In JUUKO K-808, an attacker could specially craft a packet that encodes an arbitrary command, which could be executed on the K-808 (Firmware versions prior to numbers ending ...9A, ...9B, ...9C, etc.).
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-20-301-01 |
History
No history.
MITRE
Status: PUBLISHED
Assigner: icscert
Published: 2020-11-02T16:48:15
Updated: 2024-08-05T11:23:08.925Z
Reserved: 2018-11-06T00:00:00
Link: CVE-2018-19025
Vulnrichment
No data.
NVD
Status : Analyzed
Published: 2020-11-02T21:15:13.617
Modified: 2020-11-12T20:20:36.727
Link: CVE-2018-19025
Redhat
No data.