Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
verizon wireless network extender scs-2u01 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2013-4877
The Verizon Wireless Network Extender SCS-26UC4 and SCS-2U01 does not use CAVE authentication, which makes it easier for remote malicious users to obtain ESN and MIN values from arbitrary phones, and conduct cloning attacks, by sniffing the network for registration packets.
Verizon Wireless Network Extender Scs-26uc4
Verizon Wireless Network Extender Scs-2u01
NA
CVE-2013-4875
The Uboot bootloader on the Verizon Wireless Network Extender SCS-2U01 allows physically proximate malicious users to bypass the intended boot process and obtain a login prompt by connecting a crafted HDMI cable and sending a SysReq interrupt.
Verizon Wireless Network Extender Scs-2u01
NA
CVE-2013-4876
The Verizon Wireless Network Extender SCS-2U01 has a hardcoded password for the root account, which makes it easier for physically proximate malicious users to obtain administrative access by leveraging a login prompt.
Verizon Wireless Network Extender Scs-2u01
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started