VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201908-1450 CVE-2017-18483 ANNKE SP1 HD Cross-site scripting vulnerability in wireless camera devices CVSS V2: 4.3
CVSS V3: 6.1
Severity: MEDIUM
ANNKE SP1 HD wireless camera 3.4.1.1604071109 devices allow XSS via a crafted SSID. The vulnerability stems from the lack of correct validation of client data in WEB applications. An attacker could exploit this vulnerability to execute client code
VAR-201908-1660 CVE-2018-20959 Jura E8 Vulnerabilities related to security functions in devices CVSS V2: 4.8
CVSS V3: 8.1
Severity: HIGH
Jura E8 devices lack Bluetooth connection security. Jura E8 The device contains vulnerabilities related to security functions.Tampering with information and disrupting service operations (DoS) There is a possibility of being put into a state. JURA E8 is a coffee machine produced by American JURA Company. This vulnerability is due to the lack of security measures such as authentication, access control, and rights management in network systems or products
VAR-201908-1118 CVE-2016-10861 Neet AirStream NAS1.1 Device cross-site request forgery vulnerability CVSS V2: 4.3
CVSS V3: 6.5
Severity: MEDIUM
Neet AirStream NAS1.1 devices allow CSRF attacks that cause the settings binary to change the AP name and password. Neet AirStream NAS1.1 The device contains a cross-site request forgery vulnerability.Information may be tampered with
VAR-201908-2192 No CVE Wenwangweishi all-gigabit multi-WAN smart router has weak password vulnerability CVSS V2: 5.0
CVSS V3: -
Severity: MEDIUM
Beijing Wenwang Yilian Technology Co., Ltd. is a network environment security service provider for Internet service places. The Wenwangweishi all-gigabit multi-WAN smart router has a weak password vulnerability. Attackers can use this vulnerability to obtain sensitive information.
VAR-201908-0040 CVE-2019-5301 Huawei Honor V20 Information Disclosure Vulnerability CVSS V2: 4.3
CVSS V3: 3.3
Severity: LOW
Huawei smart phones Honor V20 with the versions before 9.0.1.161(C00E161R2P2) have an information leak vulnerability. An attacker may trick a user into installing a malicious application. Due to coding error during layer information processing, attackers can exploit this vulnerability to obtain some layer information. Huawei Honor is a smartphone from China's Huawei
VAR-201908-0835 CVE-2019-1957 Cisco IoT Field Network Director Resource management vulnerability CVSS V2: 7.8
CVSS V3: 7.5
Severity: HIGH
A vulnerability in the web interface of Cisco IoT Field Network Director could allow an unauthenticated, remote attacker to trigger high CPU usage, resulting in a denial of service (DoS) condition on an affected device. The vulnerability is due to improper handling of Transport Layer Security (TLS) renegotiation requests. An attacker could exploit this vulnerability by sending renegotiation requests at a high rate. A successful exploit could increase the resource usage on the system, eventually leading to a DoS condition. Cisco IoT Field Network Director Contains a resource management vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. The system has functions such as equipment management, asset tracking and intelligent metering. The web management interface in Cisco IoT-FND versions prior to 4.4.2-11 has a resource management error vulnerability. The vulnerability stems from improper management of system resources (such as memory, disk space, files, etc.) by network systems or products
VAR-201908-0834 CVE-2019-1956 Cisco SPA112 2-Port Phone Adapter Cross-Site Scripting Vulnerability CVSS V2: 3.5
CVSS V3: 4.8
Severity: MEDIUM
A vulnerability in the web-based interface of the Cisco SPA112 2-Port Phone Adapter could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against another user of the device. The vulnerability is due to insufficient validation of user-supplied input by the web-based interface of the affected device. An attacker could exploit this vulnerability by inserting malicious code in one of the configuration fields. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. The vulnerability stems from the program's failure to fully validate input submitted by users
VAR-201908-0855 CVE-2019-1949 Cisco Firepower Management Center Vulnerable to cross-site scripting CVSS V2: 3.5
CVSS V3: 4.8
Severity: MEDIUM
A vulnerability in the web-based management interface of Cisco Firepower Management Center could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected system. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information
VAR-201908-0908 CVE-2019-14474 eQ-3 Homematic CCU3 Input Validation Error Vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
eQ-3 Homematic CCU3 3.47.15 and prior has Improper Input Validation in function 'Call()' of ReGa core logic process, resulting in the ability to start a Denial of Service. Due to Improper Authorization an attacker can obtain a session ID from CVE-2019-9583 or a valid guest/user/admin account can start this attack too. eQ-3 Homematic CCU3 Contains an input validation vulnerability. This vulnerability CVE-2019-9583 Vulnerability associated with.Service operation interruption (DoS) There is a possibility of being put into a state. eQ-3 Homematic CCU3 is a central control unit for a smart home system from German eQ-3 company. The vulnerability stems from the failure of the network system or product to properly validate the input data
VAR-201908-0547 CVE-2019-1929 Microsoft Windows for Cisco Webex Network Recording Player and Webex Player Buffer error vulnerability CVSS V2: 9.3
CVSS V3: 7.8
Severity: HIGH
Multiple vulnerabilities in Cisco Webex Network Recording Player for Microsoft Windows and Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerabilities exist because the affected software improperly validates Advanced Recording Format (ARF) and Webex Recording Format (WRF) files. An attacker could exploit these vulnerabilities by sending a user a malicious ARF or WRF file through a link or email attachment and persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of the targeted user. The vulnerability is caused by the program not properly validating ARF and WRF files
VAR-201908-0539 CVE-2019-1944 Cisco Adaptive Security Appliance Vulnerable to information disclosure CVSS V2: 4.4
CVSS V3: 7.3
Severity: HIGH
Multiple vulnerabilities in the smart tunnel functionality of Cisco Adaptive Security Appliance (ASA) could allow an authenticated, local attacker to elevate privileges to the root user or load a malicious library file while the tunnel is being established. For more information about these vulnerabilities, see the Details section of this security advisory. Cisco Adaptive Security Appliance (ASA) Contains an information disclosure vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Cisco Adaptive Security Appliances Software (ASA Software) is a set of firewall and network security platform of American Cisco (Cisco). The platform provides features such as highly secure access to data and network resources. The smart tunnel function in Cisco ASA has an input validation error vulnerability. The vulnerability is caused by the loose permissions assigned to the local system files created by the ASA smart tunnel on the client device. A local attacker could exploit this vulnerability by running a malicious script to elevate privileges to root without the user's knowledge
VAR-201908-1963 CVE-2019-1952 Cisco Enterprise NFV Infrastructure Software Path traversal vulnerability CVSS V2: 4.6
CVSS V3: 6.7
Severity: MEDIUM
A vulnerability in the CLI of Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an authenticated, local attacker to overwrite or read arbitrary files. The attacker would need valid administrator privilege-level credentials. This vulnerability is due to improper input validation of CLI command arguments. An attacker could exploit this vulnerability by using directory traversal techniques when executing a vulnerable command. A successful exploit could allow the attacker to overwrite or read arbitrary files on an affected device. Cisco Enterprise NFV Infrastructure Software (NFVIS) Contains a path traversal vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Cisco Enterprise NFV Infrastructure Software (NFVIS) is a set of NVF infrastructure software platform of Cisco (Cisco). The platform can realize the full lifecycle management of virtualized services through the central coordinator and controller. A path traversal vulnerability exists in the CLI in versions prior to Cisco Enterprise NFVIS 3.10.1
VAR-201908-1962 CVE-2019-1953 Cisco Enterprise NFV Infrastructure Software Vulnerable to information disclosure from log files CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
A vulnerability in the web portal of Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an authenticated, remote attacker to view a password in clear text. The vulnerability is due to incorrectly logging the admin password when a user is forced to modify the default password when logging in to the web portal for the first time. Subsequent password changes are not logged and other accounts are not affected. An attacker could exploit this vulnerability by viewing the admin clear text password and using it to access the affected system. The attacker would need a valid user account to exploit this vulnerability. The platform can realize the full lifecycle management of virtualized services through the central coordinator and controller
VAR-201908-1959 CVE-2019-1971 Cisco Enterprise NFV Infrastructure Software In OS Command injection vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
A vulnerability in the web portal of Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an unauthenticated, remote attacker to perform a command injection attack and execute arbitrary commands with root privileges. The vulnerability is due to insufficient input validation by the web portal framework. An attacker could exploit this vulnerability by providing malicious input during web portal authentication. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system. Cisco Enterprise NFV Infrastructure Software (NFVIS) is a set of NVF infrastructure software platform of Cisco (Cisco). The platform can realize the full lifecycle management of virtualized services through the central coordinator and controller
VAR-201908-1960 CVE-2019-1961 Cisco Enterprise NFV Infrastructure Software Vulnerable to information disclosure from log files CVSS V2: 6.8
