Arris SURFboard SBG6950AC2 Arbitrary Command Execution Vulnerability

EIP-7777417a

An arbitrary command execution vulnerability exists in Arris SURFboard SBG6950AC2 devices. An unauthenticated attacker can exploit this vulnerability to achieve code execution as root.

Vulnerability Identifier

  • Exodus Intelligence: EIP-7777417a
  • MITRE: CVE-2024-23618

Vulnerability Metrics

  • CVSSv2 Vector: AV:A/AC:L/Au:N/C:C/I:C/A:C
  • CVSSv2 Score: 8.3

Vendor References

  • The vendor has applied fixes in newer revisions of the firmware.

Discovery Credit

  • Exodus Intelligence

Disclosure Timeline

  • Disclosed to vendor: June 17, 2021
  • Vendor response to disclosure: June 21, 2021
  • Disclosed to public: January 25, 2024

Further Information

Readers of this advisory who are interested in receiving further details around the vulnerability, mitigations, detection guidance, and more can contact us at sales@exodusintel.com

IBM Merge Healthcare eFilm Workstation Hardcoded Credentials

EIP-ec3c5a9d

A hardcoded credential vulnerability exists in IBM Merge Healthcare eFilm Workstation. A remote, unauthenticated attacker can exploit this vulnerability to achieve information disclosure or remote code execution.

Vulnerability Identifier

  • Exodus Intelligence: EIP-ec3c5a9d
  • MITRE: CVE-2024-23619

Vulnerability Metrics

  • CVSSv2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
  • CVSSv2 Score: 10.0

Vendor References

  • The affected product is end-of-life and no patches are available.

Discovery Credit

  • Exodus Intelligence

Disclosure Timeline

  • Disclosed to vendor: July 30, 2021
  • Vendor response to disclosure: August 23, 2021
  • Disclosed to public: January 25, 2024

Further Information

Readers of this advisory who are interested in receiving further details around the vulnerability, mitigations, detection guidance, and more can contact us at sales@exodusintel.com

IBM Merge Healthcare eFilm Workstation License Server Buffer Overflow

EIP-96bd11d3

A buffer overflow exists in IBM Merge Healthcare eFilm Workstation license server. A remote, unauthenticated attacker can exploit this vulnerability to achieve remote code execution.

Vulnerability Identifier

  • Exodus Intelligence: EIP-96bd11d3
  • MITRE: CVE-2024-23621

Vulnerability Metrics

  • CVSSv2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
  • CVSSv2 Score: 10.0

Vendor References

  • The affected product is end-of-life and no patches are available.

Discovery Credit

  • Exodus Intelligence

Disclosure Timeline

  • Disclosed to vendor: July 30, 2021
  • Vendor response to disclosure: August 23, 2021
  • Disclosed to public: January 25, 2024

Further Information

Readers of this advisory who are interested in receiving further details around the vulnerability, mitigations, detection guidance, and more can contact us at sales@exodusintel.com

IBM Merge Healthcare eFilm Workstation License Server CopySLS_Request3 Buffer Overflow

EIP-21c968fc

A stack-based buffer overflow exists in IBM Merge Healthcare eFilm Workstation license server. A remote, unauthenticated attacker can exploit this vulnerability to achieve remote code execution with SYSTEM privileges.

Vulnerability Identifier

  • Exodus Intelligence: EIP-21c968fc
  • MITRE: CVE-2024-23622

Vulnerability Metrics

  • CVSSv2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
  • CVSSv2 Score: 10.0

Vendor References

  • The affected product is end-of-life and no patches are available.

Discovery Credit

  • Exodus Intelligence

Disclosure Timeline

  • Disclosed to vendor: July 30, 2021
  • Vendor response to disclosure: August 23, 2021
  • Disclosed to public: January 25, 2024

Further Information

Readers of this advisory who are interested in receiving further details around the vulnerability, mitigations, detection guidance, and more can contact us at sales@exodusintel.com

IBM Merge Healthcare eFilm Workstation SYSTEM Privilege Escalation

EIP-ac73ca7c

An improper privilege management vulnerability exists in IBM Merge Healthcare eFilm Workstation. A local, authenticated attacker can exploit this vulnerability to escalate privileges to SYSTEM.

Vulnerability Identifier

  • Exodus Intelligence: EIP-ac73ca7c
  • MITRE: CVE-2024-23620

Vulnerability Metrics

  • CVSSv2 Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C
  • CVSSv2 Score: 6.8

Vendor References

  • The affected product is end-of-life and no patches are available.

Discovery Credit

  • Exodus Intelligence

Disclosure Timeline

  • Disclosed to vendor: July 30, 2021
  • Vendor response to disclosure: August 23, 2021
  • Disclosed to public: January 25, 2024

Further Information

Readers of this advisory who are interested in receiving further details around the vulnerability, mitigations, detection guidance, and more can contact us at sales@exodusintel.com

Symantec Deployment Solution axengine.exe Buffer Overflow Remote Code Execution

EIP-6cce200a

A buffer overflow vulnerability exists in Symantec Deployment Solution version 7.9. A remote, anonymous attacker can exploit this vulnerability to achieve remote code execution as SYSTEM.

Vulnerability Identifier

  • Exodus Intelligence: EIP-6cce200a
  • MITRE: CVE-2024-23613

Vulnerability Metrics

  • CVSSv2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
  • CVSSv2 Score: 9.3

Vendor References

  • The affected product is end-of-life and no patches are available.

Discovery Credit

  • Exodus Intelligence

Disclosure Timeline

  • Disclosed to vendor: August 11, 2021
  • Vendor response to disclosure: July 17, 2022
  • Disclosed to public: January 25, 2024

Further Information

Readers of this advisory who are interested in receiving further details around the vulnerability, mitigations, detection guidance, and more can contact us at sales@exodusintel.com

Symantec Messaging Gateway libdec2lha.so Stack Buffer Overflow Remote Code Execution

EIP-a9e61262

A stack buffer overflow exists in Symantec Messaging Gateway in versions 9.5 and before. A remote, anonymous attacker can exploit this vulnerability to achieve remote code execution.

Vulnerability Identifier

  • Exodus Intelligence: EIP-a9e61262
  • MITRE: CVE-2024-23615

Vulnerability Metrics

  • CVSSv2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
  • CVSSv2 Score: 10.0

Vendor References

  • The affected product is end-of-life and no patches are available.

Discovery Credit

  • Exodus Intelligence

Disclosure Timeline

  • Disclosed to vendor: August 11, 2021
  • Vendor response to disclosure: June 17, 2022
  • Disclosed to public: January 25, 2024

Further Information

Readers of this advisory who are interested in receiving further details around the vulnerability, mitigations, detection guidance, and more can contact us at sales@exodusintel.com

Symantec Data Loss Prevention wp6sr.dll Stack Buffer Overflow Remote Code Execution

EIP-17a47dc2

A stack buffer overflow exists in Symantec Data Loss Prevention versions 14.0.2 and before. A remote, unauthenticated attacker can exploit this vulnerability by enticing a user to open a specifically crafted document to achieve remote code execution.

Vulnerability Identifier

  • Exodus Intelligence: EIP-17a47dc2
  • MITRE: CVE-2024-23617

Vulnerability Metrics

  • CVSSv2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
  • CVSSv2 Score: 9.3

Vendor References

  • The affected product is end-of-life and no patches are available.

Discovery Credit

  • Exodus Intelligence

Disclosure Timeline

  • Disclosed to vendor: August 11, 2021
  • Vendor response to disclosure: June 17, 2022
  • Disclosed to public: January 25, 2024

Further Information

Readers of this advisory who are interested in receiving further details around the vulnerability, mitigations, detection guidance, and more can contact us at sales@exodusintel.com

Symantec Server Management Suite axengine.exe Buffer Overflow Remote Code Execution

EIP-91da78e7

A buffer overflow vulnerability exists in Symantec Server Management Suite version 7.9 and before. A remote, anonymous attacker can exploit this vulnerability to achieve remote code execution as SYSTEM.

Vulnerability Identifier

  • Exodus Intelligence: EIP-91da78e7
  • MITRE: CVE-2024-23616

Vulnerability Metrics

  • CVSSv2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C
  • CVSSv2 Score: 10.0

Vendor References

  • The affected product is end-of-life and no patches are available.

Discovery Credit

  • Exodus Intelligence

Disclosure Timeline

  • Disclosed to vendor: August 11, 2021
  • Vendor response to disclosure: June 17, 2022
  • Disclosed to public: January 25, 2024

Further Information

Readers of this advisory who are interested in receiving further details around the vulnerability, mitigations, detection guidance, and more can contact us at sales@exodusintel.com

Symantec Messaging Gateway wp6sr.so Stack Buffer Overflow Remote Code Execution

EIP-1e5e28b3

A stack buffer overflow exists in Symantec Messaging Gateway in versions 9.5 and before. A remote, anonymous attacker can exploit this vulnerability to achieve remote code execution.

Vulnerability Identifier

  • Exodus Intelligence: EIP-1e5e28b3
  • MITRE: CVE-2024-23614

Vulnerability Metrics

  • CVSSv2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:N
  • CVSSv2 Score: 9.4

Vendor References

  • The affected product is end-of-life and no patches are available.

Discovery Credit

  • Exodus Intelligence

Disclosure Timeline

  • Disclosed to vendor: August 11, 2021
  • Vendor response to disclosure: September 27, 2021
  • Disclosed to public: January 25, 2024

Further Information

Readers of this advisory who are interested in receiving further details around the vulnerability, mitigations, detection guidance, and more can contact us at sales@exodusintel.com