VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-201809-0319 CVE-2018-17208 Linksys Velop Command injection vulnerability in devices CVSS V2: 9.3
CVSS V3: 8.8
Severity: HIGH
Linksys Velop 1.1.2.187020 devices allow unauthenticated command injection, providing an attacker with full root access, via cgi-bin/zbtest.cgi or cgi-bin/zbtest2.cgi (scripts that can be discovered with binwalk on the firmware, but are not visible in the web interface). This occurs because shell metacharacters in the query string are mishandled by ShellExecute, as demonstrated by the zbtest.cgi?cmd=level&level= substring. This can also be exploited via CSRF. Linksys Velop The device contains a command injection vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. BelkinIntermationalLinksysVelop is a family WiFi wireless network solution from Belkin Intermational. A command injection vulnerability exists in BelkinIntermationalLinksysVelop version 1.1.2.187020
VAR-201809-0281 CVE-2018-1150 NUUO NVRMini2 Vulnerabilities related to security functions CVSS V2: 7.5
CVSS V3: 7.3
Severity: HIGH
NUUO's NVRMini2 3.8.0 and below contains a backdoor that would allow an unauthenticated remote attacker to take over user accounts if the file /tmp/moses exists. NUUO NVRMini2 Contains vulnerabilities related to security features.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. NUUO is one of the monitoring solution providers, and NUUO NVRMini 2 is a NAS-enabled NVR solution. There is a backdoor vulnerability in NUUO NVRMini2. When the target device file system has a specific file /tmp/moses/, the backdoor will be opened, and any unauthorized user can obtain the user list of the non-admin user and change the password by using the API to implement the takeover of the NVR device. An attacker can exploit these issues to execute arbitrary code in the context of the affected application. Failed exploit attempts may result in a denial-of-service condition. NVRmini2 and NVRsolo 3.8.0 and prior are vulnerable. NUUO NVRmini 2 is a video storage management device produced by American NUUO company. There is a security vulnerability in NUUO NVRMini 2 3.8.0 and earlier versions, which is caused by the backdoor in the program
VAR-201809-0138 CVE-2018-12242 Symantec Messaging Gateway Authentication vulnerability CVSS V2: 7.5
CVSS V3: 9.8
Severity: CRITICAL
The Symantec Messaging Gateway product prior to 10.6.6 may be susceptible to an authentication bypass exploit, which is a type of issue that can allow attackers to potentially circumvent security mechanisms currently in place and gain access to the system or network. Symantec Messaging Gateway Contains an authentication vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Symantec Messaging Gateway is prone to an authentication-bypass vulnerability. An attacker can exploit this issue to bypass the authentication mechanism and perform unauthorized actions. This may lead to further attacks. Versions prior to Messaging Gateway 10.6.6 are vulnerable. Symantec Messaging Gateway is a set of anti-spam, anti-virus, advanced content filtering and data leakage prevention technologies developed by Symantec
VAR-201809-0888 CVE-2018-12801 Adobe Reader and Acrobat Out-of-bounds reading vulnerability CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
Adobe Acrobat and Reader versions 2018.011.20058 and earlier, 2017.011.30099 and earlier, and 2015.006.30448 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. The former is a set of PDF file editing and conversion tools, the latter is a set of PDF document reading software. A remote attacker can exploit this vulnerability to obtain sensitive information
VAR-201809-1330 No CVE Netis ADSL Router DL4322D Cross-Site Scripting Vulnerability CVSS V2: 4.3
CVSS V3: -
Severity: MEDIUM
The DL4322D is a router product from NetisSystems. A cross-site scripting vulnerability exists in the NetisADSLRouterDL4322D that allows an attacker to add a cross-site scripting attack on the Dynamic DNS Hostname field.
VAR-201809-1335 No CVE Node-RED Unauthorized Remote Command Execution Vulnerability CVSS V2: 10.0
CVSS V3: -
Severity: HIGH
Node-RED is a tool for building Internet of Things (IOT) applications. Its focus is to simplify the "connection" of code blocks to perform tasks. Node-RED has an unauthorized remote command execution vulnerability. Because the Node-RED application does not enforce any type of authentication, it can be accessed without authorization, and an attacker can execute arbitrary commands on the target system by combining specific Flows. In addition, unauthorized use of other Nodes can also implement SSRF, local file inclusion, and information leakage attacks.
