VARIoT IoT vulnerabilities database
| VAR-201906-0901 | CVE-2018-18880 | Columbia Weather MicroServer Firmware cross-site scripting vulnerability |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
In firmware version MS_2.6.9900 of Columbia Weather MicroServer, a networkdiags.php reflected Cross-site scripting (XSS) vulnerability allows remote authenticated users to inject arbitrary web script. ColumbiaWeatherSystemsWeatherMicroServer is a weather monitoring device from Columbia WeatherSystems, USA. A cross-site scripting vulnerability exists in ColumbiaWeatherSystemsWeatherMicroServerMS_2.6.9900 and earlier that caused the program to fail to validate input correctly. A remote attacker can exploit this vulnerability to execute arbitrary Wbe scripts. A directory traversal vulnerability
2. Multiple cross-site scripting vulnerabilities
3. An authentication bypass vulnerability
4. A remote code-injection vulnerability
5. A denial-of-service vulnerability
An attacker may leverage these issues to view arbitrary files within the context of the server, execute arbitrary script code in the browser of the victim in the context of the affected site, steal cookie-based authentication credentials, gain access to sensitive information or cause denial-of-service condition. This may aid in further attacks
| VAR-201903-1739 | No CVE | Command execution vulnerability in Philips smart wireless speakers |
CVSS V2: 8.3 CVSS V3: - Severity: HIGH |
Philips Smart Wireless Speaker is an artificial intelligence-based music player that can be networked.
A command execution vulnerability exists in Philips Smart Wireless Speakers, which could allow an attacker to execute arbitrary commands with administrator privileges.
| VAR-201910-1511 | CVE-2018-4002 | CUJO Smart Firewall Vulnerability in recursive control |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
An exploitable denial-of-service vulnerability exists in the mdnscap binary of the CUJO Smart Firewall running firmware 7003. When parsing labels in mDNS packets, the firewall unsafely handles label compression pointers, leading to an uncontrolled recursion that eventually exhausts the stack, crashing the mdnscap process. An unauthenticated attacker can send an mDNS message to trigger this vulnerability. CUJOSmartFirewall is a home smart firewall device from CUJO. This vulnerability stems from the failure of the program to safely process compressed pointers when parsing tags in mDNS packets
| VAR-201910-1512 | CVE-2018-4031 | CUJO Smart Firewall Code injection vulnerability |
CVSS V2: 10.0 CVSS V3: 10.0 Severity: CRITICAL |
An exploitable vulnerability exists in the safe browsing function of the CUJO Smart Firewall, version 7003. The flaw lies in the way the safe browsing function parses HTTP requests. The server hostname is extracted from captured HTTP/HTTPS requests and inserted as part of a Lua statement without prior sanitization, which results in arbitrary Lua script execution in the kernel. An attacker could send an HTTP request to exploit this vulnerability. CUJO Smart Firewall Contains a code injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. CUJO Smart Firewall is a home intelligent firewall device produced by CUJO Company in the United States
| VAR-201906-0899 | CVE-2018-18878 | Columbia Weather MicroServer Input validation vulnerability |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
In firmware version MS_2.6.9900 of Columbia Weather MicroServer, the BACnet daemon does not properly validate input, which could allow a remote attacker to send specially crafted packets causing the device to become unavailable. Columbia Weather MicroServer Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. ColumbiaWeatherSystemsWeatherMicroServer is a weather monitoring device from Columbia WeatherSystems, USA. An input validation vulnerability exists in ColumbiaWeatherSystemsWeatherMicroServerMS_2.6.9900 and earlier. A directory traversal vulnerability
2. Multiple cross-site scripting vulnerabilities
3. An authentication bypass vulnerability
4. A remote code-injection vulnerability
5. A denial-of-service vulnerability
An attacker may leverage these issues to view arbitrary files within the context of the server, execute arbitrary script code in the browser of the victim in the context of the affected site, steal cookie-based authentication credentials, gain access to sensitive information or cause denial-of-service condition. This may aid in further attacks. The vulnerability stems from the failure of the network system or product to properly validate the input data
| VAR-201903-0388 | CVE-2019-3855 | libssh2 Input validation error vulnerability |
CVSS V2: 9.3 CVSS V3: 8.8 Severity: HIGH |
An integer overflow flaw which could lead to an out of bounds write was discovered in libssh2 before 1.8.1 in the way packets are read from the server. A remote attacker who compromises a SSH server may be able to execute code on the client system when a user connects to the server. libssh2 is prone to multiple security vulnerabilities.
