VARIoT IoT vulnerabilities database
| VAR-202002-1167 | CVE-2020-3841 | plural Apple Inadequate protection of credentials in products |
CVSS V2: 4.3 CVSS V3: 6.5 Severity: MEDIUM |
The issue was addressed with improved UI handling. This issue is fixed in iOS 13.3.1 and iPadOS 13.3.1, Safari 13.0.5. A local user may unknowingly send a password unencrypted over the network. plural Apple The product has UI There is an inadequate protection vulnerability for credentials due to improper processing.Local users may unintentionally send unencrypted passwords over the network. Apple Safari, etc. are all products of Apple (Apple). Apple Safari is a web browser that is the default browser included with the Mac OS X and iOS operating systems. Apple iOS is an operating system developed for mobile devices. Apple iPadOS is an operating system for iPad tablets. A security vulnerability exists in Apple iOS versions prior to 13.3.1, iPadOS versions prior to 13.3.1, and Safari versions prior to 13.0.5, where a local user could inadvertently send passwords in clear text over the network. An attacker could exploit this vulnerability to obtain sensitive information. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
APPLE-SA-2020-1-28-1 iOS 13.3.1 and iPadOS 13.3.1
iOS 13.3.1 and iPadOS 13.3.1 are now available and address the
following:
Audio
Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4
and later, and iPod touch 7th generation
Impact: An application may be able to execute arbitrary code with
system privileges
Description: A memory corruption issue was addressed with improved
memory handling.
CVE-2020-3857: Zhuo Liang of Qihoo 360 Vulcan Team
FaceTime
Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4
and later, and iPod touch 7th generation
Impact: A remote FaceTime user may be able to cause the local user's
camera self-view to display the incorrect camera
Description: An issue existed in the handling of the local user's
self-view.
CVE-2020-3869: Elisa Lee
ImageIO
Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4
and later, and iPod touch 7th generation
Impact: Processing a maliciously crafted image may lead to arbitrary
code execution
Description: An out-of-bounds read was addressed with improved input
validation.
CVE-2020-3870
CVE-2020-3878: Samuel Groß of Google Project Zero
IOAcceleratorFamily
Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4
and later, and iPod touch 7th generation
Impact: An application may be able to execute arbitrary code with
kernel privileges
Description: A memory corruption issue was addressed with improved
memory handling.
CVE-2020-3837: Brandon Azad of Google Project Zero
IPSec
Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4
and later, and iPod touch 7th generation
Impact: Loading a maliciously crafted racoon configuration file may
lead to arbitrary code execution
Description: An off by one issue existed in the handling of racoon
configuration files.
CVE-2020-3840: @littlelailo
Kernel
Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4
and later, and iPod touch 7th generation
Impact: An application may be able to read restricted memory
Description: A validation issue was addressed with improved input
sanitization.
CVE-2020-3875: Brandon Azad of Google Project Zero
Kernel
Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4
and later, and iPod touch 7th generation
Impact: An application may be able to read restricted memory
Description: A memory initialization issue was addressed with
improved memory handling.
CVE-2020-3872: Haakon Garseg Mørk of Cognite and Cim Stordal of
Cognite
Kernel
Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4
and later, and iPod touch 7th generation
Impact: A malicious application may be able to determine kernel
memory layout
Description: An access issue was addressed with improved memory
management.
CVE-2020-3836: Brandon Azad of Google Project Zero
Kernel
Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4
and later, and iPod touch 7th generation
Impact: An application may be able to execute arbitrary code with
kernel privileges
Description: A memory corruption issue was addressed with improved
memory handling.
CVE-2020-3842: Ned Williamson working with Google Project Zero
CVE-2020-3858: Xiaolong Bai and Min (Spark) Zheng of Alibaba Inc,
Luyi Xing of Indiana University Bloomington
Kernel
Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4
and later, and iPod touch 7th generation
Impact: An application may be able to execute arbitrary code with
kernel privileges
Description: A race condition was addressed with improved locking.