CVSS V3: 4.9
Severity: MEDIUM
A vulnerability in Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an authenticated, remote attacker to read arbitrary files on the underlying operating system (OS) of an affected device. The vulnerability is due to the improper input validation of tar packages uploaded through the Web Portal to the Image Repository. An attacker could exploit this vulnerability by uploading a crafted tar package and viewing the log entries that are generated. A successful exploit could allow the attacker to read arbitrary files on the underlying OS. The platform can realize the full lifecycle management of virtualized services through the central coordinator and controller
VAR-201908-0853 CVE-2019-1946 Cisco Enterprise NFV Infrastructure Software Authentication vulnerability CVSS V2: 6.4
CVSS V3: 6.5
Severity: MEDIUM
A vulnerability in the web-based management interface of Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an unauthenticated, remote attacker to bypass authentication and get limited access to the web-based management interface. The vulnerability is due to an incorrect implementation of authentication in the web-based management interface. An attacker could exploit this vulnerability by sending a crafted authentication request to the web-based management interface on an affected system. A successful exploit could allow the attacker to view limited configuration details and potentially upload a virtual machine image. Cisco Enterprise NFV Infrastructure Software (NFVIS) Contains an authentication vulnerability.Information may be obtained and information may be altered. The platform can realize the full lifecycle management of virtualized services through the central coordinator and controller
VAR-201908-0850 CVE-2019-1973 Cisco Enterprise NFV Infrastructure Software Vulnerable to cross-site scripting CVSS V2: 3.5
CVSS V3: 4.8
Severity: MEDIUM
A vulnerability in the web portal framework of Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface. The vulnerability is due to improper input validation of log file content stored on the affected device. An attacker could exploit this vulnerability by modifying a log file with malicious code and getting a user to view the modified log file. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or to access sensitive, browser-based information. The platform can realize the full lifecycle management of virtualized services through the central coordinator and controller
VAR-201908-0849 CVE-2019-1972 Cisco Enterprise NFV Infrastructure Software Vulnerabilities related to authorization, permissions, and access control CVSS V2: 7.2
CVSS V3: 6.7
Severity: MEDIUM
A vulnerability the Cisco Enterprise NFV Infrastructure Software (NFVIS) restricted CLI could allow an authenticated, local attacker with valid administrator-level credentials to elevate privileges and execute arbitrary commands on the underlying operating system as root. The vulnerability is due to insufficient restrictions during the execution of an affected CLI command. An attacker could exploit this vulnerability by leveraging the insufficient restrictions during the execution of an affected command. A successful exploit could allow the attacker to elevate privileges and execute arbitrary commands on the underlying operating system as root. Cisco Enterprise NFV Infrastructure Software (NFVIS) Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Cisco Enterprise NFV Infrastructure Software (NFVIS) is a set of NVF infrastructure software platform of Cisco (Cisco). The platform can realize the full lifecycle management of virtualized services through the central coordinator and controller
VAR-201908-0843 CVE-2019-1960 Cisco Enterprise NFV Infrastructure Software Input validation vulnerability CVSS V2: 2.1
CVSS V3: 4.4
Severity: MEDIUM
Multiple vulnerabilities in Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an authenticated, local attacker to read arbitrary files on the underlying operating system (OS) of an affected device. For more information about these vulnerabilities, see the Details section of this advisory. Cisco Enterprise NFV Infrastructure Software (NFVIS) Contains an input validation vulnerability.Information may be obtained. The platform can realize the full lifecycle management of virtualized services through the central coordinator and controller. The vulnerability is caused by the program not performing proper input validation on parameters
VAR-201908-0837 CVE-2019-1959 Cisco Enterprise NFV Infrastructure Software Input validation vulnerability CVSS V2: 2.1
CVSS V3: 4.4
Severity: MEDIUM
Multiple vulnerabilities in Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an authenticated, local attacker to read arbitrary files on the underlying operating system (OS) of an affected device. For more information about these vulnerabilities, see the Details section of this advisory. Cisco Enterprise NFV Infrastructure Software (NFVIS) Contains an input validation vulnerability.Information may be obtained. The platform can realize the full lifecycle management of virtualized services through the central coordinator and controller. The vulnerability is caused by the program not performing proper input validation on parameters