Product:

Uc\-8210\-T\-Lx\-S_firmware

(Moxa)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 2
Date Id Summary Products Score Patch Annotated
2022-12-02 CVE-2022-3086 Cradlepoint IBR600 NCOS versions 6.5.0.160bc2e and prior are vulnerable to shell escape, which enables local attackers with non-superuser credentials to gain full, unrestrictive shell access which may allow an attacker to execute arbitrary code. Uc\-2101\-Lx_firmware, Uc\-2102\-Lx_firmware, Uc\-2104\-Lx_firmware, Uc\-2111\-Lx_firmware, Uc\-2112\-Lx_firmware, Uc\-2114\-T\-Lx_firmware, Uc\-2116\-T\-Lx_firmware, Uc\-3101\-T\-Ap\-Lx_firmware, Uc\-3101\-T\-Eu\-Lx_firmware, Uc\-3101\-T\-Us\-Lx_firmware, Uc\-3111\-T\-Ap\-Lx\-Nw_firmware, Uc\-3111\-T\-Ap\-Lx_firmware, Uc\-3111\-T\-Eu\-Lx\-Nw_firmware, Uc\-3111\-T\-Eu\-Lx_firmware, Uc\-3111\-T\-Us\-Lx\-Nw_firmware, Uc\-3111\-T\-Us\-Lx_firmware, Uc\-3121\-T\-Ap\-Lx_firmware, Uc\-3121\-T\-Eu\-Lx_firmware, Uc\-3121\-T\-Us\-Lx_firmware, Uc\-5101\-Lx_firmware, Uc\-5101\-T\-Lx_firmware, Uc\-5102\-Lx_firmware, Uc\-5102\-T\-Lx_firmware, Uc\-5111\-Lx_firmware, Uc\-5111\-T\-Lx_firmware, Uc\-5112\-Lx_firmware, Uc\-5112\-T\-Lx_firmware, Uc\-8112\-Lx_firmware, Uc\-8112a\-Me\-T\-Lx_firmware, Uc\-8131\-Lx_firmware, Uc\-8132\-Lx_firmware, Uc\-8162\-Lx_firmware, Uc\-8210\-T\-Lx\-S_firmware, Uc\-8220\-T\-Lx\-Ap\-S_firmware, Uc\-8220\-T\-Lx\-Eu\-S_firmware, Uc\-8220\-T\-Lx\-Us\-S_firmware, Uc\-8220\-T\-Lx_firmware, Uc\-8410a\-Lx_firmware, Uc\-8410a\-Nw\-Lx_firmware, Uc\-8410a\-Nw\-T\-Lx_firmware, Uc\-8410a\-T\-Lx_firmware, Uc\-8540\-Lx_firmware, Uc\-8540\-T\-Ct\-Lx_firmware, Uc\-8540\-T\-Lx_firmware, Uc\-8580\-Lx_firmware, Uc\-8580\-Q\-Lx_firmware, Uc\-8580\-T\-Ct\-Lx_firmware, Uc\-8580\-T\-Ct\-Q\-Lx_firmware, Uc\-8580\-T\-Lx_firmware, Uc\-8580\-T\-Q\-Lx_firmware 7.6
2023-03-07 CVE-2023-1257 An attacker with physical access to the affected Moxa UC Series devices can initiate a restart of the device and gain access to its BIOS. Command line options can then be altered, allowing the attacker to access the terminal. From the terminal, the attacker can modify the device’s authentication files to create a new user and gain full access to the system. Uc\-2101\-Lx_firmware, Uc\-2102\-Lx_firmware, Uc\-2102\-T\-Lx_firmware, Uc\-2104\-Lx_firmware, Uc\-2111\-Lx_firmware, Uc\-2112\-Lx_firmware, Uc\-2114\-T\-Lx_firmware, Uc\-2116\-T\-Lx_firmware, Uc\-3101\-T\-Ap\-Lx_firmware, Uc\-3101\-T\-Eu\-Lx_firmware, Uc\-3101\-T\-Us\-Lx_firmware, Uc\-3111\-T\-Ap\-Lx\-Nw_firmware, Uc\-3111\-T\-Ap\-Lx_firmware, Uc\-3111\-T\-Eu\-Lx\-Nw_firmware, Uc\-3111\-T\-Eu\-Lx_firmware, Uc\-3111\-T\-Us\-Lx\-Nw_firmware, Uc\-3111\-T\-Us\-Lx_firmware, Uc\-3121\-T\-Ap\-Lx_firmware, Uc\-3121\-T\-Eu\-Lx_firmware, Uc\-3121\-T\-Us\-Lx_firmware, Uc\-5101\-Lx_firmware, Uc\-5101\-T\-Lx_firmware, Uc\-5102\-Lx_firmware, Uc\-5102\-T\-Lx_firmware, Uc\-5111\-Lx_firmware, Uc\-5111\-T\-Lx_firmware, Uc\-5112\-Lx_firmware, Uc\-5112\-T\-Lx_firmware, Uc\-8112\-Lx_firmware, Uc\-8112\-Me\-T\-Lx1_firmware, Uc\-8112\-Me\-T\-Lx_firmware, Uc\-8112a\-Me\-T\-Lx_firmware, Uc\-8131\-Lx_firmware, Uc\-8132\-Lx_firmware, Uc\-8162\-Lx_firmware, Uc\-8210\-T\-Lx\-S_firmware, Uc\-8220\-T\-Lx\-Ap\-S_firmware, Uc\-8220\-T\-Lx\-Eu\-S_firmware, Uc\-8220\-T\-Lx\-S_firmware, Uc\-8220\-T\-Lx\-Us\-S_firmware, Uc\-8220\-T\-Lx_firmware, Uc\-8410a\-Lx_firmware, Uc\-8410a\-Nw\-Lx_firmware, Uc\-8410a\-Nw\-T\-Lx_firmware, Uc\-8410a\-T\-Lx_firmware, Uc\-8540\-Lx_firmware, Uc\-8540\-T\-Ct\-Lx_firmware, Uc\-8540\-T\-Lx_firmware, Uc\-8580\-Lx_firmware, Uc\-8580\-Q\-Lx_firmware, Uc\-8580\-T\-Ct\-Lx_firmware, Uc\-8580\-T\-Ct\-Q\-Lx_firmware, Uc\-8580\-T\-Lx_firmware, Uc\-8580\-T\-Q\-Lx_firmware 6.8