CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

Search Vulnerabilities

 Software

Searching vulnerabilities affecting “microchip”

47 vulnerabilities found for “microchip”

Page 1 of 3

CVE-2024-7490
CRITICAL9.8

Improper Input Validation vulnerability in Microchip Techology Advanced Software Framework example DHCP server can cause remote code execution through a buffer overflow. This vulnerability is associated with program files tinydhcpserver.C and program routines lwip_dhcp_find_option. This issue affects Advanced Software Framework: through 3.52.0.2574. ASF is no longer being supported. Apply provided workaround or migrate to an actively maintained framework.

microchip / advanced_software_framework
Network
Published Aug 8, 2024
Page 1 of 3
CVE-2022-45190
MEDIUM5.3

An issue was discovered on Microchip RN4870 1.43 devices. An attacker within BLE radio range can bypass passkey entry in the legacy pairing of the device.

microchip / rn4870_firmware
Adjacent
Published Feb 8, 2023
CVE-2022-46402
MEDIUM6.5

The Microchip RN4870 module firmware 1.43 (and the Microchip PIC LightBlue Explorer Demo 4.2 DT100112) accepts PairCon_rmSend with incorrect values.

microchip / bm78_firmware+8
Adjacent
Published Dec 19, 2022
CVE-2022-46400
MEDIUM5.4

The Microchip RN4870 module firmware 1.43 (and the Microchip PIC LightBlue Explorer Demo 4.2 DT100112) allows attackers to bypass passkey entry in legacy pairing.

microchip / bm78_firmware+8
Adjacent
Published Dec 19, 2022
CVE-2022-46403
HIGH8.6

The Microchip RN4870 module firmware 1.43 (and the Microchip PIC LightBlue Explorer Demo 4.2 DT100112) mishandles reject messages.

microchip / bm78_firmware+8
Network
Published Dec 19, 2022
CVE-2022-46401
MEDIUM5.4

The Microchip RN4870 module firmware 1.43 (and the Microchip PIC LightBlue Explorer Demo 4.2 DT100112) accepts PauseEncReqPlainText before pairing is complete.

microchip / bm78_firmware+11
Adjacent
Published Dec 19, 2022
CVE-2022-46399
HIGH7.5

The Microchip RN4870 module firmware 1.43 (and the Microchip PIC LightBlue Explorer Demo 4.2 DT100112) is unresponsive with ConReqTimeoutZero.

microchip / bm78_firmware+13
Adjacent
Published Dec 19, 2022
CVE-2021-37604
HIGH7.5

In version 6.5 of Microchip MiWi software and all previous versions including legacy products, there is a possibility of frame counters being validated/updated prior to the message authentication. With this vulnerability in place, an attacker may increment the incoming frame counter values by injecting messages with a sufficiently large frame counter value and invalid payload. This results in denial of service/valid packets in the network. There is also a possibility of a replay attack in the stack.

microchip / miwi
Network
Published Aug 5, 2021
CVE-2021-37605
HIGH7.5

In version 6.5 Microchip MiWi software and all previous versions including legacy products, the stack is validating only two out of four Message Integrity Check (MIC) bytes.

microchip / miwi
Network
Published Aug 5, 2021
CVE-2020-12788
HIGH7.5

CMAC verification functionality in Microchip Atmel ATSAMA5 products is vulnerable to vulnerable to timing and power analysis attacks.

microchip / atsama5d21c-cu_firmware+75
Network
Published Sep 14, 2020
CVE-2020-12789
HIGH7.5

The Secure Monitor in Microchip Atmel ATSAMA5 products use a hardcoded key to encrypt and authenticate secure applets.

microchip / atsama5d21c-cu_firmware+75
Network
Published Sep 14, 2020
CVE-2020-12787
HIGH7.5

Microchip Atmel ATSAMA5 products in Secure Mode allow an attacker to bypass existing security mechanisms related to applet handling.

microchip / atsama5d21c-cu_firmware+75
Network
Published Sep 14, 2020
CVE-2020-9032
MEDIUM6.5

Symmetricom SyncServer S100 2.90.70.3, S200 1.30, S250 1.25, S300 2.65.0, and S350 2.80.1 devices allow Directory Traversal via the FileName parameter to kernlog.php.

microchip / syncserver_s100_firmware+4
Network
Published Feb 17, 2020
CVE-2020-9031
MEDIUM6.5

Symmetricom SyncServer S100 2.90.70.3, S200 1.30, S250 1.25, S300 2.65.0, and S350 2.80.1 devices allow Directory Traversal via the FileName parameter to daemonlog.php.

microchip / syncserver_s100_firmware+4
Network
Published Feb 17, 2020
CVE-2020-9029
MEDIUM6.5

Symmetricom SyncServer S100 2.90.70.3, S200 1.30, S250 1.25, S300 2.65.0, and S350 2.80.1 devices allow Directory Traversal via the FileName parameter to messagelog.php.

microchip / syncserver_s100_firmware+4
Network
Published Feb 17, 2020
CVE-2020-9028
MEDIUM6.1

Symmetricom SyncServer S100 2.90.70.3, S200 1.30, S250 1.25, S300 2.65.0, and S350 2.80.1 devices allow stored XSS via the newUserName parameter on the "User Creation, Deletion and Password Maintenance" screen (when creating a new user).

microchip / syncserver_s100_firmware+4
Network
Published Feb 17, 2020
CVE-2020-9030
MEDIUM6.5

Symmetricom SyncServer S100 2.90.70.3, S200 1.30, S250 1.25, S300 2.65.0, and S350 2.80.1 devices allow Directory Traversal via the FileName parameter to the syslog.php.

microchip / syncserver_s100_firmware+4
Network
Published Feb 17, 2020
CVE-2020-9033
MEDIUM6.5

Symmetricom SyncServer S100 2.90.70.3, S200 1.30, S250 1.25, S300 2.65.0, and S350 2.80.1 devices allow Directory Traversal via the FileName parameter to authlog.php.

microchip / syncserver_s100_firmware+4
Network
Published Feb 17, 2020
CVE-2020-9034
HIGH7.5

Symmetricom SyncServer S100 2.90.70.3, S200 1.30, S250 1.25, S300 2.65.0, and S350 2.80.1 devices mishandle session validation, leading to unauthenticated creation, modification, or elimination of users.

microchip / syncserver_s100_firmware+4
Network
Published Feb 17, 2020
CVE-2019-19195
MEDIUM6.5

The Bluetooth Low Energy implementation on Microchip Technology BluSDK Smart through 6.2 for ATSAMB11 devices does not properly restrict link-layer data length on reception, allowing attackers in radio range to cause a denial of service (crash) via a crafted packet.

microchip / atmsamb11_blusdk_smart
Adjacent
Published Feb 10, 2020