 Beta allow access to administrator functions without authentication via the HNAP_AUTH header timestamp value. In HTTP requests, part of the HNAP_AUTH header is the timestamp used to determine the time when the user sent the request. If this value is equal to the value stored in the device's /var/hnap/timestamp file, the request will pass the HNAP_AUTH check function.

Action-Not Available
Vendor-n/aD-Link Corporation
Product-dap-1860dap-1860_firmwaren/a
CWE ID-CWE-287
Improper Authentication
CVE-2023-0228
Matching Score-4
Assigner-Asea Brown Boveri Ltd. (ABB)
ShareView Details
Matching Score-4
Assigner-Asea Brown Boveri Ltd. (ABB)
CVSS Score-8.8||HIGH
EPSS-0.11% / 29.42%
||
7 Day CHG~0.00%
Published-02 Mar, 2023 | 01:44
Updated-05 Mar, 2025 | 20:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper authentication vulnerability in S+ Operations

Improper Authentication vulnerability in ABB Symphony Plus S+ Operations.This issue affects Symphony Plus S+ Operations: from 2.X through 2.1 SP2, 2.2, from 3.X through 3.3 SP1, 3.3 SP2.

Action-Not Available
Vendor-ABB
Product-symphony_plus_s\+_operationsSymphony Plus S+ Operations
CWE ID-CWE-287
Improper Authentication
CVE-2022-47209
Matching Score-4
Assigner-Tenable Network Security, Inc.
ShareView Details
Matching Score-4
Assigner-Tenable Network Security, Inc.
CVSS Score-8.8||HIGH
EPSS-0.19% / 40.94%
||
7 Day CHG~0.00%
Published-16 Dec, 2022 | 00:00
Updated-17 Apr, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A support user exists on the device and appears to be a backdoor for Technical Support staff. The default password for this account is “support” and cannot be changed by a user via any normally accessible means.

Action-Not Available
Vendor-n/aNETGEAR, Inc.
Product-rax30_firmwarerax30NETGEAR Nighthawk WiFi6 Router
CWE ID-CWE-287
Improper Authentication
CVE-2019-10964
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-7.1||HIGH
EPSS-0.33% / 56.06%
||
7 Day CHG-0.01%
Published-28 Jun, 2019 | 20:58
Updated-22 May, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Medtronic MiniMed 508 and Paradigm Series Insulin Pumps Improper Access Control

Medtronic MiniMed Insulin Pumps are designed to communicate using a wireless RF with other devices, such as blood glucose meters, glucose sensor transmitters, and CareLink USB devices. This wireless RF communication protocol does not properly implement authentication or authorization. An attacker with adjacent access to one of the affected insulin pump models can inject, replay, modify, and/or intercept data. This vulnerability could also allow attackers to change pump settings and control insulin delivery.

Action-Not Available
Vendor-medtronicMedtronic
Product-minimed_paradigm_722minimed_paradigm_512minimed_paradigm_veo_554minimed_paradigm_523kminimed_paradigm_veo_754cmminimed_paradigm_723k_firmwareminimed_paradigm_veo_754cm_firmwareminimed_paradigm_712e_firmwareminimed_paradigm_523minimed_paradigm_veo_554cmminimed_paradigm_511minimed_paradigm_723minimed_paradigm_722_firmwareminimed_paradigm_712eminimed_paradigm_723_firmwareminimed_paradigm_522k_firmwareminimed_paradigm_veo_754minimed_paradigm_715_firmwareminimed_paradigm_723kminimed_508_firmwareminimed_paradigm_715minimed_paradigm_veo_754_firmwareminimed_paradigm_523k_firmwareminimed_paradigm_512_firmwareminimed_paradigm_523_firmwareminimed_paradigm_veo_554_firmwareminimed_paradigm_712_firmwareminimed_paradigm_veo_554cm_firmwareminimed_paradigm_522minimed_paradigm_722kminimed_508minimed_paradigm_722k_firmwareminimed_paradigm_515minimed_paradigm_511_firmwareminimed_paradigm_712minimed_paradigm_515_firmwareminimed_paradigm_522kminimed_paradigm_522_firmwareMiniMed Paradigm 512/712 pumpsMiniMed 508 pumpMiniMed Paradigm 515/715 pumpsMiniMed Paradigm 511 pumpMiniMed Paradigm 522K/722K pumpsMiniMed Paradigm 523/723 pumpsMiniMed Paradigm 523K/723K pumpsMiniMed Paradigm 522/722 pumpsMiniMed Paradigm Veo 554/754 pumpsMiniMed Paradigm Veo 554CM/754CM pumpsMiniMed Paradigm 712E pump
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-0130
Matching Score-4
Assigner-NVIDIA Corporation
ShareView Details
Matching Score-4
Assigner-NVIDIA Corporation
CVSS Score-8.8||HIGH
EPSS-0.07% / 20.52%
||
7 Day CHG~0.00%
Published-06 Dec, 2024 | 19:48
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NVIDIA UFM Enterprise, UFM Appliance, and UFM CyberAI contain a vulnerability where an attacker can cause an improper authentication issue by sending a malformed request through the Ethernet management interface. A successful exploit of this vulnerability might lead to escalation of privileges, data tampering, denial of service, and information disclosure.

