VARIoT IoT vulnerabilities database

VAR-201809-0464 | CVE-2018-15310 | BIG-IP APM portal access Vulnerable to information disclosure |
CVSS V2: 4.0 CVSS V3: 4.3 Severity: MEDIUM |
A vulnerability in BIG-IP APM portal access 11.5.1-11.5.7, 11.6.0-11.6.3, and 12.1.0-12.1.3 discloses the BIG-IP software version in rewritten pages. F5 BIG-IP Access Policy Manager (APM) is a set of access and security solutions from F5 Corporation of the United States. The solution provides unified access to business-critical applications and networks. portal access is one of the portal access components
VAR-201809-0814 | CVE-2018-16752 | LINK-NET LW-N605R Vulnerability related to input validation in device firmware |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: HIGH |
LINK-NET LW-N605R devices with firmware 12.20.2.1486 allow Remote Code Execution via shell metacharacters in the HOST field of the ping feature at adm/systools.asp. Authentication is needed but the default password of admin for the admin account may be used in some cases. LINK-NET LW-N605R There is an input validation vulnerability in the device firmware.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. The LW-N605R is a network product launched by LINK-NET. A security vulnerability exists in LINK-NET LW-N605R using firmware version 12.20.2.1486
VAR-201809-1103 | CVE-2018-3643 | Intel Converged Security and Management Engine and Server Platform Services Firmware vulnerabilities related to authorization, authority, and access control |
CVSS V2: 4.6 CVSS V3: 8.2 Severity: HIGH |
A vulnerability in Power Management Controller firmware in systems using specific Intel(R) Converged Security and Management Engine (CSME) before version 11.8.55, 11.11.55, 11.21.55, 12.0.6 or Intel(R) Server Platform Services firmware before version 4.x.04 may allow an attacker with administrative privileges to uncover certain platform secrets via local access or to potentially execute arbitrary code. Intel Atom Processor C3000 Series Platform and other products are processor products of Intel Corporation of the United States. The Intel Power Management Controller is one of the power management controllers.
A security vulnerability exists in the Intel Power Management Controller. A local attacker could exploit this vulnerability to escalate permissions or reveal information
VAR-201809-0141 | CVE-2018-12176 | Intel NUC Kit Input validation vulnerability |
CVSS V2: 7.2 CVSS V3: 8.2 Severity: HIGH |
Improper input validation in firmware for Intel NUC Kits may allow a privileged user to potentially execute arbitrary code resulting in information disclosure, escalation of privilege and/or denial of service via local access. Intel NUC kits are a mini desktop computer produced by Intel Corporation of the United States. A security vulnerability exists in the firmware of the Intel NUC Kits due to the program not properly validating input. The following products are affected: Intel NUC Kit NUC7CJYH ; NUC Kit NUC8i7HNK ; Compute Card CD1M3128MK ; Compute Card CD1IV128MK ; Compute Card CD1P64GK ; NUC Kit NUC7i7DNKE ; NUC Kit NUC7i5DNKE ; NUC Kit NUC7i3DNHE ; NUC Kit NUC7i7BNH ; NUC Kit NUC6CAYS ; NUC Kit DE3815TYBE ; NUC Kit NUC6i5SYH ; NUC Kit NUC6i7KYK ; NUC Kit NUC5PGYH ; NUC Kit NUC5CPYH ; NUC Kit NUC5i7RYH ; NUC Kit NUC5i5MYHE ; NUC Kit NUC5i3MYHE ; NUC Kit DE3815TYBE ; NUC Kit DN2820FYKH ; NUC Kit D54250WYB ; NUC Kit D53427RKE ; NUC Kit D33217GKE ; Compute Stick STK2mv64CC; Compute Stick STK2m3W64CC; Compute Stick STK1AW32SC; Compute Stick STCK1A32WFC
VAR-201809-0691 | CVE-2018-16950 | Inteno DG400 Input validation vulnerability |
CVSS V2: 3.3 CVSS V3: 6.5 Severity: MEDIUM |
Inteno DG400 WU7U_ELION3.11.6-170614_1328 devices allow remote attackers to cause a denial of service (connectivity loss) via a series of packets with random MAC addresses, as demonstrated by macof. Inteno DG400 Contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Inteno DG400 is a multi-WAN gateway product that supports routing and bridging functions from Sweden's Inteno Broadband Technology Company. There is a security vulnerability in Inteno DG400 WU7U_ELION3.11.6-170614_1328 version
VAR-201809-1074 | CVE-2018-3657 | Intel CSME Firmware buffer error vulnerability |
CVSS V2: 7.2 CVSS V3: 6.7 Severity: MEDIUM |
Multiple buffer overflows in Intel AMT in Intel CSME firmware versions before version 12.0.5 may allow a privileged user to potentially execute arbitrary code with Intel AMT execution privilege via local access. Intel CSME The firmware contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Multiple Siemens Products are prone to the following security vulnerabilities:
1. Multiple stack-based buffer-overflow vulnerabilities
2. A denial-of-service vulnerability
3. A side channel attack information disclosure vulnerability
Attackers can exploit these issues to execute arbitrary code within the context of an affected device or obtain sensitive information or cause a denial-of-service condition.
The following Siemens products are affected:
SIMATIC FieldPG M5 All versions prior to 22.01.06,
SIMATIC IPC427E All versions prior to 21.01.09,
SIMATIC IPC477E All versions prior to 21.01.09,
SIMATIC IPC547E All versions prior to R1.30.0,
SIMATIC IPC547G All versions prior to R1.23.0,
SIMATIC IPC627D All versions prior to 19.02.11,
SIMATIC IPC647D All versions prior to 19.01.14,
SIMATIC IPC677D All versions prior to 19.02.11,
SIMATIC IPC827D All versions prior to 19.02.11,
SIMATIC IPC847D All versions prior to 19.01.14, and
SIMATIC ITP1000 All versions prior to 23.01.04. Intel CSME is a converged security management engine developed by Intel Corporation. Intel AMT is one of the active management technology modules
VAR-201809-0048 | CVE-2017-18347 | STMicroelectronics STM32F0 Series device race condition vulnerabilities |
CVSS V2: 4.9 CVSS V3: 4.6 Severity: MEDIUM |
Incorrect access control in RDP Level 1 on STMicroelectronics STM32F0 series devices allows physically present attackers to extract the device's protected firmware via a special sequence of Serial Wire Debug (SWD) commands because there is a race condition between full initialization of the SWD interface and the setup of flash protection. STMicroelectronics STM32F0 Series devices contain a race condition vulnerability.Information may be obtained. STMicroelectronics STM32F0 is a microcontroller device from the STM32F0 series. A security vulnerability exists in STMicroelectronics STM32F0 due to improper access control implemented by programs in RDP Level 1
VAR-201809-1075 | CVE-2018-3658 | Intel CSME Firmware resource management vulnerability |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
Multiple memory leaks in Intel AMT in Intel CSME firmware versions before 12.0.5 may allow an unauthenticated user with Intel AMT provisioned to potentially cause a partial denial of service via network access. Intel CSME The firmware contains a resource management vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Multiple Siemens Products are prone to the following security vulnerabilities:
1. Multiple stack-based buffer-overflow vulnerabilities
2. A denial-of-service vulnerability
3. A side channel attack information disclosure vulnerability
Attackers can exploit these issues to execute arbitrary code within the context of an affected device or obtain sensitive information or cause a denial-of-service condition.
The following Siemens products are affected:
SIMATIC FieldPG M5 All versions prior to 22.01.06,
SIMATIC IPC427E All versions prior to 21.01.09,
SIMATIC IPC477E All versions prior to 21.01.09,
SIMATIC IPC547E All versions prior to R1.30.0,
SIMATIC IPC547G All versions prior to R1.23.0,
SIMATIC IPC627D All versions prior to 19.02.11,
SIMATIC IPC647D All versions prior to 19.01.14,
SIMATIC IPC677D All versions prior to 19.02.11,
SIMATIC IPC827D All versions prior to 19.02.11,
SIMATIC IPC847D All versions prior to 19.01.14, and
SIMATIC ITP1000 All versions prior to 23.01.04. Intel CSME is a converged security management engine developed by Intel Corporation. Intel AMT is one of the active management technology modules. An attacker could cause a denial of service (memory leak) by exploiting this vulnerability
VAR-201809-0853 | CVE-2018-16946 | plural LG smart network camera Vulnerabilities related to certificate and password management in product devices |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
LG LNB*, LND*, LNU*, and LNV* smart network camera devices have broken access control. Attackers are able to download /updownload/t.report (aka Log & Report) files and download backup files (via download.php) without authenticating. These backup files contain user credentials and configuration information for the camera device. An attacker is able to discover the backup filename via reading the system logs or report data, or just by brute-forcing the backup filename pattern. It may be possible to authenticate to the admin account with the admin password. LG LNB*, etc. A security vulnerability exists in several LG products. The following products are affected: LG LNB*; LG LND*; LG LNU*; LG LNV*
VAR-201809-0472 | CVE-2018-16605 | D-Link DIR-600M Cross-Site Scripting Vulnerability |
CVSS V2: 3.5 CVSS V3: 5.4 Severity: MEDIUM |
D-Link DIR-600M devices allow XSS via the Hostname and Username fields in the Dynamic DNS Configuration page. D-Link DIR-600M The device contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. D-LinkDIR-600M is a wireless router product of D-Link. A cross-site scripting vulnerability exists in the DNSConfiguration page in D-LinkDIR-600M that can be exploited by remote attackers to inject arbitrary web scripts or HTML with the help of the Hostname and Username fields
VAR-201809-1042 | CVE-2018-3669 | Intel Centrino Wireless N Adapter and Intel Centrino Advanced N Security function vulnerabilities in adapters |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
A STOP error (BSoD) in the ibtfltcoex.sys driver for Intel Centrino Wireless N and Intel Centrino Advanced N adapters may allow an unauthenticated user to potentially send a malformed L2CAP Connection Request is sent to the Intel Bluetooth device via the network. ibtfltcoex.sys driver is one of the bluetooth drivers. The following products are affected: Intel Centrino Wireless-N 135; Centrino Wireless-N 2230; Centrino Advanced-N 6235; Centrino Wireless-N 130; Centrino Wireless-N 1030; Centrino Advanced-N 6230
VAR-201809-1104 | CVE-2018-3616 | Intel Active Management Technology Cryptographic vulnerability |
CVSS V2: 4.3 CVSS V3: 5.9 Severity: MEDIUM |
Bleichenbacher-style side channel vulnerability in TLS implementation in Intel Active Management Technology before 12.0.5 may allow an unauthenticated user to potentially obtain the TLS session key via the network. Intel Active Management Technology Contains a cryptographic vulnerability.Information may be obtained. Multiple Siemens Products are prone to the following security vulnerabilities:
1. Multiple stack-based buffer-overflow vulnerabilities
2. A denial-of-service vulnerability
3. A side channel attack information disclosure vulnerability
Attackers can exploit these issues to execute arbitrary code within the context of an affected device or obtain sensitive information or cause a denial-of-service condition.
The following Siemens products are affected:
SIMATIC FieldPG M5 All versions prior to 22.01.06,
SIMATIC IPC427E All versions prior to 21.01.09,
SIMATIC IPC477E All versions prior to 21.01.09,
SIMATIC IPC547E All versions prior to R1.30.0,
SIMATIC IPC547G All versions prior to R1.23.0,
SIMATIC IPC627D All versions prior to 19.02.11,
SIMATIC IPC647D All versions prior to 19.01.14,
SIMATIC IPC677D All versions prior to 19.02.11,
SIMATIC IPC827D All versions prior to 19.02.11,
SIMATIC IPC847D All versions prior to 19.01.14, and
SIMATIC ITP1000 All versions prior to 23.01.04. A security vulnerability exists in the TLS implementation in versions prior to Intel AMT 12.0.5
VAR-201809-1076 | CVE-2018-3659 | Intel CSME firmware and TXE Firmware vulnerabilities related to authorization, authority, and access control |
CVSS V2: 4.6 CVSS V3: 6.8 Severity: MEDIUM |
