Device Manager

4 CVEs product

Monthly

CVE-2025-5781 MEDIUM This Month

Configuration Manager versions up to 11.0.5-00 is affected by insertion of sensitive information into log file (CVSS 5.2).

Information Disclosure Ops Center Api Configuration Manager Device Manager Configuration Manager
NVD
CVSS 3.1
5.2
EPSS
0.0%
CVE-2025-30025 HIGH This Week

CVE-2025-30025 is a local privilege escalation vulnerability in the inter-process communication (IPC) protocol between a server process and its service control mechanism, caused by insecure deserialization (CWE-502). An authenticated local attacker with limited privileges can exploit this flaw to escalate to higher privileges, potentially gaining complete system compromise including confidentiality, integrity, and availability impact. While the CVSS score of 7.8 indicates high severity, the local attack vector and requirement for prior authentication mean this affects primarily multi-user systems or scenarios where an attacker has already gained initial local access.

Privilege Escalation Camera Station Pro Device Manager
NVD
CVSS 3.1
7.8
EPSS
0.1%
CVE-2025-30024 MEDIUM This Month

The communication protocol used between client and server had a flaw that could be leveraged to execute a man in the middle attack.

Information Disclosure Device Manager
NVD
CVSS 3.1
6.8
EPSS
0.0%
CVE-2025-30023 CRITICAL Act Now

CVE-2025-30023 is a critical remote code execution vulnerability in a client-server communication protocol that allows authenticated users to execute arbitrary code on affected systems. The flaw affects users with valid credentials who can access the affected service over an adjacent network segment, potentially compromising confidentiality, integrity, and availability across trust boundaries. While specific product details are limited in the provided data, this represents a high-severity risk requiring immediate patching, particularly if actively exploited or if public proof-of-concept code exists.

RCE Authentication Bypass Camera Station Device Manager Camera Station Pro
NVD
CVSS 3.1
9.0
EPSS
2.3%
CVE-2025-5781
EPSS 0% CVSS 5.2
MEDIUM This Month

Configuration Manager versions up to 11.0.5-00 is affected by insertion of sensitive information into log file (CVSS 5.2).

Information Disclosure Ops Center Api Configuration Manager Device Manager +1
NVD
CVE-2025-30025
EPSS 0% CVSS 7.8
HIGH This Week

CVE-2025-30025 is a local privilege escalation vulnerability in the inter-process communication (IPC) protocol between a server process and its service control mechanism, caused by insecure deserialization (CWE-502). An authenticated local attacker with limited privileges can exploit this flaw to escalate to higher privileges, potentially gaining complete system compromise including confidentiality, integrity, and availability impact. While the CVSS score of 7.8 indicates high severity, the local attack vector and requirement for prior authentication mean this affects primarily multi-user systems or scenarios where an attacker has already gained initial local access.

Privilege Escalation Camera Station Pro Device Manager
NVD
CVE-2025-30024
EPSS 0% CVSS 6.8
MEDIUM This Month

The communication protocol used between client and server had a flaw that could be leveraged to execute a man in the middle attack.

Information Disclosure Device Manager
NVD
CVE-2025-30023
EPSS 2% CVSS 9.0
CRITICAL Act Now

CVE-2025-30023 is a critical remote code execution vulnerability in a client-server communication protocol that allows authenticated users to execute arbitrary code on affected systems. The flaw affects users with valid credentials who can access the affected service over an adjacent network segment, potentially compromising confidentiality, integrity, and availability across trust boundaries. While specific product details are limited in the provided data, this represents a high-severity risk requiring immediate patching, particularly if actively exploited or if public proof-of-concept code exists.

RCE Authentication Bypass Camera Station +2
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy