{"vulnerability": "CVE-2023-36749", "sightings": [{"uuid": "a1c1f1ef-5eb0-407f-b6d2-1d6608e97012", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-36749", "type": "seen", "source": "https://t.me/cibsecurity/66358", "content": "\u203c CVE-2023-36749 \u203c\n\nA vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions &lt; V2.16.0), RUGGEDCOM ROX MX5000RE (All versions &lt; V2.16.0), RUGGEDCOM ROX RX1400 (All versions &lt; V2.16.0), RUGGEDCOM ROX RX1500 (All versions &lt; V2.16.0), RUGGEDCOM ROX RX1501 (All versions &lt; V2.16.0), RUGGEDCOM ROX RX1510 (All versions &lt; V2.16.0), RUGGEDCOM ROX RX1511 (All versions &lt; V2.16.0), RUGGEDCOM ROX RX1512 (All versions &lt; V2.16.0), RUGGEDCOM ROX RX1524 (All versions &lt; V2.16.0), RUGGEDCOM ROX RX1536 (All versions &lt; V2.16.0), RUGGEDCOM ROX RX5000 (All versions &lt; V2.16.0). The webserver of the affected devices support insecure TLS 1.0 protocol. An attacker could achieve a man-in-the-middle attack and compromise confidentiality and integrity of data.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-11T14:29:51.000000Z"}]}