VAR-201809-0280 CVE-2018-1149 NUUO NVRMini2 Remote code execution vulnerability CVSS V2: 10.0
CVSS V3: 9.8
Severity: CRITICAL
cgi_system in NUUO's NVRMini2 3.8.0 and below allows remote attackers to execute arbitrary code via crafted HTTP requests. NUUO NVRMini2 Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. NUUO is one of the monitoring solution providers, and NUUO NVRMini 2 is a NAS-enabled NVR solution. NUUO NVRMini2 has a remote code execution vulnerability. Due to program logic defects, the length of the HTTP header cookie field was not checked when processing the GET request of /cgi-bin/cgi_system and the sprintf function was used for splicing, resulting in a stack overflow. By constructing specially crafted data, an attacker can exploit this vulnerability to execute arbitrary commands on the target device. Failed exploit attempts may result in a denial-of-service condition. NVRmini2 and NVRsolo 3.8.0 and prior are vulnerable. NUUO NVRmini 2 is a video storage management device produced by American NUUO company. There is a security vulnerability in cgi_system in NUUO NVRMini 2 3.8.0 and earlier versions
VAR-201809-0314 CVE-2018-17177 Neato Botvac Connected and Botvac 85 Vulnerability related to cryptographic strength in devices CVSS V2: 2.1
CVSS V3: 2.4
Severity: LOW
An issue was discovered on Neato Botvac Connected 2.2.0 and Botvac 85 1.2.1 devices. Static encryption is used for the copying of so-called "black box" logs (event logs and core dumps) to a USB stick. These logs are RC4-encrypted with a 9-character password of *^JEd4W!I that is obfuscated by hiding it within a custom /bin/rc4_crypt binary. Neato Robotics Botvac Connected and Neato Robotics Botvac 85 are both cleaning robots from Neato Robotics in the United States. A security vulnerability exists in Neato Robotics Botvac Connected version 2.2.0 and Neato Robotics Botvac 85 version 1.2.1. An attacker could exploit this vulnerability to obtain sensitive information
VAR-201809-0313 CVE-2018-17176 Neato Botvac Connected Authentication vulnerabilities in devices CVSS V2: 5.0
CVSS V3: 7.5
Severity: HIGH
A replay issue was discovered on Neato Botvac Connected 2.2.0 devices. Manual control mode requires authentication, but once recorded, the authentication (always transmitted in cleartext) can be replayed to /bin/webserver on port 8081. There are no nonces, and timestamps are not checked at all. Currently there is no information about this vulnerability, please keep an eye on CNNVD or vendor announcements
VAR-201809-0315 CVE-2018-17178 Neato Botvac Connected Authorization vulnerabilities in devices CVSS V2: 2.9
CVSS V3: 5.3
Severity: MEDIUM
An issue was discovered on Neato Botvac Connected 2.2.0 devices. They execute unauthenticated manual drive commands (sent to /bin/webserver on port 8081) if they already have an active session. Commands like forward, back, arc-left, arc-right, pivot-left, and pivot-right are executed even though the web socket replies with { "message" : "invalid authorization header" }. Without an active session, commands are still interpreted, but (except for eco-on and eco-off) have no effect, since without active driving, a driving direction does not change anything
VAR-201809-0909 CVE-2018-16225 QBee MultiSensor Camera Authentication vulnerability CVSS V2: 6.1
CVSS V3: 6.5
Severity: MEDIUM
The QBee MultiSensor Camera through 4.16.4 accepts unencrypted network traffic from clients (such as the QBee Cam application through 1.0.5 for Android and the Swisscom Home application up to 10.7.2 for Android), which results in an attacker being able to reuse cookies to bypass authentication and disable the camera. QBee MultiSensor Camera Contains an authentication vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Askey QBee MultiSensor Camera is a smart camera product of Askey Computer Company. A security vulnerability exists in Askey QBee MultiSensor Camera 4.16.4 and earlier versions. An attacker could exploit this vulnerability to reuse cookies, thereby bypassing authentication and disabling the camera. [VulnerabilityType Other] Auth bypass using cookie [Vendor of Product] QBee, Vestiacom, Swisscom [Affected Product Code Base] QBee MultiSensor Camera <= 4.16.4 QBee Cam (Android) <= 1.0.5 (Fixed version number not yet available) QBee Cam (iOS) < 1.5.2 Swisscom Home App (Android) < 10.7.2 Swisscom Home App (iOS) < 10.9.0 [Affected Component] Network Traffic [Attack Type] Remote [Impact Denial of Service] true [Impact Information Disclosure] true [Attack Vectors] Reuse of intercepted cookies to authorize requests to camera and disable it [Has vendor confirmed or acknowledged the vulnerability?] true [Discoverer] Francesco Servida (University of Lausanne) [Reference] https://francescoservida.ch/ https://blog.francescoservida.ch/2018/09/16/cve-2018-16225-public-disclosure-qbee-camera-vulnerability https://unil.ch/esc/ -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEE1d1OaNNWm59k5XpArHdrFWRKXbEFAlueyQcACgkQrHdrFWRK XbHlXA/+MwKRO1X7s85ViBEo0gaMNI2GIxioAwi7Hoqkn+jEEefBAkGLFy02F+MS 6i8f1C+AU88BJroihmuBhFklg6/d5qilQrym40MN2/qmr8g2ba7mayZxzRoa4jOn JAggmnLbv0ODV0aIJpWWWDOgLNyZgn2ZfBt7glnSifJ4TTNJUN0xNGUcsYCAfbjo zDjJknPFimxaM0ECJpNWMTMH2z8FJD8Cfb6uQjC9ZR6yy3Gd/xyyesyjcIf7L/56 bkVQUmzI3xLKIAISQ2WbqaMLemds69rWV3ePwrdyziUbkxflW0pKK9ObzcpoFkRD fOZvqPgvkbBpFyE2xbImqqHtgwYiI27oXPJyc183mrR3XTbfFfOuXwDJSrNYPTyp ZQwWyFAr25VqJriq4mfvr643U2ejexblwTi5Rnekf0spF2sFkjZGk1HLu095Yzx3 wThFmj8U8U/MyiUdRC8eW6Q/G0xw4lhqtQA8lxo5k7AOF9AkVImtYqk506Lx1JU8 LbJqy/3EoJleva5BWdBgTjH99zmbOHuvyGZRR8oNKDTBEUY3X2RnVeA3QUrhkEl5 Dgn1mJ/2Ztwyun6X3VcFoRQTAaHqfBb17EYzlE+92cU6SYxaFALO7PUBN/UUDIks Gd6uuT5pJB2P/RrPEqAp2vjqgwNXQuarp44oPXAsriWRwEzeUbg= =pHaV -----END PGP SIGNATURE-----
VAR-201809-1203 No CVE DCCE MAC1100 PLC has remote register tampering vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
MAC1100 PLC is a programmable logic controller produced by Dalian University of Technology Computer Control Engineering Co., Ltd. There is a remote register tampering vulnerability in the DCCE MAC1100 PLC. An attacker can construct a specific network data packet without authorization and use the vulnerability to forcibly read or tamper with the PLC register value, which affects the normal operation of the controller
VAR-201809-1198 No CVE Haiwell C10S0R (-e) PLC has remote code upload vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
C10S0R (-e) PLC is a product in the programmable logic controller (PLC) series of Xiamen Haiwei Technology Co., Ltd. Haiwell C10S0R (-e) PLC has a remote code upload vulnerability. An attacker can construct a specific network packet without authorization and use the vulnerability to upload arbitrary code
VAR-201809-1337 No CVE CalAmp lenderoutlook on colt.calamp-ts.com incorrect permission assignment vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
Calamp is a pioneer in M2M telematics, managing more than 1.5M IoT devices. CalAmp lenderoutlook on colt.calamp-ts.com has an incorrect permission assignment vulnerability. An attacker could use the vulnerability to obtain sensitive data.
VAR-201809-1202 No CVE DCCE MAC1100 PLC has arbitrary program coverage vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
MAC1100 PLC is a programmable logic controller produced by Dalian University of Technology Computer Control Engineering Co., Ltd. There is an arbitrary program coverage vulnerability in the DCCE MAC1100 PLC. The vulnerability originates from the MAC1100 PLC programmable logic controller downloading the program to the PLC without verifying the relevant permissions. An attacker can remotely download the program's data package to cover any program with the vulnerability
VAR-201809-1211 No CVE DCCE PLC_Config Denial of service vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
PLC_Config is the standard software for the configuration and programming of programmable controllers produced by Dalian University of Technology Computer Control Engineering Co., Ltd. There is a denial of service vulnerability in DCCE PLC_Config. An attacker can construct a specific network packet without authorization, and use the vulnerability to cause PLC_config to deny service
VAR-201809-1204 No CVE DCCE MAC1100 PLC has a denial of service vulnerability (CNVD-2018-19111) CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
MAC1100 PLC is a programmable logic controller produced by Dalian University of Technology Computer Control Engineering Co., Ltd. DCCE MAC1100 PLC has a denial-of-service vulnerability. An attacker can construct a specific network packet without authorization, and use the vulnerability to cause the PLC to deny service
VAR-201809-1197 No CVE DCCE MAC1100 PLC has password leak vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
MAC1100 PLC is a programmable logic controller produced by Dalian University of Technology Computer Control Engineering Co., Ltd. DCCE MAC1100 PLC has a password leakage vulnerability. An attacker can use the vulnerability to obtain the PLC user name and password when the computer is connected to the PLC
VAR-201809-1224 No CVE GE iFix scu.exe component has DLL hijacking vulnerability CVSS V2: 6.2
CVSS V3: -
Severity: MEDIUM
GE Intelligent Platform (GE-IP) 's iFIX is the world's leading industrial automation software solution that provides process visualization, data acquisition, and data monitoring of production operations. There is a DLL hijacking vulnerability in the GE iFix scu.exe component. An attacker can use the vulnerability to execute malicious code by loading a malicious dll named "DWMAPI.dll"
VAR-201809-1205 No CVE DCCE MAC1100 PLC Denial of service vulnerability CVSS V2: 7.8
CVSS V3: -
Severity: HIGH
MAC1100 PLC is a programmable logic controller produced by Dalian University of Technology Computer Control Engineering Co., Ltd. DCCE MAC1100 PLC has a denial-of-service vulnerability. An attacker can construct a specific network packet without authorization. Using the vulnerability, the PLC is shut down and the CPU denies service