Action-Not Available
Vendor-NVIDIA Corporation
Product-UFM Enterprise Appliance LTS23UFM Enterprise LTS23UFM CyberAI LTS23UFM SDN Appliance LTS23UFM CyberAI GAUFM Enterprise GAUFM Enterprise Appliance GAUFM SDN Appliance GA
CWE ID-CWE-287
Improper Authentication
CVE-2022-43620
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-8.8||HIGH
EPSS-1.38% / 80.34%
||
7 Day CHG~0.00%
Published-29 Mar, 2023 | 00:00
Updated-14 Feb, 2025 | 16:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DIR-1935 1.03 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP login requests. The issue results from the lack of proper implementation of the authentication algorithm. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-16142.

Action-Not Available
Vendor-D-Link Corporation
Product-dir-1935_firmwaredir-1935DIR-1935
CWE ID-CWE-287
Improper Authentication
CVE-2022-42463
Matching Score-4
Assigner-OpenHarmony
ShareView Details
Matching Score-4
Assigner-OpenHarmony
CVSS Score-8.3||HIGH
EPSS-0.10% / 28.11%
||
7 Day CHG~0.00%
Published-14 Oct, 2022 | 14:40
Updated-14 May, 2025 | 15:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Softbus_server in communication subsystem has a authenication bypass vulnerability in a callback handler function. Attackers can launch attacks on distributed networks by sending Bluetooth rfcomm packets to any remote device and executing arbitrary co ...

OpenHarmony-v3.1.2 and prior versions have an authenication bypass vulnerability in a callback handler function of Softbus_server in communication subsystem. Attackers can launch attacks on distributed networks by sending Bluetooth rfcomm packets to any remote device and executing arbitrary commands.

Action-Not Available
Vendor-OpenHarmony (OpenAtom Foundation)
Product-openharmonyOpenHarmony
CWE ID-CWE-287
Improper Authentication
CVE-2022-40622
Matching Score-4
Assigner-Rapid7, Inc.
ShareView Details
Matching Score-4
Assigner-Rapid7, Inc.
CVSS Score-8.8||HIGH
EPSS-0.10% / 28.11%
||
7 Day CHG~0.00%
Published-13 Sep, 2022 | 20:35
Updated-16 Sep, 2024 | 16:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WAVLINK Quantum D4G (WN531G3) Session Management by IP Address

The WAVLINK Quantum D4G (WN531G3) running firmware version M31G3.V5030.200325 uses IP addresses to hold sessions and does not not use session tokens. Therefore, if an attacker changes their IP address to match the logged-in administrator's, or is behind the same NAT as the logged in administrator, session takeover is possible.

Action-Not Available
Vendor-WAVLINK Technology Ltd.
Product-wn531g3wn531g3_firmwareWN531G3
CWE ID-CWE-304
Missing Critical Step in Authentication
CWE ID-CWE-287
Improper Authentication
CVE-2021-26637
Matching Score-4
Assigner-KrCERT/CC
ShareView Details
Matching Score-4
Assigner-KrCERT/CC
CVSS Score-8.8||HIGH
EPSS-0.34% / 56.56%
||
7 Day CHG~0.00%
Published-22 Jun, 2022 | 13:55
Updated-03 Aug, 2024 | 20:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SiHAS Improper Authentication vulnerability

There is no account authentication and permission check logic in the firmware and existing apps of SiHAS's SGW-300, ACM-300, GCM-300, so unauthorized users can remotely control the device.

