Browse all 7 CVE security advisories affecting Korenix. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Korenix specializes in industrial networking solutions, including rugged Ethernet switches and communication devices for critical infrastructure. Historically, their products have faced vulnerabilities such as remote code execution, cross-site scripting, and privilege escalation, often stemming from improper input validation and insecure default configurations. While no major public security incidents have been widely documented, the 7 CVEs on record highlight recurring issues in web interfaces and firmware that could allow unauthorized access or system compromise. Security researchers have noted weak authentication mechanisms and insufficient protection against common web attacks, emphasizing the need for regular updates and hardening in environments where Korenix devices are deployed.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-11303 | Path Traversal — JetPort 5601CWE-22 | 7.5AI | HighAI | 2024-11-18 |
| CVE-2024-7397 | Unauthenticated Command Injection — JetPort 5601v3CWE-77 | 9.8AI | CriticalAI | 2024-08-05 |
| CVE-2024-7396 | Plaintext Communication — JetPort 5601v3CWE-311 | 7.5AI | HighAI | 2024-08-05 |
| CVE-2024-7395 | Insufficient Authentication — JetPort 5601v3CWE-287 | 9.8AI | CriticalAI | 2024-08-05 |
| CVE-2024-2371 | Information exposure vulnerability in Korenix JetI/O 6550 — JetI/O 6550CWE-200 | 6.2 | Medium | 2024-03-12 |
| CVE-2023-5347 | Unauthenticated Firmware Upgrade — JetNet SeriesCWE-347 | 9.8 | Critical | 2024-01-09 |
| CVE-2023-5376 | TFTP Without Authentication — JetNet SeriesCWE-306 | 8.6 | High | 2024-01-09 |
This page lists every published CVE security advisory associated with Korenix. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.