A vulnerability in Intel PTT module in Intel CSME firmware before version 12.0.5 and Intel TXE firmware before version 4.0 may allow an unauthenticated user to potentially disclose information via physical access. Both Intel CSME and Intel TXE are products of Intel Corporation of the United States. Intel CSME is a converged security management engine. Intel TXE is a trusted execution engine with hardware authentication function used in CPU (Central Processing Unit). Intel PTT module is one of the trusted platform modules. An attacker in physical proximity could exploit this vulnerability to disclose information
VAR-201809-0104 | CVE-2018-12163 | Intel IoT Developers Kit Vulnerabilities related to authorization, permissions, and access control |
CVSS V2: 6.8 CVSS V3: 4.8 Severity: MEDIUM |
A DLL injection vulnerability in the Intel IoT Developers Kit 4.0 installer may allow an authenticated user to potentially escalate privileges using file modification via local access. Intel IoT Developers Kit is an IoT development kit from Intel Corporation of the United States. installer is its installer. A local attacker could use this vulnerability to elevate privileges
VAR-201809-1112 | CVE-2018-7922 | Huawei ALP-L09 Vulnerability related to input confirmation in smartphones |
CVSS V2: 9.3 CVSS V3: 7.8 Severity: HIGH |
Huawei ALP-L09 smart phones with versions earlier than ALP-L09 8.0.0.150(C432) have an insufficient input validation vulnerability due to lack of parameter check. An attacker tricks the user who has root privilege to install a crafted application, the application may modify the specific data to exploit the vulnerability. Successful exploit could allow the attacker to execute arbitrary code. Huawei ALP-L09 Smartphones contain a vulnerability related to input confirmation.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. HuaweiMate10ALP-L09 is a smartphone product of China's Huawei company
VAR-201809-1113 | CVE-2018-7923 | Huawei ALP-L09 Vulnerability related to input confirmation in smartphones |
CVSS V2: 9.3 CVSS V3: 7.8 Severity: HIGH |
Huawei ALP-L09 smart phones with versions earlier than ALP-L09 8.0.0.150(C432) have an insufficient input validation vulnerability due to lack of parameter check. An attacker tricks the user who has root privilege to install a crafted application, the application may modify the specific data to exploit the vulnerability. Successful exploit could allow the attacker to execute arbitrary code. Huawei ALP-L09 Smartphones contain a vulnerability related to input confirmation.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. HuaweiMate10ALP-L09 is a smartphone product of China's Huawei company
VAR-201809-0150 | CVE-2018-14809 | Fuji Electric V-Server VPR Memory Error Reference Vulnerability |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: MEDIUM |
Fuji Electric V-Server 4.0.3.0 and prior, A use after free vulnerability has been identified, which may allow remote code execution. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of a VPR file. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code under the context of the process. Fuji Electric V-Server VPR is a data collection software from Fuji Electric of Japan
VAR-201809-1044 | CVE-2018-3686 | INTEL-SA-00086 Detection Tool Code injection vulnerability |
CVSS V2: 4.6 CVSS V3: 6.7 Severity: MEDIUM |
Code injection vulnerability in INTEL-SA-00086 Detection Tool before version 1.2.7.0 may allow a privileged user to potentially execute arbitrary code via local access. Intel INTEL-SA-00086 Detection Tool is a tool used by Intel Corporation to detect security vulnerabilities of Intel products
VAR-201809-1043 | CVE-2018-3679 | Intel Data Center Manager SDK Vulnerabilities in authorization, authority and access control |
CVSS V2: 8.3 CVSS V3: 9.6 Severity: CRITICAL |
Escalation of privilege in Reference UI in Intel Data Center Manager SDK 5.0 and before may allow an unauthorized remote unauthenticated user to potentially execute code via administrator privileges. Intel Data Center Manager SDK Contains vulnerabilities in authorization, authority, and access control.Information is acquired, information is falsified, and denial of service (DoS) May be in a state. Intel Data Center Manager SDK is a data center manager SDK (Software Development Kit) of Intel Corporation. This product mainly provides real-time power supply and heat dissipation data of equipment. A remote attacker could exploit this vulnerability to elevate privileges and execute code with administrator privileges
VAR-201809-0140 | CVE-2018-12175 | Intel Distribution for Python Vulnerabilities related to authorization, permissions, and access control |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Default install directory permissions in Intel Distribution for Python (IDP) version 2018 may allow an unprivileged user to escalate privileges via local access. Intel Distribution for Python (IDP) is a software package from Intel Corporation to enhance Python applications and accelerate core computing. A security vulnerability exists in the Intel IDP 2018 release