Action-Not Available
Vendor-shinasysShina System Co.,Ltd
Product-sihas_sgw-300sihas_acm-300sihas_sgw-300_firmwaresihas_gcm-300sihas_gcm-300_firmwaresihas_acm-300_firmwareSiHAS firmwareSiHAS old app
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-862
Missing Authorization
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2022-38700
Matching Score-4
Assigner-OpenHarmony
ShareView Details
Matching Score-4
Assigner-OpenHarmony
CVSS Score-8.8||HIGH
EPSS-0.10% / 28.11%
||
7 Day CHG~0.00%
Published-09 Sep, 2022 | 14:39
Updated-16 Sep, 2024 | 16:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
multimedia subsystem has a permission bypass vulnerability. LAN attackers can bypass permission control and get control of camera service.

OpenHarmony-v3.1.1 and prior versions have a permission bypass vulnerability. LAN attackers can bypass permission control and get control of camera service.

Action-Not Available
Vendor-OpenHarmony (OpenAtom Foundation)
Product-openharmonyOpenHarmony
CWE ID-CWE-305
Authentication Bypass by Primary Weakness
CWE ID-CWE-287
Improper Authentication
CVE-2021-26088
Matching Score-4
Assigner-Fortinet, Inc.
ShareView Details
Matching Score-4
Assigner-Fortinet, Inc.
CVSS Score-7.1||HIGH
EPSS-5.48% / 90.23%
||
7 Day CHG~0.00%
Published-12 Jul, 2021 | 13:21
Updated-25 Oct, 2024 | 13:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An improper authentication vulnerability in FSSO Collector version 5.0.295 and below may allow an unauthenticated user to bypass a FSSO firewall policy and access the protected network via sending specifically crafted UDP login notification packets.

Action-Not Available
Vendor-Fortinet, Inc.
Product-fortinet_single_sign-onFortinet FSSO Windows DC Agent, FSSO Windows CA
CWE ID-CWE-287
Improper Authentication
CVE-2021-25424
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-8.8||HIGH
EPSS-0.22% / 44.57%
||
7 Day CHG~0.00%
Published-11 Jun, 2021 | 14:33
Updated-03 Aug, 2024 | 20:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authentication vulnerability in Tizen bluetooth-frwk prior to Firmware update JUN-2021 Release allows bluetooth attacker to take over the user's bluetooth device without user awareness.

Action-Not Available
Vendor-SamsungSamsung Electronics
Product-galaxy_watchgalaxy_watch_active_2_firmwaregalaxy_watch_activegalaxy_watch_3gear_s3_firmwaregear_2_neo_firmwaregalaxy_watch_active_2gear_s2galaxy_watch_active_firmwaregear_2_neogear_sgear_s2_firmwaregear_2_firmwaregear_s3galaxy_watch_firmwaregear_s_firmwaregalaxy_watch_3_firmwaregear_2Tizen wearable devices
CWE ID-CWE-287
Improper Authentication
CVE-2026-4476
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.02% / 3.31%
||
7 Day CHG~0.00%
Published-20 Mar, 2026 | 06:32
Updated-20 Mar, 2026 | 18:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Yi Technology YI Home Camera CGI Endpoint ipc missing authentication

A vulnerability was found in Yi Technology YI Home Camera 2 2.1.1_20171024151200. The impacted element is an unknown function of the file home/web/ipc of the component CGI Endpoint. Performing a manipulation results in missing authentication. Access to the local network is required for this attack. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-Yi Technology
Product-YI Home Camera
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2016-6541
Matching Score-4
Assigner-CERT/CC
ShareView Details
Matching Score-4
Assigner-CERT/CC
CVSS Score-8.8||HIGH
EPSS-0.63% / 70.37%
||
7 Day CHG~0.00%
Published-06 Jul, 2018 | 21:00
Updated-06 Aug, 2024 | 01:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
TrackR Bravo device allows unauthenticated pairing, which enables unauthenticated connected applications to write to various device attributes

TrackR Bravo device allows unauthenticated pairing, which enables unauthenticated connected applications to write to various device attributes. Updated apps, version 5.1.6 for iOS and 2.2.5 for Android, have been released by the vendor to address the vulnerabilities in CVE-2016-6538, CVE-2016-6539, CVE-2016-6540 and CVE-2016-6541.

