VARIoT IoT vulnerabilities database
| VAR-201904-1418 | CVE-2018-4327 | iOS Memory corruption vulnerability |
CVSS V2: 9.3 CVSS V3: 7.8 Severity: HIGH |
A memory corruption issue was addressed with improved memory handling. This issue affected versions prior to iOS 11.4.1. Apple iOS is an operating system developed by Apple (Apple) for mobile devices. Core Bluetooth is one of the core Bluetooth components. A buffer error vulnerability exists in the Core Bluetooth component of Apple iOS prior to 11.4.1. An attacker could exploit this vulnerability to execute arbitrary code with system privileges
| VAR-201904-1338 | CVE-2018-4470 | macOS High Sierra Privacy vulnerabilities |
CVSS V2: 4.3 CVSS V3: 3.3 Severity: LOW |
A privacy issue in the handling of Open Directory records was addressed with improved indexing. This issue affected versions prior to macOS High Sierra 10.13.6. macOS High Sierra Is Open Directory A privacy vulnerability exists because of a flaw in the processing of record indexes.Information may be obtained. Apple macOS High Sierra is a set of dedicated operating systems developed by Apple (Apple) for Mac computers. Accounts is one of the user account components. This vulnerability is due to the lack of security measures such as authentication, access control, and rights management in network systems or products
| VAR-201904-0750 | CVE-2018-4145 | plural Apple Memory corruption vulnerability in products |
CVSS V2: 6.8 CVSS V3: 8.8 Severity: HIGH |
Multiple memory corruption issues were addressed with improved memory handling. This issue affected versions prior to iOS 11.3, tvOS 11.3, watchOS 4.3, Safari 11.1, iTunes 12.7.4 for Windows, iCloud for Windows 7.4. plural Apple The product has a memory corruption vulnerability due to incomplete memory handling.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Apple iOS, etc. are all products of Apple (Apple). Apple iOS is an operating system developed for mobile devices. tvOS is a smart TV operating system. Safari is a web browser that is the default browser included with the Mac OS X and iOS operating systems. WebKit is one of the web browser engine components. A buffer error vulnerability exists in the WebKit component of several Apple products. An attacker could exploit this vulnerability to execute code through maliciously crafted web content
| VAR-201904-0749 | CVE-2018-4216 | iOS Logic vulnerability in |
CVSS V2: 4.3 CVSS V3: 5.5 Severity: MEDIUM |
A logic issue existed in the handling of call URLs. This issue was addressed with improved state management. This issue affected versions prior to iOS 11.4.1. iOS Have a call URL There is a logic vulnerability because of incomplete processing.Information may be tampered with. Apple iOS is an operating system developed by Apple (Apple) for mobile devices. Phone is one of the phone components. An attacker could exploit this vulnerability with a malicious application to bypass the call confirmation prompt
| VAR-201904-0526 | CVE-2017-13911 | plural macOS Vulnerability related to input validation in products |
CVSS V2: 9.3 CVSS V3: 7.8 Severity: HIGH |
A configuration issue was addressed with additional restrictions. This issue affected versions prior to macOS X El Capitan 10.11.6 Security Update 2018-002, macOS Sierra 10.12.6 Security Update 2018-002, macOS High Sierra 10.13.2. Apple macOS Sierra, etc. are all products. Apple macOS Sierra is a dedicated operating system developed for Mac computers. are all products of Apple (Apple). Apple macOS High Sierra is a dedicated operating system developed for Mac computers. Apple OS X El Capitan is a dedicated operating system developed for Mac computers. The vulnerability stems from the existence of unreasonable files in the use of network systems or components configuration, parameter configuration, etc
| VAR-201904-0181 | CVE-2019-6550 | Advantech WebAccess/SCADA Buffer error vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
Advantech WebAccess/SCADA, Versions 8.3.5 and prior. Multiple stack-based buffer overflow vulnerabilities, caused by a lack of proper validation of the length of user-supplied data, may allow remote code execution. Advantech WebAccess/SCADA Contains a buffer error vulnerability.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess Client. Authentication is not required to exploit this vulnerability.The specific flaw exists within bwwebd.exe, which is accessed through the 0x2711 IOCTL in the webvrpcs process. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. A buffer overflow vulnerability exists in Advantech WebAccess/SCADA. This vulnerability stems from the fact that when the network system or product performs operations on the memory, the data boundary is not correctly verified, resulting in execution to other associated memory locations. erroneous read and write operations
| VAR-201904-0182 | CVE-2019-6552 | Advantech WebAccess/SCADA Command injection vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
Advantech WebAccess/SCADA, Versions 8.3.5 and prior. Multiple command injection vulnerabilities, caused by a lack of proper validation of user-supplied data, may allow remote code execution. Advantech WebAccess/SCADA Contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Advantech WebAccess Client. Authentication is not required to exploit this vulnerability.The specific flaw exists within bwrunmie.exe, which is accessed through the 0x2711 IOCTL in the webvrpcs process. An attacker can leverage this vulnerability to execute code in the context of Administrator. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess/SCADA is prone to the following vulnerabilities:
1. Multiple command-injection vulnerabilities
2. A denial-of-service vulnerability
3. Multiple stack-based buffer-overflow vulnerabilities
An attacker can exploit these issues to inject and execute arbitrary commands in the context of the application. Failed exploit attempts will result in denial-of-service conditions. The vulnerability comes from the fact that the network system or product does not correctly filter special elements in the process of constructing executable commands from external input data
| VAR-201904-0184 | CVE-2019-6554 | Advantech WebAccess/SCADA Incorrect access control vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Advantech WebAccess/SCADA, Versions 8.3.5 and prior. An improper access control vulnerability may allow an attacker to cause a denial-of-service condition. Advantech WebAccess/SCADA Contains an access control vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Authentication is not required to exploit this vulnerability.The specific flaw exists within UninstallWA.exe, which is accessed through the 0x2711 IOCTL in the webvrpcs process. Advantech WebAccess/SCADA is a set of browser-based SCADA software from Advantech. The software supports dynamic graphical display and real-time data control, and provides the ability to remotely control and manage automation equipment. Advantech WebAccess/SCADA is prone to the following vulnerabilities:
1. Multiple command-injection vulnerabilities
2. A denial-of-service vulnerability
3. Multiple stack-based buffer-overflow vulnerabilities
An attacker can exploit these issues to inject and execute arbitrary commands in the context of the application. Failed exploit attempts will result in denial-of-service conditions
| VAR-201904-0376 | CVE-2019-7477 | SonicWall SonicOS and SonicOSv TLS CBC Cipher Vulnerabilities in the use of cryptographic algorithms |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A vulnerability in SonicWall SonicOS and SonicOSv TLS CBC Cipher allow remote attackers to obtain sensitive plaintext data when CBC cipher suites are enabled. This vulnerability affected SonicOS Gen 5 version 5.9.1.10 and earlier, Gen 6 version 6.2.7.3, 6.5.1.3, 6.5.2.2, 6.5.3.1, 6.2.7.8, 6.4.0.0, 6.5.1.8, 6.0.5.3-86o and SonicOSv 6.5.0.2-8v_RC363 (VMWARE), 6.5.0.2.8v_RC367 (AZURE), SonicOSv 6.5.0.2.8v_RC368 (AWS), SonicOSv 6.5.0.2.8v_RC366 (HYPER_V). SonicWall SonicOS is a set of operating system specially designed for SonicWall firewall equipment of SonicWall Company in the United States. This vulnerability stems from the incorrect use of relevant cryptographic algorithms in network systems or products, resulting in incorrect encryption of content, weak encryption, and sensitive information stored in plain text
