According to the report, more than 91,000 devices are at risk of attack because they are connected to the Internet, despite the fact that only vulnerable access to the LAN ACCEMENT of the SHODAN LAN. The first vulnerability to the CV-2023-6317 marking enables hackers to bypass the authorization mechanisms by changing one variable. As a result, fraudsters can add themselves as TV users.
Further, using the vulnerability marked as CV-2023-6318, they are able to access the device that opens them to introduce a variety of teams. Using two more vulnerability, CV-2023-6319 and Cve-2023-6320, cybercriminals can either manipulate libraries to ensure the introduction of command describing the ways of interaction of one computer program with another - ed. ). LG43UM7000PLA under the control of Webos 4. 9. 7-5. 30. 40; OLED555CXPUA under the control of Webos 5. 5. 0 - 04. 50.
51; OLED48C1PUB under the control of Webos 6. 3. 3-442 (Kisscurl-KingLake)-36. 03. 50; OLED555A23LA under the control of Webos 7. 3. 1-43 (Mullet-Mebin)-33. 03. 85. The patch was released on March 22, 2024 to eliminate these vulnerabilities, and for the above models it will be available since April 10, so it is worth checking the version of the LG vulnerable operating system to ensure that the patch is installed.
Earlier, we wrote that millions of Facebook users have to change their passwords because hackers stole them. The malefactors were popular with AI Midjourney. They created a Facebook publik of the same name and placed a harmful link there. It was also reported that the SBU installed Russian hackers who broke "Kyivstar".
All rights reserved IN-Ukraine.info - 2022