Vulnerabilities (CVE)

Filtered by CWE-294
Total 120 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-30467 1 Joyebike 2 Wolf 2022, Wolf 2022 Firmware 2024-02-04 4.3 MEDIUM 6.8 MEDIUM
Joy ebike Wolf Manufacturing year 2022 is vulnerable to Denial of service, which allows remote attackers to jam the key fob request via RF.
CVE-2022-27254 1 Honda 2 Civic 2018, Civic 2018 Firmware 2024-02-04 2.9 LOW 5.3 MEDIUM
The remote keyless system on Honda Civic 2018 vehicles sends the same RF signal for each door-open request, which allows for a replay attack, a related issue to CVE-2019-20626.
CVE-2021-27662 1 Johnsoncontrols 2 Kantech Kt-1 Door Controller, Kantech Kt-1 Door Controller Firmware 2024-02-04 6.8 MEDIUM 8.1 HIGH
The KT-1 door controller is susceptible to replay or man-in-the-middle attacks where an attacker can record and replay TCP packets. This issue affects Johnson Controls KT-1 all versions up to and including 3.01
CVE-2021-46145 1 Honda 1 Civic 2012 2024-02-04 2.9 LOW 5.3 MEDIUM
The keyfob subsystem in Honda Civic 2012 vehicles allows a replay attack for unlocking. This is related to a non-expiring rolling code and counter resynchronization.
CVE-2021-38459 1 Auvesy 1 Versiondog 2024-02-04 7.5 HIGH 9.8 CRITICAL
The data of a network capture of the initial handshake phase can be used to authenticate at a SYSDBA level. If a specific .exe is not restarted often, it is possible to access the needed handshake packets between admin/client connections. Using the SYSDBA permission, an attacker can change user passwords or delete the database.
CVE-2021-41030 1 Fortinet 1 Forticlient Enterprise Management Server 2024-02-04 6.4 MEDIUM 9.1 CRITICAL
An authentication bypass by capture-replay vulnerability [CWE-294] in FortiClient EMS versions 7.0.1 and below and 6.4.4 and below may allow an unauthenticated attacker to impersonate an existing user by intercepting and re-using valid SAML authentication messages.
CVE-2021-25480 2 Google, Qualcomm 2 Android, Qualcomm 2024-02-04 5.0 MEDIUM 7.5 HIGH
A lack of replay attack protection in GUTI REALLOCATION COMMAND message process in Qualcomm modem prior to SMR Oct-2021 Release 1 can lead to remote denial of service on mobile network connection.
CVE-2021-40170 1 Securitashome 2 Securitashome Alarm System, Securitashome Alarm System Firmware 2024-02-04 5.8 MEDIUM 6.8 MEDIUM
An RF replay attack vulnerability in the SecuritasHome home alarm system, version HPGW-G 0.0.2.23F BG_U-ITR-F1-BD_BL.A30.20181117, allows an attacker to trigger arbitrary system functionality by replaying previously recorded signals. This lets an adversary, among other things, disarm an armed system.
CVE-2021-35067 1 Meross 2 Msg100, Msg100 Firmware 2024-02-04 5.5 MEDIUM 8.1 HIGH
Meross MSG100 devices before 3.2.3 allow an attacker to replay the same data or similar data (e.g., an attacker who sniffs a Close message can transmit an acceptable Open message).
CVE-2020-28713 1 Nightowlsp 2 Smart Doorbell, Smart Doorbell Firmware 2024-02-04 5.8 MEDIUM 6.5 MEDIUM
Incorrect access control in push notification service in Night Owl Smart Doorbell FW version 20190505 allows remote users to send push notification events via an exposed PNS server. A remote attacker can passively record push notification events which are sent over an insecure web request. The web service does not authenticate requests, and allows attackers to send an indefinite amount of motion or doorbell events to a user's mobile application by either replaying or deliberately crafting false events.
CVE-2021-26824 1 Dm Fingertool Project 1 Dm Fingertool 2024-02-04 5.6 MEDIUM 7.1 HIGH
DM FingerTool v1.19 in the DM PD065 Secure USB is susceptible to improper authentication by a replay attack, allowing local attackers to bypass user authentication and access all features and data on the USB.
CVE-2021-31958 1 Microsoft 8 Windows 10, Windows 7, Windows 8.1 and 5 more 2024-02-04 6.8 MEDIUM 7.5 HIGH
Windows NTLM Elevation of Privilege Vulnerability
CVE-2021-27572 1 Remotemouse 1 Emote Remote Mouse 2024-02-04 6.8 MEDIUM 8.1 HIGH
An issue was discovered in Emote Remote Mouse through 4.0.0.0. Authentication Bypass can occur via Packet Replay. Remote unauthenticated users can execute arbitrary code via crafted UDP packets even when passwords are set.
CVE-2020-23178 1 Php-fusion 1 Php-fusion 2024-02-04 5.5 MEDIUM 5.4 MEDIUM
An issue exists in PHP-Fusion 9.03.50 where session cookies are not deleted once a user logs out, allowing for an attacker to perform a session replay attack and impersonate the victim user.
CVE-2020-35551 1 Google 1 Android 2024-02-04 7.5 HIGH 9.8 CRITICAL
An issue was discovered on Samsung mobile devices with O(8.x), P(9.0), and Q(10.0) (Exynos chipsets) software. They allow attackers to conduct RPMB state-change attacks because an unauthorized RPMB write operation can be replayed, a related issue to CVE-2020-13799. The Samsung ID is SVE-2020-18100 (December 2020).
CVE-2021-25834 1 Chainsafe 1 Ethermint 2024-02-04 5.0 MEDIUM 7.5 HIGH
Cosmos Network Ethermint <= v0.4.0 is affected by a transaction replay vulnerability in the EVM module. If the victim sends a very large nonce transaction, the attacker can replay the transaction through the application.
CVE-2020-12355 1 Intel 1 Trusted Execution Engine 2024-02-04 4.6 MEDIUM 6.8 MEDIUM
Authentication bypass by capture-replay in RPMB protocol message authentication subsystem in Intel(R) TXE versions before 4.0.30 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
CVE-2018-17932 1 Juuko 2 K-800, K-800 Firmware 2024-02-04 10.0 HIGH 9.8 CRITICAL
JUUKO K-800 (Firmware versions prior to numbers ending ...9A, ...9B, ...9C, etc.) is vulnerable to a replay attack and command forgery, which could allow attackers to replay commands, control the device, view commands, or cause the device to stop running.
CVE-2020-13799 2 Linaro, Westerndigital 7 Op-tee, Inand Cl Em132, Inand Cl Em132 Firmware and 4 more 2024-02-04 4.6 MEDIUM 6.8 MEDIUM
Western Digital has identified a security vulnerability in the Replay Protected Memory Block (RPMB) protocol as specified in multiple standards for storage device interfaces, including all versions of eMMC, UFS, and NVMe. The RPMB protocol is specified by industry standards bodies and is implemented by storage devices from multiple vendors to assist host systems in securing trusted firmware. Several scenarios have been identified in which the RPMB state may be affected by an attacker without the knowledge of the trusted component that uses the RPMB feature.
CVE-2020-26172 1 Tangro 1 Business Workflow 2024-02-04 6.4 MEDIUM 6.5 MEDIUM
Every login in tangro Business Workflow before 1.18.1 generates the same JWT token, which allows an attacker to reuse the token when a session is active. The JWT token does not contain an expiration timestamp.