| VAR-201904-0374 | CVE-2019-7475 | SonicWall SonicOS and SonicOSv Access control vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
A vulnerability in SonicWall SonicOS and SonicOSv with management enabled system on specific configuration allow unprivileged user to access advanced routing services. This vulnerability affected SonicOS Gen 5 version 5.9.1.10 and earlier, Gen 6 version 6.2.7.3, 6.5.1.3, 6.5.2.2, 6.5.3.1, 6.2.7.8, 6.4.0.0, 6.5.1.8, 6.0.5.3-86o and SonicOSv 6.5.0.2-8v_RC363 (VMWARE), 6.5.0.2.8v_RC367 (AZURE), SonicOSv 6.5.0.2.8v_RC368 (AWS), SonicOSv 6.5.0.2.8v_RC366 (HYPER_V). SonicWall SonicOS and SonicOSv Contains an access control vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. SonicWall SonicOS is a set of operating system specially designed for SonicWall firewall equipment of SonicWall Company in the United States. An access control error vulnerability exists in SonicWall SonicOS where a network system or product does not properly restrict access to resources from unauthorized roles
| VAR-201904-0373 | CVE-2019-7474 | SonicWall SonicOS and SonicOSv Access control vulnerability |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
A vulnerability in SonicWall SonicOS and SonicOSv, allow authenticated read-only admin to leave the firewall in an unstable state by downloading certificate with specific extension. This vulnerability affected SonicOS Gen 5 version 5.9.1.10 and earlier, Gen 6 version 6.2.7.3, 6.5.1.3, 6.5.2.2, 6.5.3.1, 6.2.7.8, 6.4.0.0, 6.5.1.8, 6.0.5.3-86o and SonicOSv 6.5.0.2-8v_RC363 (VMWARE), 6.5.0.2.8v_RC367 (AZURE), SonicOSv 6.5.0.2.8v_RC368 (AWS), SonicOSv 6.5.0.2.8v_RC366 (HYPER_V). SonicWall SonicOS and SonicOSv Contains an access control vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. SonicWall SonicOS is a set of operating system specially designed for SonicWall firewall equipment of SonicWall Company in the United States. An access control error vulnerability exists in SonicWall SonicOS. This vulnerability stems from network systems or products not properly restricting access to resources from unauthorized roles
| VAR-201904-0618 | CVE-2018-17990 | D-Link DSL-3782 In the device OS Command injection vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
An issue was discovered on D-Link DSL-3782 devices with firmware 1.01. An OS command injection vulnerability in Acl.asp allows a remote authenticated attacker to execute arbitrary OS commands via the ScrIPaddrEndTXT parameter. D-Link DSL-3782 The device includes OS A command injection vulnerability exists.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. D-LinkDSL-3782 is a wireless router from D-Link Corporation of Taiwan, China. An operating system command injection vulnerability exists in D-LinkDSL-3782 using firmware version 1.01. This vulnerability is caused by external input data constructing operating system executable commands. The network system or product does not properly filter special characters, commands, etc
| VAR-201904-0604 | CVE-2018-13289 | Synology Router Manager Vulnerable to information disclosure |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
Information exposure vulnerability in SYNO.FolderSharing.List in Synology Router Manager (SRM) before 1.1.7-6941-2 allows remote attackers to obtain sensitive information via the (1) folder_path or (2) real_path parameter. The vulnerability is caused by errors in network system or product configuration during operation
| VAR-201904-0600 | CVE-2018-13285 | Synology Router Manager In OS Command injection vulnerability |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
Command injection vulnerability in ftpd in Synology Router Manager (SRM) before 1.1.7-6941-1 allows remote authenticated users to execute arbitrary OS commands via the (1) MKD or (2) RMD command. Synology Router Manager (SRM) is a software for configuring and managing Synology routers developed by Synology, Taiwan. The vulnerability comes from the fact that the network system or product does not properly filter special elements in the process of constructing executable commands from external input data. Attackers can exploit this vulnerability to execute illegal commands