CVE-2020-3831: Corellium, Proteas of Qihoo 360 Nirvan Team
Kernel
Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4
and later, and iPod touch 7th generation
Impact: A malicious application may be able to execute arbitrary code
with system privileges
Description: A type confusion issue was addressed with improved
memory handling.
CVE-2020-3853: Brandon Azad of Google Project Zero
Kernel
Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4
and later, and iPod touch 7th generation
Impact: An application may be able to execute arbitrary code with
kernel privileges
Description: A memory corruption issue was addressed with improved
input validation.
CVE-2020-3860: Proteas of Qihoo 360 Nirvan Team
libxpc
Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4
and later, and iPod touch 7th generation
Impact: Processing a maliciously crafted string may lead to heap
corruption
Description: A memory corruption issue was addressed with improved
input validation.
CVE-2020-3856: Ian Beer of Google Project Zero
libxpc
Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4
and later, and iPod touch 7th generation
Impact: An application may be able to gain elevated privileges
Description: An out-of-bounds read was addressed with improved bounds
checking.
CVE-2020-3829: Ian Beer of Google Project Zero
Mail
Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4
and later, and iPod touch 7th generation
Impact: Turning off "Load remote content in messages" may not apply
to all mail previews
Description: This issue was addressed with improved setting
propagation.
CVE-2020-3873: Alexander Heinrich (@Sn0wfreeze) of Technische
Universität Darmstadt
Messages
Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4
and later, and iPod touch 7th generation
Impact: A person with physical access to an iOS device may be able to
access contacts from the lock screen
Description: An inconsistent user interface issue was addressed with
improved state management.
CVE-2020-3859: Simone PC of X10X (TWR)
Messages
Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4
and later, and iPod touch 7th generation
Impact: Users removed from an iMessage conversation may still be able
to alter state
Description: This issue was addressed with improved checks.
CVE-2020-3844: Lance Rodgers of Oxon Hill High School
Phone
Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4
and later, and iPod touch 7th generation
Impact: A person with physical access to an iOS device may be able to
access contacts from the lock screen
Description: A lock screen issue allowed access to contacts on a
locked device.
CVE-2020-3828: an anonymous researcher
Safari Login AutoFill
Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4
and later, and iPod touch 7th generation
Impact: A local user may unknowingly send a password unencrypted over
the network
Description: The issue was addressed with improved UI handling.
CVE-2020-3841: Sebastian Bicchi (@secresDoge) from Sec-Research
Screenshots
Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4
and later, and iPod touch 7th generation
Impact: Screenshots of the Messages app may reveal additional message
content
Description: An issued existed in the naming of screenshots.
CVE-2020-3874: Nicolas Luckie of Durham College
wifivelocityd
Available for: iPhone 6s and later, iPad Air 2 and later, iPad mini 4
and later, and iPod touch 7th generation
Impact: An application may be able to execute arbitrary code with
system privileges
Description: The issue was addressed with improved permissions logic.
CVE-2020-3838: Dayton Pidhirney (@_watbulb)
Additional recognition
IOSurface
We would like to acknowledge Liang Chen (@chenliang0817) for their
assistance.
Photos Storage
We would like to acknowledge Salman Husain of UC Berkeley for their
assistance.
Installation note:
This update is available through iTunes and Software Update on your
iOS device, and will not appear in your computer's Software Update
application, or in the Apple Downloads site. Make sure you have an
Internet connection and have installed the latest version of iTunes
from https://www.apple.com/itunes/
iTunes and Software Update on the device will automatically check
Apple's update server on its weekly schedule. When an update is
detected, it is downloaded and the option to be installed is
presented to the user when the iOS device is docked. We recommend
applying the update immediately if possible. Selecting Don't Install
will present the option the next time you connect your iOS device.
The automatic update process may take up to a week depending on the
day that iTunes or the device checks for updates. You may manually
obtain the update via the Check for Updates button within iTunes, or
the Software Update on your device.
To check that the iPhone, iPod touch, or iPad has been updated:
* Navigate to Settings
* Select General
* Select About. The version after applying this update
will be "iOS 13.3.1 and iPadOS 13.3.1".
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----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=4Udc
-----END PGP SIGNATURE-----
.
CVE-2020-3841: Sebastian Bicchi (@secresDoge) from Sec-Research
Installation note:
Safari 13.0.5 may be obtained from the Mac App Store
| VAR-202002-1159 | CVE-2020-3833 | Safari User Interface Mismatch Vulnerability in |
CVSS V2: 4.3 CVSS V3: 4.3 Severity: MEDIUM |
An inconsistent user interface issue was addressed with improved state management. This issue is fixed in Safari 13.0.5. Visiting a malicious website may lead to address bar spoofing. Safari Contains a user interface mismatch vulnerability due to poor state management.malicious Web Accessing the site can spoof the address bar. Apple Safari is a web browser of Apple (Apple), the default browser included with Mac OS X and iOS operating systems. A security vulnerability exists in versions of Apple Safari prior to 13.0.5. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
APPLE-SA-2020-1-28-5 Safari 13.0.5
Safari 13.0.5 is now available and addresses the following:
Safari
Available for: macOS Mojave and macOS High Sierra, and included in
macOS Catalina
Impact: Visiting a malicious website may lead to address bar spoofing
Description: An inconsistent user interface issue was addressed with
improved state management.
CVE-2020-3833: Nikhil Mittal (@c0d3G33k) of Payatu Labs (payatu.com)
Safari Login AutoFill
Available for: macOS Mojave and macOS High Sierra, and included in
macOS Catalina
Impact: A local user may unknowingly send a password unencrypted over
the network
Description: The issue was addressed with improved UI handling.
CVE-2020-3841: Sebastian Bicchi (@secresDoge) from Sec-Research
Installation note:
Safari 13.0.5 may be obtained from the Mac App Store.
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----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zlOg
-----END PGP SIGNATURE-----
| VAR-202002-1180 | CVE-2020-3861 | iTunes for Windows Vulnerability to gain access to protected parts of the file system |
CVSS V2: 3.6 CVSS V3: 7.1 Severity: HIGH |
The issue was addressed with improved permissions logic. This issue is fixed in iTunes for Windows 12.10.4. A user may gain access to protected parts of the file system. Apple iTunes for Windows is a media player application program based on Windows platform of Apple (Apple). WebKit is one of the web browser engine components. A security vulnerability exists in the WebKit component of Apple iTunes versions prior to 12.10.4 on Windows platforms.
CVE-2020-3861: Andrea Pierini (@decoder_it), Christian Danieli
(@padovah4ck)
Installation note:
iTunes for Windows 12.10.4 may be obtained from:
https://www.apple.com/itunes/download/
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----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YKVn
-----END PGP SIGNATURE-----
| VAR-202001-1829 | CVE-2020-8432 | Das U-Boot Double release vulnerability in |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
In Das U-Boot through 2020.01, a double free has been found in the cmd/gpt.c do_rename_gpt_parts() function. Double freeing may result in a write-what-where condition, allowing an attacker to execute arbitrary code. NOTE: this vulnerablity was introduced when attempting to fix a memory leak identified by static analysis. Das U-Boot There is a double release vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Das U-Boot is an open source firmware for Power Architecture, ARM, MIPS, x86 and other processors for embedded development.
Das U-Boot do_rename_gpt_parts () has two release vulnerabilities. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202405-23
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: U-Boot tools: double free vulnerability
Date: May 08, 2024
Bugs: #717000
ID: 202405-23
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
=======
A vulnerability has been discovered in U-Boot tools which can lead to
execution of arbitary code.
Background
=========
U-Boot tools provides utiiities for working with Das U-Boot.
Affected packages
================
Package Vulnerable Unaffected
------------------------- ------------ ------------
dev-embedded/u-boot-tools < 2020.04 >= 2020.04
Description
==========
A vulnerability has been discovered in U-Boot tools. Please review the
CVE identifier referenced below for details.
Workaround
=========
There is no known workaround at this time.
Resolution
=========
All U-Boot tools users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">\xdev-embedded/u-boot-tools-2020.04"
References
=========
[ 1 ] CVE-2020-8432
https://nvd.nist.gov/vuln/detail/CVE-2020-8432
Availability
===========
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202405-23
Concerns?
========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
======
Copyright 2024 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
| VAR-202001-1830 | CVE-2020-8438 | Ruckus ZoneFlex R500 In the device OS Command injection vulnerability |
CVSS V2: 9.0 CVSS V3: 7.2 Severity: HIGH |
Ruckus ZoneFlex R500 104.0.0.0.1347 devices allow an authenticated attacker to execute arbitrary OS commands via the hidden /forms/nslookupHandler form, as demonstrated by the nslookuptarget=|cat${IFS} substring. Ruckus ZoneFlex R500 Devices include: OS A command injection vulnerability exists.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. Ruckus ZoneFlex is a Wi-Fi access point
| VAR-202006-0825 | CVE-2019-17655 | FortiOS Vulnerability in plaintext storage of important information in |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A cleartext storage in a file or on disk (CWE-313) vulnerability in FortiOS SSL VPN 6.2.0 through 6.2.2, 6.0.9 and earlier and FortiProxy 2.0.0, 1.2.9 and earlier may allow an attacker to retrieve a logged-in SSL VPN user's credentials should that attacker be able to read the session file stored on the targeted device's system. FortiOS There is a vulnerability in plaintext storage of important information.Information may be obtained. Fortinet FortiOS is a set of security operating system dedicated to the FortiGate network security platform developed by Fortinet. The system provides users with various security functions such as firewall, anti-virus, IPSec/SSLVPN, Web content filtering and anti-spam. An information disclosure vulnerability exists in Fortinet FortiOS versions 6.2.0 to 6.2.2 and 6.0.9 and earlier versions
| VAR-202001-0210 | CVE-2019-4614 | IBM MQ and MQ Appliance Input validation vulnerability |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: Medium |
IBM MQ and IBM MQ Appliance 8.0 and 9.0 LTS client connecting to a Queue Manager could cause a SIGSEGV denial of service caused by converting an invalid message. IBM X-Force ID: 168639. IBM MQ and MQ Appliance Contains an input validation vulnerability. Vendors report this vulnerability IBM X-Force ID: 168639 Published as.Denial of service operation (DoS) May be in a state
| VAR-202001-1554 | CVE-2020-4207 | IBM Watson IoT Message Gateway Vulnerable to classical buffer overflow |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
IBM Watson IoT Message Gateway 2.0.0.x, 5.0.0.0, 5.0.0.1, and 5.0.0.2 is vulnerable to a buffer overflow, caused by improper bounds checking when handling a failed HTTP request with specific content in the headers. By sending a specially crafted HTTP request, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause a denial of service. IBM X-Force ID: 174972. Vendors report this vulnerability IBM X-Force ID: 174972 Published as.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. IBM Watson Studio Local is a set of collaborative data processing solutions from IBM in the United States. The product includes functions such as data analysis, data visualization, data cleaning and streaming data extraction. The vulnerability is caused by incorrectly verifying the data boundary when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other memory locations associated with it. Attackers can use this vulnerability to cause buffer overflow or heap overflow
| VAR-202001-1689 | CVE-2020-7997 | ASUS WRT-AC66U 3 RT Vulnerable to cross-site scripting |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
ASUS WRT-AC66U 3 RT 3.0.0.4.372_67 devices allow XSS via the Client Name field to the Parental Control feature. ASUS WRT-AC66U 3 RT Contains a cross-site scripting vulnerability.The information may be obtained and the information may be falsified. ASUS WRT-AC66U is a product of Taiwan ASUS Corporation.
A cross-site scripting vulnerability exists in ASUS WRT-AC66U. The vulnerability stems from the lack of proper validation of client data by web applications. An attacker could use this vulnerability to execute client code
| VAR-202001-0883 | CVE-2013-3093 | ASUS RT-N56U Cross-site request forgery vulnerability in devices |
CVSS V2: 9.3 CVSS V3: 8.8 Severity: HIGH |
ASUS RT-N56U devices allow CSRF. ASUS RT-N56U The device contains a cross-site request forgery vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state
| VAR-202001-0211 | CVE-2019-4620 | IBM MQ Appliance Input Validation Error Vulnerability |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
IBM MQ Appliance 8.0 and 9.0 LTS could allow a local attacker to bypass security restrictions caused by improper validation of environment variables. IBM X-Force ID: 168863. IBM MQ Appliance Contains an input validation vulnerability. Vendors report this vulnerability IBM X-Force ID: 168863 Published as.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. IBM MQ Appliance is an all-in-one device for rapid deployment of enterprise-level messaging middleware by IBM Corporation in the United States. The vulnerability stems from a network system or product that did not properly validate the input data. No detailed vulnerability details are provided at this time
| VAR-202001-0383 | CVE-2019-20216 | D-Link DIR-859 In the device OS Command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
D-Link DIR-859 1.05 and 1.06B01 Beta01 devices allow remote attackers to execute arbitrary OS commands via the urn: to the M-SEARCH method in ssdpcgi() in /htdocs/cgibin, because REMOTE_PORT is mishandled. The value of the urn: service/device is checked with the strstr function, which allows an attacker to concatenate arbitrary commands separated by shell metacharacters. D-Link DIR-859 Devices include: OS A command injection vulnerability exists.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. D-Link DIR-859 is a router device.
D-Link DIR-859 ssdpcgi () M-SEARCH method handles security vulnerabilities
| VAR-202001-0384 | CVE-2019-20217 | D-Link DIR-859 In the device OS Command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
D-Link DIR-859 1.05 and 1.06B01 Beta01 devices allow remote attackers to execute arbitrary OS commands via the urn: to the M-SEARCH method in ssdpcgi() in /htdocs/cgibin, because SERVER_ID is mishandled. The value of the urn: service/device is checked with the strstr function, which allows an attacker to concatenate arbitrary commands separated by shell metacharacters. D-Link DIR-859 Devices include: OS A command injection vulnerability exists.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. D-Link DIR-859 is a router device.
The D-Link DIR-859 ssdpcgi () M-SEARCH method handles a security vulnerability
| VAR-202001-0209 | CVE-2019-4568 | IBM MQ and MQ Appliance Input validation vulnerability |
CVSS V2: 4.3 CVSS V3: 5.9 Severity: Medium |
IBM MQ and IBM MQ Appliance 8.0 and 9.0 LTS could allow a remote attacker with intimate knowledge of the server to cause a denial of service when receiving data on the channel. IBM X-Force ID: 166629. IBM MQ and MQ Appliance Contains an input validation vulnerability. Vendors report this vulnerability IBM X-Force ID: 166629 Published as.Denial of service operation (DoS) May be in a state
| VAR-202001-0382 | CVE-2019-20215 | D-Link DIR-859 In the device OS Command injection vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
D-Link DIR-859 1.05 and 1.06B01 Beta01 devices allow remote attackers to execute arbitrary OS commands via a urn: to the M-SEARCH method in ssdpcgi() in /htdocs/cgibin, because HTTP_ST is mishandled. The value of the urn: service/device is checked with the strstr function, which allows an attacker to concatenate arbitrary commands separated by shell metacharacters. D-Link DIR-859 Devices include: OS A command injection vulnerability exists.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. D-Link DIR-859 is a router device.
The D-Link DIR-859 ssdpcgi () M-SEARCH method handles a security vulnerability
| VAR-202001-1483 | CVE-2018-19441 | Neato Botvac Connected Vulnerability regarding the use of inadequate random values in |
CVSS V2: 1.9 CVSS V3: 4.7 Severity: MEDIUM |
An issue was discovered in Neato Botvac Connected 2.2.0. The GenerateRobotPassword function of the NeatoCrypto library generates insufficiently random numbers for robot secret_key values used for local and cloud authentication/authorization. If an attacker knows the serial number and is able to estimate the time of first provisioning of a robot, he is able to brute force the generated secret_key of the robot. This is because the entropy of the secret_key exclusively relies on these two values, due to not seeding the random generator and using several constant inputs for secret_key computation. Serial numbers are printed on the packaging and equal the MAC address of the robot
| VAR-202001-1651 | CVE-2020-8087 | SMC Networks D3G0804W Vulnerabilities in devices |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
SMC Networks D3G0804W D3GNV5M-3.5.1.6.10_GA devices allow remote command execution by leveraging access to the Network Diagnostic Tools screen, as demonstrated by an admin login. The attacker must use a Parameter Pollution approach against goform/formSetDiagnosticToolsFmPing by providing the vlu_diagnostic_tools__ping_address parameter twice: once with a shell metacharacter and a command name, and once with a command argument. SMC Networks D3G0804W The device contains an unspecified vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. SMC Networks D3G0804W is a SMC network device.
The SMC Networks D3G0804W network diagnostic tool has a security vulnerability. Remote attackers can use this vulnerability to submit special requests and execute arbitrary commands
| VAR-202001-0278 | CVE-2019-17094 | Belkin WeMo Insight Switch Out of boundary write vulnerability in firmware |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
A Stack-based Buffer Overflow vulnerability in libbelkin_api.so component of Belkin WeMo Insight Switch firmware allows a local attacker to obtain code execution on the device. This issue affects: Belkin WeMo Insight Switch firmware version 2.00.11396 and prior versions. Belkin WeMo Insight Switch Firmware contains an out-of-bounds write vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state
| VAR-202001-0283 | CVE-2019-17102 | Bitdefender BOX 2 In Time-of-check Time-of-use (TOCTOU) Race condition vulnerability |
CVSS V2: 9.3 CVSS V3: 8.1 Severity: HIGH |
An exploitable command execution vulnerability exists in the recovery partition of Bitdefender BOX 2, version 2.0.1.91. The API method `/api/update_setup` does not perform firmware signature checks atomically, leading to an exploitable race condition (TOCTTOU) that allows arbitrary execution of system commands. This issue affects: Bitdefender Bitdefender BOX 2 versions prior to 2.1.47.36. Bitdefender BOX 2 In Time-of-check Time-of-use (TOCTOU) A race condition vulnerability exists.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. Bitdefender BOX is a smart home security control device from Bitdefender in Romania. The vulnerability originates from improper design or implementation during code development of a network system or product. No detailed vulnerability details are provided at this time
| VAR-202001-0808 | CVE-2019-19143 | TP-LINK TL-WR849N Authentication vulnerabilities in devices |
CVSS V2: 4.1 CVSS V3: 6.1 Severity: MEDIUM |
TP-LINK TL-WR849N 0.9.1 4.16 devices do not require authentication to replace the firmware via a POST request to the cgi/softup URI. TP-LINK TL-WR849N The device contains an authentication vulnerability.The information may be obtained and the information may be altered. TP-LINK TL-WR849N is a 300mbps WiFi router.
TP-LINK TL-WR849N version 0.9.1 4.16 has an authorization issue vulnerability. The vulnerability stems from a lack of authentication measures or insufficient authentication strength in a network system or product. No detailed vulnerability details are provided at this time