Browse all 5 CVE security advisories affecting Genians. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Genians provides network security solutions focusing on endpoint detection and response, with their core use case centered on unified threat management for enterprise networks. Historically, their products have been susceptible to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from improper input validation and authentication flaws. While no major public incidents have been widely documented, the five CVEs on record highlight recurring issues in web interfaces and API endpoints where insufficient access controls and insecure deserialization have allowed potential attackers to compromise system integrity or escalate privileges within their deployed environments.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-23843 | Genians Genian NAC 安全漏洞 — Genian NAC V5.0CWE-89 | 2.2 | Low | 2024-10-28 |
| CVE-2023-40251 | Genians Genian NAC 安全漏洞 — Genian NAC V4.0CWE-311 | 5.2 | Medium | 2023-08-17 |
| CVE-2023-40252 | Genians Genian NAC 代码注入漏洞 — Genian NAC V4.0CWE-94 | 6.0 | Medium | 2023-08-17 |
| CVE-2023-40254 | Genians Genian NAC 安全漏洞 — Genian NAC V4.0CWE-89 | 7.5 | High | 2023-08-11 |
| CVE-2023-40253 | Genians Genian NAC 授权问题漏洞 — Genian NAC V4.0CWE-78 | 6.0 | Medium | 2023-08-11 |
This page lists every published CVE security advisory associated with Genians. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.