VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201901-1003 CVE-2018-4256 macOS High Sierra Out-of-bounds reading vulnerability CVSS V2: 2.1
CVSS V3: 5.5
Severity: MEDIUM
In macOS High Sierra before 10.13.5, an out-of-bounds read was addressed with improved input validation. Apple macOS High Sierra is a set of dedicated operating systems developed by Apple (Apple) for Mac computers. AMD is one of the AMD product components. A local attacker could exploit this vulnerability to read kernel memory
VAR-201901-1002 CVE-2018-4255 macOS High Sierra Out-of-bounds reading vulnerability CVSS V2: 2.1
CVSS V3: 5.5
Severity: MEDIUM
In macOS High Sierra before 10.13.5, an out-of-bounds read was addressed with improved input validation. Apple macOS High Sierra is a set of dedicated operating systems developed by Apple (Apple) for Mac computers. AMD is one of the AMD product components. A local attacker could exploit this vulnerability to read kernel memory
VAR-201901-1001 CVE-2018-4254 macOS High Sierra Input validation vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
In macOS High Sierra before 10.13.5, an input validation issue existed in the kernel. This issue was addressed with improved input validation. Apple macOS High Sierra is a set of dedicated operating systems developed by Apple (Apple) for Mac computers. AMD is one of the AMD product components. An attacker could exploit this vulnerability to execute arbitrary code with kernel privileges
VAR-201901-0431 CVE-2017-2411 iOS Vulnerabilities related to security functions CVSS V2: 4.3
CVSS V3: 5.9
Severity: MEDIUM
In iOS before 11.2, exchange rates were retrieved from HTTP rather than HTTPS. This was addressed by enabling HTTPS for exchange rates. Apple iOS is an operating system developed by Apple (Apple) for mobile devices. Calculator is one of the calculator components. A security vulnerability exists in the Calculator component of Apple's iOS prior to 11.2. An attacker could exploit this vulnerability to change currency exchange rates
VAR-201901-0429 CVE-2017-13891 iOS User interface vulnerability CVSS V2: 4.3
CVSS V3: 6.5
Severity: MEDIUM
In iOS before 11.2, an inconsistent user interface issue was addressed through improved state management. Apple iOS is an operating system developed by Apple (Apple) for mobile devices. SafariViewController is one of the web browser components. A security vulnerability exists in the SafariViewController component in Apple iOS versions prior to 11.2. An attacker can use this vulnerability to forge the content of the address bar by using a malicious website
VAR-201901-0428 CVE-2017-13889 macOS High Sierra Vulnerabilities related to authorization, permissions, and access control CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
In macOS High Sierra before 10.13.3, Security Update 2018-001 Sierra, and Security Update 2018-001 El Capitan, a logic error existed in the validation of credentials. This was addressed with improved credential validation. macOS High Sierra Vulnerabilities related to authorization, authority, and access control exist due to a lack of processing related to credential verification.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Apple macOS High Sierra is a set of dedicated operating systems developed by Apple (Apple) for Mac computers. Security is one of the security components. An attacker could exploit this vulnerability to bypass administrator authentication (without requiring an administrator password)
VAR-201901-0427 CVE-2017-13888 iOS Type-typing vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
In iOS before 11.2, a type confusion issue was addressed with improved memory handling. Apple iOS is an operating system developed by Apple (Apple) for mobile devices. ReplayKit is one of the screen recording components. An attacker could exploit this vulnerability to prevent users from controlling their screencasts
VAR-201901-0426 CVE-2017-13887 macOS High Sierra of APFS Logic vulnerability in CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
In macOS High Sierra before 10.13.2, a logic issue existed in APFS when deleting keys during hibernation. This was addressed with improved state management. Apple macOS High Sierra is a set of dedicated operating systems developed by Apple (Apple) for Mac computers. APFS is one of the Apple device-specific file system components. There is a security vulnerability in the APFS component in Apple macOS High Sierra version 10.13.1. The vulnerability stems from the fact that the APFS encryption key may not be safely deleted after hibernation. Currently there is no information about this vulnerability, please keep an eye on CNNVD or vendor announcements
VAR-201901-0425 CVE-2017-13886 macOS High Sierra Privileged WiFi Access vulnerability in system settings CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
In macOS High Sierra before 10.13.2, an access issue existed with privileged WiFi system configuration. This issue was addressed with additional restrictions. Apple macOS High Sierra is a set of dedicated operating systems developed by Apple (Apple) for Mac computers. Wi-Fi is one of the wireless Internet access components. Attackers can use this vulnerability to change WiFi system parameters, resulting in denial of service