| VAR-201904-0602 | CVE-2018-13287 | Synology Router Manager Vulnerabilities related to authorization, permissions, and access control |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
Incorrect default permissions vulnerability in synouser.conf in Synology Router Manager (SRM) before 1.1.7-6941-1 allows remote authenticated users to obtain sensitive information via the world readable configuration. Synology Router Manager (SRM) is a software for configuring and managing Synology routers developed by Synology, Taiwan. An attacker could exploit this vulnerability to obtain sensitive information
| VAR-201904-0617 | CVE-2018-17989 | D-Link DSL-3782 Cross-Site Scripting Vulnerability |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
A stored XSS vulnerability exists in the web interface on D-Link DSL-3782 devices with firmware 1.01 that allows authenticated attackers to inject a JavaScript or HTML payload inside the ACL page. The injected payload would be executed in a user's browser when "/cgi-bin/New_GUI/Acl.asp" is requested. D-Link DSL-3782 The device contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. D-LinkDSL-3782 is a wireless router from D-Link Corporation of Taiwan, China. A cross-site scripting vulnerability exists in the web interface in D-LinkDSL-3782 using firmware version 1.01. This vulnerability stems from the lack of proper validation of client data by web applications. An attacker could exploit the vulnerability to execute client code
| VAR-201904-0582 | CVE-2018-17564 | Grandstream GXP16xx VoIP phone Access control vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
A Malformed Input String to /cgi-bin/delete_CA on Grandstream GXP16xx VoIP 1.0.4.128 phones allows attackers to delete configuration parameters and gain admin access to the device. Grandstream GXP16xx VoIP phone Contains an access control vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Grandstream GXP16xx VoIP is a 16XX series IP phone of Grandstream. An input validation error vulnerability exists in Grandstream GXP16xx VoIP version 1.0.4.128. The vulnerability stems from the failure of the network system or product to properly validate the input data
| VAR-201904-0581 | CVE-2018-17563 | Grandstream GXP16xx VoIP phone Input validation vulnerability |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
A Malformed Input String to /cgi-bin/api-get_line_status on Grandstream GXP16xx VoIP 1.0.4.128 phones allows attackers to dump the device's configuration in cleartext. Grandstream GXP16xx VoIP phone Contains an input validation vulnerability.Information may be obtained
| VAR-201904-0605 | CVE-2018-13290 | Synology DiskStation Manager Vulnerable to information disclosure |
CVSS V2: 4.0 CVSS V3: 4.3 Severity: MEDIUM |
Information exposure vulnerability in SYNO.Core.ACL in Synology Router Manager (SRM) before 1.1.7-6941-2 allows remote authenticated users to determine the existence of files or obtain sensitive information of files via the file_path parameter. Synology DiskStation Manager (DSM) Contains an information disclosure vulnerability.Information may be obtained. Synology Router Manager (SRM) is a software for configuring and managing Synology routers developed by Synology, Taiwan. The SYNO.Core.ACL in versions earlier than Synology SRM 1.1.7-6941-2 has an information disclosure vulnerability, which is caused by configuration errors in the network system or product during operation. An unauthorized attacker could exploit the vulnerability to obtain sensitive information of the affected components
| VAR-201904-0607 | CVE-2018-13292 | Synology Router Manager Vulnerable to information disclosure |
CVSS V2: 4.0 CVSS V3: 4.3 Severity: MEDIUM |
Information exposure vulnerability in /usr/syno/etc/mount.conf in Synology Router Manager (SRM) before 1.1.7-6941-2 allows remote authenticated users to obtain sensitive information via the world readable configuration. There is an information disclosure vulnerability in the /usr/syno/etc/mount.conf file in versions prior to Synology SRM 1.1.7-6941-2, which is caused by errors in network system or product configuration during operation. An unauthorized attacker could exploit the vulnerability to obtain sensitive information of the affected components