Filtered by vendor Hinet Subscriptions
Filtered by product Hicos Natural Person Credential Component Client Subscriptions
Total 5 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2022-32959 1 Hinet 1 Hicos Natural Person Credential Component Client 2024-09-17 6.8 Medium
HiCOS’ client-side citizen digital certificate component has a stack-based buffer overflow vulnerability when reading IC card due to insufficient parameter length validation for OS information. An unauthenticated physical attacker can exploit this vulnerability to execute arbitrary code, manipulate system data or terminate service.
CVE-2022-35222 1 Hinet 1 Hicos Natural Person Credential Component Client 2024-09-16 6.8 Medium
HiCOS Citizen verification component has a stack-based buffer overflow vulnerability due to insufficient parameter length validation. An unauthenticated physical attacker can exploit this vulnerability to execute arbitrary code, manipulate system command or disrupt service.
CVE-2022-32962 1 Hinet 1 Hicos Natural Person Credential Component Client 2024-09-16 6.8 Medium
HiCOS’ client-side citizen certificate component has a double free vulnerability. An unauthenticated physical attacker can exploit this vulnerability to corrupt memory and execute arbitrary code, manipulate system data or terminate service.
CVE-2022-32961 1 Hinet 1 Hicos Natural Person Credential Component Client 2024-09-16 6.8 Medium
HICOS’ client-side citizen digital certificate component has a stack-based buffer overflow vulnerability when reading IC card due to insufficient parameter length validation for token information. An unauthenticated physical attacker can exploit this vulnerability to execute arbitrary code, manipulate system data or terminate service.
CVE-2022-32960 1 Hinet 1 Hicos Natural Person Credential Component Client 2024-09-16 6.8 Medium
HiCOS’ client-side citizen digital certificate component has a stack-based buffer overflow vulnerability when reading IC card due to insufficient parameter length validation for card number. An unauthenticated physical attacker can exploit this vulnerability to execute arbitrary code, manipulate system data or terminate service.