Attackers can exploit these issues to execute arbitrary code, perform unauthorized actions, cause denial-of-service conditions, retrieve sensitive information; other attacks may also be possible. It can execute remote commands and file transfers, and at the same time provide a secure transmission channel for remote programs. An integer overflow vulnerability exists in libssh2. The vulnerability is caused by the '_libssh2_transport_read()' function not properly checking the packet_length value from the server. 6) - i386, x86_64
3. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: libssh2 security update
Advisory ID: RHSA-2019:0679-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2019:0679
Issue date: 2019-03-28
CVE Names: CVE-2019-3855 CVE-2019-3856 CVE-2019-3857
CVE-2019-3863
====================================================================
1. Summary:
An update for libssh2 is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - x86_64
Red Hat Enterprise Linux Client Optional (v. 7) - noarch, x86_64
Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64
Red Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch, x86_64
Red Hat Enterprise Linux Server (v. 7) - ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Server Optional (v. 7) - noarch, ppc64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux Workstation (v. 7) - x86_64
Red Hat Enterprise Linux Workstation Optional (v. 7) - noarch, x86_64
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - aarch64, ppc64le, s390x
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7) - aarch64, noarch, ppc64le, s390x
3. Description:
The libssh2 packages provide a library that implements the SSH2 protocol.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing these updated packages, all running applications using
libssh2 must be restarted for this update to take effect.
5. Package List:
Red Hat Enterprise Linux Client (v. 7):
Source:
libssh2-1.4.3-12.el7_6.2.src.rpm
x86_64:
libssh2-1.4.3-12.el7_6.2.i686.rpm
libssh2-1.4.3-12.el7_6.2.x86_64.rpm
libssh2-debuginfo-1.4.3-12.el7_6.2.i686.rpm
libssh2-debuginfo-1.4.3-12.el7_6.2.x86_64.rpm
Red Hat Enterprise Linux Client Optional (v. 7):
noarch:
libssh2-docs-1.4.3-12.el7_6.2.noarch.rpm
x86_64:
libssh2-debuginfo-1.4.3-12.el7_6.2.i686.rpm
libssh2-debuginfo-1.4.3-12.el7_6.2.x86_64.rpm
libssh2-devel-1.4.3-12.el7_6.2.i686.rpm
libssh2-devel-1.4.3-12.el7_6.2.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source:
libssh2-1.4.3-12.el7_6.2.src.rpm
x86_64:
libssh2-1.4.3-12.el7_6.2.i686.rpm
libssh2-1.4.3-12.el7_6.2.x86_64.rpm
libssh2-debuginfo-1.4.3-12.el7_6.2.i686.rpm
libssh2-debuginfo-1.4.3-12.el7_6.2.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional (v. 7):
noarch:
libssh2-docs-1.4.3-12.el7_6.2.noarch.rpm
x86_64:
libssh2-debuginfo-1.4.3-12.el7_6.2.i686.rpm
libssh2-debuginfo-1.4.3-12.el7_6.2.x86_64.rpm
libssh2-devel-1.4.3-12.el7_6.2.i686.rpm
libssh2-devel-1.4.3-12.el7_6.2.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source:
libssh2-1.4.3-12.el7_6.2.src.rpm
ppc64:
libssh2-1.4.3-12.el7_6.2.ppc.rpm
libssh2-1.4.3-12.el7_6.2.ppc64.rpm
libssh2-debuginfo-1.4.3-12.el7_6.2.ppc.rpm
libssh2-debuginfo-1.4.3-12.el7_6.2.ppc64.rpm
ppc64le:
libssh2-1.4.3-12.el7_6.2.ppc64le.rpm
libssh2-debuginfo-1.4.3-12.el7_6.2.ppc64le.rpm
s390x:
libssh2-1.4.3-12.el7_6.2.s390.rpm
libssh2-1.4.3-12.el7_6.2.s390x.rpm
