VARIoT IoT vulnerabilities database
| VAR-201905-1170 | CVE-2019-0086 | Intel(R) CSME and TXE for Dynamic Application Loader Vulnerability related to authorization, authority, and access control in software |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Insufficient access control vulnerability in Dynamic Application Loader software for Intel(R) CSME before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 and Intel(R) TXE 3.1.65, 4.0.15 may allow an unprivileged user to potentially enable escalation of privilege via local access. Both Intel Converged Security and Management Engine (CSME) and Intel TXE are products of Intel Corporation of the United States. Intel Converged Security and Management Engine is a security management engine. Intel TXE is a trusted execution engine with hardware authentication function used in CPU (Central Processing Unit). The vulnerability stems from the lack of effective permissions and access control measures in network systems or products. The following products and versions are affected: Intel CSME versions before 11.8.65, versions before 11.11.65, versions before 11.22.65, versions before 12.0.35; Intel TXE versions 3.1.65 and 4.0.15
| VAR-201906-0817 | CVE-2018-13381 | Fortinet FortiOS Buffer error vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A buffer overflow vulnerability in Fortinet FortiOS 6.0.0 through 6.0.4, 5.6.0 through 5.6.7, 5.4 and earlier versions and FortiProxy 2.0.0, 1.2.8 and earlier versions under SSL VPN web portal allows a non-authenticated attacker to perform a Denial-of-service attack via special craft message payloads. Fortinet FortiOS Contains a buffer error vulnerability.Denial of service (DoS) May be in a state. FortinetFortiOS is a set of Fortinet security operating systems dedicated to the FortiGate network security platform. The system provides users with multiple security features such as firewall, anti-virus, IPSec/SSLVPN, web content filtering and anti-spam. A buffer overflow vulnerability exists in FortinetFort iOS version 6.0.0 to 6.0.4, 5.6.0 to 5.6.7, and 5.4 and earlier. The vulnerability stems from a network system or product that does not properly validate data boundaries when performing operations on memory, causing erroneous read and write operations to be performed on other associated memory locations. An attacker could exploit the vulnerability to cause a buffer overflow or heap overflow. Fortinet FortiOS is prone to a buffer-overflow vulnerability.
Attackers can exploit this issue to cause denial-of-service conditions.
The following versions are vulnerable:
FortiOS 6.0.0 through 6.0.4
FortiOS 5.6.0 through 5.6.7
FortiOS 5.4 and prior
| VAR-201906-0201 | CVE-2019-5587 | Fortinet FortiOS VM Application input validation vulnerability |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
Lack of root file system integrity checking in Fortinet FortiOS VM application images all versions below 6.0.5 may allow attacker to implant malicious programs into the installing image by reassembling the image through specific methods. Fortinet FortiOS VM The application contains an input validation vulnerability.Information may be tampered with. Fortinet FortiOS VM is prone to a local security-bypass vulnerability.
Attackers can exploit this issue to bypass certain security restrictions to perform unauthorized actions. This may aid in further attacks.
Versions prior to FortiOS VM 6.0.5 are vulnerable. Fortinet FortiOS VM is a security operating system running on a virtualization platform developed by Fortinet. The system provides users with various security functions such as firewall, anti-virus, IPSec/SSLVPN, Web content filtering and anti-spam. The vulnerability is caused by the lack of integrity checks in the program. An attacker could exploit this vulnerability to execute unauthorized code or commands
| VAR-201905-0866 | CVE-2019-0172 | Android for Intel Unite(R) Client Vulnerabilities related to authorization, permissions, and access control |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
A logic issue in Intel Unite(R) Client for Android prior to version 4.0 may allow a remote attacker to potentially enable escalation of privilege via network access. Android for Intel Unite(R) Client Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. There is a security vulnerability in versions of Intel Unite(R) Client prior to 4.0 based on the Android platform. A remote attacker could exploit this vulnerability to elevate privileges
| VAR-201907-1444 | CVE-2019-10975 | Fuji Electric Alpha7 PC Loader Buffer Overflow Vulnerability |
CVSS V2: 3.3 CVSS V3: 6.6 Severity: MEDIUM |
An out-of-bounds read vulnerability has been identified in Fuji Electric Alpha7 PC Loader Versions 1.1 and prior, which may crash the system. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of A7P files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the Administrator. The vulnerability stems from a network system or product that does not properly validate data boundaries when performing operations on memory, causing erroneous read and write operations to be performed on other associated memory locations. An attacker could exploit the vulnerability to cause a buffer overflow or heap overflow.
Successfully exploiting this issue allows an attackers to crash the affected application, denying service to legitimate users
| VAR-201910-0323 | CVE-2019-9699 | Symantec Messaging Gateway Vulnerable to information disclosure |
CVSS V2: 2.7 CVSS V3: 4.5 Severity: MEDIUM |
Symantec Messaging Gateway (prior to 10.7.0), may be susceptible to an information disclosure issue, which is a type of vulnerability that could potentially allow unauthorized access to data.
