Vulnerabilities (CVE)

Filtered by vendor Hinet Subscribe
Filtered by product Hicos Natural Person Credential Component Client
Total 5 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2022-35222 1 Hinet 1 Hicos Natural Person Credential Component Client 2024-11-21 N/A 6.8 MEDIUM
HiCOS Citizen verification component has a stack-based buffer overflow vulnerability due to insufficient parameter length validation. An unauthenticated physical attacker can exploit this vulnerability to execute arbitrary code, manipulate system command or disrupt service.
CVE-2022-32962 1 Hinet 1 Hicos Natural Person Credential Component Client 2024-11-21 N/A 6.8 MEDIUM
HiCOS’ client-side citizen certificate component has a double free vulnerability. An unauthenticated physical attacker can exploit this vulnerability to corrupt memory and execute arbitrary code, manipulate system data or terminate service.
CVE-2022-32961 1 Hinet 1 Hicos Natural Person Credential Component Client 2024-11-21 N/A 6.8 MEDIUM
HICOS’ client-side citizen digital certificate component has a stack-based buffer overflow vulnerability when reading IC card due to insufficient parameter length validation for token information. An unauthenticated physical attacker can exploit this vulnerability to execute arbitrary code, manipulate system data or terminate service.
CVE-2022-32960 1 Hinet 1 Hicos Natural Person Credential Component Client 2024-11-21 N/A 6.8 MEDIUM
HiCOS’ client-side citizen digital certificate component has a stack-based buffer overflow vulnerability when reading IC card due to insufficient parameter length validation for card number. An unauthenticated physical attacker can exploit this vulnerability to execute arbitrary code, manipulate system data or terminate service.
CVE-2022-32959 1 Hinet 1 Hicos Natural Person Credential Component Client 2024-11-21 N/A 6.8 MEDIUM
HiCOS’ client-side citizen digital certificate component has a stack-based buffer overflow vulnerability when reading IC card due to insufficient parameter length validation for OS information. An unauthenticated physical attacker can exploit this vulnerability to execute arbitrary code, manipulate system data or terminate service.