Nokia Vulnerabilities
Comprehensive security vulnerability database for Nokia products
4
0
1
0
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2023-31044 | 8.8 | This vulnerability allows an attacker, who is already authenticated as a user, to inject harmful code into the Campaign Name field, which can then be exported to a CSV file. When this file is opened in spreadsheet software, it may automatically execute the malicious code, potentially leading to data theft or other harmful actions. | nokiaimpact mobile | Exploit Available | about 1 month agoMar 3, 2026 |
| CVE-2021-35485 | 8.0 | This vulnerability allows an attacker with valid login credentials to upload malicious executable files to the server, which could lead to unauthorized control over the system. It can be exploited when adding or editing applications within the Nokia IMPACT platform. | nokiaimpact | Theoretical | about 1 month agoMar 3, 2026 |
| CVE-2021-35484 | 8.2 | This vulnerability allows an authenticated user to exploit a flaw in the Nokia IMPACT system to extract sensitive information from the database, such as user credentials and database details, by manipulating a specific web request. To take advantage of this, the attacker must already have access to the system as a logged-in user. | nokiaimpact | Theoretical | about 1 month agoMar 3, 2026 |
| CVE-2021-35483 | 4.1 | This vulnerability allows an attacker, who is already logged into the Nokia IMPACT system, to upload malicious JavaScript files that can be executed when other users visit the affected web page. The attacker can exploit this during the process of adding or editing applications, potentially leading to unauthorized actions on behalf of those users. | nokiaimpact | Theoretical | about 1 month agoMar 3, 2026 |
About Nokia Security
This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Nokia products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.
Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.