Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
wireless control system vulnerabilities and exploits
(subscribe to this query)
9
CVSSv2
CVE-2017-15043
A vulnerability in Sierra Wireless AirLink GX400, GX440, ES440, and LS300 routers with firmware prior to 4.4.5 and GX450, ES450, RV50, RV50X, MP70, and MP70E routers with firmware prior to 4.9 could allow an authenticated remote malicious user to execute arbitrary code and gain f...
Sierrawireless Gx440 Firmware
Sierrawireless Es440 Firmware
Sierrawireless Ls300 Firmware
Sierrawireless Gx400 Firmware
Sierrawireless Es450 Firmware
Sierrawireless Rv50 Firmware
Sierrawireless Rv50x Firmware
Sierrawireless Mp70 Firmware
Sierrawireless Mp70e Firmware
Sierrawireless Gx450 Firmware
3.3
CVSSv2
CVE-2019-0136
Insufficient access control in the Intel(R) PROSet/Wireless WiFi Software driver before version 21.10 may allow an unauthenticated user to potentially enable denial of service via adjacent access.
Intel Proset\\/wireless Wifi
2.9
CVSSv2
CVE-2020-24588
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is ...
Ieee Ieee 802.11
Linux Mac80211 -
Microsoft Windows Server 2008 R2
Microsoft Windows 10 1607
Microsoft Windows 8.1 -
Microsoft Windows Server 2016 -
Microsoft Windows Server 2008 -
Microsoft Windows 7 -
Microsoft Windows Rt 8.1 -
Microsoft Windows Server 2012 -
Microsoft Windows 10 -
Microsoft Windows 10 1803
Microsoft Windows Server 2019 -
Microsoft Windows 10 1809
Microsoft Windows 10 1909
Microsoft Windows 10 2004
Microsoft Windows Server 2016 2004
Microsoft Windows 10 20h2
Debian Debian Linux 9.0
Siemens Scalance W1748-1 Firmware -
Siemens Scalance W1750d Firmware -
Siemens Scalance W1788-1 Firmware -
1.8
CVSSv2
CVE-2020-24587
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device se...
Ieee Ieee 802.11
Linux Mac80211 -
Debian Debian Linux 9.0
Arista C-100 Firmware -
Arista C-110 Firmware -
Arista C-120 Firmware -
Arista C-130 Firmware -
Arista C-200 Firmware -
Arista C-230 Firmware -
Arista C-235 Firmware -
Arista C-250 Firmware -
Arista C-260 Firmware -
Arista C-65 Firmware -
Arista C-75 Firmware -
Arista O-105 Firmware -
Arista O-90 Firmware -
Arista W-118 Firmware -
Arista W-68 Firmware -
Cisco 1100 Firmware -
Cisco 1100-4p Firmware -
Cisco 1100-8p Firmware -
Cisco 1101-4p Firmware -
2.9
CVSSv2
CVE-2020-24586
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragm...
Ieee Ieee 802.11
Debian Debian Linux 9.0
Linux Mac80211 -
Arista C-250 Firmware
Arista C-260 Firmware
Arista C-230 Firmware
Arista C-235 Firmware
Arista C-200 Firmware
Intel Ax210 Firmware
Intel Ax201 Firmware
Intel Ax200 Firmware
Intel Ac 9560 Firmware
Intel Ac 9462 Firmware
Intel Ac 9461 Firmware
Intel Ac 9260 Firmware
Intel Ac 8265 Firmware
Intel Ac 8260 Firmware
Intel Ac 3168 Firmware
Intel Ac 7265 Firmware
Intel Ac 3165 Firmware
Intel Ax1675 Firmware -
Intel Ax1650 Firmware -
5
CVSSv2
CVE-2014-3569
The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 0.9.8zc, 1.0.0o, and 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote malicious users to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected ...
Openssl Openssl 1.0.1j
3.3
CVSSv2
CVE-2020-26141
An issue exists in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that s...
Alfa Awus036h Firmware 6.1316.1209
Cisco Meraki Gr10 Firmware
Cisco Meraki Gr60 Firmware
Cisco Meraki Mr20 Firmware
Cisco Meraki Mr30h Firmware
Cisco Meraki Mr33 Firmware
Cisco Meraki Mr36 Firmware
Cisco Meraki Mr42 Firmware
Cisco Meraki Mr42e Firmware
Cisco Meraki Mr44 Firmware
Cisco Meraki Mr45 Firmware
Cisco Meraki Mr46 Firmware
Cisco Meraki Mr46e Firmware
Cisco Meraki Mr52 Firmware
Cisco Meraki Mr53 Firmware
Cisco Meraki Mr53e Firmware
Cisco Meraki Mr55 Firmware
Cisco Meraki Mr56 Firmware
Cisco Meraki Mr70 Firmware
Cisco Meraki Mr74 Firmware
Cisco Meraki Mr76 Firmware
Cisco Meraki Mr84 Firmware
3.2
CVSSv2
CVE-2020-26147
An issue exists in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragment...
Linux Linux Kernel
Debian Debian Linux 9.0
Arista C-75 Firmware -
Arista O-90 Firmware -
Arista C-65 Firmware -
Arista W-68 Firmware -
Siemens Scalance W700 Ieee 802.11n Firmware
Siemens Scalance W1700 Ieee 802.11ac Firmware
7.5
CVSSv2
CVE-2004-0056
Multiple vulnerabilities in the H.323 protocol implementation for Nortel Networks Business Communications Manager (BCM), Succession 1000 IP Trunk and IP Peer Networking, and 802.11 Wireless IP Gateway allow remote malicious users to cause a denial of service and possibly execute ...
Nortel 802.11 Wireless Ip Gateway
Nortel Business Communications Manager
Nortel Succession Communication Server 1000
2.9
CVSSv2
CVE-2020-26139
An issue exists in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected...
Netbsd Netbsd 7.1
Debian Debian Linux 9.0
Arista C-100 Firmware -
Arista C-110 Firmware -
Arista C-120 Firmware -
Arista C-130 Firmware -
Arista C-200 Firmware -
Arista C-230 Firmware -
Arista C-235 Firmware -
Arista C-250 Firmware -
Arista C-260 Firmware -
Arista C-65 Firmware -
Arista C-75 Firmware -
Arista O-105 Firmware -
Arista O-90 Firmware -
Arista W-118 Firmware -
Arista W-68 Firmware -
Cisco 1100 Firmware -
Cisco 1100-4p Firmware -
Cisco 1100-8p Firmware -
Cisco 1101-4p Firmware -
Cisco 1109-2p Firmware -
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
client side
CVE-2023-31889
template injection
CVE-2024-4304
CVE-2006-4304
CVE-2024-33272
type confusion
CVE-2024-21345
CVE-2024-33271
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »