Vulnerabilities (CVE)

Filtered by vendor Binatoneglobal Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-3793 1 Binatoneglobal 42 Cn28, Cn28 Firmware, Cn40 and 39 more 2021-11-16 5.0 MEDIUM 5.3 MEDIUM
An improper access control vulnerability was reported in some Motorola-branded Binatone Hubble Cameras which could allow an unauthenticated attacker on the same network as the device to access administrative pages that could result in information disclosure or device firmware update with verified firmware.
CVE-2021-3792 1 Binatoneglobal 42 Cn28, Cn28 Firmware, Cn40 and 39 more 2021-11-16 5.0 MEDIUM 5.3 MEDIUM
Some device communications in some Motorola-branded Binatone Hubble Cameras with backend Hubble services are not encrypted which could lead to the communication channel being accessible by an attacker.
CVE-2021-3791 1 Binatoneglobal 42 Cn28, Cn28 Firmware, Cn40 and 39 more 2021-11-16 3.3 LOW 6.5 MEDIUM
An information disclosure vulnerability was reported in some Motorola-branded Binatone Hubble Cameras that could allow an unauthenticated attacker on the same subnet to download an encrypted log file containing sensitive information such as WiFi SSID and password.
CVE-2021-3790 1 Binatoneglobal 42 Cn28, Cn28 Firmware, Cn40 and 39 more 2021-11-16 3.3 LOW 6.5 MEDIUM
A buffer overflow was reported in the local web server of some Motorola-branded Binatone Hubble Cameras that could allow an unauthenticated attacker on the same network to perform a denial-of-service attack against the device.
CVE-2021-3789 1 Binatoneglobal 42 Cn28, Cn28 Firmware, Cn40 and 39 more 2021-11-16 2.1 LOW 4.6 MEDIUM
An information disclosure vulnerability was reported in some Motorola-branded Binatone Hubble Cameras that could allow an attacker with physical access to obtain the encryption key used to decrypt firmware update packages.
CVE-2021-3788 1 Binatoneglobal 42 Cn28, Cn28 Firmware, Cn40 and 39 more 2021-11-16 4.6 MEDIUM 6.8 MEDIUM
An exposed debug interface was reported in some Motorola-branded Binatone Hubble Cameras that could allow an attacker with physical access unauthorized access to the device.