libssh2-debuginfo-1.4.3-12.el7_6.2.s390.rpm
libssh2-debuginfo-1.4.3-12.el7_6.2.s390x.rpm
x86_64:
libssh2-1.4.3-12.el7_6.2.i686.rpm
libssh2-1.4.3-12.el7_6.2.x86_64.rpm
libssh2-debuginfo-1.4.3-12.el7_6.2.i686.rpm
libssh2-debuginfo-1.4.3-12.el7_6.2.x86_64.rpm
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7):
Source:
libssh2-1.4.3-12.el7_6.2.src.rpm
aarch64:
libssh2-1.4.3-12.el7_6.2.aarch64.rpm
libssh2-debuginfo-1.4.3-12.el7_6.2.aarch64.rpm
ppc64le:
libssh2-1.4.3-12.el7_6.2.ppc64le.rpm
libssh2-debuginfo-1.4.3-12.el7_6.2.ppc64le.rpm
s390x:
libssh2-1.4.3-12.el7_6.2.s390.rpm
libssh2-1.4.3-12.el7_6.2.s390x.rpm
libssh2-debuginfo-1.4.3-12.el7_6.2.s390.rpm
libssh2-debuginfo-1.4.3-12.el7_6.2.s390x.rpm
Red Hat Enterprise Linux Server Optional (v. 7):
noarch:
libssh2-docs-1.4.3-12.el7_6.2.noarch.rpm
ppc64:
libssh2-debuginfo-1.4.3-12.el7_6.2.ppc.rpm
libssh2-debuginfo-1.4.3-12.el7_6.2.ppc64.rpm
libssh2-devel-1.4.3-12.el7_6.2.ppc.rpm
libssh2-devel-1.4.3-12.el7_6.2.ppc64.rpm
ppc64le:
libssh2-debuginfo-1.4.3-12.el7_6.2.ppc64le.rpm
libssh2-devel-1.4.3-12.el7_6.2.ppc64le.rpm
s390x:
libssh2-debuginfo-1.4.3-12.el7_6.2.s390.rpm
libssh2-debuginfo-1.4.3-12.el7_6.2.s390x.rpm
libssh2-devel-1.4.3-12.el7_6.2.s390.rpm
libssh2-devel-1.4.3-12.el7_6.2.s390x.rpm
x86_64:
libssh2-debuginfo-1.4.3-12.el7_6.2.i686.rpm
libssh2-debuginfo-1.4.3-12.el7_6.2.x86_64.rpm
libssh2-devel-1.4.3-12.el7_6.2.i686.rpm
libssh2-devel-1.4.3-12.el7_6.2.x86_64.rpm
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7):
aarch64:
libssh2-debuginfo-1.4.3-12.el7_6.2.aarch64.rpm
libssh2-devel-1.4.3-12.el7_6.2.aarch64.rpm
noarch:
libssh2-docs-1.4.3-12.el7_6.2.noarch.rpm
ppc64le:
libssh2-debuginfo-1.4.3-12.el7_6.2.ppc64le.rpm
libssh2-devel-1.4.3-12.el7_6.2.ppc64le.rpm
s390x:
libssh2-debuginfo-1.4.3-12.el7_6.2.s390.rpm
libssh2-debuginfo-1.4.3-12.el7_6.2.s390x.rpm
libssh2-devel-1.4.3-12.el7_6.2.s390.rpm
libssh2-devel-1.4.3-12.el7_6.2.s390x.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source:
libssh2-1.4.3-12.el7_6.2.src.rpm
x86_64:
libssh2-1.4.3-12.el7_6.2.i686.rpm
libssh2-1.4.3-12.el7_6.2.x86_64.rpm
libssh2-debuginfo-1.4.3-12.el7_6.2.i686.rpm
libssh2-debuginfo-1.4.3-12.el7_6.2.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 7):
noarch:
libssh2-docs-1.4.3-12.el7_6.2.noarch.rpm
x86_64:
libssh2-debuginfo-1.4.3-12.el7_6.2.i686.rpm
libssh2-debuginfo-1.4.3-12.el7_6.2.x86_64.rpm
libssh2-devel-1.4.3-12.el7_6.2.i686.rpm
libssh2-devel-1.4.3-12.el7_6.2.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2019-3855
https://access.redhat.com/security/cve/CVE-2019-3856
https://access.redhat.com/security/cve/CVE-2019-3857
https://access.redhat.com/security/cve/CVE-2019-3863
https://access.redhat.com/security/updates/classification/#important
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2019 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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R5e5
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. 8) - aarch64, noarch, ppc64le, s390x, x86_64
3. Description:
Kernel-based Virtual Machine (KVM) offers a full virtualization solution
for Linux on numerous hardware platforms. The virt:rhel module contains
packages which provide user-space components used to run virtual machines
using KVM. The packages also provide APIs for managing and interacting with
the virtualized systems.
Security Fix(es):
* A flaw was found in the implementation of the "fill buffer", a mechanism
used by modern CPUs when a cache-miss is made on L1 CPU cache. If an
attacker can generate a load operation that would create a page fault, the
execution will continue speculatively with incorrect data from the fill
buffer while the data is fetched from higher level caches. This response
time can be measured to infer data in the fill buffer. (CVE-2018-12130)
* Modern Intel microprocessors implement hardware-level micro-optimizations
to improve the performance of writing data back to CPU caches. The write
operation is split into STA (STore Address) and STD (STore Data)
sub-operations. These sub-operations allow the processor to hand-off
address generation logic into these sub-operations for optimized writes.
Both of these sub-operations write to a shared distributed processor
structure called the 'processor store buffer'. As a result, an
unprivileged attacker could use this flaw to read private data resident
within the CPU's processor store buffer. (CVE-2018-12126)
* Microprocessors use a ‘load port’ subcomponent to perform load operations
from memory or IO. During a load operation, the load port receives data
from the memory or IO subsystem and then provides the data to the CPU
registers and operations in the CPU’s pipelines. Stale load operations
results are stored in the 'load port' table until overwritten by newer
operations. Certain load-port operations triggered by an attacker can be
used to reveal data about previous stale requests leaking data back to the
attacker via a timing side-channel. (CVE-2018-12127)
* Uncacheable memory on some microprocessors utilizing speculative
execution may allow an authenticated user to potentially enable information
disclosure via a side channel with local access. 7.3) - x86_64
3. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-4431-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
April 13, 2019 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : libssh2
CVE ID : CVE-2019-3855 CVE-2019-3856 CVE-2019-3857 CVE-2019-3858
CVE-2019-3859 CVE-2019-3860 CVE-2019-3861 CVE-2019-3862
CVE-2019-3863
Debian Bug : 924965
Chris Coulson discovered several vulnerabilities in libssh2, a SSH2
client-side library, which could result in denial of service,
information leaks or the execution of arbitrary code.
For the stable distribution (stretch), these problems have been fixed in
version 1.7.0-1+deb9u1.
We recommend that you upgrade your libssh2 packages.
For the detailed security status of libssh2 please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/libssh2
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----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scVb
-----END PGP SIGNATURE-----
| VAR-201903-0241 | CVE-2019-9835 | Fujitsu Wireless Keyboard Set LX901 Device access control vulnerability |
CVSS V2: 5.8 CVSS V3: 9.6 Severity: CRITICAL |
The receiver (aka bridge) component of Fujitsu Wireless Keyboard Set LX901 GK900 devices allows Keystroke Injection. This occurs because it accepts unencrypted 2.4 GHz packets, even though all legitimate communication uses AES encryption. Fujitsu Wireless Keyboard Set LX901 The device contains an access control vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Fujitsu Wireless Keyboard Set LX901 is prone to a security-bypass vulnerability.
