Summary
Detail | |||
---|---|---|---|
Vendor | Siemens | First view | 2021-05-11 |
Product | 6Gk5763-1Al00-3Da0 Firmware | Last view | 2022-10-11 |
Version | Type | Os | |
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
CPE Name | Affected CVE |
---|---|
cpe:2.3:o:siemens:6gk5763-1al00-3da0_firmware:-:*:*:*:*:*:*:* | 2 |
cpe:2.3:o:siemens:6gk5763-1al00-3da0_firmware:*:*:*:*:*:*:*:* | 1 |
Related : CVE
Date | Alert | Description | |
---|---|---|---|
0 | 2022-10-11 | CVE-2022-31765 | Affected devices do not properly authorize the change password function of the web interface. This could allow low privileged users to escalate their privileges. |
6.5 | 2021-05-11 | CVE-2020-26145 | An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept second (or subsequent) broadcast fragments even when sent in plaintext and process them as full unfragmented frames. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
100% (1) | CWE-20 | Improper Input Validation |