- Description
- KramerAV VIA Connect (2) and VIA Go (2) devices with a version prior to 4.0.1.1326 exhibit a vulnerability that enables remote manipulation of the device. This vulnerability involves extracting the connection confirmation code remotely, bypassing the need to obtain it directly from the physical screen.
- Source
- cve@mitre.org
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 9.1
- Impact score
- 5.2
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
- Severity
- CRITICAL
- nvd@nist.gov
- CWE-863
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:kramerav:via_go2_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "1B4DD0C6-167E-4649-BDE4-201EC41BBA7C",
"versionEndExcluding": "4.0.1.1326"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:kramerav:via_go2:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "2192F73C-6F59-4319-8921-3BAE8AF7A330"
}
],
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:kramerav:via_connect2_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "4E3A6866-F39F-4D84-A960-9FD8D2834358",
"versionEndExcluding": "4.0.1.1326"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:kramerav:via_connect2:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "D53EDD4A-B5A0-4440-9B4D-78F8B97D79E8"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
]