Filtered by vendor Anviz
Subscribe
Total
21 CVE
| CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
|---|---|---|---|---|---|
| CVE-2026-32650 | 1 Anviz | 1 Crosschex Standard | 2026-05-04 | N/A | 7.5 HIGH |
| Anviz CrossChex Standard is vulnerable when an attacker manipulates the TDS7 PreLogin to disable encryption, causing database credentials to be sent in plaintext and enabling unauthorized database access. | |||||
| CVE-2026-40434 | 1 Anviz | 1 Crosschex Standard | 2026-05-04 | N/A | 8.1 HIGH |
| Anviz CrossChex Standard lacks source verification in the client/server channel, enabling TCP packet injection by an attacker on the same network to alter or disrupt application traffic. | |||||
| CVE-2026-31927 | 1 Anviz | 2 Cx7, Cx7 Firmware | 2026-05-04 | N/A | 4.9 MEDIUM |
| Anviz CX7 Firmware is vulnerable to an authenticated CSV upload which allows path traversal to overwrite arbitrary files (e.g., /etc/shadow), enabling unauthorized SSH access when combined with debug‑setting changes | |||||
| CVE-2026-32324 | 1 Anviz | 2 Cx7, Cx7 Firmware | 2026-05-04 | N/A | 7.7 HIGH |
| Anviz CX7 Firmware is vulnerable because the application embeds reusable certificate/key material, enabling decryption of MQTT traffic and potential interaction with device messaging channels at scale. | |||||
| CVE-2026-32648 | 1 Anviz | 4 Cx2 Lite, Cx2 Lite Firmware, Cx7 and 1 more | 2026-05-04 | N/A | 5.3 MEDIUM |
| Anviz CX2 Lite and CX7 are vulnerable to unauthenticated access that discloses debug configuration details (e.g., SSH/RTTY status), assisting attackers in reconnaissance against the device. | |||||
| CVE-2026-33093 | 1 Anviz | 2 Cx7, Cx7 Firmware | 2026-05-04 | N/A | 5.3 MEDIUM |
| Anviz CX7 Firmware is vulnerable to an unauthenticated POST to the device that captures a photo with the front facing camera, exposing visual information about the deployment environment. | |||||
| CVE-2026-33569 | 1 Anviz | 4 Cx2 Lite, Cx2 Lite Firmware, Cx7 and 1 more | 2026-05-04 | N/A | 6.5 MEDIUM |
| Anviz CX2 Lite and CX7 administrative sessions occur over HTTP, enabling on‑path attackers to sniff credentials and session data, which can be used to compromise the device. | |||||
| CVE-2026-35061 | 1 Anviz | 2 Cx7, Cx7 Firmware | 2026-05-04 | N/A | 5.3 MEDIUM |
| Anviz CX7 Firmware is vulnerable to the most recently captured test photo that can be retrieved without authentication, revealing sensitive operational imagery. | |||||
| CVE-2026-35546 | 1 Anviz | 4 Cx2 Lite, Cx2 Lite Firmware, Cx7 and 1 more | 2026-05-04 | N/A | 9.8 CRITICAL |
| Anviz CX2 Lite and CX7 are vulnerable to unauthenticated firmware uploads. This causes crafted archives to be accepted, enabling attackers to plant and execute code and obtain a reverse shell. | |||||
| CVE-2026-35682 | 1 Anviz | 2 Cx2 Lite, Cx2 Lite Firmware | 2026-05-04 | N/A | 8.8 HIGH |
| Anviz CX2 Lite is vulnerable to an authenticated command injection via a filename parameter that enables arbitrary command execution (e.g., starting telnetd), resulting in root‑level access. | |||||
| CVE-2026-40066 | 1 Anviz | 4 Cx2 Lite, Cx2 Lite Firmware, Cx7 and 1 more | 2026-05-04 | N/A | 8.8 HIGH |
| Anviz CX2 Lite and CX7 are vulnerable to unverified update packages that can be uploaded. The device unpacks and executes a script resulting in unauthenticated remote code execution. | |||||
| CVE-2026-40461 | 1 Anviz | 4 Cx2 Lite, Cx2 Lite Firmware, Cx7 and 1 more | 2026-05-04 | N/A | 7.5 HIGH |
| Anviz CX2 Lite and CX7 are vulnerable to unauthenticated POST requests that modify debug settings (e.g., enabling SSH), allowing unauthorized state changes that can facilitate later compromise. | |||||
| CVE-2019-12518 | 1 Anviz | 1 Crosschex | 2024-11-21 | 10.0 HIGH | 9.8 CRITICAL |
| Anviz CrossChex access control management software 4.3.8.0 and 4.3.12 is vulnerable to a buffer overflow vulnerability. | |||||
| CVE-2019-12394 | 1 Anviz | 1 Management System | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
| Anviz access control devices allow unverified password change which allows remote attackers to change the administrator password without prior authentication. | |||||
| CVE-2019-12393 | 1 Anviz | 1 Management System | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
| Anviz access control devices are vulnerable to replay attacks which could allow attackers to intercept and replay open door requests. | |||||
| CVE-2019-12392 | 1 Anviz | 1 Anviz Firmware | 2024-11-21 | 7.5 HIGH | 9.8 CRITICAL |
| Anviz access control devices allow remote attackers to issue commands without a password. | |||||
| CVE-2019-12391 | 1 Anviz | 1 Management System | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
| The Anviz Management System for access control has insufficient logging for device events such as door open requests. | |||||
| CVE-2019-12390 | 1 Anviz | 1 Anviz Firmware | 2024-11-21 | 5.0 MEDIUM | 5.3 MEDIUM |
| Anviz access control devices expose private Information (pin code and name) by allowing remote attackers to query this information without credentials via port tcp/5010. | |||||
| CVE-2019-12389 | 1 Anviz | 1 Anviz Firmware | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
| Anviz access control devices expose credentials (names and passwords) by allowing remote attackers to query this information without credentials via port tcp/5010. | |||||
| CVE-2019-12388 | 1 Anviz | 1 Anviz Firmware | 2024-11-21 | 5.0 MEDIUM | 7.5 HIGH |
| Anviz access control devices perform cleartext transmission of sensitive information (passwords/pins and names) when replying to query on port tcp/5010. | |||||
