Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cisco meraki mx67w firmware vulnerabilities and exploits
(subscribe to this query)
5.8
CVSSv3
CVE-2023-20071
Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote malicious user to bypass the configured policies on an affected system. This vulnerability is due to a flaw in the FTP module of the Snort detection e...
Cisco Firepower Threat Defense
Cisco Cyber Vision
Cisco Unified Threat Defense
Cisco Meraki Mx Security Appliance Firmware -
8.6
CVSSv3
CVE-2022-20933
A vulnerability in the Cisco AnyConnect VPN server of Cisco Meraki MX and Cisco Meraki Z3 Teleworker Gateway devices could allow an unauthenticated, remote malicious user to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient...
Cisco Meraki Mx64 Firmware
Cisco Meraki Mx64w Firmware
Cisco Meraki Mx65 Firmware
Cisco Meraki Mx65w Firmware
Cisco Meraki Mx67 Firmware
Cisco Meraki Mx67cw Firmware
Cisco Meraki Mx67w Firmware
Cisco Meraki Mx68 Firmware
Cisco Meraki Mx68cw Firmware
Cisco Meraki Mx68w Firmware
Cisco Meraki Mx75 Firmware
Cisco Meraki Mx84 Firmware
Cisco Meraki Mx85 Firmware
Cisco Meraki Mx95 Firmware
Cisco Meraki Mx100 Firmware
Cisco Meraki Mx105 Firmware
Cisco Meraki Mx250 Firmware
Cisco Meraki Mx400 Firmware
Cisco Meraki Mx450 Firmware
Cisco Meraki Mx600 Firmware
Cisco Meraki Vmx Firmware
Cisco Meraki Z3c Firmware -
6.5
CVSSv3
CVE-2020-26144
An issue exists on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext A-MSDU frames as long as the first 8 bytes correspond to a valid RFC1042 (i.e., LLC/SNAP) header for EAPOL. An adversary can abuse this to inject arbitrary netw...
Samsung Galaxy I9305 Firmware 4.4.4
Arista C-250 Firmware
Arista C-260 Firmware
Arista C-230 Firmware
Arista C-235 Firmware
Arista C-200 Firmware
Arista C-120 Firmware
Arista C-130 Firmware
Arista C-100 Firmware
Arista C-110 Firmware
Arista O-105 Firmware
Arista W-118 Firmware
Arista C-75 Firmware -
Arista O-90 Firmware -
Arista C-65 Firmware -
Arista W-68 Firmware -
Siemens Scalance W700 Ieee 802.11ax Firmware
Siemens Scalance W700 Ieee 802.11n Firmware
6.5
CVSSv3
CVE-2020-26145
An issue exists on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary netwo...
Samsung Galaxy I9305 Firmware 4.4.4
Siemens 6gk5763-1al00-7da0 Firmware
Siemens 6gk5766-1ge00-7da0 Firmware
Siemens 6gk5766-1ge00-7db0 Firmware
Siemens 6gk5766-1je00-7da0 Firmware
Siemens 6gk5766-1ge00-7ta0 Firmware
Siemens 6gk5766-1ge00-7tb0 Firmware
Siemens 6gk5766-1je00-7ta0 Firmware
Siemens 6gk5763-1al00-3aa0 Firmware
Siemens 6gk5763-1al00-3da0 Firmware
Siemens 6gk5766-1ge00-3da0 Firmware
Siemens 6gk5766-1ge00-3db0 Firmware
Siemens 6gk5766-1je00-3da0 Firmware
3.5
CVSSv3
CVE-2020-24586
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragm...
Ieee Ieee 802.11
Debian Debian Linux 9.0
Linux Mac80211 -
Arista C-250 Firmware
Arista C-260 Firmware
Arista C-230 Firmware
Arista C-235 Firmware
Arista C-200 Firmware
Intel Ax210 Firmware
Intel Ax201 Firmware
Intel Ax200 Firmware
Intel Ac 9560 Firmware
Intel Ac 9462 Firmware
Intel Ac 9461 Firmware
Intel Ac 9260 Firmware
Intel Ac 8265 Firmware
Intel Ac 8260 Firmware
Intel Ac 3168 Firmware
Intel Ac 7265 Firmware
Intel Ac 3165 Firmware
Intel Ax1675 Firmware -
Intel Ax1650 Firmware -
2.6
CVSSv3
CVE-2020-24587
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device se...
Ieee Ieee 802.11
Linux Mac80211 -
Debian Debian Linux 9.0
Arista C-100 Firmware -
Arista C-110 Firmware -
Arista C-120 Firmware -
Arista C-130 Firmware -
Arista C-200 Firmware -
Arista C-230 Firmware -
Arista C-235 Firmware -
Arista C-250 Firmware -
Arista C-260 Firmware -
Arista C-65 Firmware -
Arista C-75 Firmware -
Arista O-105 Firmware -
Arista O-90 Firmware -
Arista W-118 Firmware -
Arista W-68 Firmware -
Cisco 1100 Firmware -
Cisco 1100-4p Firmware -
Cisco 1100-8p Firmware -
Cisco 1101-4p Firmware -
3.5
CVSSv3
CVE-2020-24588
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is ...
Ieee Ieee 802.11
Linux Mac80211 -
Microsoft Windows Server 2008 R2
Microsoft Windows 10 1607
Microsoft Windows 8.1 -
Microsoft Windows Server 2016 -
Microsoft Windows Server 2008 -
Microsoft Windows 7 -
Microsoft Windows Rt 8.1 -
Microsoft Windows Server 2012 -
Microsoft Windows 10 -
Microsoft Windows 10 1803
Microsoft Windows Server 2019 -
Microsoft Windows 10 1809
Microsoft Windows 10 1909
Microsoft Windows 10 2004
Microsoft Windows Server 2016 2004
Microsoft Windows 10 20h2
Debian Debian Linux 9.0
Siemens Scalance W1748-1 Firmware -
Siemens Scalance W1750d Firmware -
Siemens Scalance W1788-1 Firmware -
5.3
CVSSv3
CVE-2020-26139
An issue exists in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected...
Netbsd Netbsd 7.1
Debian Debian Linux 9.0
Arista C-100 Firmware -
Arista C-110 Firmware -
Arista C-120 Firmware -
Arista C-130 Firmware -
Arista C-200 Firmware -
Arista C-230 Firmware -
Arista C-235 Firmware -
Arista C-250 Firmware -
Arista C-260 Firmware -
Arista C-65 Firmware -
Arista C-75 Firmware -
Arista O-105 Firmware -
Arista O-90 Firmware -
Arista W-118 Firmware -
Arista W-68 Firmware -
Cisco 1100 Firmware -
Cisco 1100-4p Firmware -
Cisco 1100-8p Firmware -
Cisco 1101-4p Firmware -
Cisco 1109-2p Firmware -
6.5
CVSSv3
CVE-2020-26140
An issue exists in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.
Alfa Awus036h Firmware 6.1316.1209
Siemens Scalance W1748-1 Firmware -
Siemens Scalance W1750d Firmware -
Siemens Scalance W1788-1 Firmware -
Siemens Scalance W1788-2 Firmware -
Siemens Scalance W1788-2ia Firmware -
Siemens Scalance W721-1 Firmware -
Siemens Scalance W722-1 Firmware -
Siemens Scalance W734-1 Firmware -
Siemens Scalance W738-1 Firmware -
Siemens Scalance W748-1 Firmware -
Siemens Scalance W761-1 Firmware -
Siemens Scalance W774-1 Firmware -
Siemens Scalance W778-1 Firmware -
Siemens Scalance W786-1 Firmware -
Siemens Scalance W786-2 Firmware -
Siemens Scalance W786-2ia Firmware -
Siemens Scalance W788-1 Firmware -
Siemens Scalance W788-2 Firmware -
Siemens Scalance Wam763-1 Firmware -
Siemens Scalance Wam766-1 Firmware -
Siemens Scalance Wam766-1 6ghz Firmware -
6.5
CVSSv3
CVE-2020-26141
An issue exists in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that s...
Alfa Awus036h Firmware 6.1316.1209
Cisco Meraki Gr10 Firmware
Cisco Meraki Gr60 Firmware
Cisco Meraki Mr20 Firmware
Cisco Meraki Mr30h Firmware
Cisco Meraki Mr33 Firmware
Cisco Meraki Mr36 Firmware
Cisco Meraki Mr42 Firmware
Cisco Meraki Mr42e Firmware
Cisco Meraki Mr44 Firmware
Cisco Meraki Mr45 Firmware
Cisco Meraki Mr46 Firmware
Cisco Meraki Mr46e Firmware
Cisco Meraki Mr52 Firmware
Cisco Meraki Mr53 Firmware
Cisco Meraki Mr53e Firmware
Cisco Meraki Mr55 Firmware
Cisco Meraki Mr56 Firmware
Cisco Meraki Mr70 Firmware
Cisco Meraki Mr74 Firmware
Cisco Meraki Mr76 Firmware
Cisco Meraki Mr84 Firmware
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-0044
client side
CVE-2021-47601
deserialization
CVE-2024-34994
encryption
CVE-2021-47609
CVE-2024-37079
CVE-2024-38608
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »