idemia CVE Vulnerabilities & Metrics

Focus on idemia vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About idemia Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with idemia. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total idemia CVEs: 10
Earliest CVE date: 23 Oct 2017, 08:29 UTC
Latest CVE date: 15 Dec 2023, 12:15 UTC

Latest CVE reference: CVE-2023-33222

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 0

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -100.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -100.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical idemia CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 2.11

Max CVSS: 9.0

Critical CVEs (≥9): 1

CVSS Range vs. Count

Range Count
0.0-3.9 7
4.0-6.9 1
7.0-8.9 1
9.0-10.0 1

CVSS Distribution Chart

Top 5 Highest CVSS idemia CVEs

These are the five CVEs with the highest CVSS scores for idemia, sorted by severity first and recency.

All CVEs for idemia

CVE-2023-33222 idemia vulnerability CVSS: 0 15 Dec 2023, 12:15 UTC

When handling contactless cards, usage of a specific function to get additional information from the card which doesn't check the boundary on the data received while reading. This allows a stack-based buffer overflow that could lead to a potential Remote Code Execution on the targeted device

CVE-2023-33221 idemia vulnerability CVSS: 0 15 Dec 2023, 12:15 UTC

When reading DesFire keys, the function that reads the card isn't properly checking the boundaries when copying internally the data received. This allows a heap based buffer overflow that could lead to a potential Remote Code Execution on the targeted device. This is especially problematic if you use Default DESFire key.

CVE-2023-33220 idemia vulnerability CVSS: 0 15 Dec 2023, 12:15 UTC

During the retrofit validation process, the firmware doesn't properly check the boundaries while copying some attributes to check. This allows a stack-based buffer overflow that could lead to a potential Remote Code Execution on the targeted device

CVE-2023-33219 idemia vulnerability CVSS: 0 15 Dec 2023, 12:15 UTC

The handler of the retrofit validation command doesn't properly check the boundaries when performing certain validation operations. This allows a stack-based buffer overflow that could lead to a potential Remote Code Execution on the targeted device

CVE-2023-33218 idemia vulnerability CVSS: 0 15 Dec 2023, 12:15 UTC

The Parameter Zone Read and Parameter Zone Write command handlers allow performing a Stack buffer overflow. This could potentially lead to a Remote Code execution on the targeted device.

CVE-2023-33217 idemia vulnerability CVSS: 0 15 Dec 2023, 11:15 UTC

By abusing a design flaw in the firmware upgrade mechanism of the impacted terminal it's possible to cause a permanent denial of service for the terminal. the only way to recover the terminal is by sending back the terminal to the manufacturer

CVE-2023-4667 idemia vulnerability CVSS: 0 28 Nov 2023, 09:15 UTC

The web interface of the PAC Device allows the device administrator user profile to store malicious scripts in some fields. The stored malicious script is then executed when the GUI is opened by any users of the webserver administration interface.  The root cause of the vulnerability is inadequate input validation and output encoding in the web administration interface component of the firmware. This could lead to  unauthorized access and data leakage

CVE-2021-35522 idemia vulnerability CVSS: 9.0 22 Jul 2021, 12:15 UTC

A Buffer Overflow in Thrift command handlers in IDEMIA Morpho Wave Compact and VisionPass devices before 2.6.2, Sigma devices before 4.9.4, and MA VP MD devices before 4.9.7 allows remote attackers to achieve code execution, denial of services, and information disclosure via TCP/IP packets.

CVE-2021-35521 idemia vulnerability CVSS: 4.9 22 Jul 2021, 12:15 UTC

A path traversal in Thrift command handlers in IDEMIA Morpho Wave Compact and VisionPass devices before 2.6.2 allows remote authenticated attackers to achieve denial of services and information disclosure via TCP/IP packets.

CVE-2017-15567 idemia vulnerability CVSS: 7.2 23 Oct 2017, 08:29 UTC

The certificate import component in IDEMIA (formerly Morpho) MorphoSmart 1300 Series (aka MSO 1300 Series) devices allows local users to obtain a command shell, and consequently gain privileges, via unspecified vectors. NOTE: the vendor disputes this because there is no command shell in the product or in the associated SDK