Vulnerabilities (CVE)

Filtered by vendor Motorola Subscribe
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-3898 1 Motorola 2 Device Help, Ready For 2022-05-09 4.3 MEDIUM 6.5 MEDIUM
Versions of Motorola Ready For and Motorola Device Help Android applications prior to 2021-04-08 do not properly verify the server certificate which could lead to the communication channel being accessible by an attacker.
CVE-2021-38701 1 Motorola 20 T008, T008 Firmware, T100 and 17 more 2021-12-22 3.5 LOW 4.8 MEDIUM
Certain Motorola Solutions Avigilon devices allow XSS in the administrative UI. This affects T200/201 before 4.10.0.68; T290 before 4.4.0.80; T008 before 2.2.0.86; T205 before 4.12.0.62; T204 before 3.28.0.166; and T100, T101, T102, and T103 before 2.6.0.180.
CVE-2020-21936 1 Motorola 2 Cx2, Cx2 Firmware 2021-10-04 5.0 MEDIUM 5.3 MEDIUM
An issue in HNAP1/GetMultipleHNAPs of Motorola CX2 router CX 1.0.2 Build 20190508 Rel.97360n allows attackers to access the components GetStationSettings, GetWebsiteFilterSettings and GetNetworkSettings without authentication.
CVE-2021-3459 1 Motorola 2 Mm1000, Mm1000 Firmware 2021-08-25 7.2 HIGH 6.8 MEDIUM
A privilege escalation vulnerability was reported in the MM1000 device configuration web server, which could allow privileged shell access and/or arbitrary privileged commands to be executed on the adapter.
CVE-2021-3458 1 Motorola 2 Mm1000, Mm1000 Firmware 2021-08-25 2.1 LOW 4.6 MEDIUM
The Motorola MM1000 device configuration portal can be accessed without authentication, which could allow adapter settings to be modified.
CVE-2020-21932 1 Motorola 2 Cx2, Cx2 Firmware 2021-07-30 5.0 MEDIUM 5.3 MEDIUM
A vulnerability in /Login.html of Motorola CX2 router CX 1.0.2 Build 20190508 Rel.97360n allows attackers to bypass login and obtain a partially authorized token and uid.
CVE-2019-11321 1 Motorola 4 Cx2, Cx2 Firmware, M2 and 1 more 2020-08-24 5.0 MEDIUM 5.3 MEDIUM
An issue was discovered in Motorola CX2 1.01 and M2 1.01. The router opens TCP port 8010. Users can send hnap requests to this port without authentication to obtain information such as the MAC addresses of connected client devices.
CVE-2017-9493 2 Cisco, Motorola 2 Mx011anm Firmware, Mx011anm 2019-10-03 5.8 MEDIUM 6.3 MEDIUM
The Comcast firmware on Motorola MX011ANM (firmware version MX011AN_2.9p6s1_PROD_sey) devices allows remote attackers to conduct successful forced-pairing attacks (between an RF4CE remote and a set-top box) by repeatedly transmitting the same pairing code.
CVE-2017-9498 2 Comcast, Motorola 4 Xfinity Xr11-20, Xfinity Xr11-20 Firmware, Mx011anm and 1 more 2019-10-03 2.1 LOW 5.5 MEDIUM
The Comcast firmware on Motorola MX011ANM (firmware version MX011AN_2.9p6s1_PROD_sey) and Xfinity XR11-20 Voice Remote devices allows local users to upload arbitrary firmware images to an XR11 by leveraging root access. In other words, there is no protection mechanism involving digital signatures for the firmware.
CVE-2017-9496 2 Cisco, Motorola 2 Mx011anm Firmware, Mx011anm 2019-10-03 4.6 MEDIUM 6.8 MEDIUM
The Comcast firmware on Motorola MX011ANM (firmware version MX011AN_2.9p6s1_PROD_sey) devices allows physically proximate attackers to access an SNMP server by connecting a cable to the Ethernet port, and then establishing communication with the device's link-local IPv6 address.
CVE-2017-9494 1 Motorola 2 Mx011anm, Mx011anm Firmware 2019-10-03 5.0 MEDIUM 5.3 MEDIUM
The Comcast firmware on Motorola MX011ANM (firmware version MX011AN_2.9p6s1_PROD_sey) devices allows remote attackers to enable a Remote Web Inspector that is accessible from the public Internet.
CVE-2017-9495 1 Motorola 2 Mx011anm, Mx011anm Firmware 2017-08-03 2.1 LOW 4.6 MEDIUM
The Comcast firmware on Motorola MX011ANM (firmware version MX011AN_2.9p6s1_PROD_sey) devices allows physically proximate attackers to read arbitrary files by pressing "EXIT, Down, Down, 2" on an RF4CE remote to reach the diagnostic display, and then launching a Remote Web Inspector script.
CVE-2017-9497 2 Cisco, Motorola 2 Mx011anm Firmware, Mx011anm 2017-08-02 7.2 HIGH 6.8 MEDIUM
The Comcast firmware on Motorola MX011ANM (firmware version MX011AN_2.9p6s1_PROD_sey) devices allows physically proximate attackers to execute arbitrary commands as root by pulling up the diagnostics menu on the set-top box, and then posting to a Web Inspector route.