article thumbnail

ISaPWN – research on the security of ISaGRAF Runtime

SecureList

The following potential vectors of attacks on ISaGRAF-based devices have been identified: A remote unauthenticated attacker could execute privileged commands of the IXL service on devices with ISaGRAF Runtime versions released before 2010. A remote attacker could easily implement a password brute force attack in ISaGRAF Runtime.

article thumbnail

Router security in 2021

SecureList

Number of router vulnerabilities according to cve.mitre.org, 2010–2022 ( download ). Number of router vulnerabilities according to nvd.nist.gov, 2010–2022 ( download ). Use proper encryption. Make sure to update the firmware. The cybercriminals infected WatchGuard and Asus devices with the Cyclops Blink malware.

DDOS 88
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

WizCase Report: Vulnerabilities found in WD My Book, NetGear Stora, SeaGate Home, Medion LifeCloud NAS

Security Affairs

CVE-2018-18472 – XXE and Unauthenticated Remote Command Execution in Axentra Hipserv NAS firmware. . It’s used in different devices from different vendors, the affected devices sharing the firmware are: Netgear Stora. The company provides a firmware with a web interface that mainly uses PHP as a serverside language.

article thumbnail

Millions of Arris routers are vulnerable to path traversal attacks

Malwarebytes

This web server is present in Arris firmware which can be found in several router models. last official release 2010) has a path traversal vulnerability. Unfortunately the Arris firmware is based on the vulnerable version of muhttpd. The usernames and (sometimes encrypted) passwords of all administration accounts on the system.

Firmware 143
article thumbnail

Millions of Arris routers are vulnerable to path traversal attacks

Malwarebytes

This web server is present in Arris firmware which can be found in several router models. last official release 2010) has a path traversal vulnerability. Unfortunately the Arris firmware is based on the vulnerable version of muhttpd. The usernames and (sometimes encrypted) passwords of all administration accounts on the system.

article thumbnail

The Hacker Mind Podcast: Hacking Teslas

ForAllSecure

Certainly no one uses 40 bit encryption anymore. Vamosi: I first became aware of Martin's work back in 2010 when I was writing when gadgets betray us, Martin had observed that certain manufacturers were using fixed pins such as 000 to make it easier for customers to pair their mobile devices with their cars. Very unlikely. Vamosi: Aha.

Hacking 52
article thumbnail

The Hacker Mind Podcast: Hacking Voting Systems

ForAllSecure

In 2010, she was interviewed by O'Reilly Media. Halderman : In 2010, Washington D.C. Among the many reasons, money, and with state budgets tight, she suggested back in 2010 that such an expense could be better spent to secure more of the voting process. Alex Halderman, a professor who was then with the University of Michigan.

Hacking 52