Vulnerabilities (CVE)

Filtered by vendor Redlion Subscribe
Filtered by product Crimson
Total 9 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-5719 1 Redlion 3 Crimson, Da50a, Da70a 2024-11-21 N/A 8.8 HIGH
The Crimson 3.2 Windows-based configuration tool allows users with administrative access to define new passwords for users and to download the resulting security configuration to a device. If such a password contains the percent (%) character, invalid values will be included, potentially truncating the string if a NUL is encountered. If the simplified password is not detected by the administrator, the device might be left in a vulnerable state as a result of more-easily compromised credentials. Note that passwords entered via the Crimson system web server do not suffer from this vulnerability.
CVE-2022-3090 1 Redlion 1 Crimson 2024-11-21 N/A 7.5 HIGH
Red Lion Controls Crimson 3.0 versions 707.000 and prior, Crimson 3.1 versions 3126.001 and prior, and Crimson 3.2 versions 3.2.0044.0 and prior are vulnerable to path traversal. When attempting to open a file using a specific path, the user's password hash is sent to an arbitrary host. This could allow an attacker to obtain user credential hashes.
CVE-2020-27285 1 Redlion 1 Crimson 2024-11-21 6.4 MEDIUM 9.1 CRITICAL
The default configuration of Crimson 3.1 (Build versions prior to 3119.001) allows a user to be able to read and modify the database without authentication.
CVE-2020-27283 1 Redlion 1 Crimson 2024-11-21 5.0 MEDIUM 5.3 MEDIUM
An attacker could send a specially crafted message to Crimson 3.1 (Build versions prior to 3119.001) that could leak arbitrary memory locations.
CVE-2020-27279 1 Redlion 1 Crimson 2024-11-21 7.8 HIGH 7.5 HIGH
A NULL pointer deference vulnerability has been identified in the protocol converter. An attacker could send a specially crafted packet that could reboot the device running Crimson 3.1 (Build versions prior to 3119.001).
CVE-2019-10996 1 Redlion 1 Crimson 2024-11-21 6.8 MEDIUM 7.8 HIGH
Red Lion Controls Crimson, version 3.0 and prior and version 3.1 prior to release 3112.00, allow multiple vulnerabilities to be exploited when a valid user opens a specially crafted, malicious input file that can reference memory after it has been freed.
CVE-2019-10990 1 Redlion 1 Crimson 2024-11-21 4.3 MEDIUM 6.5 MEDIUM
Red Lion Controls Crimson, version 3.0 and prior and version 3.1 prior to release 3112.00, uses a hard-coded password to encrypt protected files in transit and at rest, which may allow an attacker to access configuration files.
CVE-2019-10984 1 Redlion 1 Crimson 2024-11-21 6.8 MEDIUM 7.8 HIGH
Red Lion Controls Crimson, version 3.0 and prior and version 3.1 prior to release 3112.00, allow multiple vulnerabilities to be exploited when a valid user opens a specially crafted, malicious input file that causes the program to mishandle pointers.
CVE-2019-10978 1 Redlion 1 Crimson 2024-11-21 6.8 MEDIUM 7.8 HIGH
Red Lion Controls Crimson, version 3.0 and prior and version 3.1 prior to release 3112.00, allow multiple vulnerabilities to be exploited when a valid user opens a specially crafted, malicious input file that operates outside of the designated memory area.