Summary
Detail | |||
---|---|---|---|
Vendor | Siemens | First view | 2021-05-11 |
Product | 6Gk5721-1Fc00-0Ab0 Firmware | Last view | 2022-10-11 |
Version | Type | Os | |
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
CPE Name | Affected CVE |
---|---|
cpe:2.3:o:siemens:6gk5721-1fc00-0ab0_firmware:-:*:*:*:*:*:rj45:* | 1 |
cpe:2.3:o:siemens:6gk5721-1fc00-0ab0_firmware:-:*:*:*:*:*:*:* | 1 |
Related : CVE
Date | Alert | Description | |
---|---|---|---|
8.8 | 2022-10-11 | CVE-2022-31765 | Affected devices do not properly authorize the change password function of the web interface. This could allow low privileged users to escalate their privileges. |
6.5 | 2021-05-11 | CVE-2020-26141 | An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
100% (1) | CWE-354 | Improper Validation of Integrity Check Value |