VAR-201901-0388 CVE-2016-7576 iOS Memory corruption vulnerability CVSS V2: 9.3
CVSS V3: 7.8
Severity: HIGH
In iOS before 9.3.3, a memory corruption issue existed in the kernel. This issue was addressed through improved memory handling. Apple iOS is an operating system developed by Apple (Apple) for mobile devices. GasGauge is one of the battery fuel gauge components. A security vulnerability exists in the GasGauge component of Apple iOS prior to 9.3.3. An attacker could exploit this vulnerability with a malicious application to execute arbitrary code with kernel privileges (kernel corruption)
VAR-201901-0387 CVE-2016-4642 plural Apple In product HTTP Vulnerabilities where a proxy incorrectly reports that it has received authentication information CVSS V2: 4.3
CVSS V3: 5.9
Severity: MEDIUM
In iOS before 9.3.3, tvOS before 9.2.2, and OS X El Capitan before v10.11.6 and Security Update 2016-004, proxy authentication incorrectly reported HTTP proxies received credentials securely. This issue was addressed through improved warnings
VAR-201901-0379 CVE-2016-4644 plural Apple Downgraded vulnerabilities in products CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
In iOS before 9.3.3, tvOS before 9.2.2, and OS X El Capitan before v10.11.6 and Security Update 2016-004, a downgrade issue existed with HTTP authentication credentials saved in Keychain. This issue was addressed by storing the authentication types with the credentials. Apple iOS, tvOS, and OS X El Capitan are all products of Apple Inc. in the United States. Apple iOS is an operating system developed for mobile devices; tvOS is a smart TV operating system; OS X El Capitan is a dedicated operating system developed for Mac computers. CFNetwork Proxies is one of the components used to handle proxy connection response issues. An attacker could exploit this vulnerability to disclose sensitive user information
VAR-201901-0378 CVE-2016-4643 plural Apple In product 407 Response parsing vulnerability CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
In iOS before 9.3.3, tvOS before 9.2.2, and OS X El Capitan before v10.11.6 and Security Update 2016-004, a validation issue existed in the parsing of 407 responses. This issue was addressed through improved response validation. in the United States. Apple iOS is an operating system developed for mobile devices; tvOS is a smart TV operating system; OS X El Capitan is a dedicated operating system developed for Mac computers. CFNetwork Proxies is one of the components used to handle proxy connection response issues. An attacker could exploit this vulnerability to disclose sensitive user information
VAR-201901-0457 CVE-2018-12167 Intel(R) Optane(TM) SSD DC P4800X Input validation vulnerability CVSS V2: 2.1
CVSS V3: 4.4
Severity: MEDIUM
Firmware update routine in bootloader for Intel(R) Optane(TM) SSD DC P4800X before version E2010435 may allow a privileged user to potentially enable a denial of service via local access. Intel(R) Optane(TM) SSD DC P4800X Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. IntelOptaneSSDDCP4800X is a solid state drive from Intel Corporation of the United States. A security vulnerability exists in the firmware update subroutine of the bootloader in previous versions of IntelOptaneSSDDCP4800XE2010435. A local attacker can exploit this vulnerability to cause a denial of service
VAR-201901-0456 CVE-2018-12166 Intel(R) Optane(TM) SSD DC P4800X Input validation vulnerability CVSS V2: 2.1
CVSS V3: 4.4
Severity: MEDIUM
Insufficient write protection in firmware for Intel(R) Optane(TM) SSD DC P4800X before version E2010435 may allow a privileged user to potentially enable a denial of service via local access. Intel(R) Optane(TM) SSD DC P4800X Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. IntelOptaneSSDDCP4800X is a solid state drive from Intel Corporation of the United States. A security vulnerability exists in the firmware in previous versions of IntelOptaneSSDDCP4800XE2010435 due to a program failing to write protect. A local attacker can exploit this vulnerability to cause a denial of service
VAR-201901-0858 CVE-2018-19027 OMRON CX-One CX-Protocol CObject Type Confusion Remote Code Execution Vulnerability CVSS V2: 6.8
CVSS V3: 7.8
Severity: HIGH
Three type confusion vulnerabilities exist in CX-One Versions 4.50 and prior and CX-Protocol Versions 2.0 and prior when processing project files. An attacker could use a specially crafted project file to exploit and execute code under the privileges of the application. Provided by OMRON Corporation CX-One Contains a vulnerability that allows arbitrary code execution. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of PSW files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. The Omron CX-One is an integrated toolkit from Omron, Japan (Omron) that includes networking, PT, frequency converters, temperature controllers, and PLC programming software. CX-Protocol is one of the components used to create serial communication protocols to communicate with standard serial devices. Omron CX-Protocol is prone to multiple arbitrary code-execution vulnerabilities. Failed exploits will result in denial-of-service conditions