Successfully exploiting this issue will allow an attacker to perform replay attacks. This may lead to other attacks. receiver is its receiver component. An attacker could exploit this vulnerability to inject keystrokes
| VAR-201903-0159 | CVE-2019-5616 | CircuitWerkes Sicon-8 Information Disclosure Vulnerability |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
CircuitWerkes Sicon-8, a hardware device used for managing electrical devices, ships with a web-based front-end controller and implements an authentication mechanism in JavaScript that is run in the context of a user's web browser. CircuitWerkes Sicon-8 Contains an information disclosure vulnerability.Information may be obtained. CircuitWerkes Sicon-8 is a full-featured dial-up launch site controller produced by CircuitWerkes in the United States. The product supports recording voice responses, etc. A security vulnerability exists in CircuitWerkes Sicon-8. An attacker could exploit this vulnerability to read all configured tags and retrieve the state of the tag interface
| VAR-201903-1024 | CVE-2018-18205 | Topvision CC8800 CMTS C-E Information disclosure vulnerability in devices |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Topvision CC8800 CMTS C-E devices allow remote attackers to obtain sensitive information via a direct request for /WebContent/startup.tar.gz with userName=admin in a cookie. Topvision CC8800 CMTS C-E The device contains an information disclosure vulnerability.Information may be obtained. Topvision CC8800 is a L2 C-DOCSIS coaxial access device produced by China Topvision Technology Co., Ltd. Security vulnerabilities exist in Topvision CC8800 series products
| VAR-201903-1415 | CVE-2018-20106 | yast2-printer Input validation vulnerability |
CVSS V2: 9.3 CVSS V3: 8.1 Severity: HIGH |
In yast2-printer up to and including version 4.0.2 the SMB printer settings don't escape characters in passwords properly. If a password with backticks or simliar characters is supplied this allows for executing code as root. This requires tricking root to enter such a password in yast. yast2-printer Contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. yast2-printer is a printer configuration module. There is a security vulnerability in yast2-printer 4.0.2 and earlier versions. An attacker could exploit this vulnerability to execute code as root
| VAR-201903-1273 | CVE-2018-19393 | Cobham Satcom Sailor 800 and 900 Device access control vulnerability |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Cobham Satcom Sailor 800 and 900 devices contained a vulnerability that allowed for arbitrary writing of content to the system's configuration file. This was exploitable via multiple attack vectors depending on the device's configuration. Further analysis also indicated this vulnerability could be leveraged to achieve a Denial of Service (DoS) condition, where the device would require a factory reset to return to normal operation. Cobham Satcom Sailor 800 and 900 The device contains an access control vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. CobhamSatcomSailor800 and CobhamSatcomSailor900 are both a shipborne maritime satellite broadband terminal equipment from Cobham, UK. An access control error vulnerability exists in CobhamSatcomSailor800 and 900. Business
| VAR-201903-1274 | CVE-2018-19394 | Cobham Satcom Sailor 800 and 900 Device cross-site scripting vulnerability |
CVSS V2: 3.5 CVSS V3: 4.8 Severity: MEDIUM |
Cobham Satcom Sailor 800 and 900 devices contained persistent XSS, which required administrative access to exploit. The vulnerability was exploitable by acquiring a copy of the device's configuration file, inserting an XSS payload into a relevant field (e.g., Satellite name), and then restoring the malicious configuration file. CobhamSatcomSailor800 and CobhamSatcomSailor900 are both a shipborne maritime satellite broadband terminal equipment from Cobham, UK. A cross-site scripting vulnerability exists in CobhamSatcomSailor800 and 900. A remote attacker can exploit this vulnerability to inject arbitrary web scripts or HTML
| VAR-201903-1336 | CVE-2018-19391 | Cobham Satcom Sailor 250 and 500 Device cross-site scripting vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
Cobham Satcom Sailor 250 and 500 devices before 1.25 contained persistent XSS, which could be exploited by an unauthenticated threat actor via the /index.lua?pageID=Phone%20book name field. Cobham Satcom Sailor 250 and 500 The device contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. CobhamSatcomSailor250 and CobhamSatcomSailor500 are both shipborne maritime satellite broadband terminal equipment from Cobham, UK. A cross-site scripting vulnerability exists in CobhamSatcomSailor250 and 500 with firmware versions prior to 1.25. A remote attacker can exploit this vulnerability to inject executable JavaScript code with the help of the name field
| VAR-201903-1337 | CVE-2018-19392 | Cobham Satcom Sailor 250 and 500 Vulnerabilities related to certificate and password management in devices |
CVSS V2: 5.0 CVSS V3: 9.8 Severity: CRITICAL |
Cobham Satcom Sailor 250 and 500 devices before 1.25 contained an unauthenticated password reset vulnerability. This could allow modification of any user account's password (including the default "admin" account), without prior knowledge of their password. All that is required is knowledge of the username and attack vector (/index.lua?pageID=Administration usernameAdmChange, passwordAdmChange1, and passwordAdmChange2 fields). Cobham Satcom Sailor 250 and 500 The device contains vulnerabilities related to certificate and password management.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. CobhamSatcomSailor250 and CobhamSatcomSailor500 are both shipborne maritime satellite broadband terminal equipment from Cobham, UK. There are security holes in CobhamSatcomSailor250 and 500 using firmware versions prior to 1.25
| VAR-201903-0180 | CVE-2019-6536 | LCDS LAquis SCADA Buffer Overflow Vulnerability |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
Opening a specially crafted LCDS LAquis SCADA before 4.3.1.71 ELS file may result in a write past the end of an allocated buffer, which may allow an attacker to execute remote code in the context of the current process. LCDS LAquis SCADA ELS File Contains an out-of-bounds vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of LAquis SCADA. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of ELS files. LCDS LAquis SCADA is a SCADA (Data Acquisition and Monitoring Control) system from LCDS, Brazil. The system is mainly used for data acquisition and process control of devices with communication technology. There is an out-of-bounds write vulnerability in LCDS LAquis SCADA. LAquis SCADA is prone to an arbitrary code-execution vulnerability. Failed attempts will likely cause a denial-of-service condition.
LAquis SCADA 4.1.0.4150 is vulnerable; other versions may also be vulnerable
| VAR-201903-0974 | CVE-2018-12189 | Intel CSME and TXE Vulnerabilities related to authorization, permissions, and access control |
CVSS V2: 2.1 CVSS V3: 4.4 Severity: MEDIUM |
Unhandled exception in Content Protection subsystem in Intel CSME before versions 11.8.60, 11.11.60, 11.22.60 or 12.0.20 or Intel TXE before 3.1.60 or 4.0.10 may allow privileged user to potentially modify data via local access. Intel CSME and TXE Contains vulnerabilities related to authorization, permissions, and access control.Information may be tampered with. Intel Has released an update for each product.The expected impact depends on each vulnerability, but can be affected as follows: * information leak * Service operation interruption (DoS) * Privilege escalation. Both Intel Converged Security and Management Engine (CSME) and Intel TXE are products of Intel Corporation of the United States. Intel Converged Security and Management Engine is a security management engine. Intel TXE is a trusted execution engine with hardware authentication function used in CPU (Central Processing Unit). Content Protection subsystem is one of the content protection subsystems. A local attacker could exploit this vulnerability to modify data. The following products and versions are affected: Intel CSME prior to 11.8.60, prior to 11.11.60, prior to 11.22.60, prior to 12.0.20; Intel TXE prior to 3.1.60, prior to 4.0.10
| VAR-201903-0973 | CVE-2018-12188 | Intel CSME and TXE Input validation vulnerability |
CVSS V2: 2.1 CVSS V3: 4.6 Severity: MEDIUM |
Insufficient input validation in Intel CSME before versions 11.8.60, 11.11.60, 11.22.60 or 12.0.20 or Intel TXE before version 3.1.60 or 4.0.10 may allow an unauthenticated user to potentially modify data via physical access. Intel CSME and TXE Contains an input validation vulnerability.Information may be tampered with. Intel Has released an update for each product.The expected impact depends on each vulnerability, but can be affected as follows: * information leak * Service operation interruption (DoS) * Privilege escalation. Both Intel Converged Security and Management Engine (CSME) and Intel TXE are products of Intel Corporation of the United States. Intel Converged Security and Management Engine is a security management engine. Intel TXE is a trusted execution engine with hardware authentication function used in CPU (Central Processing Unit). Attacks in close physical proximity exploit this vulnerability to modify data. Intel CSME before 11.8.60, before 11.11.60, before 11.22.60, before 12.0.20; Intel TXE before 3.1.60, before 4.0.10
| VAR-201903-0972 | CVE-2018-12187 | Intel(R) Active Management Technology Input validation vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Insufficient input validation in Intel(R) Active Management Technology (Intel(R) AMT) before version 11.8.60, 11.11.60, 11.22.60 or 12.0.20 may allow an unauthenticated user to potentially cause a denial of service via network access. Intel Has released an update for each product.The expected impact depends on each vulnerability, but can be affected as follows: * information leak * Service operation interruption (DoS) * Privilege escalation. A security vulnerability exists in Intel AMT due to the program's failure to perform adequate input validation. An attacker could exploit this vulnerability to cause a denial of service. The following versions are affected: Intel AMT prior to 11.8.60, prior to 11.11.60, prior to 11.22.60, prior to 12.0.20
| VAR-201903-0971 | CVE-2018-12185 | Intel(R) CSME Input validation vulnerability |
CVSS V2: 4.6 CVSS V3: 6.8 Severity: MEDIUM |
Insufficient input validation in Intel(R) AMT in Intel(R) CSME before version 11.8.60, 11.11.60, 11.22.60 or 12.0.20 may allow an unauthenticated user to potentially execute arbitrary code via physical access. Intel(R) CSME Contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Intel Has released an update for each product.The expected impact depends on each vulnerability, but can be affected as follows: * information leak * Service operation interruption (DoS) * Privilege escalation. Intel Converged Security and Management Engine (CSME) is a security management engine of Intel Corporation. Intel AMT is one of the active management technology modules. A security vulnerability exists in Intel AMT in Intel CSME due to the program's failure to perform adequate input validation. An attacker in physical proximity could exploit this vulnerability to execute arbitrary code. The following versions are affected: Intel CSME prior to 11.8.60, prior to 11.11.60, prior to 11.22.60, prior to 12.0.20
| VAR-201903-0961 | CVE-2018-12208 | plural Intel Product buffer error vulnerability |
CVSS V2: 4.6 CVSS V3: 7.6 Severity: HIGH |
Buffer overflow in HECI subsystem in Intel(R) CSME before versions 11.8.60, 11.11.60, 11.22.60 or 12.0.20 and Intel(R) TXE version before 3.1.60 or 4.0.10, or Intel(R) Server Platform Services before version 5.00.04.012 may allow an unauthenticated user to potentially execute arbitrary code via physical access. Intel(R) CSME , TXE , Server Platform Services Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Intel Has released an update for each product.The expected impact depends on each vulnerability, but can be affected as follows: * information leak * Service operation interruption (DoS) * Privilege escalation. Intel Converged Security and Management Engine (CSME) and others are products of Intel Corporation of the United States. Intel Converged Security and Management Engine is a security management engine. Intel Server Platform Services is a server platform service program. Intel TXE is a trusted execution engine with hardware authentication function used in CPU (Central Processing Unit). The HECI subsystem is one of the host embedded controller interface subsystems. An attacker in physical proximity could exploit this vulnerability to execute arbitrary code. The following products and versions are affected: Intel CSME prior to 11.8.60, prior to 11.11.60, prior to 11.22.60, prior to 12.0.20; Intel TXE prior to 3.1.60, prior to 4.0.10; Intel Server Platform Services earlier than 5.00.04.012