Attackers can exploit this issue to obtain sensitive information that may aid in launching further attacks. The product includes features such as antispam, antivirus, advanced content filtering, and data loss prevention. This vulnerability stems from configuration errors in network systems or products during operation
| VAR-201905-1178 | CVE-2019-0097 | Intel(R) AMT Input validation vulnerability |
CVSS V2: 4.0 CVSS V3: 4.9 Severity: MEDIUM |
Insufficient input validation vulnerability in subsystem for Intel(R) AMT before version 12.0.35 may allow a privileged user to potentially enable denial of service via network access. Intel(R) AMT Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Intel Active Management Technology (AMT) is a set of hardware-based computer remote active management technology software developed by Intel Corporation. An input validation error vulnerability exists in subsystems in versions prior to Intel AMT 12.0.35. The vulnerability stems from the failure of the network system or product to properly validate the input data
| VAR-201905-1250 | CVE-2019-11094 | Intel Multiple vulnerabilities in the product |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Insufficient input validation in system firmware for Intel (R) NUC Kit may allow an authenticated user to potentially enable escalation of privilege, denial of service, and/or information disclosure via local access. Intel NUC Kit is a small desktop computer produced by Intel Corporation of the United States. The vulnerability stems from the failure of the network system or product to properly validate the input data
| VAR-201905-1112 | CVE-2018-20007 | Xiaomi Yeelight Smart AI Speaker Access Control Error Vulnerability |
CVSS V2: 7.2 CVSS V3: 6.8 Severity: MEDIUM |
Yeelight Smart AI Speaker 3.3.10_0074 devices have improper access control over the UART interface, allowing physical attackers to obtain a root shell. The attacker can then exfiltrate the audio data, read cleartext Wi-Fi credentials in a log file, or access other sensitive device and user information. XiaomiYeelightSmartAISpeaker is a smart speaker from Xiaomi Technology of China. An access control error vulnerability exists in the XiaomiYeelightSmartAISpeaker3.3.10_0074 release. The vulnerability stems from a network system or product that does not properly restrict access to resources from unauthorized roles. An attacker could exploit this vulnerability to gain access to webmasters
| VAR-201905-1427 | No CVE | Buffer Overflow Vulnerability in Aviosoft DVD X Player Standard Software |
CVSS V2: 2.1 CVSS V3: - Severity: LOW |
Aviosoft DVD X Player Standard is a DVD player from Aviosoft, USA.
Aviosoft DVD X Player Standard software has a buffer overflow vulnerability. The vulnerability is due to the inability to handle malformed playlist files, and an attacker could exploit the vulnerability to execute arbitrary code in the context of an application.
| VAR-201905-1428 | No CVE | Aviosoft DVD X Player Standard software has an elevation of privilege vulnerability |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
Aviosoft DVD X Player Standard is a DVD player from Aviosoft, USA.
An elevation of privilege vulnerability exists in Aviosoft DVD X Player Standard software. Allows an attacker to exploit a vulnerability to submit a specially crafted request to execute arbitrary code in the context of the application.
| VAR-201905-1429 | No CVE | Aviosoft DVD X Player Standar software has untrusted search path vulnerability |
CVSS V2: 7.2 CVSS V3: - Severity: HIGH |
Aviosoft DVD X Player Standard is a DVD player from Aviosoft, USA.
Aviosoft DVD X Player Standar software has an untrusted search path vulnerability. An attacker could use a malicious file in the directory to exploit the vulnerability to invoke the permissions of the application user to execute arbitrary code.
| VAR-201907-1422 | CVE-2018-7838 | Modicon M580 CPU and Modicon Ethernet Module Buffer error vulnerability |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: High |
A CWE-119 Buffer Errors vulnerability exists in Modicon M580 CPU - BMEP582040, all versions before V2.90, and Modicon Ethernet Module BMENOC0301, all versions before V2.16, which could cause denial of service on the FTP service of the controller or the Ethernet BMENOC module when it receives a FTP CWD command with a data length greater than 1020 bytes. A power cycle is then needed to reactivate the FTP service. Modicon M580 CPU and Modicon Ethernet Module Contains a buffer error vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state
| VAR-201905-1172 | CVE-2019-0090 | Intel Multiple vulnerabilities in the product |
CVSS V2: 4.4 CVSS V3: 7.1 Severity: HIGH |
Insufficient access control vulnerability in subsystem for Intel(R) CSME before versions 11.x, 12.0.35 Intel(R) TXE 3.x, 4.x, Intel(R) Server Platform Services 3.x, 4.x, Intel(R) SPS before version SPS_E3_05.00.04.027.0 may allow an unauthenticated user to potentially enable escalation of privilege via physical access. Intel(R) CSME and SPS Contains an access control vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Intel Converged Security and Management Engine (CSME) and others are products of Intel Corporation of the United States. Intel Converged Security and Management Engine is a security management engine. Intel Server Platform Services (SPS) is a server platform service program. Intel TXE is a trusted execution engine with hardware authentication function used in CPU (Central Processing Unit). An access control error vulnerability exists in subsystems in several Intel products. This vulnerability stems from network systems or products not properly restricting access to resources from unauthorized roles. The following products and versions are affected: Intel CSME before 11.x, before 12.0.35; TXE before 3.x, before 4.x; SPS before 3.x, before 4.x, SPS_E3_05.00.04 Versions prior to .027.0
