Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cisco meraki mr - vulnerabilities and exploits
(subscribe to this query)
7.7
CVSSv2
CVE-2014-7999
Cisco-Meraki MS, MR, and MX devices with firmware prior to 2014-09-24 allow remote authenticated users to install arbitrary firmware by leveraging unspecified HTTP handler access on the local network, aka Cisco-Meraki defect ID 00478565.
Cisco Meraki Mr Firmware
Cisco Meraki Mr -
Cisco Meraki Ms Firmware
Cisco Meraki Ms -
Cisco Meraki Mx Firmware
Cisco Meraki Mx -
4
CVSSv2
CVE-2018-0284
A vulnerability in the local status page functionality of the Cisco Meraki MR, MS, MX, Z1, and Z3 product lines could allow an authenticated, remote malicious user to modify device configuration files. The vulnerability occurs when handling requests to the local status page. An e...
Cisco Meraki Mr 24 Firmware
Cisco Meraki Mr 25 Firmware
Cisco Meraki Ms 10 Firmware
Cisco Meraki Ms 9 Firmware
Cisco Meraki Mx 15 Firmware
Cisco Meraki Mx 14 Firmware
Cisco Meraki Mx 13 Firmware
7.2
CVSSv2
CVE-2014-7995
Cisco-Meraki MS, MR, and MX devices with firmware prior to 2014-09-24 allow physically proximate malicious users to obtain shell access by opening a device's case and connecting a cable to a serial port, aka Cisco-Meraki defect ID 00302077.
Cisco Meraki Mx Firmware
Cisco Meraki Mx -
Cisco Meraki Ms Firmware
Cisco Meraki Ms -
Cisco Meraki Mr Firmware
Cisco Meraki Mr -
3.3
CVSSv2
CVE-2014-7993
Cisco-Meraki MS, MR, and MX devices with firmware prior to 2014-09-24 allow remote malicious users to obtain sensitive credential information by leveraging unspecified HTTP handler access on the local network, aka Cisco-Meraki defect ID 00302012.
Cisco Meraki Mx Firmware
Cisco Meraki Mr Firmware
Cisco Meraki Ms Firmware
5.4
CVSSv2
CVE-2014-7994
Cisco-Meraki MS, MR, and MX devices with firmware prior to 2014-09-24 allow remote malicious users to execute arbitrary commands by leveraging knowledge of a cross-device secret and a per-device secret, and sending a request to an unspecified HTTP handler on the local network, ak...
Cisco Meraki Mr Firmware
Cisco Meraki Mr -
Cisco Meraki Mx Firmware
Cisco Meraki Mx -
Cisco Meraki Ms Firmware
Cisco Meraki Ms -
5.8
CVSSv2
CVE-2018-16986
Texas Instruments BLE-STACK v2.2.1 for SimpleLink CC2640 and CC2650 devices allows remote malicious users to execute arbitrary code via a malformed packet that triggers a buffer overflow.
Ti Ble-stack
Ti Ble-stack 3.0.0
2.9
CVSSv2
CVE-2020-26139
An issue exists in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected...
Netbsd Netbsd 7.1
Debian Debian Linux 9.0
Arista C-100 Firmware -
Arista C-110 Firmware -
Arista C-120 Firmware -
Arista C-130 Firmware -
Arista C-200 Firmware -
Arista C-230 Firmware -
Arista C-235 Firmware -
Arista C-250 Firmware -
Arista C-260 Firmware -
Arista C-65 Firmware -
Arista C-75 Firmware -
Arista O-105 Firmware -
Arista O-90 Firmware -
Arista W-118 Firmware -
Arista W-68 Firmware -
Cisco 1100 Firmware -
Cisco 1100-4p Firmware -
Cisco 1100-8p Firmware -
Cisco 1101-4p Firmware -
Cisco 1109-2p Firmware -
1.8
CVSSv2
CVE-2020-24587
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device se...
Ieee Ieee 802.11
Linux Mac80211 -
Debian Debian Linux 9.0
Arista C-100 Firmware -
Arista C-110 Firmware -
Arista C-120 Firmware -
Arista C-130 Firmware -
Arista C-200 Firmware -
Arista C-230 Firmware -
Arista C-235 Firmware -
Arista C-250 Firmware -
Arista C-260 Firmware -
Arista C-65 Firmware -
Arista C-75 Firmware -
Arista O-105 Firmware -
Arista O-90 Firmware -
Arista W-118 Firmware -
Arista W-68 Firmware -
Cisco 1100 Firmware -
Cisco 1100-4p Firmware -
Cisco 1100-8p Firmware -
Cisco 1101-4p Firmware -
3.3
CVSSv2
CVE-2020-26140
An issue exists in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.
Alfa Awus036h Firmware 6.1316.1209
Siemens Scalance W1748-1 Firmware -
Siemens Scalance W1750d Firmware -
Siemens Scalance W1788-1 Firmware -
Siemens Scalance W1788-2 Firmware -
Siemens Scalance W1788-2ia Firmware -
Siemens Scalance W721-1 Firmware -
Siemens Scalance W722-1 Firmware -
Siemens Scalance W734-1 Firmware -
Siemens Scalance W738-1 Firmware -
Siemens Scalance W748-1 Firmware -
Siemens Scalance W761-1 Firmware -
Siemens Scalance W774-1 Firmware -
Siemens Scalance W778-1 Firmware -
Siemens Scalance W786-1 Firmware -
Siemens Scalance W786-2 Firmware -
Siemens Scalance W786-2ia Firmware -
Siemens Scalance W788-1 Firmware -
Siemens Scalance W788-2 Firmware -
Siemens Scalance Wam763-1 Firmware -
Siemens Scalance Wam766-1 Firmware -
Siemens Scalance Wam766-1 6ghz Firmware -
2.9
CVSSv2
CVE-2020-24588
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is ...
Ieee Ieee 802.11
Linux Mac80211 -
Microsoft Windows Server 2008 R2
Microsoft Windows 10 1607
Microsoft Windows 8.1 -
Microsoft Windows Server 2016 -
Microsoft Windows Server 2008 -
Microsoft Windows 7 -
Microsoft Windows Rt 8.1 -
Microsoft Windows Server 2012 -
Microsoft Windows 10 -
Microsoft Windows 10 1803
Microsoft Windows Server 2019 -
Microsoft Windows 10 1809
Microsoft Windows 10 1909
Microsoft Windows 10 2004
Microsoft Windows Server 2016 2004
Microsoft Windows 10 20h2
Debian Debian Linux 9.0
Siemens Scalance W1748-1 Firmware -
Siemens Scalance W1750d Firmware -
Siemens Scalance W1788-1 Firmware -
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »