[DE] | [EN]
KS

> root@ks-dev:~#

// IT Security Engineer & Researcher | IoT Architect | Trainer | Lecturer

./about_me.sh

I'm Kevin Schaller, based in Heidelberg, Germany. With 15 years in the field, I've actively shaped the IoT security landscape from local to global scale. Whether I'm auditing architectures, reverse engineering, or breaking things in offensive security, my goal is to secure the ecosystem and making the world a safer place. I also pass on this mindset as a university lecturer and through hands-on workshops.

55
Total Advisories
CRIT:28| HIGH:4| MED:18| LOW:5|

cat /var/log/cve_discoveries.log

Sort:
CVE-2025-59787 AXIS/2N Improper Handling of Exceptional Conditions leads to Information Disclosure via HTTP 500 Errors
Medium

2N Access Commander application version 3.4.2 and prior returns HTTP 500 Internal Server Error responses when receiving malformed or manipulated requests, indicating improper handling of invalid input and potential security or availability impacts.

CVSS:CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
Affected:2N Access Commander 3.4.2 and prior.
CVE-2025-59786 AXIS/2N Insufficient Session Expiration allows Session Cookies to Remain Active after Logout
Medium

2N Access Commander version 3.4.2 and prior improperly invalidates session tokens, allowing multiple session cookies to remain active after logout in web application.

CVSS:CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
Affected:2N Access Commander 3.4.2 and prior.
CVE-2025-59785 AXIS/2N Insufficient Input Validation on API Endpoint allows Bypass of Backup Encryption Password Policy
Medium

Improper validation of API end-point in 2N Access Commander version 3.4.2 and prior allows attacker to bypass password policy for backup file encryption. This vulnerability can only be exploited after authenticating with administrator privileges.

CVSS:CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N
Affected:2N Access Commander 3.4.2 and prior.
CVE-2025-59784 AXIS/2N Log Pollution via Unsanitised API Parameters
Medium

2N Access Commander version 3.4.1 and prior is vulnerable to log pollution. Certain parameters sent over API may be included in the logs without prior validation or sanitisation. This vulnerability can only be exploited after authenticating with administrator privileges.

CVSS:CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
Affected:2N Access Commander 3.4.1 and prior.
CVE-2025-59783 AXIS/2N Authenticated OS Command Injection via API Endpoint for User Synchronization
High

API endpoint for user synchronization in 2N Access Commander version 3.4.1 did not have a sufficient input validation allowing for OS command injection. This vulnerability can only be exploited after authenticating with administrator privileges.

CVSS:CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Affected:2N Access Commander 3.4.1 and prior.
CVE-2025-12603 Azure Access BLU-IC Arbitrary Write to Timezone Configuration
Low

/etc/timezone can be Arbitrarily Written.

CVSS:CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L
Affected:BLU-IC2 through 1.19.5; BLU-IC4 through 1.19.5.
Mitigation:Upgrade the firmware to the most recent firmware version, at least 1.20.
CVE-2025-12602 Azure Access BLU-IC Arbitrary Write to Avahi Service Configuration
Low

/etc/avahi/services/z9.service can be Arbitrarily Written.

CVSS:CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L
Affected:BLU-IC2 through 1.19.5; BLU-IC4 through 1.19.5.
Mitigation:Upgrade the firmware to the most recent firmware version, at least 1.20.
CVE-2025-12601 Azure Access BLU-IC Denial of Service via SlowLoris Attack
Critical

Denial of Service Due to SlowLoris.

CVSS:CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Affected:BLU-IC2 through 1.19.5; BLU-IC4 through 1.19.5.
Mitigation:Upgrade the firmware to the most recent firmware version, at least 1.20.
CVE-2025-12600 Azure Access BLU-IC Web UI Malfunction via Unexpected Locale Setting
Critical

Web UI Malfunction when setting unexpected locale via API.

CVSS:CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Affected:BLU-IC2 through 1.19.5; BLU-IC4 through 1.19.5.
Mitigation:Upgrade the firmware to the most recent firmware version, at least 1.20.
CVE-2025-12599 Azure Access BLU-IC Shared Secrets for SDKSocket across Multiple Devices
Critical

Multiple Devices are Sharing the Same Secrets for SDKSocket (TCP/5000).

CVSS:CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Affected:BLU-IC2 through 1.19.5; BLU-IC4 through 1.19.5.
Mitigation:Upgrade the firmware to the most recent firmware version, at least 1.20.
CVE-2025-12554 Azure Access BLU-IC CVE-2025-12554
Medium

CVE-2025-12554. Details pending publication on NVD.

CVSS:CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L
Affected:BLU-IC2 through 1.19.5; BLU-IC4 through 1.19.5.
Mitigation:Upgrade the firmware to the most recent firmware version, at least 1.20.
CVE-2025-12553 Azure Access BLU-IC Email Server Certificate Verification Disabled
Critical

Email Server Certificate Verification Disabled.

CVSS:CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Affected:BLU-IC2 through 1.19.5; BLU-IC4 through 1.19.5.
Mitigation:Upgrade the firmware to the most recent firmware version, at least 1.20.
CVE-2025-12552 Azure Access BLU-IC CVE-2025-12552
Medium

CVE-2025-12552. Details pending publication on NVD.

CVSS:CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L
Affected:BLU-IC2 through 1.19.5; BLU-IC4 through 1.19.5.
Mitigation:Upgrade the firmware to the most recent firmware version, at least 1.20.
CVE-2025-12517 Azure Access BLU-IC Credits Page Not Matching Firmware Component Versions
Low

Credits Page not Matching Versions in Use in the Firmware.

CVSS:CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:P/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L
Affected:BLU-IC2 through 1.19.5; BLU-IC4 through 1.19.5.
Mitigation:Upgrade the firmware to the most recent firmware version, at least 1.20.
CVE-2025-12516 Azure Access BLU-IC Lack of Graceful Error Handling via HTTP 5xx Errors
Critical

Lack of Graceful Error Handling - HTTP 5xx Error.

CVSS:CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Affected:BLU-IC2 through 1.19.5; BLU-IC4 through 1.19.5.
Mitigation:Upgrade the firmware to the most recent firmware version, at least 1.20.
CVE-2025-12515 Azure Access BLU-IC Systemic Internal Server Errors via HTTP 500 Response
Critical

Systemic Internal Server Errors - HTTP 500 Response.

CVSS:CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Affected:BLU-IC2 through 1.19.5; BLU-IC4 through 1.19.5.
Mitigation:Upgrade the firmware to the most recent firmware version, at least 1.20.
CVE-2025-12479 Azure Access BLU-IC Missing Cross-Site Request Forgery (CSRF) Token Implementation
Critical

Systemic Lack of Cross-Site Request Forgery (CSRF) Token Implementation.

CVSS:CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Affected:BLU-IC2 through 1.19.5; BLU-IC4 through 1.19.5.
Mitigation:Upgrade the firmware to the most recent firmware version, at least 1.20.
CVE-2025-12478 Azure Access BLU-IC Non-Compliant TLS Configuration
Critical

Non-Compliant TLS Configuration.

CVSS:CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Affected:BLU-IC2 through 1.19.5; BLU-IC4 through 1.19.5.
Mitigation:Upgrade the firmware to the most recent firmware version, at least 1.20.
CVE-2025-12477 Azure Access BLU-IC CVE-2025-12477
Critical

CVE-2025-12477. Details pending publication on NVD.

CVSS:CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Affected:BLU-IC2 through 1.19.5; BLU-IC4 through 1.19.5.
Mitigation:Upgrade the firmware to the most recent firmware version, at least 1.20.
CVE-2025-12476 Azure Access BLU-IC CVE-2025-12476
Critical

CVE-2025-12476. Details pending publication on NVD.

CVSS:CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Affected:BLU-IC2 through 1.19.5; BLU-IC4 through 1.19.5.
Mitigation:Upgrade the firmware to the most recent firmware version, at least 1.20.
CVE-2025-12425 Azure Access BLU-IC CVE-2025-12425
Critical

CVE-2025-12425. Details pending publication on NVD.

CVSS:CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Affected:BLU-IC2 through 1.19.5; BLU-IC4 through 1.19.5.
Mitigation:Upgrade the firmware to the most recent firmware version, at least 1.20.
CVE-2025-12424 Azure Access BLU-IC Privilege Escalation through SUID-bit Binary
Critical

Privilege Escalation through SUID-bit Binary.

CVSS:CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Affected:BLU-IC2 through 1.19.5; BLU-IC4 through 1.19.5.
Mitigation:Upgrade the firmware to the most recent firmware version, at least 1.20.
CVE-2025-12423 Azure Access BLU-IC Protocol Manipulation Leads to Denial of Service
Critical

Protocol manipulation might lead to denial of service.

CVSS:CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Affected:BLU-IC2 through 1.19.5; BLU-IC4 through 1.19.5.
Mitigation:Upgrade the firmware to the most recent firmware version, at least 1.20.
CVE-2025-12422 Azure Access BLU-IC Vulnerable Upgrade Feature Allows Arbitrary File Write
Critical

Vulnerable Upgrade Feature (Arbitrary File Write) may lead to obtaining super user permissions on board.

CVSS:CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Affected:BLU-IC2 through 1.19.5; BLU-IC4 through 1.19.5.
Mitigation:Upgrade the firmware to the most recent firmware version, at least 1.20.
CVE-2025-12365 Azure Access BLU-IC Error Messages Wrapped in HTTP Header
Medium

Error Messages Wrapped In HTTP Header.

CVSS:CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L
Affected:BLU-IC2 through 1.19.5; BLU-IC4 through 1.19.5.
Mitigation:Upgrade the firmware to the most recent firmware version, at least 1.20.
CVE-2025-12364 Azure Access BLU-IC CVE-2025-12364
Critical

CVE-2025-12364. Details pending publication on NVD.

CVSS:CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Affected:BLU-IC2 through 1.19.5; BLU-IC4 through 1.19.5.
Mitigation:Upgrade the firmware to the most recent firmware version, at least 1.20.
CVE-2025-12363 Azure Access BLU-IC CVE-2025-12363
Critical

CVE-2025-12363. Details pending publication on NVD.

CVSS:CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Affected:BLU-IC2 through 1.19.5; BLU-IC4 through 1.19.5.
Mitigation:Upgrade the firmware to the most recent firmware version, at least 1.20.
CVE-2025-12285 Azure Access BLU-IC CVE-2025-12285
Critical

CVE-2025-12285. Details pending publication on NVD.

CVSS:CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Affected:BLU-IC2 through 1.19.5; BLU-IC4 through 1.19.5.
Mitigation:Upgrade the firmware to the most recent firmware version, at least 1.20.
CVE-2025-12284 Azure Access BLU-IC CVE-2025-12284
Medium

CVE-2025-12284. Details pending publication on NVD.

CVSS:CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L
Affected:BLU-IC2 through 1.19.5; BLU-IC4 through 1.19.5.
Mitigation:Upgrade the firmware to the most recent firmware version, at least 1.20.
CVE-2025-12278 Azure Access BLU-IC CVE-2025-12278
Medium

CVE-2025-12278. Details pending publication on NVD.

CVSS:CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L
Affected:BLU-IC2 through 1.19.5; BLU-IC4 through 1.19.5.
Mitigation:Upgrade the firmware to the most recent firmware version, at least 1.20.
CVE-2025-12275 Azure Access BLU-IC Mail Configuration File Manipulation and Command Execution
Critical

Mail Configuration File Manipulation + Command Execution.

CVSS:CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Affected:BLU-IC2 through 1.19.5; BLU-IC4 through 1.19.5.
Mitigation:Upgrade the firmware to the most recent firmware version, at least 1.20.
CVE-2025-12221 Azure Access BLU-IC Busybox 1.31.1 Multiple Known Vulnerabilities (Configuration)
Low

Busybox 1.31.1 - Multiple Known Vulnerabilities.

CVSS:CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:P/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L
Affected:BLU-IC2 through 1.19.5; BLU-IC4 through 1.19.5.
Mitigation:Upgrade the firmware to the most recent firmware version, at least 1.20.
CVE-2025-12220 Azure Access BLU-IC Busybox 1.31.1 Multiple Known Vulnerabilities
Critical

Busybox 1.31.1 - Multiple Known Vulnerabilities.

CVSS:CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Affected:BLU-IC2 through 1.19.5; BLU-IC4 through 1.19.5.
Mitigation:Upgrade the firmware to the most recent firmware version, at least 1.20.
CVE-2025-12219 Azure Access BLU-IC Vulnerable Components in Azure Access OS
Critical

Vulnerable Components in Azure Access OS.

CVSS:CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Affected:BLU-IC2 through 1.19.5; BLU-IC4 through 1.19.5.
Mitigation:Upgrade the firmware to the most recent firmware version, at least 1.20.
CVE-2025-12218 Azure Access BLU-IC CVE-2025-12218
Critical

CVE-2025-12218. Details pending publication on NVD.

CVSS:CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Affected:BLU-IC2 through 1.19.5; BLU-IC4 through 1.19.5.
Mitigation:Upgrade the firmware to the most recent firmware version, at least 1.20.
CVE-2025-12217 Azure Access BLU-IC SNMP Default Community String
Medium

SNMP Default Community String (public).

CVSS:CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L
Affected:BLU-IC2 through 1.19.5; BLU-IC4 through 1.19.5.
Mitigation:Upgrade the firmware to the most recent firmware version, at least 1.20.
CVE-2025-12216 Azure Access BLU-IC Malicious App Installation without Uninstall Capability
Critical

Malicious / Malformed App can be Installed but not Uninstalled/may lead to unavailability.

CVSS:CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Affected:BLU-IC2 through 1.19.5; BLU-IC4 through 1.19.5.
Mitigation:Upgrade the firmware to the most recent firmware version, at least 1.20.
CVE-2025-12176 Azure Access BLU-IC Undocumented Administrative Accounts
Critical

Undocumented administrative accounts were getting created to facilitate access for applications running on board.

CVSS:CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Affected:BLU-IC2 through 1.19.5; BLU-IC4 through 1.19.5.
Mitigation:Upgrade the firmware to the most recent firmware version, at least 1.20.
CVE-2025-12114 Azure Access BLU-IC Serial Console Information Leakage
Medium

Enabled serial console could potentially leak information that might help attacker to find vulnerabilities.

CVSS:CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:H/SI:H/SA:H
Affected:BLU-IC2 through 1.19.5; BLU-IC4 through 1.19.5.
Mitigation:Upgrade the firmware to the most recent firmware version, at least 1.20.
CVE-2025-12104 Azure Access BLU-IC Outdated and Vulnerable UI Dependencies
Critical

Outdated and Vulnerable UI Dependencies might potentially lead to exploitation.

CVSS:CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Affected:BLU-IC2 through 1.19.5; BLU-IC4 through 1.19.5.
Mitigation:Upgrade the firmware to the most recent firmware version, at least 1.20.
CVE-2025-12031 Azure Access BLU-IC HTTP Security Misconfiguration - Missing Secure and HTTPOnly Cookie Attributes
Medium

HTTP Security Misconfiguration - Lacking Secure and HTTPOnly Attribute may allow reading the sensitive cookies from the javascript context.

CVSS:CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L
Affected:BLU-IC2 through 1.19.5; BLU-IC4 through 1.19.5.
Mitigation:Upgrade the firmware to the most recent firmware version, at least 1.20.
CVE-2025-12001 Azure Access BLU-IC CVE-2025-12001
Critical

CVE-2025-12001. Details pending publication on NVD.

CVSS:CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Affected:BLU-IC2 through 1.19.5; BLU-IC4 through 1.19.5.
Mitigation:Upgrade the firmware to the most recent firmware version, at least 1.20.
CVE-2025-11925 Azure Access BLU-IC Incorrect Content-Type Header Allows HTML/JavaScript Injection
Critical

Incorrect Content-Type header in one of the APIs (text/html instead of application/json) replies may potentially allow injection of HTML/JavaScript into reply.

CVSS:CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Affected:BLU-IC2 through 1.19.5; BLU-IC4 through 1.19.5.
Mitigation:Upgrade the firmware to the most recent firmware version, at least 1.20.
CVE-2025-11832 Azure Access BLU-IC Allocation of Resources Without Limits or Throttling allows Flooding
Critical

Allocation of Resources Without Limits or Throttling allows Flooding.

CVSS:CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Affected:BLU-IC2 through 1.19.5; BLU-IC4 through 1.19.5.
Mitigation:Upgrade the firmware to the most recent firmware version, at least 1.20.
CSA-2025-61 Commend Symphony MX Web Interface Missing Common Security Headers in HTTP Response
Medium

Several vulnerabilities have been discovered in the HTTP server response of the Symphony MX web interface which are caused by missing common HTTP security headers. Due to insufficient cache control, a threat actor could read sensitive data stored within the browser cache on the local machine. The missing content type options header permits the browser to incorrectly identify content types when no content type is specified by the server. A firmware update is required to fix the vulnerability.

CVSS:CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N (5.3)
Affected:Symphony MX below v4.7.1.
Mitigation:Update Symphony MX to firmware version v4.7.1 or higher. There is no workaround for the problem.
CSA-2025-60 Commend Symphony MX Web Interface Allows Uploading Arbitrary Data to Media
Medium

A vulnerability has been discovered in the Symphony MX web interface which allows uploading arbitrary data to the internal media storage "Media", where audio and images are stored. Due to insufficient input and file content validation, an authenticated attacker could upload malicious files. If successful, a threat actor can trick an authenticated user to run malicious file content on the local machine. A firmware update is required to fix the vulnerability. Note: Symphony MX devices cannot protect authenticated users from downloading and executing files.

CVSS:CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N (5.3)
Affected:Symphony MX below v4.7.1.
Mitigation:Update Symphony MX to firmware version v4.7.1 or higher. There is no workaround for the problem.
CSA-2025-58 Commend Symphony MX Local Privilege Escalation via Privileged Executable
High

The Symphony MX device contains a privileged executable file that is writeable, creating a critical security vulnerability. Threat actors with access to the device could exploit this vulnerability by modifying the executable with malicious code, which could then be executed with root privileges. If successful, attackers could achieve complete system compromise, establish persistence, execute arbitrary commands with root privileges or create backdoors for ongoing unauthorised access. A firmware update is required to fix the vulnerability. Note: Symphony MX devices are protected against local attack vectors, as remote maintenance via SSH is disabled by default.

CVSS:CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N (7.3)
Affected:Symphony MX below v4.7.1.
Mitigation:Update Symphony MX to firmware version v4.7.1 or higher. There is no workaround for the problem.
CSA-2025-56 Commend VirtuoSIS/S3/S6 Local Privilege Escalation via Service Hijacking
Critical

A security issue was discovered where local users can escalate privileges by manipulating environment variables that affect privileged processes. Threat actors could exploit this vulnerability by injecting malicious values into environment variables used by services running with elevated privileges. If successful, attackers could execute arbitrary commands with elevated privileges, potentially leading to complete system compromise, unauthorised access to sensitive data or the ability to modify the system configuration or security controls.

CVSS:CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:H/SA:H (9.3)
Affected:VirtuoSIS, S3 and S6 below v15.3.0.
Mitigation:Update to VirtuoSIS v15.3.0 or higher (available as .ova, .vsu, or .zip). There is no workaround for the problem.
CSA-2025-55 Commend Symphony MX Web Interface Vulnerable to Clickjacking and Cross-Frame Scripting (XFS)
Medium

Several vulnerabilities have been discovered in the Symphony MX web interface. Due to missing HTTP security headers, the web interface is vulnerable to clickjacking and cross-frame scripting (XFS) attacks. An attacker could embed the web interface into a crafted HTML web page. Such a malicious web page could introduce hidden mechanism to steal the credentials during user authentication or to modify the device configuration without being noticed. A firmware update is required to fix the vulnerability.

CVSS:CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N (5.3)
Affected:Symphony MX below v4.7.1.
Mitigation:Update Symphony MX to firmware version v4.7.1 or higher. There is no workaround for the problem.
CVE-2024-47258 AXIS/2N Missing Certificate Validation leads to MitM Attack
High

2N Access Commander version 2.1 and prior is vulnerable in default settings to Man In The Middle attack due to not verifying certificates of 2N edge devices.

CVSS:CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Affected:2N Access Commander 2.1 and prior.
Mitigation:Install the latest version 3.3 of 2N Access Commander introduces Certificate Fingerprint Verification. Communication is secured by checking the certificate uploaded to the device. The certificate fingerprint is verified during the communication. When fingerprint verification is turned on, the device administrator must confirm the validity of the certificate fingerprint whenever a new device is added. The device administrator will be prompted to verify the fingerprint even if the certificate of an already added device is changed. It is recommended that all customers update 2N Access Commander to the latest version in the application under System Update in Settings.
CVE-2024-13417 AXIS/2N Denial of Service of the RFID Reader Module
Medium

Specifically crafted payloads sent to the RFID reader could cause DoS of RFID reader. After the device is restarted, it gets back to fully working state.

CVSS:CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Affected:Potentially all 2N RFID equipped products running 2N OS 2.45 and prior.
Mitigation:2N has released an updated version 2.46 of 2N OS, where this vulnerability is mitigated. It is recommended that all customers update their devices to the latest 2N OS either directly in the web GUI of the product or using one of the management platforms (My2N or 2N Access Commander). The latest version is also available from the ‘2N Download Centre’ on https://www.2n.com/en-GB/download-center/?type=firmware&product-category=intercoms,access-control&sort=category-desc
CVE-2024-13416 AXIS/2N Authentication Token Disclosure in Log Files
Medium

Using API in the 2N OS device, authorized user can enable logging, which discloses valid authentication tokens in system log.

CVSS:CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Affected:All 2N products running 2N OS 2.45 and prior.
Mitigation:2N has released an updated version 2.46 of 2N OS, where this vulnerability is mitigated. It is recommended that all customers update their devices to the latest 2N OS either directly in the web GUI of the product or using one of the management platforms (My2N or 2N Access Commander). The latest version is also available from the ‘2N Download Centre’ on https://www.2n.com/en-GB/download-center/?type=firmware&product-category=intercoms,access-control&sort=category-desc
CVE-2023-24590 Format String Vulnerability in Gallagher Physical Access Controller 6000
High

A format string issue in the Controller 6000's optional diagnostic web interface can be used to write/read from memory, and in some instances crash the Controller 6000 leading to a Denial of Service.

CVSS:CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Affected:Gallagher Controller 6000 8.60 prior to vCR8.60.231116a (distributed in 8.60.2550 (MR7)), all versions of 8.50 and prior.
Mitigation:Ensure dipswitch 1 is turned off on all Controllers and the option, "Dipswitch 1 controls the diagnostic web interface", is not checked in Configuration Client on Controller property pages. Do not use the Controller override, "Enable WWW Connections". Refer to the Gallagher Command Centre Hardening Guide for more details.
CVE-2023-22439 Buffer Overflow Vulnerability in Gallagher Physical Access Controller 6000 and 7000
Low

Improper input validation of a large HTTP request in the Controller 6000 and Controller 7000 optional diagnostic web interface (Port 80) can be used to perform a Denial of Service of the diagnostic web interface. Further exploitation could not be proven due to this being a totally blind test case, but should be considered.

CVSS:CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
Affected:Gallagher Controller 6000 and 7000 8.90 prior to vCR8.90.231204a (distributed in 8.90.1620 (MR2)), 8.80 prior to vCR8.80.231204a (distributed in 8.80.1369 (MR3)), 8.70 prior to vCR8.70.231204a (distributed in 8.70.2375 (MR5)), 8.60 prior to vCR8.60.231116a (distributed in 8.60.2550 (MR7)), all versions of 8.50 and prior.
Mitigation:Ensure dipswitch 1 is turned off on all Controllers and the option, "Dipswitch 1 controls the diagnostic web interface", is not checked in Configuration Client on Controller property pages. Do not use the Controller override, "Enable WWW Connections". Refer to the Gallagher Command Centre Hardening Guide for more details.
CVE-2015-0250 XML External Entity (XXE) Injection Vulnerability in Apache Batik (Java SVG Toolkit)
Medium

Batik is a Java-based toolkit for applications or applets that want to use images in the Scalable Vector Graphics (SVG) format for various purposes, such as display, generation or manipulation. [1] Batik offers several classes for svg to png/jpg conversion, which suffer from a XML External Entity Injection due to the evaluation of external entities within the given svg file. If an application offers the possibility to upload a svg file an attacker can put in a malicious formed file and retrieve sensitive information such as the content of files of the respective server. The type of file that can be retrieved depends on the user context in which the application is running. Further information about the vulnerability can be seen here: [2].

CVSS:6.4 (AV:N / AC:L / Au:N / C:P / I:N / A:P)
Affected:All versions 1.0 - 1.7
Mitigation:Upgrade to Batik 1.7.1+

./contact.sh