Action-Not Available
Vendor-thetrackrTrackR
Product-trackr_bravo_firmwaretrackr_bravoBravo Mobile Application
CWE ID-CWE-306
Missing Authentication for Critical Function
CWE ID-CWE-287
Improper Authentication
CVE-2023-38555
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-8.8||HIGH
EPSS-0.05% / 16.57%
||
7 Day CHG~0.00%
Published-26 Jul, 2023 | 07:43
Updated-14 Nov, 2024 | 15:00
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Authentication bypass vulnerability in Fujitsu network devices Si-R series and SR-M series allows a network-adjacent unauthenticated attacker to obtain, change, and/or reset configuration settings of the affected products. Affected products and versions are as follows: Si-R 30B all versions, Si-R 130B all versions, Si-R 90brin all versions, Si-R570B all versions, Si-R370B all versions, Si-R220D all versions, Si-R G100 V02.54 and earlier, Si-R G200 V02.54 and earlier, Si-R G100B V04.12 and earlier, Si-R G110B V04.12 and earlier, Si-R G200B V04.12 and earlier, Si-R G210 V20.52 and earlier, Si-R G211 V20.52 and earlier, Si-R G120 V20.52 and earlier, Si-R G121 V20.52 and earlier, and SR-M 50AP1 all versions.

Action-Not Available
Vendor-Fujitsu Limited
Product-si-r220d_firmwaresi-r_30b_firmwaresi-r_g120_firmwaresi-r_g120si-r570b_firmwaresi-r370b_firmwaresi-r_g200bsi-r_90brinsi-r_g100bsi-r_g200_firmwaresi-r_g210si-r_90brin_firmwaresi-r_g100_firmwaresr-m_50ap1si-r570bsi-r370bsi-r_130b_firmwaresi-r_30bsi-r_g100b_firmwaresi-r_g121_firmwaresr-m_50ap1_firmwaresi-r_g211_firmwaresi-r_g200b_firmwaresi-r_g100si-r_g211si-r_130bsi-r_g210_firmwaresi-r_g200si-r_g110bsi-r_g121si-r_g110b_firmwaresi-r220dSi-R220DSi-R 130BSi-R G100Si-R G100BSi-R 90brinSi-R G200Si-R570BSi-R 30BSi-R370BSi-R G211Si-R G200BSi-R G210SR-M 50AP1Si-R G121Si-R G120Si-R G110B
CWE ID-CWE-287
Improper Authentication
CVE-2025-22477
Matching Score-4
Assigner-Dell
ShareView Details
Matching Score-4
Assigner-Dell
CVSS Score-8.3||HIGH
EPSS-0.11% / 29.93%
||
7 Day CHG~0.00%
Published-06 May, 2025 | 16:03
Updated-26 Feb, 2026 | 18:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Dell Storage Center - Dell Storage Manager, version(s) 20.1.20, contain(s) an Improper Authentication vulnerability. An unauthenticated attacker with adjacent network access could potentially exploit this vulnerability, leading to Elevation of privileges.

Action-Not Available
Vendor-Dell Inc.
Product-storage_managerDell Storage Center - Dell Storage Manager
CWE ID-CWE-287
Improper Authentication
CVE-2026-34121
Matching Score-4
Assigner-TP-Link Systems Inc.
ShareView Details
Matching Score-4
Assigner-TP-Link Systems Inc.
CVSS Score-8.7||HIGH
EPSS-0.09% / 24.80%
||
7 Day CHG~0.00%
Published-02 Apr, 2026 | 17:20
Updated-06 Apr, 2026 | 20:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authentication Bypass in DS Configuration Service via HTTP Request Parsing Differential of TP-Link Tapo C520WS

An authentication bypass vulnerability within the HTTP handling of the DS configuration service in TP-Link Tapo C520WS v2.6 was identified, due to inconsistent parsing and authorization logic in JSON requests during authentication check. An unauthenticated attacker can append an authentication-exempt action to a request containing privileged DS do actions, bypassing authorization checks. Successful exploitation allows unauthenticated execution of restricted configuration actions, which may result in unauthorized modification of device state.

