Nextseq 500 Instrument
by Illumina
CVEs (4)
| CVE | Vendor / Product | Sev | Risk | CVSS | EPSS | KEV | Published | Description |
|---|---|---|---|---|---|---|---|---|
| CVE-2022-1524 | 0.00 | — | 0.00 | Jun 24, 2022 | LRM version 2.4 and lower does not implement TLS encryption. A malicious actor can MITM attack sensitive data in-transit, including credentials. | |||
| CVE-2022-1518 | 0.00 | — | 0.00 | Jun 24, 2022 | LRM contains a directory traversal vulnerability that can allow a malicious actor to upload outside the intended directory structure. | |||
| CVE-2022-1519 | 0.00 | — | 0.00 | Jun 24, 2022 | LRM does not restrict the types of files that can be uploaded to the affected product. A malicious actor can upload any file type, including executable code that allows for a remote code exploit. | |||
| CVE-2022-1517 | 0.00 | — | 0.01 | Jun 24, 2022 | LRM utilizes elevated privileges. An unauthenticated malicious actor can upload and execute code remotely at the operating system level, which can allow an attacker to change settings, configurations, software, or access sensitive data on the affected produc. An attacker could also exploit this vulnerability to access APIs not intended for general use and interact through the network. |
- CVE-2022-1524Jun 24, 2022risk 0.00cvss —epss 0.00
LRM version 2.4 and lower does not implement TLS encryption. A malicious actor can MITM attack sensitive data in-transit, including credentials.
- CVE-2022-1518Jun 24, 2022risk 0.00cvss —epss 0.00
LRM contains a directory traversal vulnerability that can allow a malicious actor to upload outside the intended directory structure.
- CVE-2022-1519Jun 24, 2022risk 0.00cvss —epss 0.00
LRM does not restrict the types of files that can be uploaded to the affected product. A malicious actor can upload any file type, including executable code that allows for a remote code exploit.
- CVE-2022-1517Jun 24, 2022risk 0.00cvss —epss 0.01
LRM utilizes elevated privileges. An unauthenticated malicious actor can upload and execute code remotely at the operating system level, which can allow an attacker to change settings, configurations, software, or access sensitive data on the affected produc. An attacker could also exploit this vulnerability to access APIs not intended for general use and interact through the network.