Unspecified vulnerability in Secure Elements Class 5 AVR client and server (aka C5 EVM) before 2.8.1 allows authenticated attackers to overwrite arbitrary files (1) on a server during an update or (2) on a client via modified pathnames, possibly due to a directory traversal issue.
Max CVSS
4.0
EPSS Score
0.15%
Published
2006-05-31
Updated
2017-07-20
Secure Elements Class 5 AVR server (aka C5 EVM) before 2.8.1 uses a hard-coded user ID and password, which allows remote attackers to gain access to the server.
Max CVSS
7.5
EPSS Score
3.84%
Published
2006-05-31
Updated
2017-07-20
The Administration Console in Secure Elements Class 5 AVR (aka C5 EVM) before 2.8.1 does not enforce access control, which allows remote attackers to gain access to servers via the console.
Max CVSS
7.5
EPSS Score
2.73%
Published
2006-05-31
Updated
2017-07-20
Secure Elements Class 5 AVR client (aka C5 EVM) before 2.8.1 does not validate the CEID of an incoming message, which allows remote attackers to send messages to a protected asset without knowing the proper CEID.
Max CVSS
5.0
EPSS Score
3.46%
Published
2006-05-31
Updated
2017-07-20
Secure Elements Class 5 AVR client (aka C5 EVM) before 2.8.1 generates predictable CEIDs, which allows remote attackers to determine the CEID of a protected asset, which can be used in other attacks against AVR.
Max CVSS
5.0
EPSS Score
2.47%
Published
2006-05-31
Updated
2017-07-20
Secure Elements Class 5 AVR server (aka C5 EVM) before 2.8.1 allows remote attackers to cause an unspecified denial of service via a large number of forged client registration messages.
Max CVSS
5.0
EPSS Score
2.23%
Published
2006-05-31
Updated
2017-07-20
Secure Elements Class 5 AVR server and client (aka C5 EVM) before 2.8.1 send messages in cleartext, which allows remote attackers to read sensitive vulnerability information.
Max CVSS
5.0
EPSS Score
1.05%
Published
2006-05-31
Updated
2017-07-20
7 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!