Action-Not Available
Vendor-TP-Link Systems Inc.TP-Link Systems Inc.
Product-tapo_c520wstapo_c520ws_firmwareTapo C520WS v2.6
CWE ID-CWE-287
Improper Authentication
CVE-2018-7358
Matching Score-4
Assigner-ZTE Corporation
ShareView Details
Matching Score-4
Assigner-ZTE Corporation
CVSS Score-6.5||MEDIUM
EPSS-28.61% / 96.55%
||
7 Day CHG~0.00%
Published-14 Nov, 2018 | 15:00
Updated-05 Aug, 2024 | 06:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ZTE ZXHN H168N product with versions V2.2.0_PK1.2T5, V2.2.0_PK1.2T2, V2.2.0_PK11T7 and V2.2.0_PK11T have an improper change control vulnerability, which may allow an unauthorized user to perform unauthorized operations.

Action-Not Available
Vendor-ZTE Corporation
Product-zxhn_h168n_firmwarezxhn_h168nZXHN H168N
CWE ID-CWE-287
Improper Authentication
CVE-2020-8862
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-8.8||HIGH
EPSS-3.52% / 87.67%
||
7 Day CHG-1.19%
Published-22 Feb, 2020 | 00:00
Updated-04 Aug, 2024 | 10:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DAP-2610 Firmware v2.01RC067 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of passwords. The issue results from the lack of proper password checking. An attacker can leverage this vulnerability to execute arbitrary code in the context of root. Was ZDI-CAN-10082.

Action-Not Available
Vendor-D-Link Corporation
Product-dap-2610dap-2610_firmwareDAP-2610
CWE ID-CWE-697
Incorrect Comparison
CWE ID-CWE-287
Improper Authentication
CVE-2020-8861
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-8.8||HIGH
EPSS-2.44% / 85.20%
||
7 Day CHG-0.84%
Published-22 Feb, 2020 | 00:00
Updated-04 Aug, 2024 | 10:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DAP-1330 1.10B01 BETA Wi-Fi range extenders. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP login requests. The issue results from the lack of proper handling of cookies. An attacker can leverage this vulnerability to execute arbitrary code on the router. Was ZDI-CAN-9554.

Action-Not Available
Vendor-D-Link Corporation
Product-dap-1330_firmwaredap-1330DAP-1330
CWE ID-CWE-303
Incorrect Implementation of Authentication Algorithm
CWE ID-CWE-287
Improper Authentication
CVE-2025-10772
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.02% / 5.43%
||
7 Day CHG~0.00%
Published-21 Sep, 2025 | 23:32
Updated-22 Sep, 2025 | 21:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
huggingface LeRobot ZeroMQ Socket lekiwi_remote.py missing authentication

A vulnerability was identified in huggingface LeRobot up to 0.3.3. Affected by this vulnerability is an unknown functionality of the file lerobot/common/robot_devices/robots/lekiwi_remote.py of the component ZeroMQ Socket Handler. The manipulation leads to missing authentication. The attack can only be initiated within the local network. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-huggingface
Product-LeRobot
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2018-21118
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-0.12% / 31.24%
||
7 Day CHG~0.00%
Published-22 Apr, 2020 | 15:09
Updated-05 Aug, 2024 | 12:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NETGEAR XR500 devices before 2.3.2.32 are affected by authentication bypass.

Action-Not Available
Vendor-n/aNETGEAR, Inc.
Product-xr500_firmwarexr500n/a
CWE ID-CWE-287
Improper Authentication
CVE-2018-21125
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-0.12% / 31.24%
||
7 Day CHG~0.00%
Published-22 Apr, 2020 | 15:50
Updated-05 Aug, 2024 | 12:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

NETGEAR WAC510 devices before 5.0.0.17 are affected by authentication bypass.

Action-Not Available
Vendor-n/aNETGEAR, Inc.
Product-wac510_firmwarewac510n/a
CWE ID-CWE-287
Improper Authentication
CVE-2018-19023
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-8.8||HIGH
EPSS-0.26% / 49.42%
||
7 Day CHG~0.00%
Published-25 Jan, 2019 | 20:00
Updated-16 Sep, 2024 | 22:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Hetronic Nova-M prior to verson r161 uses fixed codes that are reproducible by sniffing and re-transmission. This can lead to unauthorized replay of a command, spoofing of an arbitrary message, or keeping the controlled load in a permanent "stop" state.

Action-Not Available
Vendor-hetronicHetronic
Product-mlc_firmwarenova-mdc_mobile_firmwarebms-hles-can-hlmlcbms-hl_firmwaredc_mobilenova-m_firmwarees-can-hl_firmwareHetronic Nova-M
CWE ID-CWE-294
Authentication Bypass by Capture-replay
CWE ID-CWE-287
Improper Authentication
CVE-2024-6174
Matching Score-4
Assigner-Canonical Ltd.
ShareView Details
Matching Score-4
Assigner-Canonical Ltd.
CVSS Score-8.8||HIGH
EPSS-0.04% / 11.19%
||
7 Day CHG~0.00%
Published-26 Jun, 2025 | 09:15
Updated-26 Aug, 2025 | 20:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

When a non-x86 platform is detected, cloud-init grants root access to a hardcoded url with a local IP address. To prevent this, cloud-init default configurations disable platform enumeration.

Action-Not Available
Vendor-Canonical Ltd.
Product-cloud-initcloud-init
CWE ID-CWE-287
Improper Authentication
CVE-2024-6235
Matching Score-4
Assigner-Citrix Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Citrix Systems, Inc.
CVSS Score-9.4||CRITICAL
EPSS-86.84% / 99.43%
||
7 Day CHG-1.51%
Published-10 Jul, 2024 | 19:07
Updated-14 May, 2025 | 15:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Sensitive information disclosure

Sensitive information disclosure in NetScaler Console

Action-Not Available
Vendor-Citrix (Cloud Software Group, Inc.)NetScaler (Cloud Software Group, Inc.)
Product-netscaler_consoleNetScaler Consolenetscaler_console
CWE ID-CWE-287
Improper Authentication
CVE-2024-57046
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-55.95% / 98.11%
||
7 Day CHG~0.00%
Published-18 Feb, 2025 | 00:00
Updated-07 Jul, 2025 | 18:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the Netgear DGN2200 router with firmware version v1.0.0.46 and earlier permits unauthorized individuals to bypass the authentication. When adding "?x=1.gif" to the the requested url, it will be recognized as passing the authentication.

Action-Not Available
Vendor-n/aNETGEAR, Inc.
Product-dgn2200_firmwaredgn2200n/a
CWE ID-CWE-287
Improper Authentication
CVE-2022-22990
Matching Score-4
Assigner-Western Digital
ShareView Details
Matching Score-4
Assigner-Western Digital
CVSS Score-7.8||HIGH
EPSS-1.71% / 82.37%
||
7 Day CHG~0.00%
Published-13 Jan, 2022 | 20:27
Updated-03 Aug, 2024 | 03:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Limited authentication bypass vulnerability on Western Digital My Cloud devices

A limited authentication bypass vulnerability was discovered that could allow an attacker to achieve remote code execution and escalate privileges on the My Cloud devices. Addressed this vulnerability by changing access token validation logic and rewriting rule logic on PHP scripts.

Action-Not Available
Vendor-Western Digital Corp.
Product-my_cloud_dl2100wd_cloudmy_cloudmy_cloud_ex4100my_cloud_ex2_ultramy_cloud_osmy_cloud_mirror_gen_2my_cloud_pr2100my_cloud_dl4100my_cloud_ex2100my_cloud_pr4100My Cloud
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-697
Incorrect Comparison
CVE-2020-15055
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-0.09% / 26.13%
||
7 Day CHG~0.00%
Published-07 Aug, 2020 | 21:16
Updated-04 Aug, 2024 | 13:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TP-Link USB Network Server TL-PS310U devices before 2.079.000.t0210 allow an attacker on the same network to bypass authentication via a web-administration request that lacks a password parameter.

Action-Not Available
Vendor-n/aTP-Link Systems Inc.
Product-tl-ps310u_firmwaretl-ps310un/a
CWE ID-CWE-287
Improper Authentication
CVE-2015-10083
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.3||MEDIUM
EPSS-0.60% / 69.56%
||
7 Day CHG~0.00%
Published-21 Feb, 2023 | 15:00
Updated-06 Aug, 2024 | 08:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
harrystech Dynosaur-Rails application_controller.rb basic_auth improper authentication

A vulnerability has been found in harrystech Dynosaur-Rails and classified as critical. Affected by this vulnerability is the function basic_auth of the file app/controllers/application_controller.rb. The manipulation leads to improper authentication. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is named 04b223813f0e336aab50bff140d0f5889c31dbec. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-221503.

Action-Not Available
Vendor-harrysharrystech
Product-dynosaur-railsDynosaur-Rails
CWE ID-CWE-287
Improper Authentication
CVE-2021-34865
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-8.8||HIGH
EPSS-1.15% / 78.50%
||
7 Day CHG~0.00%
Published-25 Jan, 2022 | 15:30
Updated-04 Aug, 2024 | 00:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of multiple NETGEAR routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the mini_httpd service, which listens on TCP port 80 by default. The issue results from incorrect string matching logic when accessing protected pages. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-13313.

Action-Not Available
Vendor-NETGEAR, Inc.
Product-r6700v2_firmwarer6850_firmwarer7450_firmwarer6220_firmwareac2600ac2400r6900v2r7200_firmwarer6800r6900v2_firmwarer6260_firmwarer6260r6220r6330_firmwareac2400_firmwarer7350_firmwarer7400_firmwarer7200r6350_firmwarer6230r6330d7000v1r6230_firmwareac2100_firmwarer7400ac2100r6700v2r6850r6350r7350r7450d7000v1_firmwarer6800_firmwareac2600_firmwareMultiple Routers
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-697
Incorrect Comparison
CVE-2021-34977
Matching Score-4
Assigner-Zero Day Initiative
ShareView Details
Matching Score-4
Assigner-Zero Day Initiative
CVSS Score-8.8||HIGH
EPSS-0.50% / 65.88%
||
7 Day CHG~0.00%
Published-13 Jan, 2022 | 21:44
Updated-04 Aug, 2024 | 00:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of NETGEAR R7000 1.0.11.116_10.2.100 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the processing of SOAP requests. The issue results from the lack of proper authentication verification before performing a password reset. An attacker can leverage this vulnerability to reset the admin password. Was ZDI-CAN-13483.

Action-Not Available
Vendor-NETGEAR, Inc.
Product-r7000_firmwarer7000R7000
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CWE ID-CWE-287
Improper Authentication
CVE-2018-0676
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-8.8||HIGH
EPSS-0.16% / 37.16%
||
7 Day CHG~0.00%
Published-09 Jan, 2019 | 22:00
Updated-05 Aug, 2024 | 03:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

BN-SDWBP3 firmware version 1.0.9 and earlier allows an attacker on the same network segment to bypass authentication to access to the management screen and execute an arbitrary command via unspecified vectors.

Action-Not Available
Vendor-panasonicPanasonic Corporation
Product-bn-sdwbp3_firmwarebn-sdwbp3BN-SDWBP3
CWE ID-CWE-287
Improper Authentication
CVE-2026-2065
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.02% / 4.83%
||
7 Day CHG-0.01%
Published-06 Feb, 2026 | 20:02
Updated-05 Mar, 2026 | 20:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Flycatcher Toys smART Pixelator Bluetooth Low Energy missing authentication

A security flaw has been discovered in Flycatcher Toys smART Pixelator 2.0. Affected by this issue is some unknown functionality of the component Bluetooth Low Energy Interface. Performing a manipulation results in missing authentication. The attack can only be performed from the local network. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-flycatcherFlycatcher Toys
Product-smart_pixelator_firmwaresmart_pixelatorsmART Pixelator
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-306
Missing Authentication for Critical Function
CWE ID-CWE-862
Missing Authorization
CVE-2021-25863
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-0.11% / 28.95%
||
7 Day CHG~0.00%
Published-26 Jan, 2021 | 07:05
Updated-03 Aug, 2024 | 20:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Open5GS 2.1.3 listens on 0.0.0.0:3000 and has a default password of 1423 for the admin account.

Action-Not Available
Vendor-open5gsn/a
Product-open5gsn/a
CWE ID-CWE-287
Improper Authentication
CVE-2018-11478
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-0.11% / 29.93%
||
7 Day CHG~0.00%
Published-30 May, 2018 | 21:00
Updated-05 Aug, 2024 | 08:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered on Vgate iCar 2 Wi-Fi OBD2 Dongle devices. The OBD port is used to receive measurement data and debug information from the car. This on-board diagnostics feature can also be used to send commands to the car (different for every vendor / car product line / car). No authentication is needed, which allows attacks from the local Wi-Fi network.

Action-Not Available
Vendor-vgaten/a
Product-icar_2_wi-fi_obd2_firmwareicar_2_wi-fi_obd2n/a
CWE ID-CWE-287
Improper Authentication
CVE-2026-21633
Matching Score-4
Assigner-HackerOne
ShareView Details
Matching Score-4
Assigner-HackerOne
CVSS Score-8.8||HIGH
EPSS-0.05% / 14.61%
||
7 Day CHG~0.00%
Published-05 Jan, 2026 | 16:47
Updated-30 Jan, 2026 | 01:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A malicious actor with access to the adjacent network could obtain unauthorized access to a UniFi Protect Camera by exploiting a discovery protocol vulnerability in the Unifi Protect Application (Version 6.1.79 and earlier). Affected Products: UniFi Protect Application (Version 6.1.79 and earlier). Mitigation: Update your UniFi Protect Application to Version 6.2.72 or later.

Action-Not Available
Vendor-Ubiquiti Inc.
Product-unifi_protectUniFi Protect Application
CWE ID-CWE-287
Improper Authentication
CVE-2026-0842
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.01% / 1.17%
||
7 Day CHG~0.00%
Published-11 Jan, 2026 | 08:02
Updated-23 Feb, 2026 | 08:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Flycatcher Toys smART Sketcher Bluetooth Low Energy missing authentication

A flaw has been found in Flycatcher Toys smART Sketcher up to 2.0. This affects an unknown part of the component Bluetooth Low Energy Interface. This manipulation causes missing authentication. The attack can only be done within the local network. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-Flycatcher Toys
Product-smART Sketcher
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2017-18772
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-0.16% / 36.98%
||
7 Day CHG~0.00%
Published-22 Apr, 2020 | 14:47
Updated-05 Aug, 2024 | 21:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Certain NETGEAR devices are affected by authentication bypass. This affects EX3700 before 1.0.0.64, EX3800 before 1.0.0.64, EX6120 before 1.0.0.32, EX6130 before 1.0.0.16, R6300v2 before 1.0.4.12, R6700 before 1.0.1.26, R6900 before 1.0.1.22, R7000 before 1.0.9.6, R7300DST before 1.0.0.52, R7900 before 1.0.1.12, R8000 before 1.0.3.24, R8500 before 1.0.2.74, and WNR2000v2 before 1.2.0.8.

Action-Not Available
Vendor-n/aNETGEAR, Inc.
Product-r8500ex6130_firmwarer6700r8000r7000ex3800_firmwarewnr2000_firmwarer7900r6900ex3700r8500_firmwarer7300dst_firmwarer6900_firmwareex3800r7900_firmwarer7000_firmwareex3700_firmwarer6300r7300dstex6120r6300_firmwarer6700_firmwareex6130ex6120_firmwarewnr2000r8000_firmwaren/a
CWE ID-CWE-287
Improper Authentication
CVE-2020-5536
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-8.8||HIGH
EPSS-0.10% / 27.58%
||
7 Day CHG~0.00%
Published-04 Mar, 2020 | 01:35
Updated-04 Aug, 2024 | 08:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OpenBlocks IoT VX2 prior to Ver.4.0.0 (Ver.3 Series) allows an attacker on the same network segment to bypass authentication and to initialize the device via unspecified vectors.

Action-Not Available
Vendor-plathomePlat'Home Co.,Ltd.
Product-openblocks_iot_vx2openblocks_iot_vx2_firmwareOpenBlocks IoT VX2
CWE ID-CWE-287
Improper Authentication
  • Previous
  • 1
  • 2
  • 3
  • Next
Details not found