VAR-201901-0856 CVE-2018-19021 Emerson DeltaV Distributed Control System Authentication Bypass Vulnerability CVSS V2: 3.3
CVSS V3: 6.5
Severity: MEDIUM
A specially crafted script could bypass the authentication of a maintenance port of Emerson DeltaV DCS Versions 11.3.1, 11.3.2, 12.3.1, 13.3.1, 14.3, R5.1, R6 and prior, which may allow an attacker to cause a denial of service. Emerson DeltaV DCS Contains vulnerabilities related to authorization, permissions, and access control.Service operation interruption (DoS) There is a possibility of being put into a state. The Emerson DeltaV Distributed Control System is an automated distributed control system from Emerson Electric. The system includes network security management, alarm management, batch control and change management. Emerson DeltaV is prone to an authentication-bypass vulnerability. DeltaV Distributed Control System 11.3.1, 11.3.2, 12.3.1, 13.3.1, 14.3, R5.1, R6 and prior are vulnerable
VAR-201901-0860 CVE-2018-18985 plural Tridium Niagara Product Vulnerable to cross-site scripting CVSS V2: 3.5
CVSS V3: 5.4
Severity: MEDIUM
Tridium Niagara Enterprise Security 2.3u1, all versions prior to 2.3.118.6, Niagara AX 3.8u4, all versions prior to 3.8.401.1, Niagara 4.4u2, all versions prior to 4.4.93.40.2, and Niagara 4.6, all versions prior to 4.6.96.28.4 a cross-site scripting vulnerability has been identified that may allow a remote attacker to inject code to some web pages affecting confidentiality. plural Tridium Niagara Product Contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. Multiple Tridium Products are prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks
VAR-201904-0637 CVE-2018-13810 CP 1604 and CP 1616 Vulnerable to cross-site request forgery CVSS V2: 4.3
CVSS V3: 6.5
Severity: MEDIUM
A vulnerability has been identified in CP 1604 (All versions), CP 1616 (All versions). The integrated configuration web server of the affected CP devices could allow a Cross-Site Request Forgery (CSRF) attack if an unsuspecting user is tricked into accessing a malicious link. Successful exploitation requires user interaction by a legitimate user. A successful attack could allow an attacker to trigger actions via the web interface that the legitimate user is allowed to perform. At the time of advisory publication no public exploitation of this vulnerability was known. CP 1604 and CP 1616 Contains a cross-site request forgery vulnerability.Information may be tampered with. The SIEMENS CP1604 is used to connect a PCI-104 system to PROFINET IO. The SIEMENS CP1616 is an innovative product that is installed in a PC for PROFINET communication. Siemens CP1604 and CP1616 are prone to following security vulnerabilities: 1. An information disclosure vulnerability 2. A cross-site-scripting vulnerability 3. A cross-site request-forgery vulnerability Attackers can exploit these issues to obtain sensitive information, or execute arbitrary code or arbitrary HTML or script code in the browser of an unsuspecting user within the context of the affected application. This can allow the attacker to steal cookie-based authentication credentials and aid in further attacks. The following products and versions are vulnerable: All versions prior to Siemens CP1604 2.8 All versions prior to Siemens CP1616 2.8. The vulnerability stems from the fact that the WEB application does not fully verify whether the request is from a trusted user. An attacker could exploit this vulnerability to send unexpected requests to the server through an affected client
VAR-201904-0635 CVE-2018-13808 CP 1604 and CP 1616 Vulnerable to information disclosure CVSS V2: 6.4
CVSS V3: 9.1
Severity: CRITICAL
A vulnerability has been identified in CP 1604 (All versions), CP 1616 (All versions). An attacker with network access to port 23/tcp could extract internal communication data or cause a Denial-of-Service condition. Successful exploitation requires network access to a vulnerable device. At the time of advisory publication no public exploitation of this vulnerability was known. CP 1604 and CP 1616 Contains an information disclosure vulnerability.Information is obtained and service operation is interrupted (DoS) There is a possibility of being put into a state. The SIEMENS CP1604 is used to connect a PCI-104 system to PROFINET IO. The SIEMENS CP1616 is an innovative product that is installed in a PC for PROFINET communication. A denial of service vulnerability exists in the SIEMENS CP1604 and CP1616 devices. Siemens CP1604 and CP1616 are prone to following security vulnerabilities: 1. An information disclosure vulnerability 2. A cross-site-scripting vulnerability 3. A cross-site request-forgery vulnerability Attackers can exploit these issues to obtain sensitive information, or execute arbitrary code or arbitrary HTML or script code in the browser of an unsuspecting user within the context of the affected application. This can allow the attacker to steal cookie-based authentication credentials and aid in further attacks. The following products and versions are vulnerable: All versions prior to Siemens CP1604 2.8 All versions prior to Siemens CP1616 2.8