The affected devices run a SSH server that is affected by the regreSSHion vulnerability despite the fact that no user can actually log in through SSH. Attackers may exploit this vulnerability to gain root access to the device.
Vulnerabilities has been discovered in the product, mainly caused by HTML injection and crosssite-scripting.
The impact of the vulnerability on the affected device may result in an information disclosure and denial of service.
A critical security vulnerability was discovered in the products, which is caused by the IPv6 stack in the Linux kernel.
The impact of the vulnerability on the affected products may result in
Critical vulnerabilities has been discovered in the product, mainly caused by an
anonymous FTP server and Telnet access.
The impact of the vulnerabilities on the affected device may result in
Critical vulnerabilities have been discovered in the product due to outdated software components.
The impact of the vulnerabilities on the affected device may result in
Critical vulnerabilities have been discovered in the utilized Bluetooth component.
For more information see: https://kb.cert.org/vuls/id/799380
Critical vulnerabilities have been discovered in the utilized component Remote Desktop Client by Microsoft.
For more information see: https://msrc.microsoft.com/update-guide/vulnerability/CVE- 2022-21990
Critical vulnerabilities have been discovered in the utilized component log4net by Apache Software Foundation.
UPDATE A: Remediation: added fixed VisuNet Products