Search criteria
ⓘ
Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.
10 vulnerabilities found for asr3607_firmware by asrmicro
CVE-2024-32634 (GCVE-0-2024-32634)
Vulnerability from nvd – Published: 2024-04-16 08:57 – Updated: 2024-08-02 02:13
VLAI?
Title
Logically dead code
Summary
In huge memory get unmapped area check, code can never be reached because of a logical contradiction.
Severity ?
6.1 (Medium)
CWE
- CWE-561 - Dead Code
Assigner
References
Date Public ?
2024-04-16 08:55
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-32634",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-04-18T15:13:11.871576Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:51:28.855Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T02:13:40.135Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.asrmicro.com/en/goods/psirt?cid=38"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Linux"
],
"product": "Falcon",
"vendor": "ASR",
"versions": [
{
"lessThan": "CP01.057.067",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"datePublic": "2024-04-16T08:55:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "In huge memory get unmapped area check, code can never be reached because of a logical contradiction. "
}
],
"value": "In huge memory get unmapped area check, code can never be reached because of a logical contradiction. "
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-561",
"description": "CWE-561 Dead Code",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-04-16T08:57:29.713Z",
"orgId": "68630edc-a58c-4cbd-9b01-0e130455c8ae",
"shortName": "ASR"
},
"references": [
{
"url": "https://www.asrmicro.com/en/goods/psirt?cid=38"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Logically dead code",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "68630edc-a58c-4cbd-9b01-0e130455c8ae",
"assignerShortName": "ASR",
"cveId": "CVE-2024-32634",
"datePublished": "2024-04-16T08:57:29.713Z",
"dateReserved": "2024-04-16T07:47:46.565Z",
"dateUpdated": "2024-08-02T02:13:40.135Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-32633 (GCVE-0-2024-32633)
Vulnerability from nvd – Published: 2024-04-16 08:54 – Updated: 2024-08-20 18:09
VLAI?
Title
Unsigned compared against 0
Summary
An unsigned value can never be negative, so eMMC full disk test will always evaluate the same way.
Severity ?
4 (Medium)
CWE
- CWE-570 - Expression is Always False
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| ASR | Falcon/Crane |
Affected:
0 , < CP01.057.067
(custom)
|
Date Public ?
2024-04-16 08:52
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T02:13:40.374Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.asrmicro.com/en/goods/psirt?cid=38"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-32633",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-20T18:07:15.629417Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-20T18:09:22.892Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Linux",
"RTOS"
],
"product": "Falcon/Crane",
"vendor": "ASR",
"versions": [
{
"lessThan": "CP01.057.067",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"datePublic": "2024-04-16T08:52:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "An unsigned value can never be negative, so eMMC full disk test will always evaluate the same way."
}
],
"value": "An unsigned value can never be negative, so eMMC full disk test will always evaluate the same way."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "LOW",
"baseScore": 4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-570",
"description": "CWE-570 Expression is Always False",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-04-16T08:54:53.330Z",
"orgId": "68630edc-a58c-4cbd-9b01-0e130455c8ae",
"shortName": "ASR"
},
"references": [
{
"url": "https://www.asrmicro.com/en/goods/psirt?cid=38"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Unsigned compared against 0",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "68630edc-a58c-4cbd-9b01-0e130455c8ae",
"assignerShortName": "ASR",
"cveId": "CVE-2024-32633",
"datePublished": "2024-04-16T08:54:53.330Z",
"dateReserved": "2024-04-16T07:47:46.565Z",
"dateUpdated": "2024-08-20T18:09:22.892Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-32632 (GCVE-0-2024-32632)
Vulnerability from nvd – Published: 2024-04-16 08:51 – Updated: 2024-08-02 02:13
VLAI?
Title
Printf arg type mismatch in ATCMD
Summary
A value in ATCMD will be misinterpreted by printf, causing incorrect output and possibly out-of-bounds memory access
Severity ?
6.6 (Medium)
CWE
- CWE-686 - Function Call with Incorrect Argument Type
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| ASR | Falcon/Crane |
Affected:
0 , < CP01.057.067
(custom)
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-32632",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-05-13T19:03:18.623281Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:52:17.670Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T02:13:40.096Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.asrmicro.com/en/goods/psirt?cid=38"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Linux",
"RTOS"
],
"product": "Falcon/Crane",
"vendor": "ASR",
"versions": [
{
"lessThan": "CP01.057.067",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "A value in ATCMD will be misinterpreted by printf, causing incorrect output and possibly out-of-bounds memory access"
}
],
"value": "A value in ATCMD will be misinterpreted by printf, causing incorrect output and possibly out-of-bounds memory access"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-686",
"description": "CWE-686 Function Call with Incorrect Argument Type",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-04-16T08:51:39.886Z",
"orgId": "68630edc-a58c-4cbd-9b01-0e130455c8ae",
"shortName": "ASR"
},
"references": [
{
"url": "https://www.asrmicro.com/en/goods/psirt?cid=38"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Printf arg type mismatch in ATCMD",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "68630edc-a58c-4cbd-9b01-0e130455c8ae",
"assignerShortName": "ASR",
"cveId": "CVE-2024-32632",
"datePublished": "2024-04-16T08:51:39.886Z",
"dateReserved": "2024-04-16T07:47:46.565Z",
"dateUpdated": "2024-08-02T02:13:40.096Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-32631 (GCVE-0-2024-32631)
Vulnerability from nvd – Published: 2024-04-16 08:44 – Updated: 2024-08-02 02:13
VLAI?
Title
Out-of-bounds read in telephony
Summary
Out-of-Bounds read in ciCCIOTOPT in ASR180X will cause incorrect computations.
Severity ?
7.2 (High)
CWE
- CWE-125 - Out-of-bounds Read
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| ASR | Falcon/Crane |
Affected:
0 , < CP01.057.067
(custom)
|
Date Public ?
2024-04-16 08:05
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-32631",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-09T16:54:53.218930Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-07-10T16:32:47.905Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T02:13:40.138Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.asrmicro.com/en/goods/psirt?cid=38"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Linux",
"RTOS"
],
"product": "Falcon/Crane",
"vendor": "ASR",
"versions": [
{
"lessThan": "CP01.057.067",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"datePublic": "2024-04-16T08:05:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Out-of-Bounds read in ciCCIOTOPT in ASR180X will cause incorrect computations."
}
],
"value": "Out-of-Bounds read in ciCCIOTOPT in ASR180X will cause incorrect computations."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-125",
"description": "CWE-125 Out-of-bounds Read",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-04-16T08:44:14.754Z",
"orgId": "68630edc-a58c-4cbd-9b01-0e130455c8ae",
"shortName": "ASR"
},
"references": [
{
"url": "https://www.asrmicro.com/en/goods/psirt?cid=38"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Out-of-bounds read in telephony",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "68630edc-a58c-4cbd-9b01-0e130455c8ae",
"assignerShortName": "ASR",
"cveId": "CVE-2024-32631",
"datePublished": "2024-04-16T08:44:04.334Z",
"dateReserved": "2024-04-16T07:47:46.565Z",
"dateUpdated": "2024-08-02T02:13:40.138Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-32625 (GCVE-0-2024-32625)
Vulnerability from nvd – Published: 2024-04-16 09:00 – Updated: 2024-08-02 02:13
VLAI?
Title
Uninitialized scalar field
Summary
In OffloadAMRWriter, a scalar field is not initialized so will contain an arbitrary value left over from earlier computations
Severity ?
5.8 (Medium)
CWE
- CWE-457 - Use of Uninitialized Variable
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| ASR | Falcon/Crane |
Affected:
0 , < CP01.057.067
(custom)
|
Date Public ?
2024-04-16 08:58
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-32625",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-05-30T19:21:30.404987Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:51:42.195Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T02:13:40.281Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.asrmicro.com/en/goods/psirt?cid=38"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Linux"
],
"product": "Falcon/Crane",
"vendor": "ASR",
"versions": [
{
"lessThan": "CP01.057.067",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"datePublic": "2024-04-16T08:58:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "In OffloadAMRWriter, a scalar field is not initialized so will contain an arbitrary value left over from earlier computations"
}
],
"value": "In OffloadAMRWriter, a scalar field is not initialized so will contain an arbitrary value left over from earlier computations"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-457",
"description": "CWE-457 Use of Uninitialized Variable",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-04-16T09:00:52.486Z",
"orgId": "68630edc-a58c-4cbd-9b01-0e130455c8ae",
"shortName": "ASR"
},
"references": [
{
"url": "https://www.asrmicro.com/en/goods/psirt?cid=38"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Uninitialized scalar field",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "68630edc-a58c-4cbd-9b01-0e130455c8ae",
"assignerShortName": "ASR",
"cveId": "CVE-2024-32625",
"datePublished": "2024-04-16T09:00:52.486Z",
"dateReserved": "2024-04-16T07:47:46.563Z",
"dateUpdated": "2024-08-02T02:13:40.281Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-32625 (GCVE-0-2024-32625)
Vulnerability from cvelistv5 – Published: 2024-04-16 09:00 – Updated: 2024-08-02 02:13
VLAI?
Title
Uninitialized scalar field
Summary
In OffloadAMRWriter, a scalar field is not initialized so will contain an arbitrary value left over from earlier computations
Severity ?
5.8 (Medium)
CWE
- CWE-457 - Use of Uninitialized Variable
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| ASR | Falcon/Crane |
Affected:
0 , < CP01.057.067
(custom)
|
Date Public ?
2024-04-16 08:58
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-32625",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-05-30T19:21:30.404987Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:51:42.195Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T02:13:40.281Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.asrmicro.com/en/goods/psirt?cid=38"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Linux"
],
"product": "Falcon/Crane",
"vendor": "ASR",
"versions": [
{
"lessThan": "CP01.057.067",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"datePublic": "2024-04-16T08:58:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "In OffloadAMRWriter, a scalar field is not initialized so will contain an arbitrary value left over from earlier computations"
}
],
"value": "In OffloadAMRWriter, a scalar field is not initialized so will contain an arbitrary value left over from earlier computations"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-457",
"description": "CWE-457 Use of Uninitialized Variable",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-04-16T09:00:52.486Z",
"orgId": "68630edc-a58c-4cbd-9b01-0e130455c8ae",
"shortName": "ASR"
},
"references": [
{
"url": "https://www.asrmicro.com/en/goods/psirt?cid=38"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Uninitialized scalar field",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "68630edc-a58c-4cbd-9b01-0e130455c8ae",
"assignerShortName": "ASR",
"cveId": "CVE-2024-32625",
"datePublished": "2024-04-16T09:00:52.486Z",
"dateReserved": "2024-04-16T07:47:46.563Z",
"dateUpdated": "2024-08-02T02:13:40.281Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-32634 (GCVE-0-2024-32634)
Vulnerability from cvelistv5 – Published: 2024-04-16 08:57 – Updated: 2024-08-02 02:13
VLAI?
Title
Logically dead code
Summary
In huge memory get unmapped area check, code can never be reached because of a logical contradiction.
Severity ?
6.1 (Medium)
CWE
- CWE-561 - Dead Code
Assigner
References
Date Public ?
2024-04-16 08:55
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-32634",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-04-18T15:13:11.871576Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:51:28.855Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T02:13:40.135Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.asrmicro.com/en/goods/psirt?cid=38"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Linux"
],
"product": "Falcon",
"vendor": "ASR",
"versions": [
{
"lessThan": "CP01.057.067",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"datePublic": "2024-04-16T08:55:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "In huge memory get unmapped area check, code can never be reached because of a logical contradiction. "
}
],
"value": "In huge memory get unmapped area check, code can never be reached because of a logical contradiction. "
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-561",
"description": "CWE-561 Dead Code",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-04-16T08:57:29.713Z",
"orgId": "68630edc-a58c-4cbd-9b01-0e130455c8ae",
"shortName": "ASR"
},
"references": [
{
"url": "https://www.asrmicro.com/en/goods/psirt?cid=38"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Logically dead code",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "68630edc-a58c-4cbd-9b01-0e130455c8ae",
"assignerShortName": "ASR",
"cveId": "CVE-2024-32634",
"datePublished": "2024-04-16T08:57:29.713Z",
"dateReserved": "2024-04-16T07:47:46.565Z",
"dateUpdated": "2024-08-02T02:13:40.135Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-32633 (GCVE-0-2024-32633)
Vulnerability from cvelistv5 – Published: 2024-04-16 08:54 – Updated: 2024-08-20 18:09
VLAI?
Title
Unsigned compared against 0
Summary
An unsigned value can never be negative, so eMMC full disk test will always evaluate the same way.
Severity ?
4 (Medium)
CWE
- CWE-570 - Expression is Always False
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| ASR | Falcon/Crane |
Affected:
0 , < CP01.057.067
(custom)
|
Date Public ?
2024-04-16 08:52
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T02:13:40.374Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.asrmicro.com/en/goods/psirt?cid=38"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-32633",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-20T18:07:15.629417Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-08-20T18:09:22.892Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Linux",
"RTOS"
],
"product": "Falcon/Crane",
"vendor": "ASR",
"versions": [
{
"lessThan": "CP01.057.067",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"datePublic": "2024-04-16T08:52:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "An unsigned value can never be negative, so eMMC full disk test will always evaluate the same way."
}
],
"value": "An unsigned value can never be negative, so eMMC full disk test will always evaluate the same way."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "LOW",
"baseScore": 4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-570",
"description": "CWE-570 Expression is Always False",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-04-16T08:54:53.330Z",
"orgId": "68630edc-a58c-4cbd-9b01-0e130455c8ae",
"shortName": "ASR"
},
"references": [
{
"url": "https://www.asrmicro.com/en/goods/psirt?cid=38"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Unsigned compared against 0",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "68630edc-a58c-4cbd-9b01-0e130455c8ae",
"assignerShortName": "ASR",
"cveId": "CVE-2024-32633",
"datePublished": "2024-04-16T08:54:53.330Z",
"dateReserved": "2024-04-16T07:47:46.565Z",
"dateUpdated": "2024-08-20T18:09:22.892Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-32632 (GCVE-0-2024-32632)
Vulnerability from cvelistv5 – Published: 2024-04-16 08:51 – Updated: 2024-08-02 02:13
VLAI?
Title
Printf arg type mismatch in ATCMD
Summary
A value in ATCMD will be misinterpreted by printf, causing incorrect output and possibly out-of-bounds memory access
Severity ?
6.6 (Medium)
CWE
- CWE-686 - Function Call with Incorrect Argument Type
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| ASR | Falcon/Crane |
Affected:
0 , < CP01.057.067
(custom)
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-32632",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-05-13T19:03:18.623281Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:52:17.670Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T02:13:40.096Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.asrmicro.com/en/goods/psirt?cid=38"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Linux",
"RTOS"
],
"product": "Falcon/Crane",
"vendor": "ASR",
"versions": [
{
"lessThan": "CP01.057.067",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "A value in ATCMD will be misinterpreted by printf, causing incorrect output and possibly out-of-bounds memory access"
}
],
"value": "A value in ATCMD will be misinterpreted by printf, causing incorrect output and possibly out-of-bounds memory access"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-686",
"description": "CWE-686 Function Call with Incorrect Argument Type",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-04-16T08:51:39.886Z",
"orgId": "68630edc-a58c-4cbd-9b01-0e130455c8ae",
"shortName": "ASR"
},
"references": [
{
"url": "https://www.asrmicro.com/en/goods/psirt?cid=38"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Printf arg type mismatch in ATCMD",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "68630edc-a58c-4cbd-9b01-0e130455c8ae",
"assignerShortName": "ASR",
"cveId": "CVE-2024-32632",
"datePublished": "2024-04-16T08:51:39.886Z",
"dateReserved": "2024-04-16T07:47:46.565Z",
"dateUpdated": "2024-08-02T02:13:40.096Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-32631 (GCVE-0-2024-32631)
Vulnerability from cvelistv5 – Published: 2024-04-16 08:44 – Updated: 2024-08-02 02:13
VLAI?
Title
Out-of-bounds read in telephony
Summary
Out-of-Bounds read in ciCCIOTOPT in ASR180X will cause incorrect computations.
Severity ?
7.2 (High)
CWE
- CWE-125 - Out-of-bounds Read
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| ASR | Falcon/Crane |
Affected:
0 , < CP01.057.067
(custom)
|
Date Public ?
2024-04-16 08:05
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-32631",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-09T16:54:53.218930Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-07-10T16:32:47.905Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T02:13:40.138Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.asrmicro.com/en/goods/psirt?cid=38"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Linux",
"RTOS"
],
"product": "Falcon/Crane",
"vendor": "ASR",
"versions": [
{
"lessThan": "CP01.057.067",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"datePublic": "2024-04-16T08:05:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Out-of-Bounds read in ciCCIOTOPT in ASR180X will cause incorrect computations."
}
],
"value": "Out-of-Bounds read in ciCCIOTOPT in ASR180X will cause incorrect computations."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-125",
"description": "CWE-125 Out-of-bounds Read",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-04-16T08:44:14.754Z",
"orgId": "68630edc-a58c-4cbd-9b01-0e130455c8ae",
"shortName": "ASR"
},
"references": [
{
"url": "https://www.asrmicro.com/en/goods/psirt?cid=38"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Out-of-bounds read in telephony",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "68630edc-a58c-4cbd-9b01-0e130455c8ae",
"assignerShortName": "ASR",
"cveId": "CVE-2024-32631",
"datePublished": "2024-04-16T08:44:04.334Z",
"dateReserved": "2024-04-16T07:47:46.565Z",
"dateUpdated": "2024-08-02T02:13:40.138Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}