Remove Authentication Remove Blog Remove Firmware
article thumbnail

PTZOptics cameras zero-days actively exploited in the wild

Security Affairs

Affected devices use VHD PTZ camera firmware < 6.3.40 is an inadequate authentication mechanisms that could allow an attacker to access sensitive information like usernames, MD5 password hashes, and configuration data. . “Organizations using VHD PTZ camera firmware < 6.3.40 CVE-2024-8957 (CVSS score of CVSS 7.2)

Firmware 121
article thumbnail

U.S. CISA adds PTZOptics camera bugs to its Known Exploited Vulnerabilities catalog

Security Affairs

Affected devices use VHD PTZ camera firmware < 6.3.40 is an inadequate authentication mechanisms that could allow an attacker to access sensitive information like usernames, MD5 password hashes, and configuration data. Organizations using VHD PTZ camera firmware < 6.3.40 reads the analysis published by GreyNoise.

Firmware 125
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Over 9,000 Routers Hijacked: ASUS Users Caught in Ongoing Cyber Operation

eSecurity Planet

They also used two additional authentication bypass techniques that havent been assigned official CVE numbers yet. Stored the backdoor in NVRAM, a memory that survives both reboots and firmware updates. Once compromised, attackers maintain control regardless of whether the device is rebooted or updated with new firmware.

article thumbnail

Threat actors attempt to exploit a flaw in Four-Faith routers

Security Affairs

“At least firmware version 2.0 allows authenticated and remote attackers to execute arbitrary OS commands over HTTP when modifying the system time via apply.cgi.” ” VulnCheck researchers reported that authenticated attackers exploited default router credentials to execute unauthenticated remote command injections.

article thumbnail

FIPS 140-3 and You, Part Three

Thales Cloud Protection & Licensing

FIPS 140-3 and You, Part Three divya Thu, 06/05/2025 - 07:00 Last spring, in the second installment of this blog series, we were excited to announce that our Luna HSM product line was the first HSM in the industry to achieve FIPS 140-3 level 3 validation certificate. It's important to begin your transition from FIPS 140-2 to FIPS 140-3 now.

article thumbnail

Kali Linux 2025.2 Release (Kali Menu Refresh, BloodHound CE & CARsenal)

Kali Linux

updates BloodHound Community Edition - Major upgrade with full set of ingestors Kali NetHunter Smartwatch Wi-Fi Injection - TicWatch Pro 3 now able to de-authenticate and capture WPA2 handshakes Kali NetHunter CARsenal - Car hacking tool set! The summary of the changelog since the 2025.1 Check out the install guide. We’ve got you!

VPN 103
article thumbnail

Fully segregated networks? Your dual-homed devices might disagree

Pen Test Partners

In this blog post, I look at a recent OT / ICS engagement with a Critical National Infrastructure (CNI) client, which shows why dual-homed devices can be valuable targets for attackers. My colleague Andrew recently published a blog post on this topic , its worth a read. What is a dual-homed device?