TABELLA VULNERABILITà
JBF s.r.l. è responsabile di ricevere, gestire e divulgare pubblicamente le vulnerabilità di sicurezza relative ai propri prodotti e soluzioni.
Elenco Vulnerabilità
CVSS Score: 8.6(High)CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
PRODUCT: JBF-AS-5MP-BNC; JBF-AS-5MP-IR; JBF-AS-5MP-DOME; JBF-AS-8MP-BV; JBF-AS-4X5MP-DOME;
AFFECTED VERSION: Firmware Build time before 2024/6/1
FIXED VERSION: JBF_IPC-HX5XXX-single-Riemann_EngItl_PN_Stream4-CustomPro_V3.142.19AV000.0.R.250224;JBF_IPC-PDBW820XX-Faraday_EngItl_PN_Stream3_V3.100.19AV001.0.R.240821;
AFFECTED COMPONENTS: Login Components;
ATTACK VECTOR: Exploiting vulnerabilities requires network accessibility
PROBLEM TYPE: Denial of Services
DESCRIPTION: The login logic has an improper input validation issue, which allows attackers to cause device initialization through carefully crafted messages.
DATE: 2025-06-06
CVSS Score: 7.5(High)CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
PRODUCT: JBF-AS-5MP-BNC; JBF-AS-5MP-IR; JBF-AS-5MP-DOME; JBF-AS-8MP-BV; JBF-AS-4X5MP-DOME;
AFFECTED VERSION: Firmware Build time before 2024/6/1
FIXED VERSION: JBF_IPC-HX5XXX-single-Riemann_EngItl_PN_Stream4-CustomPro_V3.142.19AV000.0.R.250224;JBF_IPC-PDBW820XX-Faraday_EngItl_PN_Stream3_V3.100.19AV001.0.R.240821;
AFFECTED COMPONENTS: Configuration management components.
ATTACK VECTOR: Exploiting vulnerabilities requires network accessibility
PROBLEM TYPE: Denial of Services
DESCRIPTION: The Configuration management components fails to properly validate inputs. Attackers can exploit this by sending carefully crafted messages to cause the device to crash.
DATE: 2025-06-06
CVSS Score: 6.5(Medium)CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
PRODUCT: JBF-AS-5MP-BNC; JBF-AS-5MP-IR; JBF-AS-5MP-DOME; JBF-AS-8MP-BV; JBF-AS-4X5MP-DOME;
AFFECTED VERSION: Firmware Build time before 2024/6/1
FIXED VERSION: JBF_IPC-HX5XXX-single-Riemann_EngItl_PN_Stream4-CustomPro_V3.142.19AV000.0.R.250224;JBF_IPC-PDBW820XX-Faraday_EngItl_PN_Stream3_V3.100.19AV001.0.R.240821;
AFFECTED COMPONENTS: File management components
ATTACK VECTOR: Exploiting vulnerabilities requires network accessibility
PROBLEM TYPE: Denial of Services
DESCRIPTION: The File management components fails to properly validate inputs, allowing attackers to cause the device to crash by sending carefully crafted packets.
DATE: 2025-06-06