VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201912-0095 CVE-2019-6678 plural BIG-IP Vulnerability related to input validation in products CVSS V2: 4.3
CVSS V3: 5.3
Severity: MEDIUM
On BIG-IP versions 15.0.0-15.0.1, 14.1.0-14.1.2.2, 14.0.0-14.0.1, and 13.1.0-13.1.3.1, the TMM process may restart when the packet filter feature is enabled. plural BIG-IP The product contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. A security vulnerability exists in the F5 BIG-IP. Attackers can exploit this vulnerability to cause TMM to restart, making it unable to process traffic temporarily. The following products and versions are affected: F5 BIG-IP 15.0.0 to 15.0.1, 14.1.0 to 14.1.2, 14.0.0 to 14.0.1, 13.1.0 to 13.1.3
VAR-201912-0092 CVE-2019-6147 Forcepoint NGFW Security Management Center Vulnerable to incorrect type conversion CVSS V2: 4.3
CVSS V3: 5.9
Severity: MEDIUM
Forcepoint NGFW Security Management Center (SMC) versions lower than 6.5.12 or 6.7.1 have a rare issue that in specific circumstances can corrupt the internal configuration database. When the database is corrupted, the SMC might produce an incorrect IPsec configuration for the Forcepoint Next Generation Firewall (NGFW), possibly resulting in settings that are weaker than expected. All SMC versions lower than 6.5.12 or 6.7.1 are vulnerable. Forcepoint NGFW Security Management Center (SMC) Contains an invalid type conversion vulnerability.Information may be altered
VAR-201912-1556 CVE-2019-19150 BIG-IP APM Vulnerable to information disclosure from log files CVSS V2: 3.5
CVSS V3: 4.9
Severity: MEDIUM
On versions 15.0.0-15.0.1.1, 14.1.0-14.1.2, 14.0.0-14.0.1, 13.1.0-13.1.3.1, 12.1.0-12.1.5, and 11.5.2-11.6.5.1, the BIG-IP APM system logs the client-session-id when a per-session policy is attached to the virtual server with debug logging enabled. BIG-IP APM Contains a vulnerability related to information disclosure from log files.Information may be obtained. F5 BIG-IP APM is a set of access and security solutions from F5 Corporation of the United States. The product provides unified access to business-critical applications and networks. A security vulnerability exists in F5 BIG-IP APM versions 15.0.0 through 15.0.1, 14.1.0 through 14.1.2, and 14.0.0 through 14.0.1 due to the fact that authenticated administrators could access The client-session-id stored in the log file. An attacker could exploit this vulnerability to access client-session-id
VAR-201912-0836 CVE-2019-7489 SonicWall Email Security Appliance vulnerabilities CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
A vulnerability in SonicWall Email Security appliance allow an unauthenticated user to perform remote code execution. This vulnerability affected Email Security Appliance version 10.0.2 and earlier. SonicWall Email Security The appliance contains an unspecified vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. An attacker could exploit this vulnerability with a specially crafted request to execute arbitrary code on the system
VAR-201912-0835 CVE-2019-7488 SonicWall Email Security Appliance vulnerable to password requests CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
Weak default password cause vulnerability in SonicWall Email Security appliance which leads to attacker gain access to appliance database. This vulnerability affected Email Security Appliance version 10.0.2 and earlier
VAR-201912-0475 CVE-2019-8463 Check Point Endpoint Security Client Link interpretation vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
A denial of service vulnerability was reported in Check Point Endpoint Security Client for Windows before E82.10, that could allow service log file to be written to non-standard locations
VAR-201912-0142 CVE-2019-3431 ZTE ZXCLOUD GoldenData VAP Vulnerability related to information leakage from cache in products CVSS V2: 5.0
CVSS V3: 9.8
Severity: CRITICAL
All versions up to V4.01.01.02 of ZTE ZXCLOUD GoldenData VAP product have encryption problems vulnerability. Attackers could sniff unencrypted account and password through the network for front-end system access. ZTE ZXCLOUD GoldenData VAP The product contains a vulnerability related to information disclosure from the cache.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. ZTE ZXCLOUD GoldenData VAP is a set of big data solutions of China ZTE Corporation (ZTE). An attacker could exploit this vulnerability to obtain sensitive information by sniffing the network
VAR-201912-0141 CVE-2019-3430 ZTE ZXCLOUD GoldenData VAP Information disclosure vulnerability in products CVSS V2: 4.0
CVSS V3: 4.9
Severity: MEDIUM
All versions up to V4.01.01.02 of ZTE ZXCLOUD GoldenData VAP product have an information disclosure vulnerability. Attackers could use this vulnerability to collect data information and damage the system. ZTE ZXCLOUD GoldenData VAP is a set of big data solutions of China ZTE Corporation (ZTE). This vulnerability stems from configuration errors in network systems or products during operation
VAR-201912-0140 CVE-2019-3429 ZTE ZXCLOUD GoldenData VAP Vulnerability related to information leakage from log files in products CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
All versions up to V4.01.01.02 of ZTE ZXCLOUD GoldenData VAP product have a file reading vulnerability. Attackers could obtain log file information without authorization, causing the disclosure of sensitive information. ZTE ZXCLOUD GoldenData VAP is a set of big data solutions of China ZTE Corporation (ZTE)
VAR-201912-0103 CVE-2019-6686 BIG-IP Input validation vulnerability CVSS V2: 5.0
CVSS V3: 5.3
Severity: MEDIUM
On BIG-IP versions 15.0.0-15.0.1.1, 14.1.0-14.1.2, 14.0.0-14.0.1, 13.1.0-13.1.3.1, the Traffic Management Microkernel (TMM) might stop responding after the total number of diameter connections and pending messages on a single virtual server has reached 32K. BIG-IP Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. F5 BIG-IP is an application delivery platform integrated with network traffic management, application security management, load balancing and other functions of the US company F5. Local Traffic Manager (LTM) is one of the local traffic managers. A security vulnerability exists in the F5 BIG-IP LTM. An attacker can exploit this vulnerability to make TMM generate a core file and restart it, causing the BIG-IP system to fail to process traffic. The following products and versions are affected: F5 BIG-IP LTM from version 15.0.0 to version 15.0.1, version 14.1.0 to version 14.1.2, version 14.0.0 to version 14.0.1, version 13.1.0 to version 13.1.3 Version
VAR-201912-0099 CVE-2019-6682 BIG-IP APM Vulnerable to resource exhaustion CVSS V2: 4.3
CVSS V3: 7.5
Severity: HIGH
On versions 15.0.0-15.0.1.1, 14.0.0-14.1.2.2, 13.1.0-13.1.3.1, 12.1.0-12.1.5, and 11.5.2-11.6.5.1, the BIG-IP ASM system may consume excessive resources when processing certain types of HTTP responses from the origin web server. This vulnerability is only known to affect resource-constrained systems in which the security policy is configured with response-side features, such as Data Guard or response-side learning. BIG-IP APM Contains a resource exhaustion vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. F5 BIG-IP ASM is a Web Application Firewall (WAF) of F5 Corporation in the United States, which provides secure remote access, protects emails, simplifies Web access control, and enhances network and application performance. A security vulnerability exists in F5 BIG-IP ASM. A remote attacker can exploit this vulnerability to consume a large amount of resources, interrupt traffic processing, and cause a denial of service. The following products and versions are affected: F5 BIG-IP ASM version 15.0.0 to 15.0.1, 14.1.0 to 14.1.2, 13.1.0 to 13.1.3, 12.1.0 to 12.1.5 Version, 11.5.2 to 11.6.5
VAR-201912-0098 CVE-2019-6681 BIG-IP Vulnerabilities related to lack of effective post-lifetime resource release CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
On BIG-IP versions 15.0.0-15.0.1.1, 14.1.0-14.1.2, 14.0.0-14.0.1, 13.1.0-13.1.3.1, and 12.1.0-12.1.5, a memory leak in Multicast Forwarding Cache (MFC) handling in tmrouted. BIG-IP Is vulnerable to a lack of free resources after a valid lifetime.Service operation interruption (DoS) There is a possibility of being put into a state
VAR-201912-2009 No CVE Xiaomi AI speaker-mDNS service has heap corruption vulnerability CVSS V2: 6.1
CVSS V3: -
Severity: MEDIUM
Xiaomi AI speaker is a smart speaker product produced by Xiaomi. There is a heap corruption vulnerability in the Xiaomi AI Speaker-mDNS service. The vulnerability is due to the laxity of the boundary check when the program service parses the request message, resulting in arbitrary writing of the memory heap. An attacker could use the vulnerability to execute arbitrary code.
VAR-201912-2008 No CVE Xiaomi AI Speaker-Denial of Service Vulnerability in mDNS Service CVSS V2: 6.1
CVSS V3: -
Severity: MEDIUM
Xiaomi AI speaker is a smart speaker product produced by Xiaomi. There is a denial of service vulnerability in the Xiaomi AI Speaker-mDNS service. The vulnerability is caused by the program service failing to fully judge the malformed message when parsing the request message, causing the parsing thread to fall into an infinite loop. An attacker could use the vulnerability to launch a denial of service attack.
VAR-201912-2004 No CVE H3C ACG1000-M Switch Has Weak Password Vulnerability CVSS V2: 6.4
CVSS V3: -
Severity: MEDIUM
Xinhua San Technology Co., Ltd. has the overall capabilities of a full range of digital infrastructures such as computing, storage, networking, and security, providing cloud computing, big data, intelligent connectivity, information security, new security, Internet of Things, edge computing, artificial intelligence, 5G, etc. One-stop digital solutions, as well as end-to-end technical services. H3C ACG1000-M switch has weak password vulnerability. Allows an attacker to log in to the background of the system to obtain sensitive information.
VAR-201912-1499 CVE-2019-15912 plural ASUS Input validation vulnerabilities in products CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
An issue was discovered on ASUS HG100, MW100, WS-101, TS-101, AS-101, MS-101, DL-101 devices using ZigBee PRO. Attackers can use the ZigBee trust center rejoin procedure to perform mutiple denial of service attacks. plural ASUS The product contains an input validation vulnerability.Denial of service (DoS) May be in a state. ASUS SmartHome Gateway HG100 and other products are products of ASUS, Taiwan. ASUS SmartHome Gateway HG100 is a smart home central control gateway device. ASUS WS-101 is a smart switch sensor. TS-101 is a temperature / humidity sensor. There are security vulnerabilities in ASUS SmartHome Gateway HG100 version 1.05.12, WS-101 version 1.05.12, and TS-101 version 1.05.12 (using ZigBee PRO). An attacker could use this vulnerability to cause a denial of service
VAR-201912-1502 CVE-2019-15915 plural Xiaomi Input validation vulnerabilities in product devices CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
An issue was discovered on Xiaomi DGNWG03LM, ZNCZ03LM, MCCGQ01LM, RTCGQ01LM devices. Attackers can utilize the "discover ZigBee network procedure" to perform a denial of service attack. plural Xiaomi The product device contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Xiaomi DGNWG03LM and other products are products of Xiaomi China. Xiaomi DGNWG03LM is a smart home gateway device. ZNCZ03LM is a smart switch device. MCCGQ01LM is a smart remote control. There are security holes in several Xiaomi products
VAR-201912-0162 CVE-2019-4655 IBM MQ Input validation vulnerability CVSS V2: 4.0
CVSS V3: 4.3
Severity: Medium
IBM MQ 9.1.0.0, 9.1.0.1, 9.1.0.2, 9.1.0.3, 9.1.1, 9.1.2, and 9.1.3 is vulnerable to a denial of service attack that would allow an authenticated user to reset client connections due to an error within the Data Conversion routine. IBM X-Force ID: 170966. IBM MQ Contains an input validation vulnerability. Vendors have confirmed this vulnerability IBM X-Force ID: 170966 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state
VAR-201912-1498 CVE-2019-15911 plural ASUS Vulnerability in sending clear information of important information in products CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
An issue was discovered on ASUS HG100, MW100, WS-101, TS-101, AS-101, MS-101, DL-101 devices using ZigBee PRO. Because of insecure key transport in ZigBee communication, attackers can obtain sensitive information, cause the multiple denial of service attacks, take over smart home devices, and tamper with messages. plural ASUS The product contains a vulnerability in transmitting sensitive information in the clear.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. ASUS SmartHome Gateway HG100 and other products are products of ASUS, Taiwan. ASUS SmartHome Gateway HG100 is a smart home central control gateway device. ASUS WS-101 is a smart switch sensor. TS-101 is a temperature / humidity sensor. There are security vulnerabilities in ASUS SmartHome Gateway HG100 version 1.05.12, WS-101 version 1.05.12 and TS-101 version 1.05.12 (using ZigBee PRO), which originated from the program's insecure transmission of keys
VAR-201912-1500 CVE-2019-15913 plural Xiaomi Vulnerability in authentication bypass by user control key in product device CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
An issue was discovered on Xiaomi DGNWG03LM, ZNCZ03LM, MCCGQ01LM, WSDCGQ01LM, RTCGQ01LM devices. Because of insecure key transport in ZigBee communication, causing attackers to gain sensitive information and denial of service attack, take over smart home devices, and tamper with messages. plural Xiaomi The product device contains a vulnerability related to authentication bypass by the user control key.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. Xiaomi DGNWG03LM and other products are products of Xiaomi China. Xiaomi DGNWG03LM is a smart home gateway device. ZNCZ03LM is a smart switch device. MCCGQ01LM is a smart remote control. There are security vulnerabilities in several Xiaomi products, which stem from the program's insecure transmission of keys