| VAR-201905-1173 | CVE-2019-0091 | Intel Multiple vulnerabilities in the product |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
Code injection vulnerability in installer for Intel(R) CSME before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 and Intel(R) TXE 3.1.65, 4.0.15 may allow an unprivileged user to potentially enable escalation of privilege via local access. Intel(R) CSME and TXE Contains a code injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Both Intel Converged Security and Management Engine (CSME) and Intel TXE are products of Intel Corporation of the United States. Intel Converged Security and Management Engine is a security management engine. Intel TXE is a trusted execution engine with hardware authentication function used in CPU (Central Processing Unit). A code injection vulnerability exists in the installer in Intel CSME and Intel TXE. This vulnerability stems from the fact that the network system or product does not correctly filter special elements in the process of constructing code segments from external input data. Attackers can exploit this vulnerability to generate illegal code segments and modify the expected execution control flow of network systems or components. The following products and versions are affected: Intel CSME versions before 11.8.65, versions before 11.11.65, versions before 11.22.65, versions before 12.0.35; Intel TXE versions 3.1.65 and 4.0.15
| VAR-201905-1175 | CVE-2019-0093 | Intel Multiple vulnerabilities in the product |
CVSS V2: 2.1 CVSS V3: 4.4 Severity: MEDIUM |
Insufficient data sanitization vulnerability in HECI subsystem for Intel(R) CSME before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 and Intel(R) SPS before version SPS_E3_05.00.04.027.0 may allow a privileged user to potentially enable information disclosure via local access. Intel(R) CSME and SPS Contains an information disclosure vulnerability.Information may be obtained. Both Intel Converged Security and Management Engine (CSME) and Intel Server Platform Services (SPS) are products of Intel Corporation of the United States. Intel Converged Security and Management Engine is a security management engine. Intel Server Platform Services is a server platform service program. The HECI subsystem is one of the host embedded controller interface subsystems. This vulnerability stems from configuration errors in network systems or products during operation. An unauthorized attacker could exploit the vulnerability to obtain sensitive information of the affected components. The following products and versions are affected: Intel CSME versions prior to 11.8.65, versions prior to 11.11.65, versions prior to 11.22.65, versions prior to 12.0.35; Intel SPS versions prior to SPS_E3_05.00.04.027.0
| VAR-201905-1179 | CVE-2019-0098 | Intel Multiple vulnerabilities in the product |
CVSS V2: 7.2 CVSS V3: 6.8 Severity: MEDIUM |
Logic bug vulnerability in subsystem for Intel(R) CSME before version 12.0.35, Intel(R) TXE before 3.1.65, 4.0.15 may allow an unauthenticated user to potentially enable escalation of privilege via physical access. Intel(R) CSME and TXE Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Both Intel Converged Security and Management Engine (CSME) and Intel TXE are products of Intel Corporation of the United States. Intel Converged Security and Management Engine is a security management engine. Intel TXE is a trusted execution engine with hardware authentication function used in CPU (Central Processing Unit). Vulnerabilities in permissions and access control issues exist in the subsystems of Intel CSME versions prior to 12.0.35 and Intel TXE versions prior to 3.1.65 and 4.0.15. The vulnerability stems from the lack of effective permissions and access control measures in network systems or products
| VAR-201905-0872 | CVE-2019-0153 | Intel Multiple vulnerabilities in the product |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
Buffer overflow in subsystem in Intel(R) CSME 12.0.0 through 12.0.34 may allow an unauthenticated user to potentially enable escalation of privilege via network access. Intel(R) CSME Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Intel Converged Security and Management Engine (CSME) is a security management engine of Intel Corporation. A buffer overflow vulnerability exists in the subsystems of Intel CSME versions 12.0.0 to 12.0.34. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc
| VAR-201905-1180 | CVE-2019-0099 | Intel Multiple vulnerabilities in the product |
CVSS V2: 4.6 CVSS V3: 6.8 Severity: MEDIUM |
Insufficient access control vulnerability in subsystem in Intel(R) SPS before version SPS_E3_05.00.04.027.0 may allow an unauthenticated user to potentially enable escalation of privilege via physical access. Intel(R) SPS Contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Intel Server Platform Services (SPS) is a server platform service program of Intel Corporation. Permission and access control issues exist in subsystems of Intel SPS versions prior to SPS_E3_05.00.04.027.0. The vulnerability stems from the lack of effective permissions and access control measures in network systems or products
| VAR-201905-0864 | CVE-2019-0170 | Intel Multiple vulnerabilities in the product |
CVSS V2: 4.6 CVSS V3: 6.7 Severity: MEDIUM |
Buffer overflow in subsystem in Intel(R) DAL before version 12.0.35 may allow a privileged user to potentially enable escalation of privilege via local access. Intel(R) DAL Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Intel Dynamic Application Loader (DAL) is a dynamic application loader from Intel Corporation. The product supports running Java code on CSME firmware. A buffer overflow vulnerability exists in the subsystems of Intel DAL prior to 12.0.35. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc